Towards generic representation of web applications: solutions and trade-offs
Software—Practice & Experience
Comparison and evaluation of code clone detection techniques and tools: A qualitative approach
Science of Computer Programming
Accurate and Efficient Structural Characteristic Feature Extraction for Clone Detection
FASE '09 Proceedings of the 12th International Conference on Fundamental Approaches to Software Engineering: Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2009
Complete and accurate clone detection in graph-based models
ICSE '09 Proceedings of the 31st International Conference on Software Engineering
ICSE '09 Proceedings of the 31st International Conference on Software Engineering
Clone detection via structural abstraction
Software Quality Control
Tree-pattern-based duplicate code detection
Proceedings of the ACM first international workshop on Data-intensive software management and mining
An extended assessment of type-3 clones as detected by state-of-the-art tools
Software Quality Control
Incremental clone detection and elimination for erlang programs
FASE'11/ETAPS'11 Proceedings of the 14th international conference on Fundamental approaches to software engineering: part of the joint European conferences on theory and practice of software
Similar code detection and elimination for erlang programs
PADL'10 Proceedings of the 12th international conference on Practical Aspects of Declarative Languages
Anti-unification algorithms and their applications in program analysis
PSI'09 Proceedings of the 7th international Andrei Ershov Memorial conference on Perspectives of Systems Informatics
Detecting source code similarity using code abstraction
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication
Hi-index | 0.00 |
William S. Evans will@cs.ubc.ca Christopher W. Fraser cwfraser@gmail.com Fei Ma Fei.Ma@microsoft.com Abstract This paper describes the design, implementation, and application of a new algorithm to detect cloned code. It operates on the abstract syntax trees formed by many com- pilers as an intermediate representation. It extends prior work by identifying clones even when arbitrary subtrees have been changed. On a 440,000-line code corpus, 20- 50% of the clones it detected were missed by previous meth- ods. The method also identifies cloning in declarations, so it is somewhat more general than conventional procedural abstraction.