{"id":93,"date":"2020-08-06T15:24:59","date_gmt":"2020-08-06T15:24:59","guid":{"rendered":"https:\/\/clones.usask.ca\/clones\/?page_id=93"},"modified":"2020-09-06T23:09:35","modified_gmt":"2020-09-06T23:09:35","slug":"by-year","status":"publish","type":"page","link":"https:\/\/clones.usask.ca\/clones\/by-year\/","title":{"rendered":"Publications"},"content":{"rendered":"<h1>Code Clone Literature by Year<\/h1>\n<p><strong>We used scripts to generate the html file from the bib files. Please excuse the foreign characters and typos. A few of the publications might have been listed multiple times for the same reason as well. Also please submit new articles using the <a href=\"https:\/\/clones.usask.ca\/clones\/2020\/06\/14\/submit\/\">submit menu<\/a> if you think you have a new article or you are aware of a new article that should be listed in this page. You can simply submit the Bibtex. Make sure you have the URL item too.<\/strong><\/p>\n<h3 style=\"color: red;\">See the publications in IEEE format with DOI, BibTex, Abstract and PDF links as well <a href=\"https:\/\/clones.usask.ca\/clones\/pub-year\/\">here<\/a>.<\/h3>\n<hr \/>\n<h1>2020<\/h1>\n<p><a href=\"http:\/\/www.users.miamioh.edu\/stephamd\/papers\/icpc2020.pdf\">srcClone: Detecting Code Clones via Decompositional Slicing<\/a><br \/>\nAlomari, Hakam W and Stephan, Matthew &#8211; srcClone: Detecting Code Clones via Decompositional Slicing &#8211; International Conference on. Program Comprehension (ICPC) &#8211; 2020<\/p>\n<p><a href=\"https:\/\/arxiv.org\/abs\/2002.01275\">Code Duplication on Stack Overflow<\/a><br \/>\nBaltes, Sebastian and Treude, Christoph &#8211; Code Duplication on Stack Overflow &#8211; 42nd International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER 2020) &#8211; 2020<\/p>\n<p><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-981-15-3746-2_3\">Mutation Testing-Based Evaluation Framework for Evaluating Software Clone Detection Tools<\/a><br \/>\nGautam, Pratiksha and Saini, Hemraj &#8211; Mutation Testing-Based Evaluation Framework for Evaluating Software Clone Detection Tools &#8211; Lecture Notes in Mechanical Engineering &#8211; 2020<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1016\/j.cosrev.2020.100266\">Survey of Clone Visualisations View project Bad Smells View project A systematic mapping study of clone visualization<\/a><br \/>\nHammad, Muhammad and Basit, Hamid Abdul and Jarzabek, Stan and Koschke, Rainer &#8211; Survey of Clone Visualisations View project Bad Smells View project A systematic mapping study of clone visualization &#8211; Computer Science Review &#8211; 2020<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/3383972.3384014\">A Fast Detecting Method for Clone Functions Using Global Alignment of Token Sequences<\/a><br \/>\nLee, Da-Young and Ko, Uram and Aitkazin, Ibrahim and Park, SangUn and Tak, Hae-Sung and Cho, Hwan-Gue &#8211; A Fast Detecting Method for Clone Functions Using Global Alignment of Token Sequences &#8211; Proceedings of the 2020 12th International Conference on Machine Learning and Computing &#8211; 2020<\/p>\n<p><a href=\"https:\/\/arxiv.org\/abs\/2005.00967\">A Machine Learning Based Framework for Code Clone Validation<\/a><br \/>\nMostaeen, Golam and Roy, Banani and Roy, Chanchal and Schneider, Kevin and Svajlenko, Jeffrey and Author, F and Author, S &#8211; A Machine Learning Based Framework for Code Clone Validation &#8211; Journal of Systems and Software &#8211; 2020<\/p>\n<p><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-45260-5_14\">Generalization-Driven Semantic Clone Detection in CLP<\/a><br \/>\nVanhoof, Wim and Yernaux, Gonzague &#8211; Generalization-Driven Semantic Clone Detection in CLP &#8211; Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) &#8211; 2020<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3381307.3381310\">Open-source tools and benchmarks for code-clone detection<\/a><br \/>\nWalker, Andrew and Cerny, Tomas and Song, Eungee &#8211; Open-source tools and benchmarks for code-clone detection &#8211; ACM SIGAPP Applied Computing Review &#8211; 2020<\/p>\n<p><a href=\"https:\/\/onlinelibrary.wiley.com\/doi\/full\/10.1002\/spe.2759\">IBFET: Index-based features extraction technique for scalable code clone detection at file level granularity<\/a><br \/>\nAkram, Junaid and Mumtaz, Majid and Luo, Ping &#8211; IBFET: Index-based features extraction technique for scalable code clone detection at file level granularity &#8211; Software &#8211; Practice and Experience &#8211; 2020<\/p>\n<p><a>DroidSD: An Efficient Indexed Based Android Applications Similarity Detection Tool<\/a><br \/>\nAkram, Junaid &#8211; DroidSD: An Efficient Indexed Based Android Applications Similarity Detection Tool &#8211; Journal of Information Science and Engineering &#8211; 2020<\/p>\n<p><a>Clone Detection Techniques for JavaScript and Language Independence: Review<\/a><br \/>\nAlfageh, Danyah and Alhakami, Hosam and Baz, Abdullah and Alanazi, Eisa and Alsubait, Tahani &#8211; Clone Detection Techniques for JavaScript and Language Independence: Review &#8211; International Journal of Advanced Computer Science and Applications &#8211; 2020<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9047642\/\">Clone Swarm: A Cloud Based Code-Clone Analysis Tool<\/a><br \/>\nV. Bandi and C. K. Roy and C. Gutwin &#8211; Clone Swarm: A Cloud Based Code-Clone Analysis Tool &#8211; 2020 IEEE 14th International Workshop on Software Clones (IWSC) &#8211; 2020<\/p>\n<p><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-29407-6_56\">Comprehending Code Fragment in Code Clones: A Literature-Based Perspective<\/a><br \/>\nBharti, Sarveshwar and Singh, Hardeep &#8211; Comprehending Code Fragment in Code Clones: A Literature-Based Perspective &#8211; Proceedings of ICRIC 2019 &#8211; 2020<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1080\/1206212X.2020.1720952\">Proactively managing clones inside an IDE: a systematic literature review<\/a><br \/>\nSarveshwar Bharti and Hardeep Singh &#8211; Proactively managing clones inside an IDE: a systematic literature review &#8211; International Journal of Computers and Applications &#8211; 2020<\/p>\n<p><a href=\"http:\/\/doi.org\/10.1109\/IWSC50091.2020.9047637\">Improving Syntactical Clone Detection Methods through the Use of an Intermediate Representation<\/a><br \/>\nP. M. Caldeira and K. Sakamoto and H. Washizaki and Y. Fukazawa and T. Shimada &#8211; Improving Syntactical Clone Detection Methods through the Use of an Intermediate Representation &#8211; 2020 IEEE 14th International Workshop on Software Clones (IWSC) &#8211; 2020<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/3395363.3397362\">Functional Code Clone Detection with Syntax and Semantics Fusion Learning<\/a><br \/>\nFang, Chunrong and Liu, Zixi and Shi, Yangyang and Huang, Jeff and Shi, Qingkai &#8211; Functional Code Clone Detection with Syntax and Semantics Fusion Learning &#8211; Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis &#8211; 2020<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8979435\/\">Checking Smart Contracts with Structural Code Embedding<\/a><br \/>\nZ. Gao and L. Jiang and X. Xia and D. Lo and J. Grundy &#8211; Checking Smart Contracts with Structural Code Embedding &#8211; IEEE Transactions on Software Engineering &#8211; 2020<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/3341105.3373845\">Logging Statements\u2019 Prediction Based on Source Code Clones<\/a><br \/>\nGholamian, Sina and Ward, Paul A. S. &#8211; Logging Statements\u2019 Prediction Based on Source Code Clones &#8211; Proceedings of the 35th Annual ACM Symposium on Applied Computing &#8211; 2020<\/p>\n<p><a href=\"http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1574013719302679\">A systematic mapping study of clone visualizations<\/a><br \/>\nHammad, Muhammad and Basit, Hamid Abdul and Jarzabek, Stan and Koschke, Rainer &#8211; A systematic mapping study of clone visualizations &#8211; Computer Science Review &#8211; 2020<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9047636\/\">CPPCD: A Token-Based Approach to Detecting Potential Clones<\/a><br \/>\nY. Hung and S. Takada &#8211; CPPCD: A Token-Based Approach to Detecting Potential Clones &#8211; 2020 IEEE 14th International Workshop on Software Clones (IWSC) &#8211; 2020<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9054832\/\">SAGA: Efficient and Large-Scale Detection of Near-Miss Clones with GPU Acceleration<\/a><br \/>\nG. Li and Y. Wu and C. K. Roy and J. Sun and X. Peng and N. Zhan and B. Hu and J. Ma &#8211; SAGA: Efficient and Large-Scale Detection of Near-Miss Clones with GPU Acceleration &#8211; 2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER) &#8211; 2020<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1007\/s10664-019-09757-y\">Guiding log revisions by learning from software evolution history<\/a><br \/>\nLi, Shanshan and Niu, \u00b7 Xu and Zhouyang Jia, \u00b7 and Liao, \u00b7 Xiangke and Wang, Ji and Li, Tao &#8211; Guiding log revisions by learning from software evolution history &#8211; Empirical Software Engineering &#8211; 2020<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9054846\/\">Associating Code Clones with Association Rules for Change Impact Analysis<\/a><br \/>\nM. Mondal and B. Roy and C. K. Roy and K. A. Schneider &#8211; Associating Code Clones with Association Rules for Change Impact Analysis &#8211; 2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER) &#8211; 2020<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9047639\">Evaluating Performance of Clone Detection Tools in Detecting Cloned Cochange Candidates<\/a><br \/>\nM. Nadim and M. Mondal and C. K. Roy &#8211; Evaluating Performance of Clone Detection Tools in Detecting Cloned Cochange Candidates &#8211; 2020 IEEE 14th International Workshop on Software Clones (IWSC) &#8211; 2020<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9047634\">Blanker: A Refactor-Oriented Cloned Source Code Normalizer<\/a><br \/>\nD. Pizzolotto and K. Inoue &#8211; Blanker: A Refactor-Oriented Cloned Source Code Normalizer &#8211; 2020 IEEE 14th International Workshop on Software Clones (IWSC) &#8211; 2020<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9047641\/\">An Empirical Study on Accidental Cross-Project Code Clones<\/a><br \/>\nM. Pyl and B. van Bladel and S. Demeyer &#8211; An Empirical Study on Accidental Cross-Project Code Clones &#8211; 2020 IEEE 14th International Workshop on Software Clones (IWSC) &#8211; 2020<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9047640\/\">Clone Detection on Large Scala Codebases<\/a><br \/>\nW. Rahman and Y. Xu and F. Pu and J. Xuan and X. Jia and M. Basios and L. Kanthan and L. Li and F. Wu and B. Xu &#8211; Clone Detection on Large Scala Codebases &#8211; 2020 IEEE 14th International Workshop on Software Clones (IWSC) &#8211; 2020<\/p>\n<p><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-26574-8_3\">Scalable and Accurate Detection of Function Clones in Software Using Multithreading<\/a><br \/>\nSingh, MK and in Software, K Kumar &#8211; Scalable and Accurate Detection of Function Clones in Software Using Multithreading &#8211; Springer &#8211; 2020<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/3341105.3374117\">Semantic Code Clone Detection for Enterprise Applications<\/a><br \/>\nSvacina, Jan and Simmons, Jonathan and Cerny, Tomas &#8211; Semantic Code Clone Detection for Enterprise Applications &#8211; Proceedings of the 35th Annual ACM Symposium on Applied Computing &#8211; 2020<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9047635\/\">Towards Semantic Clone Detection via Probabilistic Software Modeling<\/a><br \/>\nH. Thaller and L. Linsbauer and A. Egyed &#8211; Towards Semantic Clone Detection via Probabilistic Software Modeling &#8211; 2020 IEEE 14th International Workshop on Software Clones (IWSC) &#8211; 2020<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9054793\/\">Clone Notifier: Developing and Improving the System to Notify Changes of Code Clones<\/a><br \/>\nS. Tokui and N. Yoshida and E. Choi and K. Inoue &#8211; Clone Notifier: Developing and Improving the System to Notify Changes of Code Clones &#8211; 2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER) &#8211; 2020<\/p>\n<p><a href=\"https:\/\/arxiv.org\/abs\/2002.08653\">Detecting Code Clones with Graph Neural Network and Flow-Augmented Abstract Syntax Tree<\/a><br \/>\nWang, Wenhan and Li, Ge and Ma, Bo and Xia, Xin and Jin, Zhi &#8211; Detecting Code Clones with Graph Neural Network and Flow-Augmented Abstract Syntax Tree &#8211; SANER 2020 &#8211; Proceedings of the 2020 IEEE 27th International Conference on Software Analysis, Evolution, and Reengineering &#8211; 2020<\/p>\n<hr \/>\n<h1>2019<\/h1>\n<p><a href=\"https:\/\/doi.org\/10.1145\/3318396.3318440\">A Model-Driven Approach for Token Based Code Clone Detection Techniques &#8211; An Introduction to UMLCCD<\/a><br \/>\nUl Ain, Qurat and Azam, Farooque and Anwar, Muhammad Waseem and Kiran, Ayesha &#8211; A Model-Driven Approach for Token Based Code Clone Detection Techniques &#8211; An Introduction to UMLCCD &#8211; Proceedings of the 2019 8th International Conference on Educational and Information Technology &#8211; 2019<\/p>\n<p><a href=\"https:\/\/eudl.eu\/doi\/10.4108\/eai.13-7-2018.159353\">Scalable Source Code Similarity Detection in Large Code Repositories<\/a><br \/>\nFiras Alomari and Muhammed Harbi &#8211; Scalable Source Code Similarity Detection in Large Code Repositories &#8211; EAI Endorsed Transactions on Scalable Information Systems &#8211; 2019<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8945086\">Improving Clone Detection Precision Using Machine Learning Techniques<\/a><br \/>\nV. Arammongkolvichai and R. Koschke and C. Ragkhitwetsagul and M. Choetkiertikul and T. Sunetnanta &#8211; Improving Clone Detection Precision Using Machine Learning Techniques &#8211; 2019 10th International Workshop on Empirical Software Engineering in Practice (IWESEP) &#8211; 2019<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1007\/s11334-019-00334-6\">Measuring the Effect of Clone Refactoring on the Size of Unit Test Cases in Object-Oriented Software: An Empirical Study<\/a><br \/>\nBadri, Mourad and Badri, Linda and Hachemane, Oussama and Ouellet, Alexandre &#8211; Measuring the Effect of Clone Refactoring on the Size of Unit Test Cases in Object-Oriented Software: An Empirical Study &#8211; Innov. Syst. Softw. Eng. &#8211; 2019<\/p>\n<p><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-981-15-0111-1_35\">An Efficient Architectural Framework for Non-obtrusive and Instantaneous Real-Time Identification of Clones During the Software Development Process in IDE<\/a><br \/>\nBharti, Sarveshwar and Singh, Hardeep &#8211; An Efficient Architectural Framework for Non-obtrusive and Instantaneous Real-Time Identification of Clones During the Software Development Process in IDE &#8211; Communications in Computer and Information Science &#8211; 2019<\/p>\n<p><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-981-13-3140-4_36\">Investigating developers&#8217; sentiments associated with software cloning practices<\/a><br \/>\nBharti, Sarveshwar and Singh, Hardeep &#8211; Investigating developers&#8217; sentiments associated with software cloning practices &#8211; Communications in Computer and Information Science &#8211; 2019<\/p>\n<p><a>The MalSource Dataset: Quantifying Complexity and Code Reuse in Malware Development<\/a><br \/>\nA. Calleja and J. Tapiador and J. Caballero &#8211; The MalSource Dataset: Quantifying Complexity and Code Reuse in Malware Development &#8211; IEEE Transactions on Information Forensics and Security &#8211; 2019<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/3330204.3330277\">An Exploratory Study on Detection of Cloned Code in Information Systems<\/a><br \/>\nBatista, Mall\\&#8217;u Eduarda and Parreira, Paulo Afonso and Costa, Heitor &#8211; An Exploratory Study on Detection of Cloned Code in Information Systems &#8211; Proceedings of the XV Brazilian Symposium on Information Systems &#8211; 2019<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/3338840.3355654\">Intelligent Token-Based Code Clone Detection System for Large Scale Source Code<\/a><br \/>\nElkhail, Abdulrahman Abu and Svacina, Jan and Cerny, Tomas &#8211; Intelligent Token-Based Code Clone Detection System for Large Scale Source Code &#8211; Proceedings of the Conference on Research in Adaptive and Convergent Systems &#8211; 2019<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/profile\/Bilal_Maqbool3\/publication\/333301646_Recent_Advancements_in_Code_Clone_Detection_-_Techniques_and_Tools\/links\/5cfe875b92851c874c5d7d84\/Recent-Advancements-in-Code-Clone-Detection-Techniques-and-Tools.pdf\">Recent Advancements in Code Clone Detection \u2013 Techniques and Tools<\/a><br \/>\nHaider, Wasi and Anwar, Muhammad Waseem and Azam, Farooque and Ul Ain, Qurat and Haider Butt, Wasi and Anwar, Waseem and Maqbool, Bilal &#8211; Recent Advancements in Code Clone Detection \u2013 Techniques and Tools &#8211; IEEE Access &#8211; 2019<\/p>\n<p><a href=\"http:\/\/arxiv.org\/abs\/1905.00272\">Characterizing Code Clones in the Ethereum Smart Contract Ecosystem<\/a><br \/>\nHe, Ningyu and Wu, Lei and Wang, Haoyu and Guo, Yao and Jiang, Xuxian &#8211; Characterizing Code Clones in the Ethereum Smart Contract Ecosystem &#8211; CoRR &#8211; 2019<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/3370272.3370298\">Ranking Co-Change Candidates of Micro-Clones<\/a><br \/>\nMondal, Manishankar and Roy, Banani and Roy, Chanchal K. and Schneider, Kevin A. &#8211; Ranking Co-Change Candidates of Micro-Clones &#8211; Proceedings of the 29th Annual International Conference on Computer Science and Software Engineering &#8211; 2019<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/3338906.3341182\">CloneCognition: Machine Learning Based Code Clone Validation Tool<\/a><br \/>\nMostaeen, Golam and Svajlenko, Jeffrey and Roy, Banani and Roy, Chanchal K. and Schneider, Kevin A. &#8211; CloneCognition: Machine Learning Based Code Clone Validation Tool &#8211; Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering &#8211; 2019<\/p>\n<p><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-16722-6_14\">Structural and nominal cross-language clone detection<\/a><br \/>\nNichols, Lawton and Emre, Mehmet and Hardekopf, Ben &#8211; Structural and nominal cross-language clone detection &#8211; Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) &#8211; 2019<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/3312662.3312709\">A Method for Identifying and Recommending Reconstructed Clones<\/a><br \/>\nRongrong, She and Liping, Zhang and Fengrong, Zhao &#8211; A Method for Identifying and Recommending Reconstructed Clones &#8211; Proceedings of the 2019 3rd International Conference on Management Engineering, Software Engineering and Service Sciences &#8211; 2019<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8813290\/\">Neural Detection of Semantic Code Clones Via Tree-Based Convolution<\/a><br \/>\nH. Yu and W. Lam and L. Chen and G. Li and T. Xie and Q. Wang &#8211; Neural Detection of Semantic Code Clones Via Tree-Based Convolution &#8211; 2019 IEEE\/ACM 27th International Conference on Program Comprehension (ICPC) &#8211; 2019<\/p>\n<p><a href=\"https:\/\/wvvw.easychair.org\/publications\/preprint_download\/Jlvk\">Towards Automated Refactoring of Code Clones in Object-Oriented Programming Languages<\/a><br \/>\nBaars, Simon and Oprescu, Ana &#8211; Towards Automated Refactoring of Code Clones in Object-Oriented Programming Languages &#8211; International Journal of Innovative Research in Science, Engineering and Technology &#8211; 2019<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/331611919_Metamodel_clone_detection_with_SAMOS\">Metamodel Clone Detection with SAMOS (extended abstract)<\/a><br \/>\nBabur, Onder and Cleophas, Loek and van den Brand, Mark and Extended, tuenl I &#8211; Metamodel Clone Detection with SAMOS (extended abstract) &#8211; Journal of Computer Languages &#8211; 2019<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/3310273.3321560\">Capturing Source Code Semantics via Tree-Based Convolution over API-Enhanced AST<\/a><br \/>\nChen, Long and Ye, Wei and Zhang, Shikun &#8211; Capturing Source Code Semantics via Tree-Based Convolution over API-Enhanced AST &#8211; Proceedings of the 16th ACM International Conference on Computing Frontiers &#8211; 2019<\/p>\n<p><a href=\"https:\/\/link.springer.com\/article\/10.1007\/s10664-018-9648-z\">Cross-project code clones in GitHub<\/a><br \/>\nGharehyazie, Mohammad and Ray, Baishakhi and Keshani, Mehdi and Zavosht, Masoumeh Soleimani and Heydarnoori, Abbas and Filkov, Vladimir &#8211; Cross-project code clones in GitHub &#8211; Empirical Software Engineering &#8211; 2019<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/8813292\">CCEvovis: A Clone Evolution Visualization System for Software Maintenance<\/a><br \/>\nH. Honda and S. Tokui and K. Yokoi and E. Choi and N. Yoshida and K. Inoue &#8211; CCEvovis: A Clone Evolution Visualization System for Software Maintenance &#8211; 2019 IEEE\/ACM 27th International Conference on Program Comprehension (ICPC) &#8211; 2019<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8813261\/\">Comparing Bug Replication in Regular and Micro Code Clones<\/a><br \/>\nJ. F. Islam and M. Mondal and C. K. Roy and K. A. Schneider &#8211; Comparing Bug Replication in Regular and Micro Code Clones &#8211; 2019 IEEE\/ACM 27th International Conference on Program Comprehension (ICPC) &#8211; 2019<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8667993\/\">A Comparative Study of Software Bugs in Micro-clones and Regular Code Clones<\/a><br \/>\nJ. F. Islam and M. Mondal and C. K. Roy &#8211; A Comparative Study of Software Bugs in Micro-clones and Regular Code Clones &#8211; 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER) &#8211; 2019<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8754957\/\">Analysis of Industrial Control System Software to Detect Semantic Clones<\/a><br \/>\nH. K. Jnanamurthy and R. Jetley and F. Henskens and D. Paul and M. Wallis and S. D. Sudarsan &#8211; Analysis of Industrial Control System Software to Detect Semantic Clones &#8211; 2019 IEEE International Conference on Industrial Technology (ICIT) &#8211; 2019<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/8665850\">An Empirical Study on Clone Evolution by Analyzing Clone Lifetime<\/a><br \/>\nM. J. I. Mostafa &#8211; An Empirical Study on Clone Evolution by Analyzing Clone Lifetime &#8211; 2019 IEEE 13th International Workshop on Software Clones (IWSC) &#8211; 2019<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8701448\/\">Evolutionary Perspective of Structural Clones in Software<\/a><br \/>\nJ. Kanwal and O. Maqbool and H. A. Basit and M. A. Sindhu &#8211; Evolutionary Perspective of Structural Clones in Software &#8211; IEEE Access &#8211; 2019<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1007\/s41870-018-0213-1\">Assessing lexical similarity between short sentences of source code based on granularity<\/a><br \/>\nKaur, Harpreet and Maini, Raman &#8211; Assessing lexical similarity between short sentences of source code based on granularity &#8211; Int. j. inf. tecnol. &#8211; 2019<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8786015\/\">Investigating on the Impact of Software Clones on Technical Debt<\/a><br \/>\nA. Lerina and L. Nardi &#8211; Investigating on the Impact of Software Clones on Technical Debt &#8211; 2019 IEEE\/ACM International Conference on Technical Debt (TechDebt) &#8211; 2019<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8802819\/\">Towards Visualizing Large Scale Evolving Clones<\/a><br \/>\nD. Mondal and M. Mondal and C. K. Roy and K. A. Schneider and S. Wang and Y. Li &#8211; Towards Visualizing Large Scale Evolving Clones &#8211; 2019 IEEE\/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion) &#8211; 