[1] NGUYEN H A, NGUYEN T T, PHAM N H, et al. Clone management for evolving software[J]. IEEE Transactions on Software Engineering, 2012, 38(5):1008-1026. [2] ZIBRAN M F, ROY C K. The road to software clone management:a survey:TR 2012-03[R]. Saskatoon, Canada:University of Saskatchewan, 2012:1-66. [3] RATTAN D, BHATIA R, SINGH M, Software clone detection:a systematic review[J]. Information & Software Technology, 2013, 55(7):1165-1199. [4] 史庆庆,孟繁军,张丽萍,等.克隆代码技术研究综述[J].计算机应用研究,2013,30(6):1617-1623. (SHI Q Q, MENG F J, ZHANG L P, et al. Survey of research on code clone technique[J]. Application Research of Computers, 2013, 30(6):1617-1623.) [5] HIGO Y, HOTTA K, KUSUMOTO S. Enhancement of CRD-based clone tracking[C]//IWPSE 2013:Proceedings of the 2013 International Workshop on Principles of Software Evolution. New York:ACM, 2013:28-37. [6] GÖDE N, KOSCHKE R. Incremental clone detection[C]//CSMR 2009:Proceedings of the 13th European Conference on Software Maintenance and Reengineering. Washington, DC:IEEE Computer Society, 2009:219-228. [7] BAKOKA T, FERENC R, GYIMOTHY T. Clone smells in software evolution[C]//ICSM 2007:Proceedings of the 2007 IEEE International Conference on Software Maintenance. Piscataway, NJ:IEEE, 2007:24-33. [8] THUMMALAPENTA S, CERULO L, AVERSANO L, et al. An empirical study on the maintenance of source code clones[J]. Empirical Software Engineering, 2010, 15(1):1-34. [9] SAHA R K, ROY C K, SCHNEIDER K A. An automatic framework for extracting and classifying near-miss clone genealogies[C]//Proceedings of the 201127th IEEE International Conference on Software Maintenance. Piscataway, NJ:IEEE, 2011:293-302. [10] CI M, SU X H, WANG T T, et al. A new clone group mapping algorithm for extracting clone genealogy on multi-version software[C]//IMCCC'13:Proceedings of the 2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control. Washington, DC:IEEE Computer Society, 2013:848-853. [11] 张瑞霞,张丽萍,王春晖,等.基于主题建模技术的克隆群映射方法[J].计算机工程与设计,2015,36(6):1524-1529.(ZHANG R X, ZHANG L P, WANG C H, et al. Clone group mapping method based on topic modeling[J]. Computer Engineering and Design, 2015, 36(6):1524-1529.) [12] 涂颖,张丽萍,王春晖,等.基于软件多版本演化提取克隆谱系[J].计算机应用,2015,35(4):1169-1173,1178(TU Y, ZHANG L P, WANG C H, et al. Clone genealogies extraction base on software evolution over multiple versions[J]. Journal of Computer Applications, 2015, 35(4):1169-1173, 1178.) [13] KIM M, SAZAWAL V, NOTKIN D, et al. An empirical study of code clone genealogies[C]//ESEC/FSE-13:Proceedings of the 200510th European Software Engineering Conference Held Jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering. New York:ACM, 2005:187-196. [14] 陈桌, 张丽萍, 王欢,等.基于改进向量空间模型的克隆群映射方法[J].计算机应用,2016,36(7):2031-2037.(CHEN Z, ZHANG L P, WANG H, et al. Clone group mapping method based on improved vector space model[J]. Journal of Computer Applications, 2016, 36(7):2031-2037.) [15] 张久杰,王春晖,张丽萍,等.基于Token编辑距离检测克隆代码[J].计算机应用,2015,35(12):3536-3543.(ZHANG J J, WANG C H, ZHANG L P, et al. Code clone detection based on Levenshtein distance of token[J]. Journal of Computer Applications, 2015, 35(12):3536-3543.) [16] 张丽萍,张瑞霞,王欢,等.基于贝叶斯网络的克隆代码有害性预测[J].计算机应用,2016,36(1):260-265.(ZHANG L P, ZHANG R X, WANG H, et al. Harmfulness prediction of clone code based on Bayesian network[J]. Journal of Computer Applications, 2016, 36(1):260-265.) |