參考文獻 |
[1] F. Deissenboeck, B. Hummel, E. Juergens, “Code Clone Detection in Practice”, ICSE ’10, Cape Town, South Africa, May 2010.
[2] Martin Fowler, Kent Beck, John Brant, William Opdyke, don Roberts 著,重構─改善既有程式的設計, 2/e (Refactoring: Improving The Design of Existing Code),侯捷、熊節譯,碁峰,台北,民國九十七年。
[3] J. Johnson, Identifying Redundancy in Source Code Using Fingerprints, in: Proceedings of the 1993 Conference of the Centre for Advanced Studies on Collaborative Research, CASCON 1993, pp. 171–183 (1993).
[4] J. Johnson, Visualizing Textual Redundancy in Legacy Source, in: Proceedings of the 1994 Conference of the Centre for Advanced Studies on Collaborative research, CASCON 2004, pp. 171-183 (1994).
[5] S. Ducasse, M. Rieger and S. Demeyer, A Language Independent Approach for Detecting Duplicated Code, in:Proceedings of the 15th International Conference on Software Maintenance, ICSM 1999, pp. 109-118 (1999).
[6] M. Rieger. Effective Clone DetectionWithout Language Barriers, Ph.D. Thesis, University of Bern, Switzerland, 2005.
[7] C.K. Roy and J.R. Cordy, NICAD: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization, in: Proceedings of the 16th IEEE International Conference on Program Comprehension,ICPC 2008, pp. 172-181 (2008).
[8] C.K. Roy and J.R. Cordy, An Empirical Study of Function Clones in Open Source Software Systems, in: Proceedings of the 15th Working Conference on Reverse Engineering, WCRE 2008, pp. 81-90 (2008).
[9] B. Baker, A Program for Identifying Duplicated Code, in: Proceedings of Computing Science and Statistics:24th Symposium on the Interface, Vol. 24:4957, 24:49-57 (1992).
[10] B. Baker, On Finding Duplication and Near-Duplication in Large Software Systems, in: Proceedings of the 2nd Working Conference on Reverse Engineering, WCRE 1995, pp. 86-95 (1995).
[11] I. Baxter, A. Yahin, L. Moura and M. Anna, Clone Detection Using Abstract Syntax Trees, in: Proceedings of the 14th International Conference on Software Maintenance, ICSM 1998, pp. 368-377 (1998).
[12] Project Bauhaus. URL http://www.bauhaus-stuttgart.de Last accessed November 2008.
[13] W. Yang, Identifying Syntactic Differences Between Two Programs, SoftwarePractice and Experience,
21(7):739-755 (1991).
[14] R. Koschke, R. Falke and P. Frenzel, Clone Detection Using Abstract Syntax Suffix Trees, in: Proceedings of the 13th Working Conference on Reverse Engineering, WCRE 2006, pp. 253-262 (2006).
[15] R. Falke, R. Koschke and P. Frenzel, Empirical Evaluation of Clone Detection Using Syntax Suffix Trees,
Empirical Software Engineering, Vol. 13: 601-643 (2008).
[16] R. Tairas and J. Gray, Phoenix-Based Clone Detection Using Suffix Trees, in: Proceedings of the 44th Annual Southeast Regional Conference, ACM-SE 2006, pp. 679-684 (2006).
[17] J. Mayrand, C. Leblanc and E. Merlo. Experiment on the Automatic Detection of Function Clones in a Software System Using Metrics, in: Proceedings of the 12th International Conference on Software Maintenance, ICSM 1996, pp. 244-253 (1996).
[18] K. Kontogiannis, R. DeMori, E. Merlo, M. Galler, and M. Bernstein, Pattern Matching for Clone and Concept Detection, Journal of Automated Software Engineering, 3(1-2):77-108 (1996).
[19] R. Komondoor and S. Horwitz, Using Slicing to Identify Duplication in Source Code, in: Proceedings of the 8th International Symposium on Static Analysis, SAS 2001, pp. 40-56 (2001).
[20] M. Gabel, L. Jiang and Z. Su, Scalable Detection of Semantic Clones, in: Proceedings of the 30th International Conference on Software Engineering, ICSE 2008, pp. 321-330 (2008).
[21] A. Leit˜ao, Detection of Redundant Code Using R2D2, Software Quality Journal, 12(4):361-382 (2004). |