2019<\/p>\n<p><a href=\"http:\/\/www.sciencedirect.com\/science\/article\/pii\/S2468502X1930018X\">Clone-World: A visual analytic system for large scale software clones<\/a><br \/>\nDebajyoti Mondal and Manishankar Mondal and Chanchal K. Roy and Kevin A. Schneider and Yukun Li and Shisong Wang &#8211; Clone-World: A visual analytic system for large scale software clones &#8211; Visual Informatics &#8211; 2019<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8919065\/\">Investigating Context Adaptation Bugs in Code Clones<\/a><br \/>\nM. Mondal and B. Roy and C. K. Roy and K. A. Schneider &#8211; Investigating Context Adaptation Bugs in Code Clones &#8211; 2019 IEEE International Conference on Software Maintenance and Evolution (ICSME) &#8211; 2019<\/p>\n<p><a href=\"https:\/\/ksiresearch.org\/seke\/seke19paper\/seke19paper_183.pdf\">Detecting Security Vulnerabilities using Clone Detection and Community Knowledge<\/a><br \/>\nPatrick Viertel, Fabien and Brunotte, Wasja and Str\u00fcber, Daniel and Schneider, Kurt &#8211; Detecting Security Vulnerabilities using Clone Detection and Community Knowledge &#8211; SEKE &#8211; 2019<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1109\/MSR.2019.00078\">Cross-Language Clone Detection by Learning over Abstract Syntax Trees<\/a><br \/>\nPerez, Daniel and Chiba, Shigeru &#8211; Cross-Language Clone Detection by Learning over Abstract Syntax Trees &#8211; Proceedings of the 16th International Conference on Mining Software Repositories &#8211; 2019<\/p>\n<p><a href=\"http:\/\/dx.doi.org\/10.1109\/TSE.2019.2900307\">Toxic Code Snippets on Stack Overflow<\/a><br \/>\nC. Ragkhitwetsagul and J. Krinke and M. Paixao and G. Bianco and R. Oliveto &#8211; Toxic Code Snippets on Stack Overflow &#8211; IEEE Transactions on Software Engineering &#8211; 2019<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8730167\/\">On the Evolution of Keyword-Driven Test Suites<\/a><br \/>\nR. Rwemalika and M. Kintis and M. Papadakis and Y. Le Traon and P. Lorrach &#8211; On the Evolution of Keyword-Driven Test Suites &#8211; 2019 12th IEEE Conference on Software Testing, Validation and Verification (ICST) &#8211; 2019<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1109\/ICSE.2019.00023\">Towards Automating Precision Studies of Clone Detectors<\/a><br \/>\nSaini, Vaibhav and Farmahinifarahani, Farima and Lu, Yadong and Yang, Di and Martins, Pedro and Sajnani, Hitesh and Baldi, Pierre and Lopes, Cristina V. &#8211; Towards Automating Precision Studies of Clone Detectors &#8211; Proceedings of the 41st International Conference on Software Engineering &#8211; 2019<\/p>\n<p><a href=\"http:\/\/dx.doi.org\/10.24018\/ejers.2019.4.12.1642\">A Novel Method of Clone Detection by Neural Networks<\/a><br \/>\nSharma, P and And, C Singh &#8211; A Novel Method of Clone Detection by Neural Networks &#8211; European Journal of Engineering Research and Science &#8211; 2019<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1109\/ICSE-NIER.2019.00014\">Towards a Cognizant Virtual Software Modeling Assistant Using Model Clones<\/a><br \/>\nStephan, Matthew &#8211; Towards a Cognizant Virtual Software Modeling Assistant Using Model Clones &#8211; Proceedings of the 41st International Conference on Software Engineering: New Ideas and Emerging Results &#8211; 2019<\/p>\n<p><a href=\"https:\/\/link.springer.com\/article\/10.1007\/s10664-018-9645-2\">Will this clone be short-lived? Towards a better understanding of the characteristics of short-lived clones<\/a><br \/>\nThongtanunam, Patanamon and Shang, Weiyi and Hassan, Ahmed E. &#8211; Will this clone be short-lived? Towards a better understanding of the characteristics of short-lived clones &#8211; Empirical Software Engineering &#8211; 2019<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8665851\/\">Tracking Method-Level Clones and a Case Study<\/a><br \/>\nK. Uemura and A. Mori and E. Choi and H. Iida &#8211; Tracking Method-Level Clones and a Case Study &#8211; 2019 IEEE 13th International Workshop on Software Clones (IWSC) &#8211; 2019<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8665855\/\">A Novel Approach for Detecting Type-IV Clones in Test Code<\/a><br \/>\nB. van Bladel and S. Demeyer &#8211; A Novel Approach for Detecting Type-IV Clones in Test Code &#8211; 2019 IEEE 13th International Workshop on Software Clones (IWSC) &#8211; 2019<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8637956\/\">Detecting Java Code Clones Based on Bytecode Sequence Alignment<\/a><br \/>\nD. Yu and J. Yang and X. Chen and J. Chen &#8211; Detecting Java Code Clones Based on Bytecode Sequence Alignment &#8211; IEEE Access &#8211; 2019<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/8719895\">A Systematic Review on Code Clone Detection<\/a><br \/>\nQ. U. Ain and W. H. Butt and M. W. Anwar and F. Azam and B. Maqbool &#8211; A Systematic Review on Code Clone Detection &#8211; IEEE Access &#8211; 2019<\/p>\n<hr \/>\n<h1>2018<\/h1>\n<p><a href=\"https:\/\/doi.org\/10.1007\/s10270-016-0557-6\">An Approach to Clone Detection in Sequence Diagrams and Its Application to Security Analysis<\/a><br \/>\nAlalfi, Manar H. and Antony, Elizabeth P. and Cordy, James R. &#8211; An Approach to Clone Detection in Sequence Diagrams and Its Application to Security Analysis &#8211; Softw. Syst. Model. &#8211; 2018<\/p>\n<p><a href=\"http:\/\/arxiv.org\/abs\/1811.00804\">The Evolution of Stack Overflow Posts: Reconstruction and Analysis<\/a><br \/>\nBaltes, Sebastian and Dumani, Lorik and Treude, Christoph and Diehl, Stephan &#8211; The Evolution of Stack Overflow Posts: Reconstruction and Analysis &#8211; CoRR &#8211; 2018<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1007\/s11219-017-9375-5\">An Investigation of the Fault-Proneness of Clone Evolutionary Patterns<\/a><br \/>\nBarbour, Liliane and An, Le and Khomh, Foutse and Zou, Ying and Wang, Shaohua &#8211; An Investigation of the Fault-Proneness of Clone Evolutionary Patterns &#8211; Software Quality Journal &#8211; 2018<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8625133\/\">Resilient and Scalable Cloned App Detection Using Forced Execution and Compression Trees<\/a><br \/>\nM. Elsabagh and R. Johnson and A. Stavrou &#8211; Resilient and Scalable Cloned App Detection Using Forced Execution and Compression Trees &#8211; 2018 IEEE Conference on Dependable and Secure Computing (DSC) &#8211; 2018<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/3196321.3196325\">Adventures in NICAD: A Ten-Year Retrospective<\/a><br \/>\nRoy, Chanchal K. and Cordy, James R. &#8211; Adventures in NICAD: A Ten-Year Retrospective &#8211; Proceedings of the 26th Conference on Program Comprehension &#8211; 2018<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/3236024.3236026\">Oreo: Detection of Clones in the Twilight Zone<\/a><br \/>\nSaini, Vaibhav and Farmahinifarahani, Farima and Lu, Yadong and Baldi, Pierre and Lopes, Cristina V. &#8211; Oreo: Detection of Clones in the Twilight Zone &#8211; Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering &#8211; 2018<\/p>\n<p><a href=\"https:\/\/link.springer.com\/article\/10.1007\/s11227-016-1832-6\">Semantic code clone detection for Internet of Things applications using reaching definition and liveness analysis<\/a><br \/>\nTekchandani, Rajkumar and Bhatia, Rajesh and Singh, Maninder &#8211; Semantic code clone detection for Internet of Things applications using reaching definition and liveness analysis &#8211; Journal of Supercomputing &#8211; 2018<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3196321.3196353\">How slim will my system be?: Estimating refactored code size by merging clones<\/a><br \/>\nYoshida, Norihiro and Ishizu, Takuya and Edwards, Bufurod and Inoue, Katsuro &#8211; How slim will my system be?: Estimating refactored code size by merging clones &#8211; Proceedings &#8211; International Conference on Software Engineering &#8211; 2018<\/p>\n<p><a>DCCD: An Efficient and Scalable Distributed Code Clone Detection Technique for Big Code<\/a><br \/>\nAkram, Junaid and Shi, Zhendong and Mumtaz, Majid and Luo, Ping &#8211; DCCD: An Efficient and Scalable Distributed Code Clone Detection Technique for Big Code &#8211; The 30th International Conference on Software Engineering and Knowledge Engineering &#8211; 2018<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/8327320\">Towards slice-based semantic clone detection<\/a><br \/>\nH. W. Alomari and M. Stephan &#8211; Towards slice-based semantic clone detection &#8211; 2018 IEEE 12th International Workshop on Software Clones (IWSC) &#8211; 2018<\/p>\n<p><a href=\"https:\/\/www.ingentaconnect.com\/content\/asp\/jctn\/2018\/00000015\/f0020011\/art00045\">Dictionary Based Approach to Detect Cross Language Clones of C and Java Language<\/a><br \/>\nAnkali, SB and And, L Parthiban &#8211; Journal of Computational and undefined 2018 &#8211; Dictionary Based Approach to Detect Cross Language Clones of C and Java Language &#8211; Journal of Computational and Theoretical Nanoscience &#8211; 2018<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/3267183.3267188\">Cloning in Customization Classes: A Case of a Worldwide Software Product Line<\/a><br \/>\nBarbosa, Jefferson and Andrade, Rossana M. C. and Filho, Jo\\~ao Bosco F. and Bezerra, Carla I. M. and Barreto, Isaac and Capilla, Rafael &#8211; Cloning in Customization Classes: A Case of a Worldwide Software Product Line &#8211; Proceedings of the VII Brazilian Symposium on Software Components, Architectures, and Reuse &#8211; 2018<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/3196321.3196360\">Replicomment: Identifying Clones in Code Comments<\/a><br \/>\nBlasi, Arianna and Gorla, Alessandra &#8211; Replicomment: Identifying Clones in Code Comments &#8211; Proceedings of the 26th Conference on Program Comprehension &#8211; 2018<\/p>\n<p><a href=\"https:\/\/onlinelibrary.wiley.com\/doi\/abs\/10.1002\/smr.1951\">Clone refactoring inspection by summarizing clone refactorings and detecting inconsistent changes during software evolution<\/a><br \/>\nChen, Zhiyuan and Kwon, Young Woo and Song, Myoungkyu &#8211; Clone refactoring inspection by summarizing clone refactorings and detecting inconsistent changes during software evolution &#8211; Journal of Software: Evolution and Process &#8211; 2018<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/330653359_A_Survey_on_Software_Code_Clone_Detection_to_Improve_the_Maintenance_Effort_and_Maintenance_Cost_of_the_Software\">A Survey on Software Code Clone Detection to Improve the Maintenance Effort and Maintenance Cost of the Software<\/a><br \/>\nGuna, V and Kumar, M Sunil &#8211; A Survey on Software Code Clone Detection to Improve the Maintenance Effort and Maintenance Cost of the Software &#8211; INTERNATIONAL JOURNAL OF COMPUTER SCIENCES AND ENGINEERING &#8211; 2018<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8327315\/\">On the characteristics of buggy code clones: A code quality perspective<\/a><br \/>\nM. R. Islam and M. F. Zibran &#8211; On the characteristics of buggy code clones: A code quality perspective &#8211; 2018 IEEE 12th International Workshop on Software Clones (IWSC) &#8211; 2018<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8327313\/\">Structural clones: An evolution perspective<\/a><br \/>\nJ. Kanwal and H. A. Basit and O. Maqbool &#8211; Structural clones: An evolution perspective &#8211; 2018 IEEE 12th International Workshop on Software Clones (IWSC) &#8211; 2018<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/3180155.3180187\">FaCoY: A Code-to-Code Search Engine<\/a><br \/>\nKim, Kisub and Kim, Dongsun and Bissyand\\&#8217;e, Tegawend\\&#8217;e F. and Choi, Eunjong and Li, Li and Klein, Jacques and Traon, Yves Le &#8211; FaCoY: A Code-to-Code Search Engine &#8211; Proceedings of the 40th International Conference on Software Engineering &#8211; 2018<\/p>\n<p><a href=\"http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0164121218301079\">Bug-proneness and late propagation tendency of code clones: A Comparative study on different clone types<\/a><br \/>\nManishankar Mondal and Chanchal K. Roy and Kevin A. Schneider &#8211; Bug-proneness and late propagation tendency of code clones: A Comparative study on different clone types &#8211; Journal of Systems and Software &#8211; 2018<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8330196\/\">Micro-clones in evolving software<\/a><br \/>\nM. Mondai and C. K. Roy and K. A. Schneider &#8211; Micro-clones in evolving software &#8211; 2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER) &#8211; 2018<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8530729\/\">[Research Paper] On the Use of Machine Learning Techniques Towards the Design of Cloud Based Automatic Code Clone Validation Tools<\/a><br \/>\nG. Mostaeen and J. Svajlenko and B. Roy and C. K. Roy and K. A. Schneider &#8211; [Research Paper] On the Use of Machine Learning Techniques Towards the Design of Cloud Based Automatic Code Clone Validation Tools &#8211; 2018 IEEE 18th International Working Conference on Source Code Analysis and Manipulation (SCAM) &#8211; 2018<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1007\/s10515-018-0238-5\">Cleaning up Copy&#8212;Paste Clones with Interactive Merging<\/a><br \/>\nNarasimhan, Krishna and Reichenbach, Christoph and Lawall, Julia &#8211; Cleaning up Copy&#8212;Paste Clones with Interactive Merging &#8211; Automated Software Engg. &#8211; 2018<\/p>\n<p><a href=\"https:\/\/onlinelibrary.wiley.com\/doi\/abs\/10.1002\/smr.2115\">An empirical study on how project context impacts on code cloning<\/a><br \/>\nPerez-Castillo, Ricardo and Piattini, Mario &#8211; An empirical study on how project context impacts on code cloning &#8211; Journal of Software: Evolution and Process &#8211; 2018<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/8327318\">A picture is worth a thousand words: Code clone detection based on image similarity<\/a><br \/>\nC. Ragkhitwetsagul and J. Krinke and B. Marnette &#8211; A picture is worth a thousand words: Code clone detection based on image similarity &#8211; 2018 IEEE 12th International Workshop on Software Clones (IWSC) &#8211; 2018<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8330194\/\">Benchmarks for software clone detection: A ten-year retrospective<\/a><br \/>\nC. K. Roy and J. R. Cordy &#8211; Benchmarks for software clone detection: A ten-year retrospective &#8211; 2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER) &#8211; 2018<\/p>\n<p><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1877050918308123\">Code clones: Detection and management<\/a><br \/>\nNeha Saini and Sukhdip Singh and Suman &#8211; Code clones: Detection and management &#8211; Procedia Computer Science &#8211; 2018<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/8719568\">Multilingual Detection of Code Clones Using ANTLR Grammar Definitions<\/a><br \/>\nY. Semura and N. Yoshida and E. Choi and K. Inoue &#8211; Multilingual Detection of Code Clones Using ANTLR Grammar Definitions &#8211; 2018 25th Asia-Pacific Software Engineering Conference (APSEC) &#8211; 2018<\/p>\n<p><a href=\"http:\/\/www.ijfrcsce.org\/download\/browse\/Volume_4\/April_18_Volume_4_Issue_4\/1524737260_26-04-2018.pdf\">Code Smell Detection Techniques and Process: A Review<\/a><br \/>\nSharma, Pratiksha and Arshpreet Kaur, Er &#8211; Code Smell Detection Techniques and Process: A Review &#8211; International Journal on Future Revolution in Computer Science \\&amp; Communication Engineering &#8211; 2018<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/3183440.3195005\">Fast, Scalable and User-Guided Clone Detection<\/a><br \/>\nSvajlenko, Jeffrey and Roy, Chanchai K. &#8211; Fast, Scalable and User-Guided Clone Detection &#8211; Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings &#8211; 2018<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/323535753\">LICCA: A tool for cross-language clone detection<\/a><br \/>\nVislavski, Tijana and Raki, Gordana and Cardozo, Nicol\u00e1s and Budimac, Zoran &#8211; LICCA: A tool for cross-language clone detection &#8211; 5th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER) &#8211; 2018<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/8530072\">Stereo: Editing Clones Refactored as Code Generators<\/a><br \/>\nN. Volanschi &#8211; Stereo: Editing Clones Refactored as Code Generators &#8211; 2018 IEEE International Conference on Software Maintenance and Evolution (ICSME) &#8211; 2018<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/3180155.3180179\">CCAligner: A Token Based Large-Gap Clone Detector<\/a><br \/>\nWang, Pengcheng and Svajlenko, Jeffrey and Wu, Yanzhao and Xu, Yun and Roy, Chanchal K. &#8211; CCAligner: A Token Based Large-Gap Clone Detector &#8211; Proceedings of the 40th International Conference on Software Engineering &#8211; 2018<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8719484\/\">Investigating Vector-Based Detection of Code Clones Using BigCloneBench<\/a><br \/>\nK. Yokoi and E. Choi and N. Yoshida and K. Inoue &#8211; Investigating Vector-Based Detection of Code Clones Using BigCloneBench &#8211; 2018 25th Asia-Pacific Software Engineering Conference (APSEC) &#8211; 2018<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8530022\/\">Automatic Clone Recommendation for Refactoring Based on the Present and the Past<\/a><br \/>\nR. Yue and Z. Gao and N. Meng and Y. Xiong and X. Wang and J. D. Morgenthaler &#8211; Automatic Clone Recommendation for Refactoring Based on the Present and the Past &#8211; 2018 IEEE International Conference on Software Maintenance and Evolution (ICSME) &#8211; 2018<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/3282308.3282333\">And the Tool Created a GUI That Was Impure and Without Form: Anti-Patterns in Automatically Generated GUIs<\/a><br \/>\nZarras, Apostolos V. and Mamalis, Georgios and Papamichail, Aggelos and Kollias, Panagiotis and Vassiliadis, Panos &#8211; And the Tool Created a GUI That Was Impure and Without Form: Anti-Patterns in Automatically Generated GUIs &#8211; Proceedings of the 23rd European Conference on Pattern Languages of Programs &#8211; 2018<\/p>\n<hr \/>\n<h1>2017<\/h1>\n<p><a href=\"https:\/\/doi.org\/10.1145\/3120459.3120465\">Assessing Code Smell Interest Probability: A Case Study<\/a><br \/>\nCharalampidou, Sofia and Ampatzoglou, Apostolos and Chatzigeorgiou, Alexander and Avgeriou, Paris &#8211; Assessing Code Smell Interest Probability: A Case Study &#8211; Proceedings of the XP2017 Scientific Workshops &#8211; 2017<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1109\/ICSE-SEIP.2017.6\">Transferring Code-Clone Detection and Analysis to Practice<\/a><br \/>\nDang, Yingnong and Zhang, Dongmei and Ge, Song and Huang, Ray and Chu, Chengyun and Xie, Tao &#8211; Transferring Code-Clone Detection and Analysis to Practice &#8211; Proceedings of the 39th International Conference on Software Engineering: Software Engineering in Practice Track &#8211; 2017<\/p>\n<p><a>Rethinking dependence clones<\/a><br \/>\nT. A. D. Henderson and A. Podgurski &#8211; Rethinking dependence clones &#8211; 2017 IEEE 11th International Workshop on Software Clones (IWSC) &#8211; 2017<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/3133908\">D\\&#8217;eJ\\`aVu: A Map of Code Duplicates on GitHub<\/a><br \/>\nLopes, Cristina V. and Maj, Petr and Martins, Pedro and Saini, Vaibhav and Yang, Di and Zitny, Jakub and Sajnani, Hitesh and Vitek, Jan &#8211; D\\&#8217;eJ\\`aVu: A Map of Code Duplicates on GitHub &#8211; Proc. ACM Program. Lang. &#8211; 2017<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1016\/j.eswa.2017.12.040\">A detection framework for semantic code clones and obfuscated code<\/a><br \/>\nSheneamer, Abdullah and Roy, Swarup and Kalita, Jugal &#8211; A detection framework for semantic code clones and obfuscated code &#8211; Expert Systems With Applications &#8211; 2017<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1007\/s10664-015-9419-z\">Raters\u2019 Reliability in Clone Benchmarks Construction<\/a><br \/>\nCharpentier, Alan and Falleri, Jean-R\\&#8217;emy and Morandat, Flor\\&#8217;eal and Ben Hadj Yahia, Elyas and R\\&#8217;eveill\\`ere, Laurent &#8211; Raters\u2019 Reliability in Clone Benchmarks Construction &#8211; Empirical Softw. Engg. &#8211; 2017<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/8252205\">On the association between code cloning and fault-proneness: An empirical investigation<\/a><br \/>\nM. O. Elish &#8211; On the association between code cloning and fault-proneness: An empirical investigation &#8211; 2017 Computing Conference &#8211; 2017<\/p>\n<p><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-66197-1_10\">Specification Clones: An Empirical Study of the Structure of Event-B Specifications<\/a><br \/>\nFarrell, Marie and Monahan, Rosemary and Power, James &#8211; Specification Clones: An Empirical Study of the Structure of Event-B Specifications &#8211; International Conference on Software Engineering and Formal Methods &#8211; 2017<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.4018\/IJOSSP.2017040101\">Non-trivial software clone detection using program dependency graph<\/a><br \/>\nGautam, Pratiksha and Saini, Hemraj &#8211; Non-trivial software clone detection using program dependency graph &#8211; International Journal of Open Source Software and Processes &#8211; 2017<\/p>\n<p><a href=\"https:\/\/dl.gi.de\/handle\/20.500.12116\/4695\">Deriving Categories of Semantic Clones from a Coding Contest<\/a><br \/>\nG\u00f6rg, Torsten &#8211; Deriving Categories of Semantic Clones from a Coding Contest &#8211; Softwaretechnik-Trends &#8211; 2017<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/7961534\/\">Removing Code Clones from Industrial Systems Using Compiler Directives<\/a><br \/>\nHatano, Tomomi and Matsuo, Akihiko &#8211; Removing Code Clones from Industrial Systems Using Compiler Directives &#8211; 2017 IEEE\/ACM 25th International Conference on Program Comprehension (ICPC) &#8211; 2017<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/7880510\">A technique to detect multi-grained code clones<\/a><br \/>\nY. Yuki and Y. Higo and S. Kusumoto &#8211; A technique to detect multi-grained code clones &#8211; 2017 IEEE 11th International Workshop on Software Clones (IWSC) &#8211; 2017<\/p>\n<p><a href=\"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218194017400083\">Comparing Software Bugs in Clone and Non-clone Code: An Empirical Study<\/a><br \/>\nIslam, Judith F and Mondal, Manishankar and Roy, Chanchal K and Schneider, Kevin A &#8211; Comparing Software Bugs in Clone and Non-clone Code: An Empirical Study &#8211; World Scientific &#8211; 2017<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8169981\/\">Security Vulnerabilities in Categories of Clones and Non-Cloned Code: An Empirical Study<\/a><br \/>\nM. R. Islam and M. F. Zibran and A. Nagpal &#8211; Security Vulnerabilities in Categories of Clones and Non-Cloned Code: An Empirical Study &#8211; 2017 ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM) &#8211; 2017<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/316531860_Performance_Evaluation_and_Comparative_Analysis_of_Code-Clone-Detection_Techniques_and_Tools\">Performance Evaluation and Comparative Analysis of Code-Clone-Detection Techniques and Tools<\/a><br \/>\nKaur, Harpreet and Maini, Raman &#8211; Performance Evaluation and Comparative Analysis of Code-Clone-Detection Techniques and Tools &#8211; International Journal of Software Engineering and Its Applications &#8211; 2017<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/3109729.3109736\">Finding Lost Features in Cloned Systems<\/a><br \/>\nKr\\&#8221;uger, Jacob and Nell, Louis and Fenske, Wolfram and Saake, Gunter and Leich, Thomas &#8211; Finding Lost Features in Cloned Systems &#8211; Proceedings of the 21st International Systems and Software Product Line Conference &#8211; Volume B &#8211; 