Structure and interpretation of computer programs
Structure and interpretation of computer programs
Object-oriented programming with flavors
OOPLSA '86 Conference proceedings on Object-oriented programming systems, languages and applications
Introduction to artificial intelligence
Introduction to artificial intelligence
Common LISPcraft
Software engineering metrics and models
Software engineering metrics and models
LISP
A programmer's guide to object-oriented programming in Common LISP
A programmer's guide to object-oriented programming in Common LISP
Common Lisp
OOPSLA/ECOOP '90 Proceedings of the European conference on object-oriented programming on Object-oriented programming systems, languages, and applications
Correcting a widespread error in unification algorithms
Software—Practice & Experience
CLOS: integrating object-oriented and functional programming
Communications of the ACM - Special issue on LISP
Detection of similarities in student programs: YAP'ing may be preferable to plague'ing
SIGCSE '92 Proceedings of the twenty-third SIGCSE technical symposium on Computer science education
Program restructuring as an aid to software maintenance
Program restructuring as an aid to software maintenance
ACM Transactions on Programming Languages and Systems (TOPLAS)
Design patterns: elements of reusable object-oriented software
Design patterns: elements of reusable object-oriented software
Rules and strategies for transforming functional and logic programs
ACM Computing Surveys (CSUR)
YAP3: improved detection of similarities in computer program and other texts
SIGCSE '96 Proceedings of the twenty-seventh SIGCSE technical symposium on Computer science education
Supporting the restructuring of data abstractions through manipulation of a program visualization
ACM Transactions on Software Engineering and Methodology (TOSEM)
Maintenance support tools for JAVA programs: CCFinder and JAAT
ICSE '01 Proceedings of the 23rd International Conference on Software Engineering
An algorithmic approach to the detection and prevention of plagiarism
ACM SIGCSE Bulletin
Metacircular semantics for common Lisp special forms
ACM SIGPLAN Lisp Pointers
Substring Matching for Clone Detection and Change Tracking
ICSM '94 Proceedings of the International Conference on Software Maintenance
Experiment on the Automatic Detection of Function Clones in a Software System Using Metrics
ICSM '96 Proceedings of the 1996 International Conference on Software Maintenance
Using an integrated toolset for program understanding
CASCON '95 Proceedings of the 1995 conference of the Centre for Advanced Studies on Collaborative research
On finding duplication and near-duplication in large software systems
WCRE '95 Proceedings of the Second Working Conference on Reverse Engineering
Identifying Similar Code with Program Dependence Graphs
WCRE '01 Proceedings of the Eighth Working Conference on Reverse Engineering (WCRE'01)
Assessing the Benefits of Incorporating Function Clone Detection in a Development Process
ICSM '97 Proceedings of the International Conference on Software Maintenance
Clone Detection Using Abstract Syntax Trees
ICSM '98 Proceedings of the International Conference on Software Maintenance
A Language Independent Approach for Detecting Duplicated Code
ICSM '99 Proceedings of the IEEE International Conference on Software Maintenance
The leap year problem
Mycin: a rule-based computer program for advising physicians regarding antimicrobial therapy selection.
Identifying redundancy in source code using fingerprints
CASCON '93 Proceedings of the 1993 conference of the Centre for Advanced Studies on Collaborative research: software engineering - Volume 1
Comparison and evaluation of code clone detection techniques and tools: A qualitative approach
Science of Computer Programming
The next 700 programming libraries
Proceedings of the 2007 International Lisp Conference
A security policy oracle: detecting security holes using multiple API implementations
Proceedings of the 32nd ACM SIGPLAN conference on Programming language design and implementation
Making the leap to a software platform strategy: Issues and challenges
Information and Software Technology
Hi-index | 0.00 |
We present the R2D2 redundancy detector. R2D2 identifies redundant code fragments in large software systems written in Lisp. For each pair of code fragments, R2D2 uses a combination of techniques ranging from syntax-based analysis to semantics-based analysis, that detects positive and negative evidences regarding the redundancy of the analyzed code fragments. These evidences are combined according to a well-defined model and sufficiently redundant fragments are reported to the user. R2D2 explores several techniques and heuristics to operate within reasonable time and space bounds and is designed to be extensible.