[1] ROY C K, ZIBRAN M F, KOSCHKE R. The vision of software clone management:past, present, and future (Keynote paper)[C]//Proceedings of the 2014 IEEE Conference on Software Maintenance, Reengineering and Reverse Engineering. Piscataway, NJ:IEEE, 2014:18-33. [2] BELLON S, KOSCHKE R, ANTONIOL G, et al. Comparison and evaluation of clone detection tools[J]. IEEE Transactions on Software Engineering, 2007, 33(9):577-591. [3] PATE J R, TAIRAS R, KRAFT N A. Clone evolution:a systematic review[J]. Journal of Software:Evolution and Process, 2013, 25(3):261-283. [4] BARBOUR L, KHOMH F, ZOU Y. An empirical study of faults in late propagation clone genealogies[J]. Journal of Software:Evolution and Process, 2013, 25(11):1139-1165. [5] LAGUE B, PROULX D, MAYRAND J, et al. Assessing the benefits of incorporating function clone detection in a development process[C]//Proceedings of the 1997 IEEE International Conference on Software Maintenance. Piscataway, NJ:IEEE, 1997:314-321. [6] ANTONIOL G, VILLANO U, MERLO E, et al. Analyzing cloning evolution in the Linux kernel[J]. Information and Software Technology, 2002, 44(13):755-765. [7] GÖDE N. Clone Evolution[M]. Berlin:Springer, 2011:3-4. [8] KIM M, SAZAWAL V, NOTKIN D, et al. An empirical study of code clone genealogies[J]. ACM SIGSOFT Software Engineering Notes, 2005, 30(5):187-196. [9] KIM M, NOTKIN D. Using a clone genealogy extractor for understanding and supporting evolution of code clones[J]. ACM SIGSOFT Software Engineering Notes, 2005, 30(4):1-5. [10] ZIBRAN M F, SAHA R K, ROY C K, et al. Evaluating the conventional wisdom in clone removal:a genealogy-based empirical study[C]//Proceedings of the 28th Annual ACM Symposium on Applied Computing. New York:ACM, 2013:1123-1130. [11] SAHA R K, ASADUZZAMAN M, ZIBRAN M F, et al. Evaluating code clone genealogies at release level:an empirical study[C]//Proceedings of the 10th IEEE Working Conference on Source Code Analysis and Manipulation. Piscataway, NJ:IEEE, 2010:87-96. [12] GÖDE N, KOSCHKE R. Studying clone evolution using incremental clone detection[J]. Journal of Software:Evolution and Process, 2013, 25(2):165-192. [13] BAKOTA T. Tracking the Evolution of Code Clones[M]. Berlin:Springer, 2011:86-98. [14] YING T, LI P Z, CHUN H W, et al. Extract function clone genealogies across multiple versions[J]. International Journal of Security and Its Applications, 2015, 9(6):167-182. [15] SAHA R K, ROY C K, SCHNEIDER K. gCad:a near-miss clone genealogy extractor to support clone evolution analysis[C]//Proceedings of the 2013 IEEE International Conference on Software Maintenance. Piscataway, NJ:IEEE, 2013:488-491. [16] MENG C, XIAO H, TIAN T, et al. A new clone group mapping algorithm for extracting clone genealogy on multi-version software[C]//Proceedings of the 2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control. Piscataway, NJ:IEEE, 2013:848-853. [17] BAKOTA T, FERENC R, GYIMOTHY T. Clone smells in soft-ware evolution[C]//Proceedings of the 23rd International Conference on Software Maintenance. Piscataway, NJ:IEEE, 2007:24-33. [18] AVERSANO L, CERULO L, PENTA M D. How clones are maintained:an empirical study[C]//Proceedings of the 11st European Conference on Software Maintenance and Reengineering. Piscataway, NJ:IEEE, 2007:81-90. [19] THUMMALAPENTA S, CERULO L, AVERSANO L, et al. An empirical study on the maintenance of source code clones[J]. Empirical Software Engineering, 2009, 15(1):1-34. [20] KUHN A, DUCASSE S, GíRBA T. Semantic clustering:identifying topics in source code[J]. Information and Software Technology, 2007, 49(3):230-243. [21] THOMAS S W, ADAMS B, HASSAN A E, et al. Validating the use of topic models for software evolution[C]//Proceedings of the 2010 IEEE Conference on Source Code Analysis and Manipulation. Piscataway, NJ:IEEE, 2010:55-64. [22] THOMAS S W, ADAMS B, HASSAN A E, et al. Studying software evolution using topic models[J]. Science of Computer Programming, 2014, 80:457-479. [23] ASUNCION H U, ASUNCION A U, TAYLOR R N. Software traceability with topic modeling[C]//Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering. New York:ACM, 2010:95-104. [24] 金靖,李萌,华哲邦,等.一种基于LDA和静态分析的代码功能识别方法[J].计算机工程与应用,2013,49(15):27-31.(JIN J, LI M, HUA Z B, et al. Code function recognition approach based on LDA and static analysis[J]. Computer Engineering and Applications, 2013, 49(15):27-31.) [25] 张瑞霞,张丽萍,王春晖,等.基于主题建模技术的克隆群映射方法[J].计算机工程与设计,2015,36(6):1524-1529.(ZHANG R X, ZHANG L P, WANG C H, et al. Clone group mapping method based on topic modeling[J]. Computer Engineering and Design, 2015, 36(6):1524-1529.) [26] PHAN X H, NGUYEN L M, HORIGUCHI S. Learning to classify short and sparse text & Web with hidden topics from large-scale data collections[C]//Proceedings of the 17th International Conference on World Wide Web. New York:ACM, 2008:91-100. [27] JUERGENS E, DEISSENBOECK F, HUMMEL B. Clonedetective-a workbench for clone detection research[C]//Proceedings of the 31st International Conference on Software Engineering. Piscataway, NJ:IEEE, 2009:603-606. [28] 张久杰,王春辉,张丽萍,等.基于Token编辑距离检测克隆代码[J].计算机应用,2015,35(12):3536-3543.(ZHANG J J, WANG C H, ZHANG L P, et al. Clone code detection based on Levenshtein distance of token[J]. Journal of Computer Applications, 2015, 35(12):3536-3543.) [29] LIN Y, XING Z, PENG X, et al. Clonepedia:summarizing code clones by common syntactic context for software maintenance[C]//Proceedings of the 2014 IEEE International Conference on Software Maintenance and Evolution. Piscataway, NJ:IEEE, 2014:341-350. |