2017<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8094426\/\">CCLearner: A Deep Learning-Based Clone Detection Approach<\/a><br \/>\nL. Li and H. Feng and W. Zhuang and N. Meng and B. Ryder &#8211; CCLearner: A Deep Learning-Based Clone Detection Approach &#8211; 2017 IEEE International Conference on Software Maintenance and Evolution (ICSME) &#8211; 2017<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/3018882.3018892\">Detecting Code Clones with Gaps by Function Applications<\/a><br \/>\nMatsushita, Tsubasa and Sasano, Isao &#8211; Detecting Code Clones with Gaps by Function Applications &#8211; Proceedings of the 2017 ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation &#8211; 2017<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/7961508\/\">Identifying Code Clones Having High Possibilities of Containing Bugs<\/a><br \/>\nM. Mondal and C. K. Roy and K. A. Schneider &#8211; Identifying Code Clones Having High Possibilities of Containing Bugs &#8211; 2017 IEEE\/ACM 25th International Conference on Program Comprehension (ICPC) &#8211; 2017<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/7975193\/\">Detection of near-miss clones using metrics and Abstract Syntax Trees<\/a><br \/>\nVishwachi and S. Gupta &#8211; Detection of near-miss clones using metrics and Abstract Syntax Trees &#8211; 2017 International Conference on Inventive Communication and Computational Technologies (ICICCT) &#8211; 2017<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/322482317_Machine_learning_strategies_for_temporal_analysis_of_software_clone_evolution_using_software_metrics\">Machine Learning Strategies for Temporal Analysis of Software Clone Evolution using Software Metrics<\/a><br \/>\nPati, Jayadeep and Kumar, Babloo and Manjhi, Devesh and Shukla, K K &#8211; Machine Learning Strategies for Temporal Analysis of Software Clone Evolution using Software Metrics &#8211; International Journal of Applied Engineering Research &#8211; 2017<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8090146\/\">On the Relationships Between Stability and Bug-Proneness of Code Clones: An Empirical Study<\/a><br \/>\nM. S. Rahman and C. K. Roy &#8211; On the Relationships Between Stability and Bug-Proneness of Code Clones: An Empirical Study &#8211; 2017 IEEE 17th International Working Conference on Source Code Analysis and Manipulation (SCAM) &#8211; 2017<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/8306014\">Interface Driven Code Clone Detection<\/a><br \/>\nM. R. H. Misu and K. Sakib &#8211; Interface Driven Code Clone Detection &#8211; 2017 24th Asia-Pacific Software Engineering Conference (APSEC) &#8211; 2017<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/7880506\">Software clones in scratch projects: on the presence of copy-and-paste in computational thinking learning<\/a><br \/>\nG. Robles and J. Moreno-Le\u00f3n and E. Aivaloglou and F. Hermans &#8211; Software clones in scratch projects: on the presence of copy-and-paste in computational thinking learning &#8211; 2017 IEEE 11th International Workshop on Software Clones (IWSC) &#8211; 2017<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/8312535\">An Exploratory Study on Interface Similarities in Code Clones<\/a><br \/>\nM. R. H. Misu and A. Satter and K. Sakib &#8211; An Exploratory Study on Interface Similarities in Code Clones &#8211; 2017 24th Asia-Pacific Software Engineering Conference Workshops (APSECW) &#8211; 2017<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8305997\/\">CCFinderSW: Clone Detection Tool with Flexible Multilingual Tokenization<\/a><br \/>\nY. Semura and N. Yoshida and E. Choi and K. Inoue &#8211; CCFinderSW: Clone Detection Tool with Flexible Multilingual Tokenization &#8211; 2017 24th Asia-Pacific Software Engineering Conference (APSEC) &#8211; 2017<\/p>\n<p><a href=\"http:\/\/www.ijirct.org\/viewPaper.php?paperId=IJIRCT1601037\">Code Clone Detection Using Hybrid Approach<\/a><br \/>\nSharad Patil, Sayali and Santosh Chaudhari, Sachin and Mukunda Sonawane, Ashwini and Siddharth Salunke, Sonal and Ramakant Bhole, Makarand &#8211; Code Clone Detection Using Hybrid Approach &#8211; (IJIRCT )International Journal of Innovative Research and Creative Technology &#8211; 2017<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8260767\/\">Schemes for Labeling Semantic Code Clones using Machine Learning<\/a><br \/>\nA. Sheneamer and H. Hazazi and S. Roy and J. Kalita &#8211; Schemes for Labeling Semantic Code Clones using Machine Learning &#8211; 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA) &#8211; 2017<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/8090136\">An Exploratory Study of Functional Redundancy in Code Repositories<\/a><br \/>\nM. Suzuki and A. Carvalho de Paula and E. Guerra and C. V. Lopes and O. A. Lazzarini Lemos &#8211; An Exploratory Study of Functional Redundancy in Code Repositories &#8211; 2017 IEEE 17th International Working Conference on Source Code Analysis and Manipulation (SCAM) &#8211; 2017<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8247574\/\">The pragmatics of clone detection and elimination<\/a><br \/>\nThompson, Simon and Li, Huiqing and Schumacher, Andreas &#8211; The pragmatics of clone detection and elimination &#8211; The Art, Science, and Engineering of Programming &#8211; 2017<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/7985650\/\">Clone Refactoring with Lambda Expressions<\/a><br \/>\nN. Tsantalis and D. Mazinanian and S. Rostami &#8211; Clone Refactoring with Lambda Expressions &#8211; 2017 IEEE\/ACM 39th International Conference on Software Engineering (ICSE) &#8211; 2017<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/7880501\/\">Detecting and analyzing code clones in HDL<\/a><br \/>\nK. Uemura and A. Mori and K. Fujiwara and E. Choi and H. Iida &#8211; Detecting and analyzing code clones in HDL &#8211; 2017 IEEE 11th International Workshop on Software Clones (IWSC) &#8211; 2017<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8305932\/\">CCSharp: An Efficient Three-Phase Code Clone Detector Using Modified PDGs<\/a><br \/>\nM. Wang and P. Wang and Y. Xu &#8211; CCSharp: An Efficient Three-Phase Code Clone Detector Using Modified PDGs &#8211; 2017 24th Asia-Pacific Software Engineering Conference (APSEC) &#8211; 2017<\/p>\n<p><a href=\"https:\/\/pdfs.semanticscholar.org\/ad3a\/07425891ffa7d6cc2a1edbc2185874925048.pdf\">Positive and Unlabeled Learning for Detecting Software Functional Clones with Adversarial Training<\/a><br \/>\nWei, Hui-Hui and Li, Ming &#8211; Positive and Unlabeled Learning for Detecting Software Functional Clones with Adversarial Training &#8211; Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence (IJCAI) &#8211; 2017<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/324725510\">Component-based experimental testbed to faciltiate code clone detection research<\/a><br \/>\nWijesiriwardana, Chaman and Wimalaratne, Prasad &#8211; Component-based experimental testbed to faciltiate code clone detection research &#8211; 2017 8th IEEE International Conference on Software Engineering and Service &#8211; 2017<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8029624\/\">Detecting Java Code Clones with Multi-granularities Based on Bytecode<\/a><br \/>\nD. Yu and J. Wang and Q. Wu and J. Yang and J. Wang and W. Yang and W. Yan &#8211; Detecting Java Code Clones with Multi-granularities Based on Bytecode &#8211; 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) &#8211; 2017<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/7985703\/\">Automated Transplantation and Differential Testing for Clones<\/a><br \/>\nT. Zhang and M. Kim &#8211; Automated Transplantation and Differential Testing for Clones &#8211; 2017 IEEE\/ACM 39th International Conference on Software Engineering (ICSE) &#8211; 2017<\/p>\n<hr \/>\n<h1>2016<\/h1>\n<p><a href=\"https:\/\/doi.org\/10.1145\/2851613.2851792\">Is Code Cloning in Games Really Different?<\/a><br \/>\nAl-omari, Farouq and Roy, Chanchal K. &#8211; Is Code Cloning in Games Really Different? &#8211; Proceedings of the 31st Annual ACM Symposium on Applied Computing &#8211; 2016<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/315698515\">Language Independent Code Clone Detection Approach Using JSON String Parsing<\/a><br \/>\nKaur, Sandeep and Singh, Gaurav and Sohal, Bhavneesh &#8211; Language Independent Code Clone Detection Approach Using JSON String Parsing &#8211; Article in International Journal of Control Theory and Applications &#8211; 2016<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/2851613.2851787\">Architectural Clones: Toward Tactical Code Reuse<\/a><br \/>\nKrutz, Daniel E. and Mirakhorl, Mehdi &#8211; Architectural Clones: Toward Tactical Code Reuse &#8211; Proceedings of the 31st Annual ACM Symposium on Applied Computing &#8211; 2016<\/p>\n<p><a href=\"https:\/\/link.springer.com\/article\/10.1007\/s11704-016-5131-4\">Major motivations for extract method refactorings: analysis based on interviews and change histories<\/a><br \/>\nLiu, Wenmei and Liu, Hui &#8211; Major motivations for extract method refactorings: analysis based on interviews and change histories &#8211; Front. Comput. Sci &#8211; 2016<\/p>\n<p><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-47106-8_20\">Searching for Configurations in Clone Evaluation A Replication Study<\/a><br \/>\nRagkhitwetsagul, Chaiyong and Paixao, Matheus and Adham, Manal and Busari, Saheed and Krinke, Jens and Drake, John H &#8211; Searching for Configurations in Clone Evaluation A Replication Study &#8211; Search Based Software Engineering(SSBSE) &#8211; 2016<\/p>\n<p><a href=\"https:\/\/www.semanticscholar.org\/paper\/A-Survey-of-Software-Clone-Detection-Techniques-Sheneamer-Kalita\/1b150df71fea9b7d131acb9ab0eecc504c920f3f?p2df\">A Survey of Software Clone Detection Techniques<\/a><br \/>\nAbdullah Sheneamer and Jugal Kumar Kalita &#8211; A Survey of Software Clone Detection Techniques &#8211; International Journal of Computer Applications &#8211; 2016<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/302311346\">Clone Detection for Graph-Based Model Transformation Languages<\/a><br \/>\nStr\u00fcber, Daniel and Pl\u00f6ger, Jennifer and Acre\u00b5oaie, Vlad &#8211; Clone Detection for Graph-Based Model Transformation Languages &#8211; International Conference on Model Transformation &#8211; 2016<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/2950290.2950321\">Code Relatives: Detecting Similarly Behaving Software<\/a><br \/>\nSu, Fang-Hsiang and Bell, Jonathan and Harvey, Kenneth and Sethumadhavan, Simha and Kaiser, Gail and Jebara, Tony &#8211; Code Relatives: Detecting Similarly Behaving Software &#8211; Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering &#8211; 2016<\/p>\n<p><a href=\"https:\/\/tufanomichele.com\/publications\/C5.pdf\">Deep learning code fragments for code clone detection<\/a><br \/>\nWhite, Martin and Tufano, Michele and Vendome, Christopher and Poshyvanyk, Denys &#8211; Deep learning code fragments for code clone detection &#8211; ASE 2016 &#8211; Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering &#8211; 2016<\/p>\n<p><a href=\"http:\/\/ceur-ws.org\/Vol-1771\/paper10.pdf\">When, why and for whom do practitioners detect technical debt?: An experience report<\/a><br \/>\nYoshida, Norihiro &#8211; When, why and for whom do practitioners detect technical debt?: An experience report &#8211; 1st International Workshop on Technical Debt Analytics (TDA 2016) &#8211; 2016<\/p>\n<p><a href=\"https:\/\/www.semanticscholar.org\/paper\/A-Novel-Approach-for-Code-Clone-Detection-Using-Ahmad-Dmutto\/cdc0fe9233884185a35f1086fa6d947f738f2ae2\">A Novel Approach for Code Clone Detection Using Hybrid Technique<\/a><br \/>\nAhmad, Muneer and Dmutto, Mudasirahma &#8211; A Novel Approach for Code Clone Detection Using Hybrid Technique &#8211; International Journal of Advanced Engineering, Management and Science (IJAEMS) &#8211; 2016<\/p>\n<p><a href=\"https:\/\/journals.ekb.eg\/article_19841.html\">Automatic Detecting and Removal Duplicate Codes Clones<\/a><br \/>\nAl-Saffar, Z D and Sarhan, S S and Elmougy, S &#8211; Automatic Detecting and Removal Duplicate Codes Clones &#8211; International Journal of Intelligent Computing and Information Sciences &#8211; 2016<\/p>\n<p><a>DroidClone: Detecting android malware variants by exposing code clones<\/a><br \/>\nS. Alam and R. Riley and I. Sogukpinar and N. Carkaci &#8211; DroidClone: Detecting android malware variants by exposing code clones &#8211; 2016 Sixth International Conference on Digital Information and Communication Technology and its Applications (DICTAP) &#8211; 2016<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/305992168\">Clones Clustering Using K-Means<\/a><br \/>\nAshish, Aveg &#8211; Clones Clustering Using K-Means &#8211; 10th International Conference on Intelligent Systems and Control (ISCO) &#8211; 2016<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/7888740\/\">Signature limits: an entire map of clone features and their discovery in nearly linear time<\/a><br \/>\nCasey, William and Shelmire, Aaron &#8211; Signature limits: an entire map of clone features and their discovery in nearly linear time &#8211; 2016 11th International Conference on Malicious and Unwanted Software (MALWARE) &#8211; 2016<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1007\/s10664-015-9394-4\">Code Clones and Developer Behavior: Results of Two Surveys of the Clone Research Community<\/a><br \/>\nChatterji, Debarshi and Carver, Jeffrey C. and Kraft, Nicholas A. &#8211; Code Clones and Developer Behavior: Results of Two Surveys of the Clone Research Community &#8211; Empirical Softw. Engg. &#8211; 2016<\/p>\n<p><a href=\"https:\/\/link.springer.com\/article\/10.1007\/s11219-015-9296-0\">Clone detection in MATLAB Stateflow models<\/a><br \/>\nChen, Jian and Dean, Thomas R and Manar, \u2022 and Alalfi, H and Alalfi, Manar H &#8211; Clone detection in MATLAB Stateflow models &#8211; Software Quality Journal &#8211; 2016<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/2970276.2970363\">Mining Revision Histories to Detect Cross-Language Clones without Intermediates<\/a><br \/>\nCheng, Xiao and Peng, Zhiming and Jiang, Lingxiao and Zhong, Hao and Yu, Haibo and Zhao, Jianjun &#8211; Mining Revision Histories to Detect Cross-Language Clones without Intermediates &#8211; Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering &#8211; 2016<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/2889160.2889220\">A Guided Tour of the Legal Implications of Software Cloning<\/a><br \/>\nCiancarini, Paolo and Russo, Daniel and Sillitti, Alberto and Succi, Giancarlo &#8211; A Guided Tour of the Legal Implications of Software Cloning &#8211; Proceedings of the 38th International Conference on Software Engineering Companion &#8211; 2016<\/p>\n<p><a href=\"http:\/\/cyber.bibl.u-szeged.hu\/index.php\/actcybern\/article\/view\/3895\">Identifying Code Clones with RefactorErl<\/a><br \/>\nF\u00f6rdos, Vikt\u00f3ria and T\u00f3th, Melinda &#8211; Identifying Code Clones with RefactorErl &#8211; Acta Cybernetica &#8211; 2016<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/301945885_A_Novel_Approach_to_Detect_Duplicate_Code_Blocks_to_Reduce_Maintenance_Effort\">A Novel Approach to Detect Duplicate Code Blocks to Reduce Maintenance Effort<\/a><br \/>\nGupta, Sonam and Gupta, P C &#8211; A Novel Approach to Detect Duplicate Code Blocks to Reduce Maintenance Effort &#8211; International Journal of Advanced Computer Science and Applications &#8211; 2016<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/2989238.2989241\">Sampling Code Clones from Program Dependence Graphs with GRAPLE<\/a><br \/>\nHenderson, Tim A. D. and Podgurski, Andy &#8211; Sampling Code Clones from Program Dependence Graphs with GRAPLE &#8211; Proceedings of the 2nd International Workshop on Software Analytics &#8211; 2016<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/7476631\/\">Bug Replication in Code Clones: An Empirical Study<\/a><br \/>\nJ. F. Islam and M. Mondal and C. K. Roy &#8211; Bug Replication in Code Clones: An Empirical Study &#8211; 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER) &#8211; 2016<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/7476787\/\">A Comparative Study on Vulnerabilities in Categories of Clones and Non-cloned Code<\/a><br \/>\nM. R. Islam and M. F. Zibran &#8211; A Comparative Study on Vulnerabilities in Categories of Clones and Non-cloned Code &#8211; 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER) &#8211; 2016<\/p>\n<p><a href=\"http:\/\/www.ijtc.org\/download\/Volume-2\/April-2\/IJTC201604009-Implementation%20of%20Model%20Cloning%20in%20Software%20Models%20using%20UML%20diagrams-s129.pdf\">Implementation of Model Cloning in Software Models using UML diagrams<\/a><br \/>\nKaur, Jashandeep and Singh, Rasbir &#8211; Implementation of Model Cloning in Software Models using UML diagrams &#8211; International Journal of Technology and Computing (IJTC) &#8211; 2016<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/315702342\">Software Clone Detection: A review<\/a><br \/>\nKaur, Sandeep and Chatley, Geetika and Sohal, Bhavneesh &#8211; Software Clone Detection: A review &#8211; Article in International Journal of Control Theory and Applications &#8211; 2016<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/303319044\">A Study on the Nature of Code Clone Occurrence Predominantly in Feature Oriented Programming and the Prospects of Refactoring<\/a><br \/>\nKesswani, Nishtha and Devi, U and Sharma, A and Kesswani, N &#8211; A Study on the Nature of Code Clone Occurrence Predominantly in Feature Oriented Programming and the Prospects of Refactoring &#8211; Article in International Journal of Computer Applications &#8211; 2016<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/2889160.2889168\">JDeodorant: Clone Refactoring<\/a><br \/>\nMazinanian, Davood and Tsantalis, Nikolaos and Stein, Raphael and Valenta, Zackary &#8211; JDeodorant: Clone Refactoring &#8211; Proceedings of the 38th International Conference on Software Engineering Companion &#8211; 2016<\/p>\n<p><a href=\"https:\/\/idp.springer.com\/authorize\/casa?redirect_uri=https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-016-9305-y.pdf&amp;casa_token=NPZc4XCjtSsAAAAA:z9Q0w-es430WcDbdwj8x6h9CI48EAX9xXdp3UGb__llKoTyQHvY5DXt3beYvpko5SxFKg7snWrp1LZ-4\">A comparative study on the intensity and harmfulness of late propagation in near-miss code clones<\/a><br \/>\nMondal, Manishankar and Chanchal Roy, K and Schneider, Kevin A &#8211; A comparative study on the intensity and harmfulness of late propagation in near-miss code clones &#8211; Software Quality Journal &#8211; 2016<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/7476789\">Towards Detection and Analysis of Interlanguage Clones for Multilingual Web Applications<\/a><br \/>\nY. Nakamura and E. Choi and N. Yoshida and S. Haruna and K. Inoue &#8211; Towards Detection and Analysis of Interlanguage Clones for Multilingual Web Applications &#8211; 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER) &#8211; 2016<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/304106172\">A novel kernel to predict software defectiveness<\/a><br \/>\nOkutan, Ahmet and Taner Yildiz, Olcay and Taner YILDIZ, Olcay &#8211; A novel kernel to predict software defectiveness &#8211; Article in Journal of Systems and Software &#8211; 2016<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/7813733\/\">Code clones detection using machine learning technique: Support vector machine<\/a><br \/>\nS. Jadon &#8211; Code clones detection using machine learning technique: Support vector machine &#8211; 2016 International Conference on Computing, Communication and Automation (ICCCA) &#8211; 2016<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/2934466.2934487\">A Prototype-Based Approach for Managing Clones in Clone-and-Own Product Lines<\/a><br \/>\nRabiser, Daniela and Gr\\&#8221;unbacher, Paul and Pr\\&#8221;ahofer, Herbert and Angerer, Florian &#8211; A Prototype-Based Approach for Managing Clones in Clone-and-Own Product Lines &#8211; Proceedings of the 20th International Systems and Software Product Line Conference &#8211; 2016<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/2979779.2979855\">Systematic Mapping Study of Metrics Based Clone Detection Techniques<\/a><br \/>\nRattan, Dhavleesh and Kaur, Jagdeep &#8211; Systematic Mapping Study of Metrics Based Clone Detection Techniques &#8211; Proceedings of the International Conference on Advances in Information Communication Technology &amp; Computing &#8211; 2016<\/p>\n<p><a href=\"http:\/\/ijtet.com\/wp-content\/plugins\/ijtet\/file\/upload\/docx\/3996IJTET1301006-pdf.pdf\">A Survey on Software Refactorability through Software Clone Detection Tools and Techniques<\/a><br \/>\nSahithi, A Naga and Ramani, K &#8211; A Survey on Software Refactorability through Software Clone Detection Tools and Techniques &#8211; International Journal for Trends in Engineering and Technology &#8211; 2016<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/7883349\">SourcererCC and SourcererCC-I: Tools to detect clones in batch mode and during software development<\/a><br \/>\nSaini, Vaibhav and Sajnani, Hitesh and Kim, Jaewoo and Lopes, Cristina &#8211; SourcererCC and SourcererCC-I: Tools to detect clones in batch mode and during software development &#8211; Proceedings of International Conference on Software Engineering &#8211; 2016<\/p>\n<p><a href=\"https:\/\/arxiv.org\/abs\/1512.06448\">SourcererCC: Scaling code clone detection to big-code<\/a><br \/>\nSajnani, Hitesh and Saini, Vaibhav and Svajlenko, Jeffrey and Roy, Chanchal K. and Lopes, Cristina V. &#8211; SourcererCC: Scaling code clone detection to big-code &#8211; Proceedings of International Conference on Software Engineering &#8211; 2016<\/p>\n<p><a href=\"https:\/\/idp.springer.com\/authorize\/casa?redirect_uri=https:\/\/link.springer.com\/article\/10.1134\/S0361768816010072&amp;casa_token=aOecztvPBXYAAAAA:X3xSfS64dC2ixATFOc_EhJfaULlkW-UDDLxfw3IIEZH7Cb67kOEMGkW9JJrTyc-IYsL1MQuhUB11a8c8\">Scalable and Accurate Detection of Code Clones<\/a><br \/>\nSargsyan, S and Kurmangaleev, Sh and Belevantsev, A and Avetisyan, A &#8211; Scalable and Accurate Detection of Code Clones &#8211; Original Russian Text &#8211; 2016<\/p>\n<p><a href=\"https:\/\/pdfs.semanticscholar.org\/6423\/5ec2fad562872ea2e43d4ba97c73df4a470d.pdf\">To Enhance Type 4 Clone Detection in Clone Testing<\/a><br \/>\nSharma, Swati and Mehta, Priyanka and Tech Scholar, M &#8211; To Enhance Type 4 Clone Detection in Clone Testing &#8211; International Journal of Computer Science and Information Technologies &#8211; 2016<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/7838289\">Semantic Clone Detection Using Machine Learning<\/a><br \/>\nA. Sheneamer and J. Kalita &#8211; Semantic Clone Detection Using Machine Learning &#8211; 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA) &#8211; 2016<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/7503720\">Identifying functionally similar code in complex codebases<\/a><br \/>\nFang-Hsiang Su and J. Bell and G. Kaiser and S. Sethumadhavan &#8211; Identifying functionally similar code in complex codebases &#8211; 2016 IEEE 24th International Conference on Program Comprehension (ICPC) &#8211; 2016<\/p>\n<p><a href=\"https:\/\/www.semanticscholar.org\/paper\/Discovering-Functionally-Similar-Code-with-Taint-Su-Bell\/20f8ff1e20f999f332885ab4fe60beb5332e4f9a\">Discovering Functionally Similar Code with Taint Analysis<\/a><br \/>\nSu, Fang-Hsiang and Bell, Jonathan and Kaiser, Gail and Sethumadhavan, Simha &#8211; Discovering Functionally Similar Code with Taint Analysis &#8211; Journal of Software: Evolution and Process &#8211; 2016<\/p>\n<p><a href=\"https:\/\/pdfs.semanticscholar.org\/664c\/1739942bd6bd32d559afad5109e68bd962cd.pdf\">Efficiently Measuring an Accurate and Generalized Clone Detection Precision using Clone Clustering<\/a><br \/>\nSvajlenko, Jeffrey and Roy, Chanchal K &#8211; Efficiently Measuring an Accurate and Generalized Clone Detection Precision using Clone Clustering &#8211; Proceedings of the 28th International Conference on Software Engineering and Knowledge Engineering (SEKE) &#8211; 2016<\/p>\n<p><a href=\"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-015-9368-6.pdf\">Development nature matters: An empirical study of code clones in JavaScript applications<\/a><br \/>\nTing Cheung, Wai and Ryu, Sukyoung and Kim, Sunghun and Cheung, W T and Ryu, \u00b7 S and Kim, S &#8211; Development nature matters: An empirical study of code clones in JavaScript applications &#8211; Empir Software Eng &#8211; 2016<\/p>\n<p><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-32467-8_47\">Mining Source Code Clones in a Corporate Environment<\/a><br \/>\nTorres, Jose J. and Junior, Methanias C. and Santos, Francisco R. &#8211; Mining Source Code Clones in a Corporate Environment &#8211; Information Technology: New Generations &#8211; 2016<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/3011141.3011160\">Maximal Frequent Sequence Mining for Finding Software Clones<\/a><br \/>\nUdagawa, Yoshihisa &#8211; Maximal Frequent Sequence Mining for Finding Software Clones &#8211; Proceedings of the 18th International Conference on Information Integration and Web-Based Applications and Services &#8211; 2016<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/7503736\">Defending against the attack of the micro-clones<\/a><br \/>\nR. van Tonder and C. Le Goues &#8211; Defending against the attack of the micro-clones &#8211; 2016 IEEE 24th International Conference on Program Comprehension (ICPC) &#8211; 2016<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/7476632\/\">On the Relationship of Inconsistent Software Clones and Faults: An Empirical Study<\/a><br \/>\nS. Wagner and A. Abdulkhaleq and K. Kaya and A. Paar &#8211; On the Relationship of Inconsistent Software Clones and Faults: An Empirical Study &#8211; 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER) &#8211; 2016<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/312693231_On_the_Effectiveness_of_Vector-Based_Approach_for_Supporting_Simultaneous_Editing_of_Software_Clones\">On the Effectiveness of Vector-Based Approach for Supporting Simultaneous Editing of Software Clones<\/a><br \/>\nNumata, Seiya and Yoshida, Norihiro and Choi, Eunjong and Inoue, Katsuro &#8211; On the Effectiveness of Vector-Based Approach for Supporting Simultaneous Editing of Software Clones &#8211; International Conference on Product-Focused Software Process Improvement &#8211; 2016<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/7476798\">Towards Implementation of an Integrated Clone Management Infrastructure<\/a><br \/>\nM. F. Zibran &#8211; Towards Implementation of an Integrated Clone Management Infrastructure &#8211; 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER) &#8211; 2016<\/p>\n<hr \/>\n<h1>2015<\/h1>\n<p><a href=\"https:\/\/doi.org\/10.1145\/2855667.2855676\">Discovering Clones in Software: From Complex Algorithms to Everyday Desktop Tool<\/a><br \/>\nAkhin, Marat and Suhinin, Alexandr &#8211; Discovering Clones in Software: From Complex Algorithms to Everyday Desktop Tool &#8211; Proceedings of the 11th Central &amp; Eastern European Software Engineering Conference in Russia &#8211; 2015<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/2745802.2745811\">Fault Density Analysis of Object-Oriented Classes in Presence of Code Clones<\/a><br \/>\nElish, Mahmoud O. and Al-Ghamdi, Yasser &#8211; Fault Density Analysis of Object-Oriented Classes in Presence of Code Clones &#8211; Proceedings of the 19th International Conference on Evaluation and Assessment in Software Engineering &#8211; 2015<\/p>\n<p><a href=\"http:\/\/arxiv.org\/abs\/1503.00711\">Smelling out Code Clones: Clone Detection Tool Evaluation and Corresponding Challenges<\/a><br \/>\nGauci, Rachel &#8211; Smelling out Code Clones: Clone Detection Tool Evaluation and Corresponding Challenges &#8211; CoRR &#8211; 2015<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1007\/978-3-319-26535-3_59\">Software Clone Detection Using Clustering Approach<\/a><br \/>\nJoshi, Bikash and Budhathoki, Puskar and Woon, Wei Lee and Svetinovic, Davor &#8211; Software Clone Detection Using Clustering Approach &#8211; Proceeings, Part II, of the 22nd International Conference on Neural Information Processing &#8211; Volume 9490 &#8211; 2015<\/p>\n<p><a href=\"http:\/\/dx.doi.org\/10.1155\/2015\/829389\">Classifying Obstructive and Nonobstructive Code Clones of Type I Using Simplified Classification Scheme: A Case Study<\/a><br \/>\nStaron, Miroslaw and Meding, Wilhelm and Eriksson, Peter and Nilsson, Jimmy and L\u00f6vgren, Nils and \u00d6sterstr\u00f6m, Per &#8211; Classifying Obstructive and Nonobstructive Code Clones of Type I Using Simplified Classification Scheme: A Case Study &#8211; Advances in Software Engineering 2015 &#8211; 2015<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/2771783.2771795\">WuKong: A Scalable and Accurate Two-Phase Approach to Android App Clone Detection<\/a><br \/>\nWang, Haoyu and Guo, Yao and Ma, Ziang and Chen, Xiangqun &#8211; WuKong: A Scalable and Accurate Two-Phase Approach to Android App Clone Detection &#8211; Proceedings of the 2015 International Symposium on Software Testing and Analysis &#8211; 2015<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/281117910\">An Empirical Study of the Copy and Paste Behavior during Development<\/a><br \/>\nAhmed, Tarek M and Shang, Weiyi and Hassan, Ahmed E &#8211; An Empirical Study of the Copy and Paste Behavior during Development &#8211; Working Conference on Mining Software Repositories &#8211; 2015<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/7069888\/\">Tool support for managing method clones<\/a><br \/>\nH. A. Basit and H. S. Khan and F. Hamid and I. Suhail &#8211; Tool support for managing method clones &#8211; 2015 IEEE 9th International Workshop on Software Clones (IWSC) &#8211; 2015<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/308106751\">A survey on goal-oriented visualization of clone data<\/a><br \/>\nBasit, Hamid and Hammad, Muhammad and Koschke, Rainer &#8211; A survey on goal-oriented visualization of clone data &#8211; IEEE 3rd Working Conference on Software Visualization (VISSOFT) &#8211; 2015<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/7069891\/footnotes#footnotes\">What do we need to know about clones? deriving information needs from user goals<\/a><br \/>\nH. A. Basit and M. Hammad and S. Jarzabek and R. Koschke &#8211; What do we need to know about clones? deriving information needs from user goals &#8211; 2015 IEEE 9th International Workshop on Software Clones (IWSC) &#8211; 2015<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/2745802.2745821\">An Empirical Assessment of Bellon\u2019s Clone Benchmark<\/a><br \/>\nCharpentier, Alan and Falleri, Jean-R\\&#8217;emy and Lo, David and R\\&#8217;eveill\\`ere, Laurent &#8211; An Empirical Assessment of Bellon\u2019s Clone Benchmark &#8211; Proceedings of the 19th International Conference on Evaluation and Assessment in Software Engineering &#8211; 2015<\/p>\n<p><a href=\"http:\/\/www.forbes.com\/sites\/gordonkelly\/2014\/03\/24\/report-97-of-mobile-malware-is-on-android-this-is-the-easy-way-you-st-\">Detecting Android Malware Using Clone Detection<\/a><br \/>\nChen, Jian and Alalfi, Manar H and Dean, Thomas R and Zou, Ying &#8211; Detecting Android Malware Using Clone Detection &#8211; Journal of Computer Science and Technology &#8211; 2015<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/7069885\">An empirical study of identical function clones in CRAN<\/a><br \/>\nClaes, Maelick and Mens, Tom and Claes, Ma\u00eblick and Tabout, Narjisse and Grosjean, Philippe &#8211; An empirical study of identical function clones in CRAN &#8211; 2015 IEEE 9th International Workshop on Software Clones (IWSC) &#8211; 2015<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/7447218\">SIMONE: architecture-sensitive near-miss clone detection for Simulink models<\/a><br \/>\nCordy, James R &#8211; SIMONE: architecture-sensitive near-miss clone detection for Simulink models &#8211; 2015 First International Workshop on Automotive Software Architecture (WASA) &#8211; 2015<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/274326181_Survey_Based_Analysis_of_Effect_of_Code_Clones_on_Software_Quality\">Survey Based Analysis of Effect of Code Clones on Software Quality<\/a><br \/>\nDang, Shilpa and Wani, Shahid Ahmad &#8211; Survey Based Analysis of Effect of Code Clones on Software Quality &#8211; Article in International Journal of Engineering and Technical Research &#8211; 2015<\/p>\n<p><a href=\"http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.735.1950&amp;rep=rep1&amp;type=pdf\">Code Clone Detection using Sequential Pattern Mining<\/a><br \/>\nEl-Matarawy, Ali and El-Ramly, Mohammad and Bahgat, Reem &#8211; Code Clone Detection using Sequential Pattern Mining &#8211; International Journal of Computer Applications &#8211; 2015<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/7416575\">Code duplication in ROS launchfiles<\/a><br \/>\nEstef\u00f3, Pablo and Robbes, Romain and Fabry, Johan and Labs, Rych &#8211; Code duplication in ROS launchfiles &#8211; 2015 34th International Conference of the Chilean Computer Science Society (SCCC) &#8211; 2015<\/p>\n<p><a href=\"https:\/\/aip.scitation.org\/doi\/10.1063\/1.4912559\">Comprehensible presentation of clone detection results<\/a><br \/>\n&#8211; Comprehensible presentation of clone detection results &#8211; AIP Conference Proceedings &#8211; 2015<\/p>\n<p><a href=\"http:\/\/ijiet.com\/wp-content\/uploads\/2015\/02\/30.pdf\">Algorithm to Detect Non-Contiguous Clones with High Precision<\/a><br \/>\nGupta, Sonam and Gupta, P C &#8211; Algorithm to Detect Non-Contiguous Clones with High Precision &#8211; International Journal of Innovations in Engineering and Technology &#8211; 2015<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/7081859\">ClonePacker: A tool for clone set visualization<\/a><br \/>\nH. Murakami and Y. Higo and S. Kusumoto &#8211; ClonePacker: A tool for clone set visualization &#8211; 2015 IEEE 22nd International Conference on Software Analysis, Evolution, and Reengineering (SANER) &#8211; 2015<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/7069882\/\">An execution-semantic and content-and-context-based code-clone detection and analysis<\/a><br \/>\nT. Kamiya &#8211; An execution-semantic and content-and-context-based code-clone detection and analysis &#8211; 2015 IEEE 9th International Workshop on Software Clones (IWSC) &#8211; 2015<\/p>\n<p><a href=\"http:\/\/www.krishisanskriti.org\/ACSIT.html\">A Review of Clone Detection in UML Models<\/a><br \/>\nKaur, Balwinder and Kaur, Er Harpreet &#8211; A Review of Clone Detection in UML Models &#8211; Advances in Computer Science and Information Technology (ACSIT) &#8211; 2015<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/7081830\">Threshold-free code clone detection for a large-scale heterogeneous Java repository<\/a><br \/>\nI. Keivanloo and F. Zhang and Y. Zou &#8211; Threshold-free code clone detection for a large-scale heterogeneous Java repository &#8211; 2015 IEEE 22nd International Conference on Software Analysis, Evolution, and Reengineering (SANER) &#8211; 2015<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/7069883\">Code clone detection using wavelets<\/a><br \/>\nS. Karus and K. Kilgi &#8211; Code clone detection using wavelets &#8211; 2015 IEEE 9th International Workshop on Software Clones (IWSC) &#8211; 2015<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/2695664.2695929\">Examining the Effectiveness of Using Concolic Analysis to Detect Code Clones<\/a><br \/>\nKrutz, Daniel E. and Malachowsky, Samuel A. and Shihab, Emad &#8211; Examining the Effectiveness of Using Concolic Analysis to Detect Code Clones &#8211; Proceedings of the 30th Annual ACM Symposium on Applied Computing &#8211; 2015<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/2786805.2786871\">Clone-Based and Interactive Recommendation for Modifying Pasted Code<\/a><br \/>\nLin, Yun and Peng, Xin and Xing, Zhenchang and Zheng, Diwen and Zhao, Wenyun &#8211; Clone-Based and Interactive Recommendation for Modifying Pasted Code &#8211; Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering &#8211; 2015<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/282431515_Duplicate_Code_Detection_using_Control_Statements\/references\">Duplicate Code Detection using Control Statements<\/a><br \/>\nMallaiah, Sudhamani and Rangarajan, Lalitha &#8211; Duplicate Code Detection using Control Statements &#8211; International Journal of Computer Applications Technology and Research &#8211; 2015<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/7332455\/\">A comparative study on the bug-proneness of different types of code clones<\/a><br \/>\nM. Mondal and C. K. Roy and K. A. Schneider &#8211; A comparative study on the bug-proneness of different types of code clones &#8211; 2015 IEEE International Conference on Software Maintenance and Evolution (ICSME) &#8211; 2015<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/7081861\">SPCP-Miner: A tool for mining code clones that are important for refactoring or tracking<\/a><br \/>\nM. Mondal and C. K. Roy and K. A. Schneider &#8211; SPCP-Miner: A tool for mining code clones that are important for refactoring or tracking &#8211; 2015 IEEE 22nd International Conference on Software Analysis, Evolution, and Reengineering (SANER) &#8211; 2015<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/270760261_Enhancing_Generic_Pipeline_Model_for_Code_Clone_Detection_Using_Divide_and_Conquer_Approach\">Enhancing Generic Pipeline Model for Code Clone Detection Using Divide and Conquer Approach<\/a><br \/>\nMubarak-Ali, Al-Fahim and Syed-Mohamad, Sharifah and Sulaiman, Shahida &#8211; Enhancing Generic Pipeline Model for Code Clone Detection Using Divide and Conquer Approach &#8211; International Arab Journal of Information Technology &#8211; 2015<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/2812428.2812471\">Reusability Based Program Clone Detection: Case Study on Large Scale Healthcare Software System<\/a><br \/>\nPulkkinen, Petri and Holvitie, Johannes and Nevalainen, Olli S. and Lepp\\&#8221;anen, Ville &#8211; Reusability Based Program Clone Detection: Case Study on Large Scale Healthcare Software System &#8211; Proceedings of the 16th International Conference on Computer Systems and Technologies &#8211; 2015<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/7335420\">SimNav: Simulink navigation of model clone classes<\/a><br \/>\nE. J. Rapos and A. Stevenson and M. H. Alalfi and J. R. Cordy &#8211; SimNav: Simulink navigation of model clone classes &#8211; 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM) &#8211; 2015<\/p>\n<p><a>Various possibilities of Clone Detection in Software&#8217;s: A Review<\/a><br \/>\nRicha Grover, Er and Narender Rana, Er and Proff In CSE, Astt &#8211; Various possibilities of Clone Detection in Software&#8217;s: A Review &#8211; IJRIT International Journal of Research in Information Technology &#8211; 2015<\/p>\n<p><a href=\"http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0306437914001860\">Detecting approximate clones in business process model repositories<\/a><br \/>\nMarcello La Rosa and Marlon Dumas and Chathura C. Ekanayake and Luciano Garc\u00eda-Ba\u00f1uelos and Jan Recker and Arthur H.M. ter Hofstede &#8211; Detecting approximate clones in business process model repositories &#8211; Information Systems &#8211; 2015<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/profile\/Saeed_Shafieian\/publication\/267840728_Comparison_of_Clone_Detection_Techniques\/links\/54b6aa760cf2bd04be324938.pdf\">A Measurement of Similarity to Identify Identical Code Clones<\/a><br \/>\nShanmughasundaram, Mythili and Subramani, Sarala &#8211; A Measurement of Similarity to Identify Identical Code Clones &#8211; The International Arab Journal of Information Technology &#8211; 2015<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/7397263\/\">Code clone detection using coarse and fine-grained hybrid approaches<\/a><br \/>\nA. Sheneamer and J. Kalita &#8211; Code clone detection using coarse and fine-grained hybrid approaches &#8211; 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS) &#8211; 2015<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/7167402\">Identifying Instances of Model Design Patterns and Antipatterns Using Model Clone Detection<\/a><br \/>\nM. Stephan and J. R. Cordy &#8211; Identifying Instances of Model Design Patterns and Antipatterns Using Model Clone Detection &#8211; 2015 IEEE\/ACM 7th International Workshop on Modeling in Software Engineering &#8211; 2015<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/7130676\">Assessing the Refactorability of Software Clones<\/a><br \/>\nN. Tsantalis and D. Mazinanian and G. P. Krishnan &#8211; Assessing the Refactorability of Software Clones &#8211; IEEE Transactions on Software Engineering &#8211; 2015<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/7335412\">On the comprehension of code clone visualizations: A controlled study using eye tracking<\/a><br \/>\nM. S. Uddin and V. Gaur and C. Gutwin and C. K. Roy &#8211; On the comprehension of code clone visualizations: A controlled study using eye tracking &#8211; 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM) &#8211; 2015<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/2886444.2886475\">Towards Convenient Management of Software Clone Codes in Practice: An Integrated Approach<\/a><br \/>\nUddin, Md Sharif and Roy, Chanchal K. and Schneider, Kevin A. &#8211; Towards Convenient Management of Software Clone Codes in Practice: An Integrated Approach &#8211; Proceedings of the 25th Annual International Conference on Computer Science and Software Engineering &#8211; 2015<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1007\/s10664-014-9316-x\">Classification model for code clones based on machine learning<\/a><br \/>\nYang, J and Hotta, K and Higo, Y and H, Igaki &#8211; Classification model for code clones based on machine learning &#8211; Empirical Software Engineering &#8211; 2015<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/7069889\/\">Analysis and visualization for clone refactoring<\/a><br \/>\nM. F. Zibran &#8211; Analysis and visualization for clone refactoring &#8211; 2015 IEEE 9th International Workshop on Software Clones (IWSC) &#8211; 2015<\/p>\n<hr \/>\n<h1>2014<\/h1>\n<p><a href=\"http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.685.7674&amp;rep=rep1&amp;type=pdf\">Proceedings of the Eighth International Workshop on Software Clones (IWSC 2014) How Accurate Is Coarse-grained Clone Detection?: Comparision with Fine-grained Detectors<\/a><br \/>\nHotta, Keisuke and Yang, Jiachen and Higo, Yoshiki and Kusumoto, Shinji &#8211; Proceedings of the Eighth International Workshop on Software Clones (IWSC 2014) How Accurate Is Coarse-grained Clone Detection?: Comparision with Fine-grained Detectors &#8211; Electronic Communications of the EASST &#8211; 2014<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/2597073.2597127\">A Code Clone Oracle<\/a><br \/>\nKrutz, Daniel E. and Le, Wei &#8211; A Code Clone Oracle &#8211; Proceedings of the 11th Working Conference on Mining Software Repositories &#8211; 2014<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/2660190.2662116\">Detection of Code Clones in Software Generators<\/a><br \/>\nLillack, Max and Bucholdt, Christian and Schilling, Daniela &#8211; Detection of Code Clones in Software Generators &#8211; Proceedings of the 6th International Workshop on Feature-Oriented Software Development &#8211; 2014<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/6975631\">Automatic Identification of Important Clones for Refactoring and Tracking<\/a><br \/>\nM. Mondal and C. K. Roy and K. A. Schneider &#8211; Automatic Identification of Important Clones for Refactoring and Tracking &#8211; 2014 IEEE 14th International Working Conference on Source Code Analysis and Manipulation &#8211; 2014<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6975633\/\">A Change-Type Based Empirical Study on the Stability of Cloned Code<\/a><br \/>\nM. S. Rahman and C. K. Roy &#8211; A Change-Type Based Empirical Study on the Stability of Cloned Code &#8211; 2014 IEEE 14th International Working Conference on Source Code Analysis and Manipulation &#8211; 2014<\/p>\n<p><a href=\"http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.800.907&amp;rep=rep1&amp;type=pdf\">Detection of Behavioural Clone<\/a><br \/>\nSingh, Manu and Sharma, Vidushi &#8211; Detection of Behavioural Clone &#8211; International Journal of Computer Applications &#8211; 2014<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/300915649_An_Empirical_Study_on_Retrieving_Structural_Clones_Using_Sequence_Pattern_Mining_Algorithms\">An empirical study on retrieving structural clones using sequence pattern mining algorithms<\/a><br \/>\nUdagawa, Yoshihisa &#8211; An empirical study on retrieving structural clones using sequence pattern mining algorithms &#8211; ACM International Conference Proceeding Series &#8211; 2014<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1007\/s10796-013-9428-7\">Aspectualization of code clones-an algorithmic approach Chung-Horng Lung<\/a><br \/>\nAjila, Samuel A and Gakhar, Angad S &#8211; Aspectualization of code clones-an algorithmic approach Chung-Horng Lung &#8211; Information Systems Frontiers &#8211; 2014<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/273204076\">On the Structural Code Clone Detection Problem: A Survey and Software Metric Based Approach<\/a><br \/>\nAktas, Mehmet &#8211; On the Structural Code Clone Detection Problem: A Survey and Software Metric Based Approach &#8211; Computational Science and Its Applications &#8211; ICCSA 2014 &#8211; 2014<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6227873\/\">Analysis and clustering of model clones: An automotive industrial experience<\/a><br \/>\nM. H. Alalfi and J. R. Cordy and T. R. Dean &#8211; Analysis and clustering of model clones: An automotive industrial experience &#8211; 2014 Software Evolution Week &#8211; IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering (CSMR-WCRE) &#8211; 2014<\/p>\n<p><a href=\"http:\/\/mdakhan.weebly.com\/index.html2croy@cs.usask.ca,http:\/\/www.cs.usask.ca\/%E2%88%BCcroy\/3kevin.schneider@usask.ca,http:\/\/www.cs.usask.ca\/%E2%88%BCkas\/Welcome.html\">Proceedings of the Eighth International Workshop on Software Clones (IWSC 2014) Active Clones: Source Code Clones at Runtime<\/a><br \/>\nAsif, Mohammad and Khan, A and Roy, Chanchal K and Schneider, Kevin A &#8211; Proceedings of the Eighth International Workshop on Software Clones (IWSC 2014) Active Clones: Source Code Clones at Runtime &#8211; Electronic Communications of the EASST &#8211; 2014<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6897221\/\">Selecting a set of appropriate metrics for detecting code clones<\/a><br \/>\nG. Bansal and R. Tekchandani &#8211; Selecting a set of appropriate metrics for detecting code clones &#8211; 2014 Seventh International Conference on Contemporary Computing (IC3) &#8211; 2014<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/2667473.2667486\">A Replication and Reproduction of Code Clone Detection Studies<\/a><br \/>\nChen, Xiliang and Wang, Alice Yuchen and Tempero, Ewan &#8211; A Replication and Reproduction of Code Clone Detection Studies &#8211; Proceedings of the Thirty-Seventh Australasian Computer Science Conference &#8211; Volume 147 &#8211; 2014<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6901018\/\">Near-miss software clones in open source games: An empirical study<\/a><br \/>\nY. Chen and I. Keivanloo and C. K. Roy &#8211; Near-miss software clones in open source