[1] BETTENBURG N, SHANG W, IBRAHIM W, et al. An empirical study on inconsistent changes to code clones at release level [C]// Proceedings of the 2009 16th Working Conference on Reverse Engineering. Piscataway, NJ: IEEE, 2009: 85-94. [2] ZIBRAN M F, ROY C K. The road to software clone management: a survey [R]. Saskatchewan, Canada: University of Saskatchewan, 2012: 1-66. [3] KOSCHKE R. Seventh international workshop on softwareclones [EB/OL]. [2015-02-15]. http://softwareclones.org/iwsc2013/. [4] ROY K C. Detection and analysis of near-miss software clones [C]// ICSM 2009: Proceedings of the Doctoral Symposium Track of the 25th IEEE International Conference on Software Maintenance. Piscataway, NJ: IEEE, 2009: 447-450. [5] 叶进,林士敏.基于贝叶斯网络的推理在移动客户流失分析中的应用[J].计算机应用,2005,25(3):673-675.(YE J, LIN S M. Application of Bayesian network in subscriber churn analysis of wireless carriers [J]. Journal of computer applications, 2005, 25(3): 673-675.) [6] BAKOTA T. Tracking the evolution of code clones [C]// SOFSEM 2011: Proceedings of the 37th Conference on Current Trends in Theory and Practice of Computer Science, LNCS 6543. Berlin: Springer, 2011: 86-98. [7] BAKOTA T, FERENC R, GYIMOTHY T. Clone smells in software evolution [C]// ICSM'07: Proceedings of the 2007 International Conference on Software Maintenance. Piscataway, NJ: IEEE, 2007: 24-33. [8] JUERGEBS E, DEISSENBOECK F, HUMMEL B, et al. Do code clones matter? [C]// ICSE'09: Proceedings of the 31st International Conference on Software Engineering. Piscataway, NJ: IEEE, 2009: 485-495. [9] BARBOUR L, KHOMH F, ZOU Y. An empirical study of faults in late propagation clone genealogies [J]. Journal of software: evolution and process, 2013, 25(11): 1137-1138. [10] 史庆庆,张丽萍,尹丽丽,等.基于后缀数组的克隆检测[J].计算机工程,2013,39(9):123-127.(SHI Q Q, ZHANG L P, YIN L L, et al. Clone detection based on suffix array [J]. Computer engineering, 2013, 39(9): 123-127.) [11] SHI Q, ZHANG L, MENG F, et al. A novel detection approach for statement clones [C]// Proceedings of the 2013 4th IEEE International Conference on Software Engineering and Service Science. Piscataway, NJ: IEEE, 2013: 27-30. [12] 侯敏,张丽萍,史庆庆,等.基于后缀数组检测函数克隆[J].计算机应用研究,2014,31(4):1082-1085.(HOU M, ZHANG L P, SHI Q Q, et al. Detecting function clone based on suffix array [J]. Application research of computers, 2014, 31(4): 1082-1085.) [13] 张瑞霞,张丽萍,王春晖,等.基于主题建模技术的克隆群映射方法[J].计算机工程与设计,2015,36(6):1524-1529.(ZHANG R X, ZHANG L P, WANG C H, et al. Clone group mapping method based on topic modeling [J]. Computer engineering and design, 2015, 36(6): 1524-1529.) [14] 涂颖,张丽萍,王春晖,等.基于软件多版本演化提取克隆谱系[J].计算机应用,2015,35(4):1169-1173.(TU Y, ZHANG L P, WANG C H, et al. Clone genealogies extraction based on software evolution over multiple versions [J]. Journal of computer applications, 2015, 35(4): 1169-1173.) |