[1] KAMIYA T, KUSUMOTO S, INOUE K. CCFinder:a multilinguistic token-based code clone detection system for large scale source code[J]. IEEE Transactions on Software Engineering, 2002, 28(7):654-670. [2] ZIBRAN M F, ROY C K. IDE-based real-time focused search for near-miss clone[C]//Proceedings of the 27th Annual ACM Symposium on Applied Computing. New York:ACM, 2012:1235-1242. [3] BETTENBURG N, SHANG W, IBRAHIM W, et al. An empirical study on inconsistent changes to code clones at release level[C]//WCRE'09:Proceedings of the 2009 Working Conference on Reverse Engineering. Piscataway, NJ:IEEE, 2009:85-94. [4] ROY C K, CORDY J R, KOSCHKE R. Comparison and evaluation of code clone detection techniques and tools:a qualitative approach[J]. Science of Computer Programming, 2009, 74(7):470-495. [5] ZIBRAN F M, SAHA R, ASADUZZAMAN M, et al. Analyzing and forecasting near-miss clones in evolving software:an empirical study[C]//Proceedings of the 16th IEEE International Conference on Engineering of Complex Computer Systems. Washington, DC:IEEE Computer Society, 2011:295-304. [6] ROY C K, CORDY J R. Near-miss function clones in open source software:an empirical study[J]. Journal of Software Maintenance & Evolution Research & Practice, 2010, 22(3):165-189. [7] BASIT H A, PUGLISⅡ S J, SMYTH W F, et al. Efficient token based clone detection with flexible tokenization[C]//ESEC-FSE'07:Proceedings of the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering. New York:ACM, 2007:513-516. [8] DUALA-EKOKO E, ROBILLARD M P. Clonetracker:tool support for code clone management[C]//Proceedings of the 2008 International Conference on Software Engineering. New York:ACM, 2008:843-846. [9] APDAN M, AKTAS M, YIGITI M. On the structural code clone detection problem:a survey and software metric based approach[C]//ICCSA 2014:Proceedings of the 14th International Conference on Computational Science and Its Applications. Berlin:Springer, 2014:492-507. [10] CUOMO A, SANTONE A, VILLANO U. A novel approach based on formal methods for clone detection[C]//Proceedings of the 2012 International Workshop on Software Clones. Piscataway, NJ:IEEE, 2012:8-14. [11] CALEFATO F, LANUBILE F, MALLARDO T. Function clone detection in Web applications:a semiautomated approach[J]. Journal of Web Engineering, 2004, 3(1):3-21. [12] 史庆庆,张丽萍,尹丽丽,等.基于后缀数组的克隆检测[J].计算机工程,2013,39(9):123-127.(SHI Q Q, ZHANG L P, YIN L L, et al. Clone detection based on suffix array[J]. Computer Engineering, 2013, 39(9):123-127.) [13] 张久杰,王春晖,张丽萍,等.基于Token编辑距离检测克隆代码[J].计算机应用,2015,35(12):3536-3543.(ZHANG J J, WANG C H, ZHANG L P, et al. Clone code detection based on Token edit distance[J]. Journal of Computer Applications, 2015, 35(12):3536-3543.) [14] OPDYKE W F. Refactoring Object Frame Works[M]. Urban-Champaign:University of Illinois at Urban-Champaign, 1992:18-35. [15] BAKOTA T. Tracking the evolution of code clones[C]//Proceedings of the 37th International Conference on Current Trends in Theory and Practice of Computer Science. Berlin:Springer, 2011:86-98. [16] RAHMAN M M, RIYADH R R, RAHMAN M R. Recommendation of move method refactorings using coupling, cohesion and contextual similarity[C]//Proceedings of the 2007 IEEE International Conference on Imaging, Vision & Pattern Recognition. Piscataway, NJ:IEEE, 2017[2017-12-10]. https://ieeexplore.ieee.org/document/7890876/. [17] FOWLER M. Refactoring:improving the design of existing code[C]//XP/Agile Universe 2002:Proceedings of the Second XP Universe and First Agile Universe Conference on Extreme Programming and Agile Methods, LNCS 2418. Berlin:Springer, 1999:256. [18] DEMEYER S, DUCASSE S, NIERSTRASZ O. Finding refactor-ings via change metrics[J]. ACM SIGPLAN Notices, 2000, 35(10):166-177. [19] WANG X. Can i clone this piece of code here?[C]//Proceedings of the 2012 IEEE/ACM International Conference on Automated Software Engineering. New York:ACM, 2012:170-179. [20] STEIDL D, GÖDE N. Feature-based detection of bugs in clones[C]//Proceedings of the 2013 International Workshop on Software Clones. Piscataway, NJ:IEEE, 2013:76-82. [21] 王欢,张丽萍,闫盛,等.克隆代码有害性预测中的特征选择模型[J].计算机应用,2017,37(4):1135-1142.(WANG H, ZHANG L P, YAN S, et al. Feature selection model in predicting harmfulness of cloned code[J]. Journal of Computer Applications, 2017, 37(4):1135-1142.) [22] 袁悦.基于复制粘贴操作的克隆代码一致性维护需求预测方法[D].哈尔滨:哈尔滨工业大学,2016:30-32.(YUAN Y. Prediction method of consistency maintaining clone code based on copy and paste operation[D]. Harbin:Harbin Institute of Technology, 2016:30-32.) [23] WANG W, GODFREY M W. Recommending clones for refactoring using design, context, and history[C]//Proceedings of the 2014 IEEE International Conference on Software Maintenance and Evolution. Piscataway, NJ:IEEE, 2014:331-340. [24] 赵玉武,翟晔,刘东升.基于bugs的克隆代码稳定性评估方法[J].计算机应用研究,2017,34(4):1109-1113.(ZHAO Y W, ZHAI Y, LIU D S. Studies on the stability of clone code based on bugs[J]. Application Research of Computers, 2017, 34(4):1109-1113.) [25] 刘冬瑞,刘东升,张丽萍,等.基于贝叶斯网络预测克隆代码质量[J].计算机科学,2017,44(4):165-168.(LIU D R, LIU D S, ZHANG L P, et al. Prediction of clone code quality based on Bayesian network[J]. Computer Science, 2017, 44(4):165-168.) [26] KOSKER Y, TURHAN B, BENER A. An expert system for determining candidate software classes for refactoring[J]. Expert Systems with Applications, 2009, 36(6):10000-10003. |