games: An empirical study &#8211; 2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE) &#8211; 2014<\/p>\n<p><a href=\"https:\/\/search.ieice.org\/bin\/summary.php?id=e97-d_5_1244\">An Investigation into the Characteristics of Merged Code Clones during Software Evolution<\/a><br \/>\nChoi, Eunjong and Yoshida, Norihiro and Inoue, Katsuro &#8211; An Investigation into the Characteristics of Merged Code Clones during Software Evolution &#8211; IEICE TRANSACTIONS on Information and Systems &#8211; 2014<\/p>\n<p><a href=\"http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.677.9629&amp;rep=rep1&amp;type=pdf\">Implication of Clone Detection and Refactoring Techniques using Delayed Duplicate Detection Refactoring<\/a><br \/>\nDeepika, M and Sarala, S &#8211; Implication of Clone Detection and Refactoring Techniques using Delayed Duplicate Detection Refactoring &#8211; International Journal of Computer Applications &#8211; 2014<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/7092292\/\">A qualitative analysis of code clones and object oriented runtime complexity based on method access points<\/a><br \/>\nA. F. Desouky and M. D. Beard and L. H. Etzkorn &#8211; A qualitative analysis of code clones and object oriented runtime complexity based on method access points &#8211; International Conference for Convergence for Technology-2014 &#8211; 2014<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/6895418\">BinClone: Detecting Code Clones in Malware<\/a><br \/>\nM. R. Farhadi and B. C. M. Fung and P. Charland and M. Debbabi &#8211; BinClone: Detecting Code Clones in Malware &#8211; 2014 Eighth International Conference on Software Security and Reliability (SERE) &#8211; 2014<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/7002385\/\">An approach to rank code clones for efficient clone management<\/a><br \/>\nR. Garg and R. Tekchandani &#8211; An approach to rank code clones for efficient clone management &#8211; 2014 International Conference on Advances in Electronics Computers and Communications &#8211; 2014<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/269668531_Code_Clone_vs_Model_Clones_Pros_and_Cons\">Code Clone v\/s Model Clones: Pros and Cons<\/a><br \/>\nGarg, Ritu and Bhatia, Rajesh &#8211; Code Clone v\/s Model Clones: Pros and Cons &#8211; International Journal of Computer Applications &#8211; 2014<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/272867793_Incremental_Detection_of_Parameterized_Code_Clones\">Incremental Detection of Parameterized Code Clones<\/a><br \/>\nG\u00f6rg, Torsten &#8211; Incremental Detection of Parameterized Code Clones &#8211; Softwaretechnik-Trends &#8211; 2014<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/289645965_Detecting_refactorable_clones_by_slicing_program_dependence_graphs\">Detecting refactorable clones by slicing program dependence graphs<\/a><br \/>\nHamid, A. and Zaytsev, Vadim &#8211; Detecting refactorable clones by slicing program dependence graphs &#8211; CEUR Workshop Proceedings &#8211; 2014<\/p>\n<p><a href=\"http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.685.3059&amp;rep=rep1&amp;type=pdf\">Toward a Code-Clone Search through the Entire Lifecycle of a Software Product-Position Paper-Toshihiro Kamiya 7 pages Toward a Code-Clone Search through the Entire Lifecycle of a Software Product<\/a><br \/>\nKamiya, Toshihiro &#8211; Toward a Code-Clone Search through the Entire Lifecycle of a Software Product-Position Paper-Toshihiro Kamiya 7 pages Toward a Code-Clone Search through the Entire Lifecycle of a Software Product &#8211; Proceedings of the Eighth International Workshop on Software Clones (IWSC) &#8211; 2014<\/p>\n<p><a href=\"http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.677.4671&amp;rep=rep1&amp;type=pdf\">Detecting Clones in Class Diagrams Using Suffix Array 244 Figure:-1.a Classes with similar attributes due to unfinished modeling<\/a><br \/>\nKaur, H and and M, Kaur &#8211; Detecting Clones in Class Diagrams Using Suffix Array 244 Figure:-1.a Classes with similar attributes due to unfinished modeling &#8211; International Journal of Engineering and Advanced Technology (IJEAT) &#8211; 2014<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/2597716.2597723\">Clone detection in software source code using operational similarity of statements<\/a><br \/>\nKaur, Raminder and Singh, Satwinder &#8211; Clone detection in software source code using operational similarity of statements &#8211; ACM SIGSOFT Software Engineering Notes &#8211; 2014<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6976122\/\">Compiling Clones: What Happens?<\/a><br \/>\nO. Kononenko and C. Zhang and M. W. Godfrey &#8211; Compiling Clones: What Happens? &#8211; 2014 IEEE International Conference on Software Maintenance and Evolution &#8211; 2014<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/286668711\">Effect of Clone Information on the Performance of Developers Fixing Cloned Bugs<\/a><br \/>\nKoschke, Rainer and Bazrafshan, Saman &#8211; Effect of Clone Information on the Performance of Developers Fixing Cloned Bugs &#8211; 2014 IEEE 14th International Working Conference on Source Code Analysis and Manipulation (SCAM) &#8211; 2014<\/p>\n<p><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-81-322-1695-7_41\">Refactoring Structure Semantics Similar Clones Combining Standardization with Metrics<\/a><br \/>\nLi, Xia and Su, Xiaohong and Ma, Peijun and Wang, Tiantian &#8211; Refactoring Structure Semantics Similar Clones Combining Standardization with Metrics &#8211; Proceedings of International Conference on Soft Computing Techniques and Engineering Application &#8211; 2014<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/6976100\">Clonepedia: Summarizing Code Clones by Common Syntactic Context for Software Maintenance<\/a><br \/>\nY. Lin and Z. Xing and X. Peng and Y. Liu and J. Sun and W. Zhao and J. Dong &#8211; Clonepedia: Summarizing Code Clones by Common Syntactic Context for Software Maintenance &#8211; 2014 IEEE International Conference on Software Maintenance and Evolution &#8211; 2014<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/2568225.2568298\">Detecting differences across multiple instances of code clones<\/a><br \/>\nLin, Yun and Xing, Zhenchang and Xue, Yinxing and Liu, Yang and Peng, Xin and Sun, Jun and Zhao, Wenyun &#8211; Detecting differences across multiple instances of code clones &#8211; Proceedings of International Conference on Software Engineering &#8211; 2014<\/p>\n<p><a href=\"http:\/\/www.easst.org\/eceasst\/\">Proceedings of the Eighth International Workshop on Software Clones (IWSC 2014) Clones and Macro co-changes Clones and Macro co-changes<\/a><br \/>\nLozano, Angela and Jaafar, Fehmi and Mens, Kim and Ga\u00ebl Gu\u00e9h\u00e9neuc, Yann &#8211; Proceedings of the Eighth International Workshop on Software Clones (IWSC 2014) Clones and Macro co-changes Clones and Macro co-changes &#8211; Electronic Communications of the EASST &#8211; 2014<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/2591062.2591181\">Collecting and leveraging a benchmark of build system clones to aid in quality assessments<\/a><br \/>\nMcIntosh, Shane and Poehlmann, Martin and Juergens, Elmar and Mockus, Audris and Adams, Bram and Hassan, Ahmed E. and Haupt, Brigitte and Wagner, Christian &#8211; Collecting and leveraging a benchmark of build system clones to aid in quality assessments &#8211; 36th International Conference on Software Engineering, ICSE Companion 2014 &#8211; Proceedings &#8211; 2014<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/6976071\">A Fine-Grained Analysis on the Evolutionary Coupling of Cloned Code<\/a><br \/>\nM. Mondal and C. K. Roy and K. A. Schneider &#8211; A Fine-Grained Analysis on the Evolutionary Coupling of Cloned Code &#8211; 2014 IEEE International Conference on Software Maintenance and Evolution &#8211; 2014<\/p>\n<p><a href=\"http:\/\/ubsrvweb09.ub.tu-berlin.de\/eceasst\/article\/view\/913\">Late Propagation in Near-Miss Clones: An Empirical Study<\/a><br \/>\nMondal, Manishankar and Roy, Chanchal K and Schneider, Kevin A &#8211; Late Propagation in Near-Miss Clones: An Empirical Study &#8211; Electronic Communications of the EASST &#8211; 2014<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/2597073.2597104\">Prediction and Ranking of Co-Change Candidates for Clones<\/a><br \/>\nMondal, Manishankar and Roy, Chanchal K. and Schneider, Kevin A. &#8211; Prediction and Ranking of Co-Change Candidates for Clones &#8211; Proceedings of the 11th Working Conference on Mining Software Repositories &#8211; 2014<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/6747161\">Automatic ranking of clones for refactoring through mining association rules<\/a><br \/>\nM. Mandal and C. K. Roy and K. A. Schneider &#8211; Automatic ranking of clones for refactoring through mining association rules &#8211; 2014 Software Evolution Week &#8211; IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering (CSMR-WCRE) &#8211; 2014<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/270760283\">A Systematic Literature Review of Code Clone Prevention Approaches<\/a><br \/>\nMubarak-Ali, Al-Fahim and Sulaiman, Shahida &#8211; A Systematic Literature Review of Code Clone Prevention Approaches &#8211; International Journal of Software Engineering and Technology &#8211; 2014<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/2597073.2597133\">A Dataset of Clone References with Gaps<\/a><br \/>\nMurakami, Hiroaki and Higo, Yoshiki and Kusumoto, Shinji &#8211; A Dataset of Clone References with Gaps &#8211; Proceedings of the 11th Working Conference on Mining Software Repositories &#8211; 2014<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6747160\/\">Unification and refactoring of clones<\/a><br \/>\nG. P. Krishnan and N. Tsantalis &#8211; Unification and refactoring of clones &#8211; 2014 Software Evolution Week &#8211; IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering (CSMR-WCRE) &#8211; 2014<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/262990748_Multi-Agent_based_Sequence_Algorithm_for_Detecting_Plagiarism_and_Clones_in_Java_Source_Code_using_Abstract_Syntax_Tree\">Multi-Agent based Sequence Algorithm for Detecting Plagiarism and Clones in Java Source Code using Abstract Syntax Tree<\/a><br \/>\nPoongodi, D. and Arasu, G. &#8211; Multi-Agent based Sequence Algorithm for Detecting Plagiarism and Clones in Java Source Code using Abstract Syntax Tree &#8211; International Journal of Computer Applications &#8211; 2014<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/279532581_Clones_and_Macro_co-changes\">Clones and Macro co-changes<\/a><br \/>\nLozano, Angela and Jaafar, Fehmi and Mens, Kim and Gu\u00e9h\u00e9neuc, Yann-Ga\u00ebl &#8211; Clones and Macro co-changes &#8211; Proceedings of the Eight International Workshop on Clones (IWSC) &#8211; 2014<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/2664243.2664275\">Towards a Scalable Resource-Driven Approach for Detecting Repackaged Android Applications<\/a><br \/>\nShao, Yuru and Luo, Xiapu and Qian, Chenxiong and Zhu, Pengfei and Zhang, Lei &#8211; Towards a Scalable Resource-Driven Approach for Detecting Repackaged Android Applications &#8211; Proceedings of the 30th Annual Computer Security Applications Conference &#8211; 2014<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/2666581.2666586\">Supporting clone analysis with tag cloud visualization<\/a><br \/>\nSano, Manamu and Choi, Eunjong and Yoshida, Norihiro and Yamanaka, Yuki and Inoue, Katsuro &#8211; Supporting clone analysis with tag cloud visualization &#8211; International Workshop on Innovative Software Development Methodologies and Practices, InnoSWDev &#8211; 2014<\/p>\n<p><a href=\"https:\/\/www.semanticscholar.org\/paper\/Detection-Of-Clones-from-UML-Diagrams-Unified-Singh-Kaur\/d19537795679d2a375eb9d4bc1d9811eea153122\">Detection Of Clones from UML Diagrams Unified Modeling Language<\/a><br \/>\nSingh, Pamilpreet and Kaur, Harpreet &#8211; Detection Of Clones from UML Diagrams Unified Modeling Language &#8211; IJSRD-International Journal for Scientific Research \\&amp; Development &#8211; 2014<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6976121\/\">Towards a Big Data Curated Benchmark of Inter-project Code Clones<\/a><br \/>\nJ. Svajlenko and J. F. Islam and I. Keivanloo and C. K. Roy and M. M. Mia &#8211; Towards a Big Data Curated Benchmark of Inter-project Code Clones &#8211; 2014 IEEE International Conference on Software Maintenance and Evolution &#8211; 2014<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6976098\/\">Evaluating Modern Clone Detection Tools<\/a><br \/>\nJ. Svajlenko and C. K. Roy &#8211; Evaluating Modern Clone Detection Tools &#8211; 2014 IEEE International Conference on Software Maintenance and Evolution &#8211; 2014<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6980217\/\">Visual Clone Analysis with SolidSDD<\/a><br \/>\nL. Voinea and A. C. Telea &#8211; Visual Clone Analysis with SolidSDD &#8211; 2014 Second IEEE Working Conference on Software Visualization &#8211; 2014<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/6976099\">Recommending Clones for Refactoring Using Design, Context, and History<\/a><br \/>\nW. Wang and M. W. Godfrey &#8211; Recommending Clones for Refactoring Using Design, Context, and History &#8211; 2014 IEEE International Conference on Software Maintenance and Evolution &#8211; 2014<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6815760\/\">Predicting Consistency-Maintenance Requirement of Code Clonesat Copy-and-Paste Time<\/a><br \/>\nX. Wang and Y. Dang and L. Zhang and D. Zhang and E. Lan and H. Mei &#8211; Predicting Consistency-Maintenance Requirement of Code Clonesat Copy-and-Paste Time &#8211; IEEE Transactions on Software Engineering &#8211; 2014<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6747229\/\">An empirical study on the fault-proneness of clone migration in clone genealogies<\/a><br \/>\nS. Xie and F. Khomh and Y. Zou and I. Keivanloo &#8211; An empirical study on the fault-proneness of clone migration in clone genealogies &#8211; 2014 Software Evolution Week &#8211; IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering (CSMR-WCRE) &#8211; 2014<\/p>\n<p><a href=\"https:\/\/doi.org\/10.2991\/ccit-14.2014.32\">A Novel Approach for Predicting the Probability of Inconsistent Changes to Code Clones Based LDA<\/a><br \/>\nLili Yin and Liping Zhang and Min Hou and Dongsheng Liu &#8211; A Novel Approach for Predicting the Probability of Inconsistent Changes to Code Clones Based LDA &#8211; Proceedings of the 2014 International Conference on Computer, Communications and Information Technology &#8211; 2014<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1016\/j.ins.2010.04.022\">Pattern Mining of Cloned Codes in Software Systems<\/a><br \/>\nQu, Wei and Jia, Yuanyuan and Jiang, Michael &#8211; Pattern Mining of Cloned Codes in Software Systems &#8211; Inf. Sci. &#8211; 2014<\/p>\n<hr \/>\n<h1>2013<\/h1>\n<p><a href=\"http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.414.4555&amp;rep=rep1&amp;type=pdf\">An approach to clone detection in behavioural models<\/a><br \/>\nE. P. Antony and M. H. Alalfi and J. R. Cordy &#8211; An approach to clone detection in behavioural models &#8211; 2013 20th Working Conference on Reverse Engineering (WCRE) &#8211; 2013<\/p>\n<p><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-642-38197-3_4\">Semantic code clones in logic programs<\/a><br \/>\nDandois, Celine and Vanhoof, Wim &#8211; Semantic code clones in logic programs &#8211; Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) &#8211; 2013<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/2523649.2523650\">Uncovering Access Control Weaknesses and Flaws with Security-Discordant Software Clones<\/a><br \/>\nGauthier, Fran\\ccois and Lavoie, Thierry and Merlo, Ettore &#8211; Uncovering Access Control Weaknesses and Flaws with Security-Discordant Software Clones &#8211; Proceedings of the 29th Annual Computer Security Applications Conference &#8211; 2013<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/2555523.2555541\">An Empirical Study of the Factors Affecting Co-Change Frequency of Cloned Code<\/a><br \/>\nMarks, Lionel and Zou, Ying and Keivanloo, Iman &#8211; An Empirical Study of the Factors Affecting Co-Change Frequency of Cloned Code &#8211; Proceedings of the 2013 Conference of the Center for Advanced Studies on Collaborative Research &#8211; 2013<\/p>\n<p><a href=\"http:\/\/arxiv.org\/abs\/1301.2447\">Clone Removal in Java Programs as a Process of Stepwise Unification<\/a><br \/>\nSpeicher, Daniel and Bremm, Andri &#8211; Clone Removal in Java Programs as a Process of Stepwise Unification &#8211; 26th Workshop on Logic Programming &#8211; 2013<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6613037\">Scaling classical clone detection tools for ultra-large datasets: An exploratory study<\/a><br \/>\nJ. Svajlenko and I. Keivanloo and C. K. Roy &#8211; Scaling classical clone detection tools for ultra-large datasets: An exploratory study &#8211; 2013 7th International Workshop on Software Clones (IWSC) &#8211; 2013<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6624022\/\">An empirical study of the fault-proneness of clone mutation and clone migration<\/a><br \/>\nS. Xie and F. Khomh and Y. Zou &#8211; An empirical study of the fault-proneness of clone mutation and clone migration &#8211; 2013 10th Working Conference on Mining Software Repositories (MSR) &#8211; 2013<\/p>\n<p><a href=\"https:\/\/onlinelibrary.wiley.com\/doi\/abs\/10.1002\/smr.520\">Studying clone evolution using incremental clone detection<\/a><br \/>\nGode, Nils and Koschke, Rainer &#8211; Studying clone evolution using incremental clone detection &#8211; Journal of software: Evolution and Process &#8211; 2013<\/p>\n<p><a href=\"https:\/\/arxiv.org\/abs\/1302.1355\">Characterizing and Evaluating the Impact of Software Interface Clones<\/a><br \/>\nAbdeen, Hani and Shata, Osama &#8211; Characterizing and Evaluating the Impact of Software Interface Clones &#8211; International Journal of Software Engineering \\&amp; Applications (IJSEA) &#8211; 2013<\/p>\n<p><a href=\"https:\/\/idp.springer.com\/authorize\/casa?redirect_uri=https:\/\/link.springer.com\/article\/10.3103\/S0146411613070171&amp;casa_token=kqQiLCiZrsUAAAAA:cVSsRcJ4pHrKZJjaVFahfhbcEbV5gDSiwaU5XdlqpXa5U69hnzHDjf_gHtxWSgAX3aK9f9Ao_GQbdFae\">Tree slicing: Finding intertwined and gapped clones in one simple step<\/a><br \/>\nAkhin, M and Sciences, V Itsykson &#8211; Automatic Control and Computer and undefined 2013 &#8211; Tree slicing: Finding intertwined and gapped clones in one simple step &#8211; Automatic Control and Computer Sciences &#8211; 2013<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/2464526.2464531\">A Fuzzy Model for High-Level Clones in Software<\/a><br \/>\nBaliyan, Niyati and Sharma, Vidushi and Shivani &#8211; A Fuzzy Model for High-Level Clones in Software &#8211; SIGSOFT Softw. Eng. Notes &#8211; 2013<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/267856869_Late_propagation_of_Type-3_Clones\">Late propagation of Type-3 Clones<\/a><br \/>\nBazrafshan, Saman &#8211; Late propagation of Type-3 Clones &#8211; Softwaretechnik-Trends &#8211; 2013<\/p>\n<p><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0164121213000733\">SPAPE: A semantic-preserving amorphous procedure extraction method for near-miss clones<\/a><br \/>\nYixin Bian and Gunes Koru and Xiaohong Su and Peijun Ma &#8211; SPAPE: A semantic-preserving amorphous procedure extraction method for near-miss clones &#8211; Journal of Systems and Software &#8211; 2013<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/6613857\">SimCad: An extensible and faster clone detection tool for large scale software systems<\/a><br \/>\nM. S. Uddin and C. K. Roy and K. A. Schneider &#8211; SimCad: An extensible and faster clone detection tool for large scale software systems &#8211; 2013 21st International Conference on Program Comprehension (ICPC) &#8211; 2013<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6671286\/\">Effects of cloned code on software maintainability: A replicated developer study<\/a><br \/>\nChatterji, Debarshi and Carver, Jeffrey C and Kraft, Nicholas A and Harder, Jan &#8211; Effects of cloned code on software maintainability: A replicated developer study &#8211; 2013 20th Working Conference on Reverse Engineering (WCRE) &#8211; 2013<\/p>\n<p><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-642-45260-4_9\">Using Machine Learning and Information Retrieval Techniques to Improve Software Maintainability<\/a><br \/>\nCorazza, Anna and Di Martino, Sergio and Maggio, Valerio and Moschitti, Alessandro and Passerini, Andrea and Scanniello, Giuseppe and Silvestri, Fabrizio &#8211; Using Machine Learning and Information Retrieval Techniques to Improve Software Maintainability &#8211; Communications in Computer and Information Science &#8211; 2013<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/258789775_Parallel_and_Distributed_Code_Clone_Detection_using_Sequential_Pattern_Mining\">Parallel and Distributed Code Clone Detection using Sequential Pattern Mining<\/a><br \/>\nEl-Matarawy, Ali and El-Ramly, Mohammad and Bahgat, Reem &#8211; Parallel and Distributed Code Clone Detection using Sequential Pattern Mining &#8211; Article in International Journal of Computer Applications &#8211; 2013<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/268370115_A_Model-Based_Approach_to_Type-3_Clone_Elimination\">A Model-Based Approach to Type-3 Clone Elimination<\/a><br \/>\nG\u00f6rg, Torsten &#8211; A Model-Based Approach to Type-3 Clone Elimination &#8211; Softwaretechnik-Trends &#8211; 2013<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/6606575\">Data clone detection and visualization in spreadsheets<\/a><br \/>\nHermans, Felienne and Sedee, Ben and Pinzger, Martin and Van Deursen, Arie &#8211; Data clone detection and visualization in spreadsheets &#8211; 2013 35th International Conference on Software Engineering (ICSE) &#8211; 2013<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/6613837\">Gapped code clone detection with lightweight source code analysis<\/a><br \/>\nH. Murakami and K. Hotta and Y. Higo and H. Igaki and S. Kusumoto &#8211; Gapped code clone detection with lightweight source code analysis &#8211; 2013 21st International Conference on Program Comprehension (ICPC) &#8211; 2013<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/2501543.2501552\">Identifying Clone Removal Opportunities Based on Co-Evolution Analysis<\/a><br \/>\nHigo, Yoshiki and Kusumoto, Shinji &#8211; Identifying Clone Removal Opportunities Based on Co-Evolution Analysis &#8211; Proceedings of the 2013 International Workshop on Principles of Software Evolution &#8211; 2013<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/6613854\">Agec: An execution-semantic clone detection tool<\/a><br \/>\nT. Kamiya &#8211; Agec: An execution-semantic clone detection tool &#8211; 2013 21st International Conference on Program Comprehension (ICPC) &#8211; 2013<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/2480362.2480401\">Disguised Malware Script Detection System Using Hybrid Genetic Algorithm<\/a><br \/>\nKim, Jinhyun and Moon, Byung-Ro &#8211; Disguised Malware Script Detection System Using Hybrid Genetic Algorithm &#8211; Proceedings of the 28th Annual ACM Symposium on Applied Computing &#8211; 2013<\/p>\n<p><a href=\"https:\/\/www.atlantis-press.com\/proceedings\/icaise-13\/6969\">Functionally Equivalent Clone Detection Using IOT-Behavior Algorithm<\/a><br \/>\nLi, Xia and Wang, Tiantian and Su, Xiaohong and Ma, Peijun &#8211; Functionally Equivalent Clone Detection Using IOT-Behavior Algorithm &#8211; Proceedings of the 2013 The International Conference on Artificial Intelligence and Software Engineering (ICAISE) &#8211; 2013<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1007\/s00766-013-0197-0\">Supporting