[1] JIN Zhi,ZHOU Minghui,ZHANG Yuxia.Open source software and its eco-systems:today and tommorow[J].Science and Technology Review,2016,34(14):42-48.(in Chinese) 金芝,周明辉,张宇霞.开源软件与开源软件生态:现状与趋势[J].科技导报,2016,34(14):42-48. [2] GitHub.GitHub official website[EB/OL].[2019-01-14].https://www.github.com/. [3] OpenHub.OpenHub official website[EB/OL].[2019-01-14].https://www.openhub.net/. [4] StackOverflow.StackOverflow official website[EB/OL].[2019-01-14].https://stackoverflow.com/. [5] Wikipedia.GNU general public licence[EB/OL].[2019-01-14].https://en.wikipedia.org/wiki/GNU_General_Public_License. [6] Wikipedia.GNU lesser general public license[EB/OL].[2019-01-14].https://en.wikipedia.org/wiki/GNU_Lesser_General_Public_License. [7] Apache Software Foundation.Apachelicense v2[EB/OL].[2019-01-14].https://www.apache.org/licenses/LICENSE-2.0. [8] Wikipedia.BSD licenses[EB/OL].[2019-01-14].https://en.wikipedia.org/wiki/BSD_licenses#2-clause. [9] OSI.Open source initiative official website[EB/OL].[2019-01-14].http://www.opensource.org/. [10] Microsoft apologizes:GPL open source code is used in Win7 tools[EB/OL].[2019-01-14].http://news.mydrivers.com/1/148/148809.htm.(in Chinese) 微软致歉:Win7工具中使用了GPL开源代码[EB/OL].[2019-01-14].http://news.mydrivers.com/1/148/148809.htm. [11] Wikipedia.Google的Java侵权案[EB/OL].[2019-01-14].https://zh.wikipedia.org/wiki/Android. [12] LU Ying.Gartner:details of the top ten security projects in 2018(3)[J].Computer and Network,2018,44(24):48-49.(in Chinese) 陆英.Gartner:2018年十大安全项目详解(三)[J].计算机与网络,2018,44(24):48-49. [13] Wikipedia.Diff[EB/OL].[2019-01-14].https://en.wikipedia.org/wiki/Diff. [14] Araxis Merge.Araxis official website[EB/OL].[2019-01-14].https://www.araxis.com/. [15] XIONG Hao,YAN Haihua,GUO Tao,et al.Code similarity detection:a survey[J].Computer Science,2010,37(8):9-14,76.(in Chinese) 熊浩,晏海华,郭涛,等.代码相似性检测技术:研究综述[J].计算机科学,2010,37(8):9-14,76. [16] AHO A V,LAM M S,SETHI R,et al.Compilers:principles,techniques,and tools 2nd edition[EB/OL].[2019-01-14].https://pdfs.semanticscholar.org/b7ec/eec1e8edfa769fdd095db16897a061b02a79.pdf. [17] Apache Lucene.Apache Lucene official website[EB/OL].[2019-01-14].https://lucene.apache.org/. [18] Searchcode.Searchcode official website[EB/OL].[2019-01-14].https://searchcode.com/. [19] ROBERT D,NGUYEN H A,RAJAN H,et al.Boa:a language and infrastructure for analyzing ultra-large-scale software repositories[C]//Proceedings of 2013 International Conference on Software Engineering.Washington D.C.,USA:IEEE Press,2013:422-431. [20] HUMMEL B,JUERGENS E,HEINEMANN L,et al.Index-based code clone detection:incremental,distributed,scalable[C]//Proceedings of 2010 IEEE International Conference on Software Maintenance.Washington D.C.,USA:IEEE Press,2010:1-9. [21] QIAO Yanchen,YUN Xiaochun,TUO Yupeng,et al.Fast reused code tracing method based on Simhash and inverted index[J].Journal on Communications,2016,37(11):104-113.(in Chinese) 乔延臣,云晓春,庹宇鹏,等.基于Simhash与倒排索引的复用代码快速溯源方法[J].通信学报,2016,37(11):104-113. [22] ZHAI Liang,ZHANG Gang,ZHAO Fengyu.Method and implementation of code infringement detection based on local proxy and index information[J].Software Guide,2017,16(6):5-10.(in Chinese) 寨亮,张刚,赵逢禹.基于本地代理和索引信息的代码侵权检测方法[J].软件导刊,2017,16(6):5-10. [23] WANG Shuyan,LUO Dan,SUN Jiaze.Fault location method based on variable slicing and association rule[J].Computer Engineering,2018,44(7):74-79,85.(in Chinese) 王曙燕,罗丹,孙家泽.基于变量切片与关联规则的错误定位方法[J].计算机工程,2018,44(7):74-79,85. [24] LIU Xuliang,ZHONG Hao.A program automatic repair method based on StackOverflow analysis[J].Computer Engineering,2018,44(10):95-100.(in Chinese) 刘旭亮,钟浩.一种基于StackOverflow分析的程序自动修复方法[J].计算机工程,2018,44(10):95-100. [25] 2018 open source code security report[EB/OL].[2019-01-14].http://baijiahao.baidu.com/s?id=1605216054132051304.(in Chinese) 2018开源代码安全报告[EB/OL].[2019-01-14].http://baijiahao.baidu.com/s?id=1605216054132051304. [26] Black Duck Software Inc.Black Duck Software official website[EB/OL].[2019-01-14].http://www.blackducksoftware.com/. [27] Palamida Inc.Palamida official website[EB/OL].[2019-01-14].http://www.palamida.com/. [28] SADOWSKI C,LEVIN G.Simhash:hash-based similarity detection[EB/OL].[2019-01-16].http://www.googlecode.com/sun/trunk/paper/Sim Hash with Bib.pdf,2007. [29] Hibernate.GitHub[EB/OL].[2019-01-16].https://github.com/hibernate/. [30] Apache Web Server.The apache software foundation[EB/OL].[2019-01-16].https://github.com/apache/. [31] JACKSON D,RINARD M.Software analysis:a roadmap[C]//Proceedings of Conference on the Future of Software Engineering.[S.l.]:DBLP,2000:133-145. [32] Wikipedia.Unified Diff format[EB/OL].[2019-01-16].https://en.wikipedia.org/wiki/Diff#Context_format. [33] PENG Jiayin.Lattice-valued pushdown automata and lattice-valued context-free grammars[J].Computer Engineering and Applications,2011,47(25):34-38,48.(in Chinese)彭家寅.格值下推自动机与格值上下文无关文法[J].计算机工程与应用,2011,47(25):34-38,48. [34] MANKU G S,JAIN A,DAS SARMA A.Detecting near-duplicates for Web crawling[C]//Proceedings of the 16th International Conference on World Wide Web.New York,USA:ACM Press,2007:141-150. [35] CAO Hai,SUN Jing,SHI Xibin.Short text duplicate removal algorithm based on feature iteration[J].Computer Engineering,2015,41(12):54-57,63.(in Chinese)曹海,孙婧,史喜斌.基于特征迭代的短文本去重算法[J].计算机工程,2015,41(12):54-57,63. |