default search action
6th IWSC 2012: Zurich, Switzerland
- James R. Cordy, Katsuro Inoue, Rainer Koschke, Jens Krinke, Chanchal K. Roy:
Proceeding of the 6th International Workshop on Software Clones, IWSC 2012, Zurich, Switzerland, June 4, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-1794-8
Preface
- James R. Cordy, Katsuro Inoue, Rainer Koschke:
Foreword.
Technical Papers
- Thierry Lavoie, Ettore Merlo:
An accurate estimation of the Levenshtein distance using metric trees and Manhattan distance. 1-7 - Antonio Cuomo, Antonella Santone, Umberto Villano:
A novel approach based on formal methods for clone detection. 8-14 - Debarshi Chatterji, Jeffrey C. Carver, Nicholas A. Kraft:
Claims and beliefs about code clones: Do we agree as a community? A survey. 15-21 - Mikkel Jonsson Thomsen, Fritz Henglein:
Clone detection using rolling hashing, suffix trees and dagification: A case study. 22-28 - Manishankar Mondal, Chanchal K. Roy, Kevin A. Schneider:
Dispersion of changes in cloned and non-cloned code. 29-35 - Iman Keivanloo, Chanchal K. Roy, Juergen Rilling:
Java bytecode clone detection via relaxation on code fingerprint and Semantic Web reasoning. 36-42 - Umut Tekin, Ural Erdemir, Feza Buzluca:
Mining object-oriented design models for detecting identical design structures. 43-49 - Nic Volanschi:
Safe clone-based refactoring through stereotype identification and iso-generation. 50-56
Industrial Experience Papers
- Eray Tüzün, Emre Er:
A case study on applying clone technology to an industrial application framework. 57-61 - Radhika D. Venkatasubramanyam, Himanshu K. Singh, K. Ravikanth:
A method for proactive moderation of code clones in IDEs. 62-66 - Yuki Yamanaka, Eunjong Choi, Norihiro Yoshida, Katsuro Inoue, Tateki Sano:
Industrial application of clone change management system. 67-71
Short Papers
- Cory Kapser, Jan Harder, Ira D. Baxter:
A common conceptual model for clone detection results. 72-73 - Toshihiro Kamiya:
Conte∗t clones or re-thinking clone on a call graph. 74-75 - Jiachen Yang, Keisuke Hotta, Yoshiki Higo, Hiroshi Igaki, Shinji Kusumoto:
Filtering clones for individual user based on machine learning analysis. 76-77 - Manar H. Alalfi, James R. Cordy, Thomas R. Dean, Matthew Stephan, Andrew Stevenson:
Near-miss model clone detection for Simulink models. 78-79 - Rochelle Elva, Gary T. Leavens:
Semantic clone detection using method IOE-behavior. 80-81 - Iman Keivanloo, Chanchal K. Roy, Juergen Rilling, Philippe Charland:
Shuffling and randomization for scalable source code clone detection. 82-83 - Matthew Stephan, Manar H. Alalfi, Andrew Stevenson, James R. Cordy:
Towards qualitative comparison of Simulink model clone detection approaches. 84-85 - Benedikt Hauptmann, Veronika Bauer, Maximilian Junker:
Using edge bundle views for clone visualization. 86-87 - Wei Wang, Michael W. Godfrey:
We have all of the clones, now what? Toward integrating clone analysis into software quality assessment. 88-89 - Nils Göde, Benjamin Hummel, Elmar Jürgens:
What clone coverage can tell. 90-91
Tool Demonstrations
- Warren Toomey:
Ctcompare: Code clone detection using hashed token sequences. 92-93 - Katsuro Inoue, Yoshiki Higo, Norihiro Yoshida, Eunjong Choi, Shinji Kusumoto, Kyonghwan Kim, Wonjin Park, Eunha Lee:
Experience of finding inconsistently-changed bugs in code clones of mobile software. 94-95 - Kentaro Yoshimura, Ryota Mibe:
Visualizing code clone outbreak: An industrial case study. 96-97
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.