requirements to code traceability through refactoring<\/a><br \/>\nMahmoud, Anas and Niu, Nan &#8211; Supporting requirements to code traceability through refactoring &#8211; Requirements Engineering &#8211; 2013<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6567821\">Near-miss clone patterns in web applications: An empirical study with industrial systems<\/a><br \/>\nT. Muhammad and M. F. Zibran and Y. Yamamoto and C. K. Roy &#8211; Near-miss clone patterns in web applications: An empirical study with industrial systems &#8211; 2013 26th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE) &#8211; 2013<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6650525\/\">ClonEvol: Visualizing software evolution with code clones<\/a><br \/>\nA. Hanjali\u0107 &#8211; ClonEvol: Visualizing software evolution with code clones &#8211; 2013 First IEEE Working Conference on Software Visualization (VISSOFT) &#8211; 2013<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6676874\/\">How Multiple Developers Affect the Evolution of Code Clones<\/a><br \/>\nJ. Harder &#8211; How Multiple Developers Affect the Evolution of Code Clones &#8211; 2013 IEEE International Conference on Software Maintenance &#8211; 2013<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/6832302\">An efficient code clone detection model on Java byte code using hybrid approach<\/a><br \/>\nRaheja, Kanika and Tekchandani, Raj Kumar &#8211; An efficient code clone detection model on Java byte code using hybrid approach &#8211; IET Conference Publications &#8211; 2013<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6606694\/\">On the relationships between domain-based coupling and code clones: An exploratory study<\/a><br \/>\nM. S. Rahman and A. Aryani and C. K. Roy and F. Perin &#8211; On the relationships between domain-based coupling and code clones: An exploratory study &#8211; 2013 35th International Conference on Software Engineering (ICSE) &#8211; 2013<\/p>\n<p><a href=\"http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0950584913000323\">Software clone detection: A systematic review<\/a><br \/>\nDhavleesh Rattan and Rajesh Bhatia and Maninder Singh &#8211; Software clone detection: A systematic review &#8211; Information and Software Technology &#8211; 2013<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6676939\/\">gCad: A Near-Miss Clone Genealogy Extractor to Support Clone Evolution Analysis<\/a><br \/>\nR. K. Saha and C. K. Roy and K. A. Schneider &#8211; gCad: A Near-Miss Clone Genealogy Extractor to Support Clone Evolution Analysis &#8211; 2013 IEEE International Conference on Software Maintenance &#8211; 2013<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6624021\/\">Understanding the evolution of Type-3 clones: An exploratory study<\/a><br \/>\nR. K. Saha and C. K. Roy and K. A. Schneider and D. E. Perry &#8211; Understanding the evolution of Type-3 clones: An exploratory study &#8211; 2013 10th Working Conference on Mining Software Repositories (MSR) &#8211; 2013<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/261447651\">On the robustness of clone detection to code obfuscation<\/a><br \/>\nSchulze, Sandro and Meyer, Daniel &#8211; On the robustness of clone detection to code obfuscation &#8211; 7th International Workshop on Software Clones (IWSC) &#8211; 2013<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6615249\/\">A novel detection approach for statement clones<\/a><br \/>\nQing Qing Shi and Li Ping Zhang and Fan Jun Meng and Dong Sheng Liu &#8211; A novel detection approach for statement clones &#8211; 2013 IEEE 4th International Conference on Software Engineering and Service Science &#8211; 2013<\/p>\n<p><a href=\"http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.674.5726&amp;rep=rep1&amp;type=pdf\">High Level Clones Classification<\/a><br \/>\nSingh, Manu and Sharma, Vidushi &#8211; High Level Clones Classification &#8211; International Journal of Engineering and Advanced Technology (IJEAT) &#8211; 2013<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/2662708.2662724\">Feature-Based Detection of Bugs in Clones<\/a><br \/>\nSteidl, Daniela and G\\&#8221;ode, Nils &#8211; Feature-Based Detection of Bugs in Clones &#8211; Proceedings of the 7th International Workshop on Software Clones &#8211; 2013<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6606693\/\">Using mutation analysis for a model-clone detector comparison framework<\/a><br \/>\nM. Stephan and M. H. Alafi and A. Stevenson and J. R. Cordy &#8211; Using mutation analysis for a model-clone detector comparison framework &#8211; 2013 35th International Conference on Software Engineering (ICSE) &#8211; 2013<\/p>\n<p><a>Code Clones in Program Test Sequence Identification<\/a><br \/>\nSurendran, Anupama and Samuel, Philip and Jacob, K Poulose &#8211; Code Clones in Program Test Sequence Identification &#8211; International Journal of Computer Information Systems and Industrial Management Applications &#8211; 2013<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6613033\/\">A mutation analysis based benchmarking framework for clone detectors<\/a><br \/>\nJ. Svajlenko and C. K. Roy and J. R. Cordy &#8211; A mutation analysis based benchmarking framework for clone detectors &#8211; 2013 7th International Workshop on Software Clones (IWSC) &#8211; 2013<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/6832306\">Semantic code clone detection using parse trees and grammar recovery<\/a><br \/>\nTekchandani, Rajkumar and Bhatia, Rajesh Kumar and Singh, Maninder &#8211; Semantic code clone detection using parse trees and grammar recovery &#8211; IET Conference Publications &#8211; 2013<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6613043\/\">Towards a curated collection of code clones<\/a><br \/>\nE. Tempero &#8211; Towards a curated collection of code clones &#8211; 2013 7th International Workshop on Software Clones (IWSC) &#8211; 2013<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6671285\/\">Distilling useful clones by contextual differencing<\/a><br \/>\nZ. Xing and Y. Xue and S. Jarzabek &#8211; Distilling useful clones by contextual differencing &#8211; 2013 20th Working Conference on Reverse Engineering (WCRE) &#8211; 2013<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/2577554.2577559\">Genealogical Insights into the Facts and Fictions of Clone Removal<\/a><br \/>\nZibran, Minhaz F. and Saha, Ripon K. and Roy, Chanchal K. and Schneider, Kevin A. &#8211; Genealogical Insights into the Facts and Fictions of Clone Removal &#8211; SIGAPP Appl. Comput. Rev. &#8211; 2013<\/p>\n<p><a href=\"https:\/\/www.cs.usask.ca\/~croy\/papers\/2013\/ZibranCloneChange_SAC2013.pdf\">Evaluating the conventional wisdom in clone removal: A genealogy-based empirical study<\/a><br \/>\nZibran, Minhaz F. and Saha, Ripon K. and Roy, Chanchal K. and Schneider, Kevin A. &#8211; Evaluating the conventional wisdom in clone removal: A genealogy-based empirical study &#8211; Proceedings of the ACM Symposium on Applied Computing &#8211; 2013<\/p>\n<hr \/>\n<h1>2012<\/h1>\n<p><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-642-35267-6_3\">STVsm: Similar structural code detection based on AST and VSM<\/a><br \/>\nLi, Ning and Shen, Mingda and Li, Sinan and Zhang, Lijun and Li, Zhanhuai &#8211; STVsm: Similar structural code detection based on AST and VSM &#8211; Communications in Computer and Information Science &#8211; 2012<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/2162110.2162126\">A scalable and accurate approach based on count matrix for detecting code clones<\/a><br \/>\nYuan, Yang &#8211; A scalable and accurate approach based on count matrix for detecting code clones &#8211; AOSD&#8217;12 Companion &#8211; Proceedings of the 11th Annual International Conference on Aspect Oriented Software Development &#8211; 2012<\/p>\n<p><a href=\"https:\/\/www.cs.usask.ca\/~croy\/papers\/2012\/Zibran_SAC2012_CloneSearch.pdf\">IDE-based real-time focused search for near-miss clones<\/a><br \/>\nZibran, Minhaz F. and Roy, Chanchal K. &#8211; IDE-based real-time focused search for near-miss clones &#8211; Proceedings of the ACM Symposium on Applied Computing &#8211; 2012<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6302984\/\">Reusing and converting code clones to aspects &#8211; An algorithmic approach<\/a><br \/>\nS. A. Ajila and A. S. Gakhar and C. H. Lung and M. Zaman &#8211; Reusing and converting code clones to aspects &#8211; An algorithmic approach &#8211; 2012 IEEE 13th International Conference on Information Reuse Integration (IRI) &#8211; 2012<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/6385136\">Detecting Clones Across Microsoft .NET Programming Languages<\/a><br \/>\nF. Al-Omari and I. Keivanloo and C. K. Roy and J. Rilling &#8211; Detecting Clones Across Microsoft .NET Programming Languages &#8211; 2012 19th Working Conference on Reverse Engineering &#8211; 2012<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6227873\/\">Near-miss model clone detection for Simulink models<\/a><br \/>\nM. H. Alalfi and J. R. Cordy and T. R. Dean and M. Stephan and A. Stevenson &#8211; Near-miss model clone detection for Simulink models &#8211; 2012 6th International Workshop on Software Clones (IWSC) &#8211; 2012<\/p>\n<p><a>Models are Code too: Near-miss Clone Detection for Simulink Models<\/a><br \/>\nAlalfi, Manar and Cordy, James and Dean, Thomas and Stephan, Matthew and Stevenson, Andrew &#8211; Models are Code too: Near-miss Clone Detection for Simulink Models &#8211; IEEE International Conference on Software Maintenance, ICSM &#8211; 2012<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/261417001\">Things structural clones tell that simple clones don&#8217;t<\/a><br \/>\nBasit, Hamid and Ali, Usman and Haque, Sidra and Jarzabek, Stan &#8211; Things structural clones tell that simple clones don&#8217;t &#8211; 28th IEEE International Conference on Software Maintenance (ICSM) &#8211; 2012<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/266632001_Code_Clones_in_Rhino_A_Case_Study\/references\">Code Clones in Rhino: A Case Study<\/a><br \/>\nBeard, Matthew and Kraft, Nicholas and Etzkorn, Letha &#8211; Code Clones in Rhino: A Case Study &#8211; Proceedings of the IASTED International Conference on Software Engineering and Applications, SEA 2012 &#8211; 2012<\/p>\n<p><a href=\"https:\/\/www.ijser.org\/paper\/The-Reverse-Engineering-in-Oriented-Aspect-Detection-of-semantics-clones.html\">The Reverse Engineering in Oriented Aspect &#8220;Detection of semantics clones&#8221;<\/a><br \/>\nBelmabrouk, Amel and Messabih, Belhadri &#8211; The Reverse Engineering in Oriented Aspect &#8220;Detection of semantics clones&#8221; &#8211; International Journal of Scientific \\&amp; Engineering Research &#8211; 2012<\/p>\n<p><a href=\"http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167642310002091\">An empirical study on inconsistent changes to code clones at the release level<\/a><br \/>\nNicolas Bettenburg and Weiyi Shang and Walid M. Ibrahim and Bram Adams and Ying Zou and Ahmed E. Hassan &#8211; An empirical study on inconsistent changes to code clones at the release level &#8211; Science of Computer Programming &#8211; 2012<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/6227860\/footnotes#footnotes\">Claims and beliefs about code clones: Do we agree as a community? A survey<\/a><br \/>\nD. Carver, Jeff and Chatterji, Debarshi and Carver, Jeffrey C and Kraft, Nicholas A &#8211; Claims and beliefs about code clones: Do we agree as a community? A survey &#8211; 2012 6th International Workshop on Software Clones (IWSC) &#8211; 2012<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/2664398.2664400\">A Novel Approach Based on Formal Methods for Clone Detection<\/a><br \/>\nCuomo, Antonio and Santone, Antonella and Villano, Umberto &#8211; A Novel Approach Based on Formal Methods for Clone Detection &#8211; Proceedings of the 6th International Workshop on Software Clones &#8211; 2012<\/p>\n<p><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-642-32211-2_7\">Clones in logic programs and how to detect them<\/a><br \/>\nDandois, C\u00e9line and Vanhoof, Wim &#8211; Clones in logic programs and how to detect them &#8211; Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) &#8211; 2012<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/2420950.2421004\">XIAO: Tuning code clones at hands of engineers in practice<\/a><br \/>\nDang, Yingnong and Zhang, Dongmei and Ge, Song and Chu, Chengyun and Qiu, Yingjun and Xie, Tao &#8211; XIAO: Tuning code clones at hands of engineers in practice &#8211; ACM International Conference Proceeding Series &#8211; 2012<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6228170\/\">Detecting Clones, Copying and Reuse on the Web<\/a><br \/>\nX. L. Dong and D. Srivastava &#8211; Detecting Clones, Copying and Reuse on the Web &#8211; 2012 IEEE 28th International Conference on Data Engineering &#8211; 2012<\/p>\n<p><a>Doppel-Code: A Clone Visualization Tool for Prioritizing Global and Local Clone Impacts<\/a><br \/>\nChristopher Forbes and Iman Keivanloo and Juergen Rilling &#8211; Doppel-Code: A Clone Visualization Tool for Prioritizing Global and Local Clone Impacts &#8211; 2012 IEEE 36th Annual Computer Software and Applications Conference &#8211; 2012<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6240491\/\">A controlled experiment on software clones<\/a><br \/>\nJ. Harder and R. Tiarks &#8211; A controlled experiment on software clones &#8211; 2012 20th IEEE International Conference on Program Comprehension (ICPC) &#8211; 2012<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6227864\/\">Java bytecode clone detection via relaxation on code fingerprint and Semantic Web reasoning<\/a><br \/>\nI. Keivanloo and C. K. Roy and J. Rilling &#8211; Java bytecode clone detection via relaxation on code fingerprint and Semantic Web reasoning &#8211; 2012 6th International Workshop on Software Clones (IWSC) &#8211; 2012<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/6240495\">SeByte: A semantic clone detection tool for intermediate languages<\/a><br \/>\nI. Keivanloo and C. K. Roy and J. Rilling &#8211; SeByte: A semantic clone detection tool for intermediate languages &#8211; 2012 20th IEEE International Conference on Program Comprehension (ICPC) &#8211; 2012<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6385128\/\">Inferring Repository File Structure Modifications Using Nearest-Neighbor Clone Detection<\/a><br \/>\nT. Lavoie and F. Khomh and E. Merlo and Y. Zou &#8211; Inferring Repository File Structure Modifications Using Nearest-Neighbor Clone Detection &#8211; 2012 19th Working Conference on Reverse Engineering &#8211; 2012<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6227183\/\">CBCD: Cloned buggy code detector<\/a><br \/>\nJ. Li and M. D. Ernst &#8211; CBCD: Cloned buggy code detector &#8211; 2012 34th International Conference on Software Engineering (ICSE) &#8211; 2012<\/p>\n<p><a href=\"http:\/\/www.euroasiapub.orghttp\/\/www.euroasiapub.org\">SOFTWARE CLONING IN EXTREME PROGRAMMING ENVIRONMENT<\/a><br \/>\nMahajan, Ginika &#8211; SOFTWARE CLONING IN EXTREME PROGRAMMING ENVIRONMENT &#8211; IJREAS &#8211; 2012<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6227863\/\">Dispersion of changes in cloned and non-cloned code<\/a><br \/>\nM. Mondal and C. K. Roy and K. A. Schneider &#8211; Dispersion of changes in cloned and non-cloned code &#8211; 2012 6th International Workshop on Software Clones (IWSC) &#8211; 2012<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/2387358.2387360\">An Empirical Study on Clone Stability<\/a><br \/>\nMondal, Manishankar and Roy, Chanchal K. and Schneider, Kevin A. &#8211; An Empirical Study on Clone Stability &#8211; SIGAPP Appl. Comput. Rev. &#8211; 2012<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/2245276.2231969\">Comparative Stability of Cloned and Non-Cloned Code: An Empirical Study<\/a><br \/>\nMondal, Manishankar and Roy, Chanchal K. and Rahman, Md. Saidur and Saha, Ripon K. and Krinke, Jens and Schneider, Kevin A. &#8211; Comparative Stability of Cloned and Non-Cloned Code: An Empirical Study &#8211; Proceedings of the 27th Annual ACM Symposium on Applied Computing &#8211; 2012<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6392103\/\">Folding Repeated Instructions for Improving Token-Based Code Clone Detection<\/a><br \/>\nH. Murakami and K. Hotta and Y. Higo and H. Igaki and S. Kusumoto &#8211; Folding Repeated Instructions for Improving Token-Based Code Clone Detection &#8211; 2012 IEEE 12th International Working Conference on Source Code Analysis and Manipulation &#8211; 2012<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6007141\/\">Clone Management for Evolving Software<\/a><br \/>\nH. A. Nguyen and T. T. Nguyen and N. H. Pham and J. Al-Kofahi and T. N. Nguyen &#8211; Clone Management for Evolving Software &#8211; IEEE Transactions on Software Engineering &#8211; 2012<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6392104\/\">Evolution of Near-Miss Clones<\/a><br \/>\nS. Bazrafshan &#8211; Evolution of Near-Miss Clones &#8211; 2012 IEEE 12th International Working Conference on Source Code Analysis and Manipulation &#8211; 2012<\/p>\n<p><a href=\"https:\/\/link.springer.com\/article\/10.1007\/s10664-011-9195-3\">Clones: What is that smell?<\/a><br \/>\nRahman, Foyzur and Bird, Christian and Devanbu, Premkumar &#8211; Clones: What is that smell? &#8211; Empirical Software Engineering &#8211; 2012<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/2666527.2666530\">Clone Detection Meets Semantic Web-Based Transitive Closure Computation<\/a><br \/>\nKeivanloo, Iman and Rilling, Juergen &#8211; Clone Detection Meets Semantic Web-Based Transitive Closure Computation &#8211; Proceedings of the First International Workshop on Realizing AI Synergies in Software Engineering &#8211; 2012<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6308805\/\">Detecting C source code clones in college students&#8217; homework<\/a><br \/>\nJinguo He &#8211; Detecting C source code clones in college students&#8217; homework &#8211; 2012 International Conference on Computer Science and Information Processing (CSIP) &#8211; 2012<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/2664398.2664416\">Towards Qualitative Comparison of Simulink Model Clone Detection Approaches<\/a><br \/>\nStephan, Matthew and Alafi, Manar H. and Stevenson, Andrew and Cordy, James R. &#8211; Towards Qualitative Comparison of Simulink Model Clone Detection Approaches &#8211; Proceedings of the 6th International Workshop on Software Clones &#8211; 2012<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/2664398.2664407\">A Case Study on Applying Clone Technology to an Industrial Application Framework<\/a><br \/>\nT\\&#8221;uz\\&#8221;un, Eray and Er, Emre &#8211; A Case Study on Applying Clone Technology to an Industrial Application Framework &#8211; Proceedings of the 6th International Workshop on Software Clones &#8211; 2012<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6227868\/\">A method for proactive moderation of code clones in IDEs<\/a><br \/>\nR. D. Venkatasubramanyam and H. K. Singh and K. Ravikanth &#8211; A method for proactive moderation of code clones in IDEs &#8211; 2012 6th International Workshop on Software Clones (IWSC) &#8211; 2012<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/6494924\">Can i clone this piece of code here?<\/a><br \/>\nWang, Xiaoyin and Dang, Yingnong and Zhang, Lu and Zhang, Dongmei and Lan, Erica and Mei, Hong &#8211; Can i clone this piece of code here? &#8211; 2012 27th IEEE\/ACM International Conference on Automated Software Engineering (ASE) &#8211; 2012<\/p>\n<p><a href=\"https:\/\/www.jstage.jst.go.jp\/article\/imt\/7\/4\/7_1370\/_article\/-char\/ja\/\">Development of a Code Clone Search Tool for Open Source Repositories<\/a><br \/>\nXia, Pei and Manabe, Yuki and Yoshida, Norihiro and Inoue, Katsuro &#8211; Development of a Code Clone Search Tool for Open Source Repositories &#8211; Information and Media Technologies &#8211; 2012<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/265077570_Development_of_a_code_clone_search_tool_for_open_source_repositories\">Development of a code clone search tool for open source repositories<\/a><br \/>\nXia, Pei and Manabe, Yuki and Yoshida, Norihiro and Inoue, Katsuro &#8211; Development of a code clone search tool for open source repositories &#8211; Computer Software &#8211; 2012<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/267986580_Evolution_of_Component_Relationships_between_Framework_and_Application\">Evolution of Component Relationships between Framework and Application<\/a><br \/>\nYokomori, Reishi and Siy, Harvey and Yoshida, Norihiro and Noro, Masami and Inoue, Katsuro &#8211; Evolution of Component Relationships between Framework and Application &#8211; Journal of Computers &#8211; 2012<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6462669\/\">An Experience Report on Analyzing Industrial Software Systems Using Code Clone Detection Techniques<\/a><br \/>\nN. Yoshida and Y. Higo and S. Kusumoto and K. Inoue &#8211; An Experience Report on Analyzing Industrial Software Systems Using Code Clone Detection Techniques &#8211; 2012 19th Asia-Pacific Software Engineering Conference &#8211; 2012<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/2162110.2162126\">A Scalable and Accurate Approach Based on Count Matrix for Detecting Code Clones<\/a><br \/>\nYuan, Yang &#8211; A Scalable and Accurate Approach Based on Count Matrix for Detecting Code Clones &#8211; Proceedings of the 11th Annual International Conference on Aspect-Oriented Software Development Companion &#8211; 2012<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/6494937\">Boreas: An accurate and scalable token-based approach to code clone detection<\/a><br \/>\nYuan, Yang and Guo, Yao &#8211; Boreas: An accurate and scalable token-based approach to code clone detection &#8211; 2012 27th IEEE\/ACM International Conference on Automated Software Engineering, ASE 2012 &#8211; Proceedings &#8211; 2012<\/p>\n<p><a href=\"https:\/\/www.osti.gov\/servlets\/purl\/1145241\">Clones: Underlying Patterns throughout the Software Lifecycle.<\/a><br \/>\nZage, DJ and Zage, WM and Zage, D &#8211; Clones: Underlying Patterns throughout the Software Lifecycle. &#8211; 9th Working Conference on Mining Software Repositories &#8211; 2012<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6405284\/\">Cloning practices: Why developers clone and what can be changed<\/a><br \/>\nG. Zhang and X. Peng and Z. Xing and W. Zhao &#8211; Cloning practices: Why developers clone and what can be changed &#8211; 2012 28th IEEE International Conference on Software Maintenance (ICSM) &#8211; 2012<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/2245276.2231970\">IDE-Based Real-Time Focused Search for near-Miss Clones<\/a><br \/>\nZibran, Minhaz F. and Roy, Chanchal K. &#8211; IDE-Based Real-Time Focused Search for near-Miss Clones &#8211; Proceedings of the 27th Annual ACM Symposium on Applied Computing &#8211; 2012<\/p>\n<hr \/>\n<h1>2011<\/h1>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1985404.1985425\">VisCad: Flexible Code Clone Analysis Support for NiCad<\/a><br \/>\nAsaduzzaman, Muhammad and Roy, Chanchal K. and Schneider, Kevin A. &#8211; VisCad: Flexible Code Clone Analysis Support for NiCad &#8211; Proceedings of the 5th International Workshop on Software Clones &#8211; 2011<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1985404.1985416\">On the Need for Human-Based Empirical Validation of Techniques and Tools for Code Clone Analysis<\/a><br \/>\nCarver, Jeffrey and Chatterji, Debarshi and Kraft, Nicholas A. &#8211; On the Need for Human-Based Empirical Validation of Techniques and Tools for Code Clone Analysis &#8211; Proceedings of the 5th International Workshop on Software Clones &#8211; 2011<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/5970188\/\">DebCheck: Efficient Checking for Open Source Code Clones in Software Systems<\/a><br \/>\nCordy, James R and Roy, Chanchal K &#8211; DebCheck: Efficient Checking for Open Source Code Clones in Software Systems &#8211; 2011 IEEE 19th International Conference on Program Comprehension &#8211; 2011<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1985793.1986050\">Fifth International Workshop on Software Clones (IWSC 2011)<\/a><br \/>\nCordy, James R. and Inoue, Katsuro and Jarzabek, Stanislaw and Koschke, Rainer &#8211; Fifth International Workshop on Software Clones (IWSC 2011) &#8211; Proceedings of the 33rd International Conference on Software Engineering &#8211; 2011<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1985404.1985411\">Automated Type-3 Clone Oracle Using Levenshtein Metric<\/a><br \/>\nLavoie, Thierry and Merlo, Ettore &#8211; Automated Type-3 Clone Oracle Using Levenshtein Metric &#8211; Proceedings of the 5th International Workshop on Software Clones &#8211; 2011<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1985404.1985417\">Code Clone Detection Experience at Microsoft<\/a><br \/>\nDang, Yingnong and Ge, Song and Huang, Ray and Zhang, Dongmei &#8211; Code Clone Detection Experience at Microsoft &#8211; Proceedings of the 5th International Workshop on Software Clones &#8211; 2011<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1985404.1985418\">Determining the Provenance of Software Artifacts<\/a><br \/>\nGodfrey, Michael W. and German, Daniel M. and Davies, Julius and Hindle, Abram &#8211; Determining the Provenance of Software Artifacts &#8211; Proceedings of the 5th International Workshop on Software Clones &#8211; 2011<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/1987434.1987468\">Incremental Clone Detection and Elimination for Erlang Programs<\/a><br \/>\nLi, Huiqing and Thompson, Simon &#8211; Incremental Clone Detection and Elimination for Erlang Programs &#8211; Proceedings of the 14th International Conference on Fundamental Approaches to Software Engineering: Part of the Joint European Conferences on Theory and Practice of Software &#8211; 2011<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1985404.1985421\">Visualizing the Evolution of Code Clones<\/a><br \/>\nSaha, Ripon K. and Roy, Chanchal K. and Schneider, Kevin A. &#8211; Visualizing the Evolution of Code Clones &#8211; Proceedings of the 5th International Workshop on Software Clones &#8211; 2011<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/5773403\/\">Analyzing and Forecasting Near-Miss Clones in Evolving Software: An Empirical Study<\/a><br \/>\nM. F. Zibran and R. K. Saha and M. Asaduzzaman and C. K. Roy &#8211; Analyzing and Forecasting Near-Miss Clones in Evolving Software: An Empirical Study &#8211; 2011 16th IEEE International Conference on Engineering of Complex Computer Systems &#8211; 2011<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/code-similarity-in-touchdevelop-harnessing-clones\/\">Code Similarity in TouchDevelop: Harnessing Clones<\/a><br \/>\nTillmann, Nikolai and Fahndrich, Manuel and Moskal, Michal and de Halleux, Peli &#8211; Code Similarity in TouchDevelop: Harnessing Clones &#8211; Microsoft Technical Report &#8211; 2011<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1985404.1985409\">Index-Based Model Clone Detection<\/a><br \/>\nHummel, Benjamin and Juergens, Elmar and Steidl, Daniela &#8211; Index-Based Model Clone Detection &#8211; Proceedings of the 5th International Workshop on Software Clones &#8211; 2011<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1985404.1985419\">Research in Cloning beyond Code: A First Roadmap<\/a><br \/>\nJuergens, Elmar &#8211; Research in Cloning beyond Code: A First Roadmap &#8211; Proceedings of the 5th International Workshop on Software Clones &#8211; 2011<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/2025113.2025162\">On the Congruence of Modularity and Code Coupling<\/a><br \/>\nBeck, Fabian and Diehl, Stephan &#8211; On the Congruence of Modularity and Code Coupling &#8211; Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering &#8211; 2011<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/6079770\">On the Effectiveness of Simhash for Detecting Near-Miss Clones in Large Scale Software Systems<\/a><br \/>\nM. S. Uddin and C. K. Roy and K. A. Schneider and A. Hindle &#8211; On the Effectiveness of Simhash for Detecting Near-Miss Clones in Large Scale Software Systems &#8211; 2011 18th Working Conference on Reverse Engineering &#8211; 2011<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/1985404.1985407\">Extracting code clones for refactoring using combinations of clone metrics<\/a><br \/>\nChoi, Eunjong and Yoshida, Norihiro and Ishio, Takashi and Inoue, Katsuro and Sano, Tateki &#8211; Extracting code clones for refactoring using combinations of clone metrics &#8211; Proceedings &#8211; International Conference on Software Engineering &#8211; 2011<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1985404.1985426\">Live Scatterplots<\/a><br \/>\nCordy, James R. &#8211; Live Scatterplots &#8211; Proceedings of the 5th International Workshop on Software Clones &#8211; 2011<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/5970149\/\">Exploring Large-Scale System Similarity Using Incremental Clone Detection and Live Scatterplots<\/a><br \/>\nJ. R. Cordy &#8211; Exploring Large-Scale System Similarity Using Incremental Clone Detection and Live Scatterplots &#8211; 2011 IEEE 19th International Conference on Program Comprehension &#8211; 2011<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/6032470\">Frequency and risks of changes to clones<\/a><br \/>\nG\u00f6de, Nils and Koschke, Rainer &#8211; Frequency and risks of changes to clones &#8211; Proceedings &#8211; International Conference on Software Engineering &#8211; 2011<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1109\/CSMR.2011.12\">Code Clone Detection on Specialized PDGs with Heuristics<\/a><br \/>\nHigo, Yoshiki and Kusumoto, Shinji &#8211; Code Clone Detection on Specialized PDGs with Heuristics &#8211; Proceedings of the 2011 15th European Conference on Software Maintenance and Reengineering &#8211; 2011<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/6032469\">MeCC: Memory comparison-based clone detector<\/a><br \/>\nKim, Heejung and Jung, Yungbum and Kim, Sunghun and Yi, Kwankeun &#8211; MeCC: Memory comparison-based clone detector &#8211; Proceedings &#8211; International Conference on Software Engineering &#8211; 2011<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1985404.1985412\">Analyzing Web Service Similarity Using Contextual Clones<\/a><br \/>\nMartin, Douglas and Cordy, James R. &#8211; Analyzing Web Service Similarity Using Contextual Clones &#8211; Proceedings of the 5th International Workshop on Software Clones &#8211; 2011<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/5970172\/\">An Empirical Study of the Impacts of Clones in Software Maintenance<\/a><br \/>\nM. Mondal and M. S. Rahman and R. K. Saha and C. K. Roy and J. Krinke and K. A. Schneider &#8211; An Empirical Study of the Impacts of Clones in Software Maintenance &#8211; 2011 IEEE 19th International Conference on Program Comprehension &#8211; 2011<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/221200445_Internet-scale_Real-time_Code_Clone_Search_Via_Multi-level_Indexing\">Internet-scale Real-time Code Clone Search Via Multi-level Indexing<\/a><br \/>\nKeivanloo, Iman and Rilling, Juergen and Charland, Philippe &#8211; Internet-scale Real-time Code Clone Search Via Multi-level Indexing &#8211; 8th Working Conference on Reverse Engineering, WCRE &#8211; 2011<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6032385\">Reasoning about Global Clones: Scalable Semantic Clone Detection<\/a><br \/>\nP. Schugerl and J. Rilling and P. Charland &#8211; Reasoning about Global Clones: Scalable Semantic Clone Detection &#8211; 2011 IEEE 35th Annual Computer Software and Applications Conference &#8211; 2011<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6080796\/\">An automatic framework for extracting and classifying near-miss clone genealogies<\/a><br \/>\nR. K. Saha and C. K. Roy and K. A. Schneider &#8211; An automatic framework for extracting and classifying near-miss clone genealogies &#8211; 2011 27th IEEE International Conference on Software Maintenance (ICSM) &#8211; 2011<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1985404.1985413\">Scalable Clone Detection Using Description Logic<\/a><br \/>\nSchugerl, Philipp &#8211; Scalable Clone Detection Using Description Logic &#8211; Proceedings of the 5th International Workshop on Software Clones &#8211; 2011<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6065170\/\">Analyzing the Effect of Preprocessor Annotations on Code Clones<\/a><br \/>\nS. Schulze and E. Jurgens and J. Feigenspan &#8211; Analyzing the Effect of Preprocessor Annotations on Code Clones &#8211; 2011 IEEE 11th International Working Conference on Source Code Analysis and Manipulation &#8211; 2011<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/6100129\/\">CloneDifferentiator: Analyzing clones by differentiation<\/a><br \/>\nZ. Xing and Y. Xue and S. Jarzabek &#8211; CloneDifferentiator: Analyzing clones by differentiation &#8211; 2011 26th IEEE\/ACM International Conference on Automated Software Engineering (ASE 2011) &#8211; 2011<\/p>\n<p><a href=\"http:\/\/dx.doi.org\/doi:10.1109\/ASE.2011.6100063\">Specifying and detecting meaningful changes in programs<\/a><br \/>\nY. Yu and T. T. Tun and B. Nuseibeh &#8211; Specifying and detecting meaningful changes in programs &#8211; 2011 26th IEEE\/ACM International Conference on Automated Software Engineering (ASE 2011) &#8211; 2011<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/6130694\">CMCD: Count Matrix Based Code Clone Detection<\/a><br \/>\nY. Yuan and Y. Guo &#8211; CMCD: Count Matrix Based Code Clone Detection &#8211; 2011 18th Asia-Pacific Software Engineering Conference &#8211; 2011<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/5970178\/\">Conflict-Aware Optimal Scheduling of Code Clone Refactoring: A Constraint Programming Approach<\/a><br \/>\nM. F. Zibran and C. K. Roy &#8211; Conflict-Aware Optimal Scheduling of Code Clone Refactoring: A Constraint Programming Approach &#8211; 2011 IEEE 19th International Conference on Program Comprehension &#8211; 2011<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1985404.1985423\">Towards Flexible Code Clone Detection, Management, and Refactoring in IDE<\/a><br \/>\nZibran, Minhaz F. and Roy, Chanchal K. &#8211; Towards Flexible Code Clone Detection, Management, and Refactoring in IDE &#8211; Proceedings of the 5th International Workshop on Software Clones &#8211; 2011<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1985404.1985420\">How Code Skips over Revisions<\/a><br \/>\nKamiya, Toshihiro &#8211; How Code Skips over Revisions &#8211; Proceedings of the 5th International Workshop on Software Clones &#8211; 2011<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1985404.1985416\">On the Need for Human-Based Empirical Validation of Techniques and Tools for Code Clone Analysis<\/a><br \/>\nCarver, Jeffrey and Chatterji, Debarshi and Kraft, Nicholas A. &#8211; On the Need for Human-Based Empirical Validation of Techniques and Tools for Code Clone Analysis &#8211; Proceedings of the 5th International Workshop on Software Clones &#8211; 2011<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1985404.1985406\">Viewing Simple Clones from Structural Clones\u2019 Perspective<\/a><br \/>\nBasit, Hamid Abdul and Ali, Usman and Jarzabek, Stan &#8211; Viewing Simple Clones from Structural Clones\u2019 Perspective &#8211; Proceedings of the 5th International Workshop on Software Clones &#8211; 2011<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/5741247\">Clone Stability<\/a><br \/>\nN. G\u00f6de and J. Harder &#8211; Clone Stability &#8211; 2011 15th European Conference on Software Maintenance and Reengineering &#8211; 2011<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/5661763\">Guilty or Not Guilty: Using Clone Metrics to Determine Open Source Licensing Violations<\/a><br \/>\nA. Monden and S. Okahara and Y. Manabe and K. Matsumoto &#8211; Guilty or Not Guilty: Using Clone Metrics to Determine Open Source Licensing Violations &#8211; IEEE Software &#8211; 2011<\/p>\n<hr \/>\n<h1>2010<\/h1>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1808901.1808902\">Achieving Accurate Clone Detection Results<\/a><br \/>\nJuergens, Elmar and Gode, Nils &#8211; Achieving Accurate Clone Detection Results &#8211; Proceedings of the 4th International Workshop on Software Clones &#8211; 2010<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1937117.1937121\">Measuring the Efficacy of Code Clone Information: An Empirical Study<\/a><br \/>\nChatterji, Debarshi and Massengill, Beverly and Oslin, Jason and Carver, Jeffrey C. and Kraft, Nicholas A. &#8211; Measuring the Efficacy of Code Clone Information: An Empirical Study &#8211; Evaluation and Usability of Programming Languages and Tools &#8211; 2010<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/224198233\">From Whence It Came: Detecting Source Code Clones by Analyzing Assembler<\/a><br \/>\nDavis, Ian and Davis, Ian J and Godfrey, Michael W &#8211; From Whence It Came: Detecting Source Code Clones by Analyzing Assembler &#8211; Proceedings of Working Conference on Reverse Engineering (WCRE) &#8211; 2010<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1808901.1808914\">A Hybrid Approach (Syntactic and Textual) to Clone Detection<\/a><br \/>\nFunaro, Marco and Braga, Daniele and Campi, Alessandro and Ghezzi, Carlo &#8211; A Hybrid Approach (Syntactic and Textual) to Clone Detection &#8211; Proceedings of the 4th International Workshop on Software Clones &#8211; 2010<\/p>\n<p><a>Clone removal: fact or fiction?<\/a><br \/>\nG\u00f6de, Nils &#8211; Clone removal: fact or fiction? &#8211; Proceeding of the 4th ICSE International Workshop on Software Clones (IWSC) &#8211; 2010<\/p>\n<p><a href=\"http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.301.4574&amp;rep=rep1&amp;type=pdf\">Issues in clone classification for dataflow languages<\/a><br \/>\nGold, Nicolas and Krinke, Jens and Harman, Mark and Binkley, David &#8211; Issues in clone classification for dataflow languages &#8211; Proceedings &#8211; International Conference on Software Engineering &#8211; 2010<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1810295.1810431\">Fourth International Workshop on Software Clones (IWSC)<\/a><br \/>\nInoue, Katsuro and Jarzabek, Stanislaw and Cordy, James R. and Koshke, Rainer &#8211; Fourth International Workshop on Software Clones (IWSC) &#8211; Proceedings of the 32nd ACM\/IEEE International Conference on Software Engineering &#8211; Volume 2 &#8211; 2010<\/p>\n<p><a href=\"https:\/\/www.semanticscholar.org\/paper\/Clone-Detection-by-Comparing-Abstract-Memory-States-Kim-Jung\/61c0727e3783e456eb22e59f33664785dca5bb69\">Clone Detection by Comparing Abstract Memory States<\/a><br \/>\nKim, Heejung and Jung, Yungbum and Kim, Sunghun and Yi, Kwangkeun &#8211; Clone Detection by Comparing Abstract Memory States &#8211; Research on Software Analysis for Error-free Computing (ROSAEC) &#8211; 2010<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1808901.1808907\">Distinguishing Copies from Originals in Software Clones<\/a><br \/>\nKrinke, Jens and Gold, Nicolas and Jia, Yue and Binkley, David &#8211; Distinguishing Copies from Originals in Software Clones &#8211; Proceedings of the 4th International Workshop on Software Clones &#8211; 2010<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1882291.1882317\">Instant Code Clone Search<\/a><br \/>\nLee, Mu-Woong and Roh, Jong-Won and Hwang, Seung-won and Kim, Sunghun &#8211; Instant Code Clone Search &#8211; Proceedings of the Eighteenth ACM SIGSOFT International Symposium on Foundations of Software Engineering &#8211; 2010<\/p>\n<p><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-642-11503-5_10\">Similar Code Detection and Elimination for Erlang Programs<\/a><br \/>\nLi, Huiqing and Thompson, Simon &#8211; Similar Code Detection and Elimination for Erlang Programs &#8211; Practical Aspects of Declarative Languages &#8211; 2010<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/5645563\">Enhancing Source-Based Clone Detection Using Intermediate Representation<\/a><br \/>\nG. M. K. Selim and K. C. Foo and Y. Zou &#8211; Enhancing Source-Based Clone Detection Using Intermediate Representation &#8211; 2010 17th Working Conference on Reverse Engineering &#8211; 2010<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/5640465\/\">Extracting the similarity in detected software clones using metrics<\/a><br \/>\nA. Perumal and S. Kanmani and E. Kodhai &#8211; Extracting the similarity in detected software clones using metrics &#8211; 2010 International Conference on Computer and Communication Technology (ICCCT) &#8211; 2010<\/p>\n<p><a href=\"https:\/\/www.cs.usask.ca\/~croy\/papers\/2010\/RC_JSME_OSS_Clones.pdf\">Near-miss function clones in open source software: An empirical study<\/a><br \/>\nRoy, C. K. and Cordy, J. R. &#8211; Near-miss function clones in open source software: An empirical study &#8211; Journal of Software Maintenance and Evolution &#8211; 2010<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/1808901.1808904\">Are scripting languages really different?<\/a><br \/>\nRoy, Chanchal K. and Cordy, James R. &#8211; Are scripting languages really different? &#8211; Proceedings of International Conference on Software Engineering &#8211; 2010<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/5601826\/\">Evaluating Code Clone Genealogies at Release Level: An Empirical Study<\/a><br \/>\nR. K. Saha and M. Asaduzzaman and M. F. Zibran and C. K. Roy and K. A. Schneider &#8211; Evaluating Code Clone Genealogies at Release Level: An Empirical Study &#8211; 2010 10th IEEE Working Conference on Source Code Analysis and Manipulation &#8211; 2010<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1868294.1868310\">Code Clones in Feature-Oriented Software Product Lines<\/a><br \/>\nSchulze, Sandro and Apel, Sven and K\\&#8221;astner, Christian &#8211; Code Clones in Feature-Oriented Software Product Lines &#8211; Proceedings of the Ninth International Conference on Generative Programming and Component Engineering &#8211; 2010<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/5645480\/\">Studying the Impact of Clones on Software Defects<\/a><br \/>\nG. M. K. Selim and L. Barbour and W. Shang and B. Adams and A. E. Hassan and Y. Zou &#8211; Studying the Impact of Clones on Software Defects &#8211; 2010 17th Working Conference on Reverse Engineering &#8211; 2010<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/5608893\/\">Modeling clones evolution in open source systems through chaos theory<\/a><br \/>\nD. M. Shawky and A. F. Ali &#8211; Modeling clones evolution in open source systems through chaos theory &#8211; 2010 2nd International Conference on Software Technology and Engineering &#8211; 2010<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1808901.1808913\">Clone Detection by Exploiting Assembler<\/a><br \/>\nDavis, Ian J. and Godfrey, Michael W. &#8211; Clone Detection by Exploiting Assembler &#8211; Proceedings of the 4th International Workshop on Software Clones &#8211; 2010<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1808901.1808919\">Towards a Multi-Scale Approach for Source Code Approximate Match Report<\/a><br \/>\nChilowicz, Michel and Duris, Etienne and Roussel, Gilles &#8211; Towards a Multi-Scale Approach for Source Code Approximate Match Report &#8211; Proceedings of the 4th International Workshop on Software Clones &#8211; 2010<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1808901.1808903\">Actively Comparing Clones inside the Code Editor<\/a><br \/>\nJacob, Ferosh and Hou, Daqing and Jablonski, Patricia &#8211; Actively Comparing Clones inside the Code Editor &#8211; Proceedings of the 4th International Workshop on Software Clones &#8211; 2010<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1808901.1808904\">Are Scripting Languages Really Different?<\/a><br \/>\nRoy, Chanchal K. and Cordy, James R. &#8211; Are Scripting Languages Really Different? &#8211; Proceedings of the 4th International Workshop on Software Clones &#8211; 2010<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1808901.1808910\">Tracking Clones\u2019 Imprint<\/a><br \/>\nLozano, Angela and Wermelinger, Michel &#8211; Tracking Clones\u2019 Imprint &#8211; Proceedings of the 4th International Workshop on Software Clones &#8211; 2010<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1808901.1808911\">Are Clones Harmful for Maintenance?<\/a><br \/>\nJarzabek, Stan and Xue, Yinxing &#8211; Are Clones Harmful for Maintenance? &#8211; Proceedings of the 4th International Workshop on Software Clones &#8211; 2010<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1808901.1808917\">Quo Vadis, Clone Management?<\/a><br \/>\nHarder, Jan and G\\&#8221;ode, Nils &#8211; Quo Vadis, Clone Management? &#8211; Proceedings of the 4th International Workshop on Software Clones &#8211; 2010<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1706356.1706378\">Clone Detection and Elimination for Haskell<\/a><br \/>\nBrown, Christopher and Thompson, Simon &#8211; Clone Detection and Elimination for Haskell &#8211; Proceedings of the 2010 ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation &#8211; 2010<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/5563834\">An approach for assessing similarity metrics used in metric-based clone detection techniques<\/a><br \/>\nD. M. Shawky and A. F. Ali &#8211; An approach for assessing similarity metrics used in metric-based clone detection techniques &#8211; 2010 3rd International Conference on Computer Science and Information Technology &#8211; 2010<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/5609529\">Using clone detection to identify bugs in concurrent software<\/a><br \/>\nK. Jalbert and J. S. Bradbury &#8211; Using clone detection to identify bugs in concurrent software &#8211; 2010 IEEE International Conference on Software Maintenance &#8211; 2010<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/6062141\">Can clone detection support quality assessments of requirements specifications?<\/a><br \/>\nE. Juergens and F. Deissenboeck and M. Feilkas and B. Hummel and B. Schaetz and S. Wagner and C. Domann and J. Streit &#8211; Can clone detection support quality assessments of requirements specifications? &#8211; 2010 ACM\/IEEE 32nd International Conference on Software Engineering &#8211; 2010<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/5714422\">Code Similarities Beyond Copy Paste<\/a><br \/>\nE. Juergens and F. Deissenboeck and B. Hummel &#8211; Code Similarities Beyond Copy Paste &#8211; 2010 14th European Conference on Software Maintenance and Reengineering &#8211; 2010<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/220520236_Latent_semantic_indexing_LSI_fails_for_TREC_collections\">Latent semantic indexing (LSI) fails for TREC collections<\/a><br \/>\nAtreya, Avinash and Elkan, Charles &#8211; Latent semantic indexing (LSI) fails for TREC collections &#8211; SIGKDD Explorations &#8211; 2010<\/p>\n<hr \/>\n<h1>2009<\/h1>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1723028.1723051\">Exploring the Design Space of Proactive Tool Support for Copy-and-Paste Programming<\/a><br \/>\nHou, Daqing and Jacob, Ferosh and Jablonski, Patricia &#8211; Exploring the Design Space of Proactive Tool Support for Copy-and-Paste Programming &#8211; Proceedings of the 2009 Conference of the Center for Advanced Studies on Collaborative Research &#8211; 2009<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/5090048\/\">Vector space analysis of software clones<\/a><br \/>\nS. Grant and J. R. Cordy &#8211; Vector space analysis of software clones &#8211; 2009 IEEE 17th International Conference on Program Comprehension &#8211; 2009<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/5090049\">CnP: Towards an environment for the proactive management of copy-and-paste programming<\/a><br \/>\nD. Hou and P. Jablonski and F. Jacob &#8211; CnP: Towards an environment for the proactive management of copy-and-paste programming &#8211; 2009 IEEE 17th International Conference on Program Comprehension &#8211; 2009<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/5070547\/\">Do code clones matter?