[1] BETTENBURG N, SHANG W, IBRAHIM W, et al. An empirical study on inconsistent changes to code clones at release level[C]//Proceedings of the 200916th Working Conference on Reverse Engineering. Piscataway, NJ:IEEE, 2009:85-94. [2] KOSCHKE R. Seventh international workshop on software clones[EB/OL].[2016-02-15]. http://softwareclones.org/iwsc2013/. [3] ROY C K. Detection and analysis of near-miss software clones[C]//Proceedings of the 2009 IEEE International Conference on Software Maintenance. Washington, DC:IEEE Computer Society, 2009:447-450. [4] 梅宏,王千祥,张路,等.软件分析技术进展[J].计算机学报,2009,32(9):1697-1710.(MEI H, WANG Q X, ZHANG L, et al. Software analysis technology progress[J]. Chinese Journal of Computers, 2009, 32(9):1697-1710.) [5] WANG X, DANG Y, ZHANG L, et al. Can I clone this piece of code here?[C]//Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering. New York:ACM, 2012:170-179. [6] 李智超.基于支持向量机的克隆代码有害性评价方法研究[D].哈尔滨:哈尔滨工业大学,2013:15-17.(LI Z C. Research on SVM-based evaluation method of clone code harmfulness[D]. Harbin:Harbin Institute of Technology, 2013:15-17.) [7] BAKOTA T. Tracking the evolution of code clones[C]//SOFSEM 2011:Proceedings of the 37th Conference on Current Trends in Theory and Practice of Computer Science, LNCS 6543. Berlin:Springer, 2011:86-98. [8] BAKOTA T, FERENC R, GYIMOTHY T. Clone smells in software evolution[C]//ICSM 2007:Proceedings of the 2007 IEEE International Conference on Software Maintenance. Piscataway, NJ:IEEE, 2007:24-33. [9] JUERGEBS E, DEISSENBOECK F, HUMMEL B, et al. Do code clones matter?[C]//ICSE 2009:Proceedings of the 31st International Conference on Software Engineering. Piscataway, NJ:IEEE, 2009:485-495. [10] BARBOUR L, KHOMH F, ZOU Y. An empirical study of faults in late propagation clone genealogies[J]. Journal of Software:Evolution and Process, 2013, 25(11):1139-1165. [11] CHAWLA N V, BOWYER K W, HALL L O,et al. SMOTE:synthetic minority over-sampling technique[J]. Journal of Artificial Intelligence Research, 2011, 16(1):321-357. [12] ESTABROOKS A, JO T, JAPKOWICZ N. A multiple resampling method for learning from imbalanced data sets[J]. Computational Intelligence, 2004, 20(1):18-36. [13] JAPKOWICZ N, MYERS C, GLUCK M A. A novelty detection approach to classification[C]//IJCAI'95:Proceedings of the 14th International Joint Conference on Artificial Intelligence. San Francisco, CA:Morgan Kaufmann Publishers, 1995:518-523. [14] ZHOU Z H, LIU X Y. Training cost-sensitive neural networks with methods addressing the class imbalance problem[J]. IEEE Transactions on Knowledge and Data Engineering, 2006, 18(1):63-77. [15] HO T K, HULL J J, SRIHARI S N. Decision combination in multiple classifier systems[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1994, 16(1):66-75. [16] ROKACH L. Ensemble-based classifiers[J]. Artificial Intelligence Review, 2010, 33(1/2):1-39. [17] WANG S, CHEN H., YAO X. Negative correlation learning for classification ensembles[C]//Proceedings of the 2010 IEEE International Joint Conference on Neural Networks. Piscataway, NJ:IEEE, 2010:2893-2900. [18] WANG S, YAO X. Using class imbalance learning for software defect prediction[J]. IEEE Transactions on Reliability, 2013, 62(2):434-443. [19] BREIMAN L. Bagging predictors[J]. Machine Learning, 1996, 24(2):123-140. [20] BROWN G, WYATT J L, TINO P. Managing diversity in regression ensembles[J]. Journal of Machine Learning Research, 2005, 6(1):1621-1650. [21] TANG E K, SUGANTHAN P N, YAO X. An analysis of diversity measures[J]. Machine Learning, 2006, 65(1):247-271. [22] MANI I, ZHANG B J. KNN approach to unbalanced data distributions:a case study involving information extraction[C]//Proceedings of the 2003 Workshop on Learning from Imbalanced Datasets Ⅱ. Washington DC:ICML, 2003:42-48. [23] SEIFFERT C, KHOSHGOFTAAR T M, HULSE J V, et al. A comparative study of data sampling and cost sensitive learning[C]//Proceedings of the 2008 IEEE International Conference on Data Mining Workshops. Washington, DC:IEEE Computer Society, 2008:46-52. [24] 侯敏,张丽萍,史庆庆,等.基于后缀数组检测函数克隆[J].计算机应用研究,2014,31(4):1082-1085.(HOU M, ZHANG L P, SHI Q Q, et al. Detecting code clone based on suffix array[J]. Application Research of Computers, 2014, 31(4):1082-1085.) [25] 张瑞霞,张丽萍,王春晖,等.基于主题建模技术的克隆群映射方法[J].计算机工程与设计,2015,36(6):1524-1529.(ZHANG R X, ZHANG L, WANG C H, et al. Clone group mapping method based on topic modeling[J]. Journal of Computer Engineering and Design, 2015, 36(6):1524-1529.) [26] 涂颖,张丽萍,王春晖,等.基于软件多版本演化提取克隆谱系[J].计算机应用,2015,35(4):1169-1173.(TU Y, ZHANG L P, WANG C H, et al. Clone genealogies extraction based on software evolution over multiple versions[J]. Journal of Computer Applications, 2015, 35(4):1169-1173.) [27] WITTEN I H, FRANK E. Data Mining:Practical Machine Learning Tools and Techniques[M]. 2nd ed. San Francisco, CA:Morgan Kaufmann Publishers, 2005:206-207. [28] 张丽萍,张瑞霞,王欢,等.基于贝叶斯网络的克隆代码有害性预测[J].计算机应用,2016,36(1):260-265.(ZHANG L P, ZHANG R X, WANG H, et al. Harmfulness prediction of clone code based on Bayesian network[J]. Journal of Computer Applications, 2016, 36(1):260-265.) |