[1] ROY C K, ZIBRAN M F, KOSCHKE R. The vision of software clone management:past, present, and future (keynote paper)[C]//Proceedings of the 2014 IEEE Conference on Software Maintenance, Reengineering and Reverse Engineering. Piscataway:IEEE, 2014:18-33. [2] BELLON S, KOSCHKE R, ANTONIOL G, et al. Comparison and evaluation of clone detection tools[J]. IEEE Transactions on Software Engineering, 2007, 33(9):577-591. [3] ROY C K, CORDY J R. NICAD:Accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization[C]//Proceedings of the 16th IEEE Conference on Program Comprehension. Piscataway:IEEE, 2008:172-181. [4] SHI Q, ZHANG L,YIN L, et al. Clone detection based on suffix array[J]. Computer Engineering, 2013, 39(9):123-127. (史庆庆,张丽萍,尹丽丽,等.基于后缀数组的克隆检测[J].计算机工程,2013,39(9):123-127.) [5] KAMIYA T, KUSUMOTO S, INOUE K. CCFinder:a multilinguistic token-based code clone detection system for large scale source code[J]. IEEE Transactions on Software Engineering, 2002, 28(7):654-670. [6] TOOMEY W. Ctcompare:code clone detection using hashed token sequences[C]//Proceedings of the 6th IEEE International Workshop on Software Clones. Piscataway:IEEE, 2012:92-93. [7] LAVOIE T, MERLO E. Automated type-3 clone oracle using Levenshtein metric[C]//Proceedings of the 5th International Workshop on Software Clones. New York:ACM, 2011:34-40. [8] WAHLER V, SEIPEL D, GUDENBERG J, et al. Clone detection in source code by frequent itemset techniques[C]//Proceedings of the 4th International Workshop on Source Code Analysis and Manipulation. Piscataway:IEEE, 2004:128-135. [9] DAVEY N, BARSON P, FIELD S, et al. The development of a software clone detector[J]. International Journal of Applied Software Technology, 1995, 1(3/4):219-236. [10] LAVOIE T, MERLO E. About metrics for clone detection[J/OL]//Electronic Communications of the EASST, 2014, 63. http://journal.ub.tu-berlin.de/eceasst/article/viewFile/923/915. [11] KRINKE J. Identifying similar code with program dependence graphs[C]//Proceedings of the 8th Working Conference on Reverse Engineering. Piscataway:IEEE, 2001:301-309. [12] KHAN M A A, ROY C K, SCHNEIDER K A. Active clones:source code clones at runtime[J/OL]//Electronic Communications of the EASST, 2014:63. http://www.cs.usask.ca/~croy/papers/2014/KhanIWSC2014ActiveClones.pdf. [13] SAJNANI H, SAINI V, LOPES C. A parallel and efficient approach to large scale clone detection[J]. Journal of Software Evolution & Process, 2015, 7(6):402-429. [14] LIN Y, XING Z, XUE Y, et al. Detecting differences across multiple instances of code clones[C]//Proceedings of the 36th International Conference on Software Engineering. New York:ACM, 2014:164-174. [15] LIN Y, XING Z, PENG X, et al. Clonepedia:summarizing code clones by common syntactic context for software maintenance[C]//Proceedings of the 2014 IEEE International Conference on Software Maintenance and Evolution. Piscataway:IEEE, 2014:341-350. [16] SVAJLENKO J, ROY C K, CORDY J R. A mutation analysis based benchmarking framework for clone detectors[C]//Proceedings of the 7th International Workshop on Software Clones. Piscataway:IEEE, 2013:8-9. [17] ROY C K, SCHNEIDER K. SimCad:an extensible and faster clone detection tool for large scale software systems[C]//Proceedings of the 21st International Conference on Program Comprehension. Piscataway:IEEE, 2013:236-238. [18] ROY C K, CORDY J R, KOSCHKE R. Comparison and evaluation of code clone detection techniques and tools:a qualitative approach[J]. Science of Computer Programming, 2009, 74(7):470-495. [19] SVAJLENKO J, ROY C K. Evaluating modern clone detection tools[C]//Proceedings of the 2014 IEEE International Conference on Software Maintenance and Evolution. Piscataway:IEEE, 2014:321-330. |