Proceedings of the 10th European Software Engineering Conference Held Jointly With 13th ACM SIGSOFT International Symposium on 2005
DOI: 10.1145/1081706.1081733
|View full text |Cite
|
Sign up to set email alerts
|

Detecting higher-level similarity patterns in programs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
29
0

Year Published

2005
2005
2017
2017

Publication Types

Select...
4
2
2

Relationship

3
5

Authors

Journals

citations
Cited by 51 publications
(29 citation statements)
references
References 34 publications
0
29
0
Order By: Relevance
“…Similar to plagiarism detection, clone detection identifies cloned fragments by abstracting the program into a set of characteristics. The abstraction can be categorized into the following types: String-based [58], [59], Token-based [54], [55], AST-based [57], [60]- [62], PDG-based [63]- [65], Behavior-based [66], and Memory-State-based [56]. Sebjornsen et.…”
Section: Related Work In Other Domainsmentioning
confidence: 99%
“…Similar to plagiarism detection, clone detection identifies cloned fragments by abstracting the program into a set of characteristics. The abstraction can be categorized into the following types: String-based [58], [59], Token-based [54], [55], AST-based [57], [60]- [62], PDG-based [63]- [65], Behavior-based [66], and Memory-State-based [56]. Sebjornsen et.…”
Section: Related Work In Other Domainsmentioning
confidence: 99%
“…Basit and Stan apply the Frequent Itemset data mining techniques in order to detect design level clones using the clone information [18]. Cory and Godfrey propose to understand clone in large software systems through categorization [28].…”
Section: Related Workmentioning
confidence: 99%
“…It is also the first attempt to address filtering and visualization of higher-level cloning abstractions formed by Clone Miner that represent larger, designlevel software similarities [2].…”
Section: Introductionmentioning
confidence: 99%
“…We developed our approach to enable the follow up analysis of cloning data produced by our clone detector called Clone Miner [2]. Unlike most of the other clone detectors, Clone Miner not only finds simple clones, but also presents further abstractions of these clones in the form of large granularity similar program structures such as similar files or repeating configurations of similar files across directories.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation