[1] WAGNER S, ABDULKHALEQ A, KAYA K, et al. On the relationship of inconsistent software clones and faults: an empirical study[C]//Proceedings of the 23rd International Conference on Software Analysis, Evolution, and Reengineering. Washington, DC: IEEE Computer Society, 2016:79-89. [2] 梅宏, 王千祥, 张路, 等. 软件分析技术进展[J]. 计算机学报, 2009, 32(9): 1697-1710.(MEI H, WANG Q X, ZHANG L, et al. Software analysis technology progress[J]. Chinese Journal of Computers, 2009, 32(9): 1697-1710.) [3] WANG X, DANG Y, ZHANG L, et al. Can I clone this piece of code here?[C]//Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering. Piscataway, NJ: IEEE, 2012: 170-179. [4] 李智超. 基于支持向量机的克隆代码有害性评价方法研究[D]. 哈尔滨:哈尔滨工业大学, 2013:32-34.(LI Z C. Research on SVM-based evaluation method of clone code harmfulness[D]. Harbin: Harbin Institute of Technology, 2013: 32-34.) [5] 张丽萍, 张瑞霞, 王欢, 等. 基于贝叶斯网络的克隆代码有害性预测[J]. 计算机应用, 2016, 36(1):260-265.(ZHANG L P, ZHANG R X, WANG H, et al. Harmfulness prediction of clone code based on Bayesian network[J]. Journal of Computer Applications, 2016, 36(1):260-265.) [6] 尹丽丽. 基于主题模型的克隆代码有害性预测研究[D]. 呼和浩特:内蒙古师范大学, 2014:6-7.(YIN L L. Research on predicting harmfulness of code clones based on the topic model[D]. Hohhot: Inner Mongolia Normal University, 2014:6-7.) [7] INOUE K, HIGO Y, YOSHIDA N, et al. Experience of finding inconsistently-changed bugs in code clones of mobile software[C]//IWSC 2012: Proceedings of the 6th International Workshop on Software Clones. Piscataway, NJ: IEEE, 2012:94-95. [8] JUERGEBS E, DEISSENBOECK F, HUMMEL B, et al. Do code clones matter?[C]//ICSE 2009: Proceedings of the 31st International Conference on Software Engineering. Piscataway, NJ: IEEE, 2009:485-495. [9] STEIDL D, GODE N. Feature-based detection of bugs in clones[C]//IWSC 2013: Proceedings of the 20137th International Workshop on Software Clones. Piscataway, NJ: IEEE, 2013: 76-82. [10] GUYON I, ELISSEEFF A. An introduction to variable and feature selection[J]. Journal of Machine Learning Research, 2002, 3(6):1157-1182. [11] BONEV B, ESCOLANO F, CAZORLA M. Feature selection, mutual information, and the classification of high-dimensional patterns[J]. Formal Pattern Analysis & Applications, 2008, 11(3/4):309-319. [12] MOUSTAKIDIS S P, THEOCHARIS J B. A fast SVM-based wrapper feature selection method driven by a fuzzy complementary criterion[J]. Formal Pattern Analysis & Applications, 2012, 15(4):379-397. [13] MENZIES T, GREENWALD J, FRANK A. Data mining static code attributes to learn defect predictors[J]. IEEE Transactions on Software Engineering, 2007, 33(1):2-13. [14] KOHAVI R, JOHN G H. Wrappers for feature subset selection[J]. Artificial Intelligence, 1997, 97(1/2):273-324. [15] JANECEK A, GANSTERER W N, DEMEL M, et al. On the relationship between feature selection and classification accuracy[EB/OL].[2016-05-10]. http://www.jmlr.org/proceedings/papers/v4/janecek08a/janecek08a.pdf. [16] 张久杰, 王春晖, 张丽萍, 等.基于Token编辑距离检测克隆代码[J]. 计算机应用, 2015, 35(12): 3536-3543.(ZHANG J J, WANG C H, ZHANG L P, et al. Clone code detection based on Levenshtein distance of Token[J]. Journal of Computer Applications, 2015, 35(12):3536-3543.) [17] 涂颖, 张丽萍, 王春晖, 等.基于软件多版本演化提取克隆谱系[J]. 计算机应用, 2015, 35(4): 1169-1173.(TU Y, ZHANG L P, WANG C H, et al. Clone genealogies extraction based on software evolution over multiple versions[J]. Journal of Computer Applications, 2015, 35(4): 1169-1173.) [18] FAWCETT T. An introduction to ROC analysis[J]. Pattern Recognition Letters, 2006, 27(8):861-874. |