[1] ZIBRAN M F, SAHA R K, ASADUZZAMAN M, et al. Analyzing and forecasting near-miss clones in evolving software: an empirical study[C]// Proceedings of the 16th IEEE International Conference on Engineering of Complex Computer Systems. Piscataway: IEEE Press, 2011: 295-304. [2] HARDER J, GODE N. Cloned code: stable code[J]. Journal of Software: Evolution and Process, 2013, 25(10): 1063-1088. [3] CHATTERJI D, CARVER J C, KRAFT N A, et al. Effects of cloned code on software maintainability: a replicated developer study[C]// Proceedings of the 20th IEEE Working Conference on Reverse Engineering. Piscataway: IEEE Press, 2013: 112-121. [4] GODE N, KOSCHKE R. Frequency and risks of changes to clones[C]// Proceedings of the 33rd IEEE International Conference on Software Engineering. Piscataway: IEEE Press, 2011: 311-320. [5] NGUYEN H A, NGUYEN T T, PHAM N H, et al. Clone management for evolving software[J]. IEEE Transactions on Software Engineering, 2012, 38(5): 1008-1026. [6] ZHANG G, PENG X, XING Z, et al. Towards contextual and on-demand code clone management by continuous monitoring[C]// Proceedings of the 28th IEEE/ACM International Conference on Automated Software Engineering. Piscataway: IEEE Press, 2013: 497-507. [7] ROY C K, ZIBRAN M F, KOSCHKE R. The vision of software clone management: past, present, and future (Keynote paper) [C]// Proceedings of the 2014 IEEE Conference on Software Maintenance, Reengineering and Reverse Engineering. Piscataway: IEEE Press, 2014:18-33. [8] PATE J R, TAIRAS R, KRAFT N A. Clone evolution: a systematic review[J]. Journal of Software: Evolution and Process, 2013, 25(3): 261-283. [9] KIM M, SAZAWAL V, NOTKIN D, et al. An empirical study of code clone genealogies[C]// Proceedings of the 10th European Software Engineering Conference Held Jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering. New York: ACM Press, 2005: 187-196. [10] AVERSANO L, CERULO L, PENTA M D. How clones are maintained: an empirical study[C]// Proceedings of the 11st European Conference on Software Maintenance and Reengineering. Piscataway: IEEE Press, 2007: 81-90. [11] ZIBRAN M F, SAHA R K, ROY C K, et al. Evaluating the conventional wisdom in clone removal: a genealogy-based empirical study[C]// Proceedings of the 28th Symposium on Applied Computing. New York: ACM Press, 2013: 1123-1130. [12] XIE S, KHOMH F, ZOU Y, et al. An empirical study on the fault-proneness of clone migration in clone genealogies[C]// Proceedings of the 2013 10th IEEE Working Conference on Mining Software Repositories. Piscataway: IEEE Press,2014: 94-103. [13] SHI Q, MENG F, ZHANG L, et al. Survey of research on code clone technique[J]. Application Research of Computers, 2013, 30(6):1617-1623.(史庆庆,孟繁军,张丽萍,等.克隆代码技术研究综述[J]. 计算机应用研究, 2013, 30(6): 1617-1623.) [14] THUMMALAPENTA S, CERULO L, AVERSANO L, et al. An empirical study on the maintenance of source code clones[J]. Empirical Software Engineering, 2009, 15(1): 1-34. [15] BAKOTA T. Tracking the evolution of code clones[C]// Proceedings of the 37th International Conference on Current Trends in Theory and Practice of Computer Science. Berlin: Springer-Verlag,2011: 86-98. [16] GODE N, KOSCHKE R. Studying clone evolution using incremental clone detection[J]. Journal of Software: Evolution and Process, 2013, 25(2): 165-192. [17] CI M. Research on clone genealogy extracting method based on CRD clone group mapping[D]. Harbin: Harbin Institute of Technology, 2013.(慈萌. 基于CRD克隆群映射的克隆家系提取方法研究[D]. 哈尔滨:哈尔滨工业大学, 2013.) [18] DUALA-EKOKO E, ROBILLARD M P. Clone region descriptors: representing and tracking duplication in source code[J]. ACM Transactions on Software Engineering and Methodology, 2010, 20(1): 1-31. [19] SAHA R K, ASADUZZAMAN M, ZIBRAN M F, et al. Evaluating code clone genealogies at release level: an empirical study[C]// Proceedings of the 10th Working Conference on Source Code Analysis and Manipulation. Piscataway: IEEE Press, 2010: 87-96. [20] SAHA R K, ROY C K, SCHNEIDER K A. gCad: a near-miss clone genealogy extractor to support clone evolution analysis[C]// Proceedings of the 29th International Conference on Software Maintenance. Piscataway: IEEE Press, 2013: 488-491. [21] SHI Q, ZHANG L, YIN L, et al. Clone detection based on suffix array[J]. Computer Engineering, 2013, 39(9):123-127.(史庆庆, 张丽萍, 尹丽丽, 等. 基于后缀数组的克隆检测[J]. 计算机工程, 2013, 39(9):123-127.) |