Voir la notice de l'article provenant de la source Math-Net.Ru
@article{MAIS_2012_19_6_a5, author = {Marat Akhin and Vladimir Itsykson}, title = {Tree {Slicing} in {Clone} {Detection:} {Syntactic} {Analysis} {Made} {(Semi)-Semantic}}, journal = {Modelirovanie i analiz informacionnyh sistem}, pages = {69--78}, publisher = {mathdoc}, volume = {19}, number = {6}, year = {2012}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/MAIS_2012_19_6_a5/} }
TY - JOUR AU - Marat Akhin AU - Vladimir Itsykson TI - Tree Slicing in Clone Detection: Syntactic Analysis Made (Semi)-Semantic JO - Modelirovanie i analiz informacionnyh sistem PY - 2012 SP - 69 EP - 78 VL - 19 IS - 6 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/MAIS_2012_19_6_a5/ LA - ru ID - MAIS_2012_19_6_a5 ER -
Marat Akhin; Vladimir Itsykson. Tree Slicing in Clone Detection: Syntactic Analysis Made (Semi)-Semantic. Modelirovanie i analiz informacionnyh sistem, Tome 19 (2012) no. 6, pp. 69-78. http://geodesic.mathdoc.fr/item/MAIS_2012_19_6_a5/
[1] A. Deshpande, D. Riehle, “The Total Growth of Open Source”, Conference on Open Source Systems, Springer-Verlag, 2008
[2] C. K. Roy, J. R. Cordy, A Survey on Software Clone Detection Research, TR 2007-541, School of Computing, Queen's University, 2007
[3] M. Kh. Akhin, V. M. Itsykson, “Obnaruzhenie klonov iskhodnogo koda: teoriya i praktika”, Sistemnoe programmirovanie, 5 (2010), 145–163
[4] Z. Li, S. Lu, S. Myagmar, Y. Zhou, “CP-Miner: a Tool for Finding Copy-Paste and Related Bugs in Operating System Code”, Conference on Symposium on Opearting Systems Design Implementation, USENIX Association, Berkeley, 2004, 20
[5] K. Kontogiannis, “Evaluation Experiments on the Detection of Programming Patterns Using Software Metrics”, Working Conference on Reverse Engineering, IEEE Computer Society, Washington, DC, 1997, 44
[6] R. Koschke, R. Falke, P. Frenzel, “Clone Detection Using Abstract Syntax Suffix Trees”, Working Conference on Reverse Engineering, IEEE Computer Society, Washington, DC, 2006, 253–262
[7] B. Hummel, E. Juergens, L. Heinemann, M. Conradt, “Index-based Code Clone Detection: Incremental, Distributed, Scalable”, International Conference on Software Maintenance, IEEE Computer Society, Washington, DC, 2010, 1–9
[8] M. Gabel, L. Jiang, S. Su, “Scalable Detection of Semantic Clones”, International Conference on Software Engineering, IEEE Computer Society, Washington, DC, 2008, 321–330
[9] J. Krinke, “Identifying Similar Code with Program Dependence Graphs”, Working Conference on Reverse Engineering, IEEE Computer Society, Washington, DC, 2001
[10] L. Jiang, G. Misherghi, S. Su, S. Glondu, “DECKARD: Scalable and Accurate Tree-based Detection of Code Clones”, International Conference on Software Engineering, IEEE Computer Society, Washington, DC, 2007, 96–105
[11] A. Andoni, P. Indyk, “Near-optimal Hashing Algorithms for Approximate Nearest Neighbour in High Dimensions”, Commun. ACM, 51:1 (2008), 117–122
[12] W. Evans, C. Fraser, F. Ma, “Clone Detection via Structural Abstraction”, Software Quality Journal, 17:4 (2009), 309–330
[13] P. Bulychev, M. Minea, “Duplicate Code Detection Using Anti-unification”, Spring Young Researchers Colloquium on Software Engineering, 2008, 51–54
[14] T. Kamiya, S. Kusumoto, K. Inoue, “CCFinder: Multilinguistic Token-based Code Clone Detection System for Large Scale Source Code”, IEEE Trans. Softw. Eng., 28:7 (2002), 654–670 | MR