<\/a><br \/>\nE. Juergens and F. Deissenboeck and B. Hummel and S. Wagner &#8211; Do code clones matter? &#8211; 2009 IEEE 31st International Conference on Software Engineering &#8211; 2009<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/4812766\/\">Third International Workshop on Software Clones (IWSC)<\/a><br \/>\nR. Koschke and S. Jarzabek and J. Cordy and K. Inoue &#8211; Third International Workshop on Software Clones (IWSC) &#8211; 2009 13th European Conference on Software Maintenance and Reengineering &#8211; 2009<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1651309.1651312\">Tree-Pattern-Based Duplicate Code Detection<\/a><br \/>\nLee, Hyo-Sub and Doh, Kyung-Goo &#8211; Tree-Pattern-Based Duplicate Code Detection &#8211; Proceedings of the ACM First International Workshop on Data-Intensive Software Management and Mining &#8211; 2009<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1480945.1480971\">Clone Detection and Removal for Erlang\/OTP within a Refactoring Environment<\/a><br \/>\nLi, Huiqing and Thompson, Simon &#8211; Clone Detection and Removal for Erlang\/OTP within a Refactoring Environment &#8211; Proceedings of the 2009 ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation &#8211; 2009<\/p>\n<p><a href=\"https:\/\/qspace.library.queensu.ca\/handle\/1974\/5104\">Detection and analysis of near-miss software clones<\/a><br \/>\nC. K. Roy &#8211; Detection and analysis of near-miss software clones &#8211; 2009 IEEE International Conference on Software Maintenance &#8211; 2009<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/220703605_An_Assessment_of_Type-3_Clones_as_Detected_by_State-of-the-Art_Tools\">An extended assessment of type-3 clones as detected by state-of-the-art tools<\/a><br \/>\nTiarks, R and Koschke, R and Journal, R Falke &#8211; Software Quality and undefined 2011 &#8211; An extended assessment of type-3 clones as detected by state-of-the-art tools &#8211; 9th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM) &#8211; 2009<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/221308166_Managing_Code_Clones_Using_Dynamic_Change_Tracking_and_Resolution\">Managing Code Clones Using Dynamic Change Tracking and Resolution<\/a><br \/>\nWit, Michiel and Zaidman, Andy and Deursen, Arie &#8211; Managing Code Clones Using Dynamic Change Tracking and Resolution &#8211; 25th IEEE International Conference on Software Maintenance (ICSM) &#8211; 2009<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1109\/ICSE.2009.5070547\">Do Code Clones Matter?<\/a><br \/>\nJuergens, Elmar and Deissenboeck, Florian and Hummel, Benjamin and Wagner, Stefan &#8211; Do Code Clones Matter? &#8211; Proceedings of the 31st International Conference on Software Engineering &#8211; 2009<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/5328752\">SHINOBI: A Tool for Automatic Code Clone Detection in the IDE<\/a><br \/>\nS. Kawaguchi and T. Yamashina and H. Uwano and K. Fushida and Y. Kamei and M. Nagura and H. Iida &#8211; SHINOBI: A Tool for Automatic Code Clone Detection in the IDE &#8211; 2009 16th Working Conference on Reverse Engineering &#8211; 2009<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/5090050\">Syntax tree fingerprinting for source code similarity detection<\/a><br \/>\nM. Chilowicz and E. Duris and G. Roussel &#8211; Syntax tree fingerprinting for source code similarity detection &#8211; 2009 IEEE 17th International Conference on Program Comprehension &#8211; 2009<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/5070566\">CloneDetective &#8211; A workbench for clone detection research<\/a><br \/>\nE. Juergens and F. Deissenboeck and B. Hummel &#8211; CloneDetective &#8211; A workbench for clone detection research &#8211; 2009 IEEE 31st International Conference on Software Engineering &#8211; 2009<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/5070528\">Complete and accurate clone detection in graph-based models<\/a><br \/>\nN. H. Pham and H. A. Nguyen and T. T. Nguyen and J. M. Al-Kofahi and T. N. Nguyen &#8211; Complete and accurate clone detection in graph-based models &#8211; 2009 IEEE 31st International Conference on Software Engineering &#8211; 2009<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/4812755\">Incremental Clone Detection<\/a><br \/>\nN. G\u00f6de and R. Koschke &#8211; Incremental Clone Detection &#8211; 2009 13th European Conference on Software Maintenance and Reengineering &#8211; 2009<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/4796208\">A Data Mining Approach for Detecting Higher-Level Clones in Software<\/a><br \/>\nH. A. Basit and S. Jarzabek &#8211; A Data Mining Approach for Detecting Higher-Level Clones in Software &#8211; IEEE Transactions on Software Engineering &#8211; 2009<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/5328705\">An Empirical Study on Inconsistent Changes to Code Clones at Release Level<\/a><br \/>\nN. Bettenburg and W. Shang and W. Ibrahim and B. Adams and Y. Zou and A. E. Hassan &#8211; An Empirical Study on Inconsistent Changes to Code Clones at Release Level &#8211; 2009 16th Working Conference on Reverse Engineering &#8211; 2009<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/5358762\">Code Clone Graph Metrics for Detecting Diffused Code Clones<\/a><br \/>\nY. Fukushima and R. Kula and S. Kawaguchi and K. Fushida and M. Nagura and H. Iida &#8211; Code Clone Graph Metrics for Detecting Diffused Code Clones &#8211; 2009 16th Asia-Pacific Software Engineering Conference &#8211; 2009<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/5358749\">Problematic Code Clones Identification Using Multiple Detection Results<\/a><br \/>\nY. Higo and K. Sawa and S. Kusumoto &#8211; Problematic Code Clones Identification Using Multiple Detection Results &#8211; 2009 16th Asia-Pacific Software Engineering Conference &#8211; 2009<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/5328785\">Computing Structural Types of Clone Syntactic Blocks<\/a><br \/>\nE. Merlo and T. Lavoie &#8211; Computing Structural Types of Clone Syntactic Blocks &#8211; 2009 16th Working Conference on Reverse Engineering &#8211; 2009<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/5279977\">Evolution of Type-1 Clones<\/a><br \/>\nN. G\u00f6de &#8211; Evolution of Type-1 Clones &#8211; 2009 Ninth IEEE International Working Conference on Source Code Analysis and Manipulation &#8211; 2009<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/5279980\">An Assessment of Type-3 Clones as Detected by State-of-the-Art Tools<\/a><br \/>\nR. Tiarks and R. Koschke and R. Falke &#8211; An Assessment of Type-3 Clones as Detected by State-of-the-Art Tools &#8211; 2009 Ninth IEEE International Working Conference on Source Code Analysis and Manipulation &#8211; 2009<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/4976382\">A Mutation\/Injection-Based Automatic Framework for Evaluating Code Clone Detection Tools<\/a><br \/>\nC. K. Roy and J. R. Cordy &#8211; A Mutation\/Injection-Based Automatic Framework for Evaluating Code Clone Detection Tools &#8211; 2009 International Conference on Software Testing, Verification, and Validation Workshops &#8211; 2009<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1007\/s11219-009-9074-y\">Clone Detection via Structural Abstraction<\/a><br \/>\nEvans, William S. and Fraser, Christopher W. and Ma, Fei &#8211; Clone Detection via Structural Abstraction &#8211; Software Quality Journal &#8211; 2009<\/p>\n<hr \/>\n<h1>2008<\/h1>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/4556127\/\">Scenario-Based Comparison of Clone Detection Techniques<\/a><br \/>\nC. K. Roy and J. R. Cordy &#8211; Scenario-Based Comparison of Clone Detection Techniques &#8211; 2008 16th IEEE International Conference on Program Comprehension &#8211; 2008<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/4556129\/\">NICAD: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization<\/a><br \/>\nC. K. Roy and J. R. Cordy &#8211; NICAD: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization &#8211; 2008 16th IEEE International Conference on Program Comprehension &#8211; 2008<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/4656397\/\">An Empirical Study of Function Clones in Open Source Software<\/a><br \/>\nC. K. Roy and J. R. Cordy &#8211; An Empirical Study of Function Clones in Open Source Software &#8211; 2008 15th Working Conference on Reverse Engineering &#8211; 2008<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/4814143\">Scalable detection of semantic clones<\/a><br \/>\nM. Gabel and L. Jiang and Z. Su &#8211; Scalable detection of semantic clones &#8211; 2008 ACM\/IEEE 30th International Conference on Software Engineering &#8211; 2008<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1007\/s10664-008-9073-9\">Empirical Evaluation of Clone Detection Using Syntax Suffix Trees<\/a><br \/>\nFalke, Raimar and Frenzel, Pierre and Koschke, Rainer &#8211; Empirical Evaluation of Clone Detection Using Syntax Suffix Trees &#8211; Empirical Softw. Engg. &#8211; 2008<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/4656398\">Detecting Clones in Business Applications<\/a><br \/>\nJ. Guo and Y. Zou &#8211; Detecting Clones in Business Applications &#8211; 2008 15th Working Conference on Reverse Engineering &#8211; 2008<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/4814172\">Clone detection in automotive model-based development<\/a><br \/>\nF. Deissenboeck and B. Hummel and E. J\u00fcrgens and B. Sch\u00e4tz and S. Wagner and J. Girard and S. Teuchert &#8211; Clone detection in automotive model-based development &#8211; 2008 ACM\/IEEE 30th International Conference on Software Engineering &#8211; 2008<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/4658071\">Assessing the effect of clones on changeability<\/a><br \/>\nA. Lozano and M. Wermelinger &#8211; Assessing the effect of clones on changeability &#8211; 2008 IEEE International Conference on Software Maintenance &#8211; 2008<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/4658086\">Query-based filtering and graphical view generation for clone analysis<\/a><br \/>\nYali Zhang and H. A. Basit and S. Jarzabek and D. Anh and M. Low &#8211; Query-based filtering and graphical view generation for clone analysis &#8211; 2008 IEEE International Conference on Software Maintenance &#8211; 2008<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/4637539\">Is Cloned Code More Stable than Non-cloned Code?<\/a><br \/>\nJ. Krinke &#8211; Is Cloned Code More Stable than Non-cloned Code? &#8211; 2008 Eighth IEEE International Working Conference on Source Code Analysis and Manipulation &#8211; 2008<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/4656401\">Mining Coding Patterns to Detect Crosscutting Concerns in Java Programs<\/a><br \/>\nT. Ishio and H. Date and T. Miyake and K. Inoue &#8211; Mining Coding Patterns to Detect Crosscutting Concerns in Java Programs &#8211; 2008 15th Working Conference on Reverse Engineering &#8211; 2008<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/220171370_Aspect_Mining_from_a_Modeling_Perspective\">Aspect Mining from a Modeling Perspective<\/a><br \/>\nZhang, Jing and Gray, Jeff and Lin, Yuehua and Tairas, Robert &#8211; Aspect Mining from a Modeling Perspective &#8211; International Journal of Computer Applications in Technology (IJCAT) &#8211; 2008<\/p>\n<hr \/>\n<h1>2007<\/h1>\n<p><a href=\"https:\/\/bvucoepune.edu.in\/wp-content\/uploads\/2018\/BVUCOEP-DATA\/Research_Publications\/2015_16\/58.pdf\">Techniques and Algorithm for Clone Detection and Analysis<\/a><br \/>\nJadhav, Snehal R and Wakurdekar, Sachin B &#8211; Techniques and Algorithm for Clone Detection and Analysis &#8211; International Journal of Innovative Research in Computer and Communication Engineering &#8211; 2007<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1287624.1287634\">Context-Based Detection of Clone-Related Bugs<\/a><br \/>\nJiang, Lingxiao and Su, Zhendong and Chiu, Edwin &#8211; Context-Based Detection of Clone-Related Bugs &#8211; Proceedings of the the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on The Foundations of Software Engineering &#8211; 2007<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1109\/MSR.2007.1\">Analysis of the Linux Kernel Evolution Using Code Clone Coverage<\/a><br \/>\nLivieri, Simone and Higo, Yoshiki and Matsushita, Makoto and Inoue, Katsuro &#8211; Analysis of the Linux Kernel Evolution Using Code Clone Coverage &#8211; Proceedings of the Fourth International Workshop on Mining Software Repositories &#8211; 2007<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/4222572\">DECKARD: Scalable and Accurate Tree-Based Detection of Code Clones<\/a><br \/>\nL. Jiang and G. Misherghi and Z. Su and S. Glondu &#8211; DECKARD: Scalable and Accurate Tree-Based Detection of Code Clones &#8211; 29th International Conference on Software Engineering (ICSE&#8217;07) &#8211; 2007<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/4425862\">Applying a Code Clone Detection Method to Domain Analysis of Device Drivers<\/a><br \/>\nY. Ma and D. Woo &#8211; Applying a Code Clone Detection Method to Domain Analysis of Device Drivers &#8211; 14th Asia-Pacific Software Engineering Conference (APSEC&#8217;07) &#8211; 2007<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/4362615\">Clone Smells in Software Evolution<\/a><br \/>\nT. Bakota and R. Ferenc and T. Gyimothy &#8211; Clone Smells in Software Evolution &#8211; 2007 IEEE International Conference on Software Maintenance &#8211; 2007<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/4400163\">A Study of Consistent and Inconsistent Changes to Code Clones<\/a><br \/>\nJ. Krinke &#8211; A Study of Consistent and Inconsistent Changes to Code Clones &#8211; 14th Working Conference on Reverse Engineering (WCRE 2007) &#8211; 2007<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/4288194\">Finding Clones with Dup: Analysis of an Experiment<\/a><br \/>\nB. S. Baker &#8211; Finding Clones with Dup: Analysis of an Experiment &#8211; IEEE Transactions on Software Engineering &#8211; 2007<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/4222642\">SoftGUESS: Visualization and Exploration of Code Clones in Context<\/a><br \/>\nE. Adar and M. Kim &#8211; SoftGUESS: Visualization and Exploration of Code Clones in Context &#8211; 29th International Conference on Software Engineering (ICSE&#8217;07) &#8211; 2007<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/4228655\">Evaluating the Harmfulness of Cloning: A Change Based Experiment<\/a><br \/>\nA. Lozano and M. Wermelinger and B. Nuseibeh &#8211; Evaluating the Harmfulness of Cloning: A Change Based Experiment &#8211; Fourth International Workshop on Mining Software Repositories (MSR&#8217;07:ICSE Workshops 2007) &#8211; 2007<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/4145027\">How Clones are Maintained: An Empirical Study<\/a><br \/>\nL. Aversano and L. Cerulo and M. Di Penta &#8211; How Clones are Maintained: An Empirical Study &#8211; 11th European Conference on Software Maintenance and Reengineering (CSMR&#8217;07) &#8211; 2007<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/4425863\">Simultaneous Modification Support based on Code Clone Analysis<\/a><br \/>\nY. Higo and Y. Ueda and S. Kusumoto and K. Inoue &#8211; Simultaneous Modification Support based on Code Clone Analysis &#8211; 14th Asia-Pacific Software Engineering Conference (APSEC&#8217;07) &#8211; 2007<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/4268251\">Evaluating Aspect Mining Techniques: A Case Study<\/a><br \/>\nC. K. Roy and M. Gias Uddin and B. Roy and T. R. Dean &#8211; Evaluating Aspect Mining Techniques: A Case Study &#8211; 15th IEEE International Conference on Program Comprehension (ICPC &#8217;07) &#8211; 2007<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1287624.1287698\">Efficient Token Based Clone Detection with Flexible Tokenization<\/a><br \/>\nBasit, Hamid Abdul and Jarzabek, Stan &#8211; Efficient Token Based Clone Detection with Flexible Tokenization &#8211; Proceedings of the the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on The Foundations of Software Engineering &#8211; 2007<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1109\/ICSE.2007.90\">Tracking Code Clones in Evolving Software<\/a><br \/>\nDuala-Ekoko, Ekwa and Robillard, Martin P. &#8211; Tracking Code Clones in Evolving Software &#8211; Proceedings of the 29th International Conference on Software Engineering &#8211; 2007<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/4268235\">Search Based Software Engineering for Program Comprehension<\/a><br \/>\nM. Harman &#8211; Search Based Software Engineering for Program Comprehension &#8211; 15th IEEE International Conference on Program Comprehension (ICPC &#8217;07) &#8211; 2007<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/221107989_CReN_a_tool_for_tracking_copy-and-paste_code_clones_and_renaming_identifiers_consistently_in_the_IDE\">CReN: a tool for tracking copy-and-paste code clones and renaming identifiers consistently in the IDE.<\/a><br \/>\nDeshane, Patricia and Hou, Daqing &#8211; CReN: a tool for tracking copy-and-paste code clones and renaming identifiers consistently in the IDE. &#8211; Proceedings of the 2007 OOPSLA workshop on Eclipse Technology eXchange (ETX) &#8211; 2007<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/4362914\">A Framework for Studying Clones In Large Software Systems<\/a><br \/>\nZ. M. Jiang and A. E. Hassan &#8211; A Framework for Studying Clones In Large Software Systems &#8211; Seventh IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007) &#8211; 2007<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1007\/978-3-540-77042-8_6\">A Survey of Automated Code-Level Aspect Mining Techniques<\/a><br \/>\nKellens, Andy and Mens, Kim and Tonella, Paolo &#8211; A Survey of Automated Code-Level Aspect Mining Techniques &#8211; Transactions on Aspect-Oriented Software Development IV &#8211; 2007<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1109\/ICSE.2007.97\">Very-Large Scale Code Clone Analysis and Visualization of Open Source Programs Using Distributed CCFinder: D-CCFinder<\/a><br \/>\nLivieri, Simone and Higo, Yoshiki and Matushita, Makoto and Inoue, Katsuro &#8211; Very-Large Scale Code Clone Analysis and Visualization of Open Source Programs Using Distributed CCFinder: D-CCFinder &#8211; Proceedings of the 29th International Conference on Software Engineering &#8211; 2007<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1242572.1242592\">Detecting Near-Duplicates for Web Crawling<\/a><br \/>\nManku, Gurmeet Singh and Jain, Arvind and Das Sarma, Anish &#8211; Detecting Near-Duplicates for Web Crawling &#8211; Proceedings of the 16th International Conference on World Wide Web &#8211; 2007<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/1332044.1332075\">Source Code Enhancement Using Reduction of Duplicated Code<\/a><br \/>\nNasehi, Seyyed Mehdi and Sotudeh, Gholam Reza and Gomrokchi, Maziar &#8211; Source Code Enhancement Using Reduction of Duplicated Code &#8211; Proceedings of the 25th Conference on IASTED International Multi-Conference: Software Engineering &#8211; 2007<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1109\/ICPC.2007.13\">Combining Formal Concept Analysis with Information Retrieval for Concept Location in Source Code<\/a><br \/>\nPoshyvanyk, Denys and Marcus, Andrian &#8211; Combining Formal Concept Analysis with Information Retrieval for Concept Location in Source Code &#8211; Proceedings of the 15th IEEE International Conference on Program Comprehension &#8211; 2007<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/4222574\">Using Server Pages to Unify Clones in Web Applications: A Trade-Off Analysis<\/a><br \/>\nD. C. Rajapakse and S. Jarzabek &#8211; Using Server Pages to Unify Clones in Web Applications: A Trade-Off Analysis &#8211; 29th International Conference on Software Engineering (ICSE&#8217;07) &#8211; 2007<\/p>\n<hr \/>\n<h1>2006<\/h1>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/4137427\">Detecting Duplications in Sequence Diagrams Based on Suffix Trees<\/a><br \/>\nH. Liu and Z. Ma and L. Zhang and W. Shao &#8211; Detecting Duplications in Sequence Diagrams Based on Suffix Trees &#8211; 2006 13th Asia Pacific Software Engineering Conference (APSEC&#8217;06) &#8211; 2006<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/4023973\">&#8220;Cloning Considered Harmful&#8221; Considered Harmful<\/a><br \/>\nC. Kapser and M. W. Godfrey &#8211; &#8220;Cloning Considered Harmful&#8221; Considered Harmful &#8211; 2006 13th Working Conference on Reverse Engineering &#8211; 2006<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/1631105\">How Developers Copy<\/a><br \/>\nM. Balint and R. Marinescu and T. Girba &#8211; How Developers Copy &#8211; 14th IEEE International Conference on Program Comprehension (ICPC&#8217;06) &#8211; 2006<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1124772.1124889\">GUESS: A Language and Interface for Graph Exploration<\/a><br \/>\nAdar, Eytan &#8211; GUESS: A Language and Interface for Graph Exploration &#8211; Proceedings of the SIGCHI Conference on Human Factors in Computing Systems &#8211; 2006<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1143997.1144312\">A Novel Approach to Optimize Clone Refactoring Activity<\/a><br \/>\nBouktif, Salah and Antoniol, Giuliano and Merlo, Ettore and Neteler, Markus &#8211; A Novel Approach to Optimize Clone Refactoring Activity &#8211; Proceedings of the 8th Annual Conference on Genetic and Evolutionary Computation &#8211; 2006<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1166324.1166351\">Recovering Conceptual Models from Web Applications<\/a><br \/>\nDi Lucca, Giuseppe Antonio and Distante, Damiano and Bernardi, Mario Luca &#8211; Recovering Conceptual Models from Web Applications &#8211; Proceedings of the 24th Annual ACM International Conference on Design of Communication &#8211; 2006<\/p>\n<p><a href=\"https:\/\/onlinelibrary.wiley.com\/doi\/abs\/10.1002\/smr.317\">On the effectiveness of clone detection by string matching<\/a><br \/>\nDucasse, St\u00e9phane and Nierstrasz, Oscar and Rieger, Matthias &#8211; On the effectiveness of clone detection by string matching &#8211; Journal of Software Maintenance and Evolution: Research and Practice &#8211; 2006<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/30815550_Generic_modelling_of_code_clones\">Generic modelling of code clones<\/a><br \/>\nGiesecke, Simon &#8211; Generic modelling of code clones &#8211; roceedings of Duplication, Re-dundancy, and Similarity in Software &#8211; 2006<\/p>\n<p><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/11693017_31\">Relation of Code Clones and Change Couplings<\/a><br \/>\nGeiger, Reto and Fluri, Beat and Gall, Harald C. and Pinzger, Martin &#8211; Relation of Code Clones and Change Couplings &#8211; Fundamental Approaches to Software Engineering &#8211; 2006<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/1148461.1148463\">Unifying Clones with a Generative Programming Technique: A Case Study: Practice Articles<\/a><br \/>\nJarzabek, Stan and Li, Shubiao &#8211; Unifying Clones with a Generative Programming Technique: A Case Study: Practice Articles &#8211; J. Softw. Maint. Evol. &#8211; 2006<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1109\/APSEC.2006.63\">Visualizing Clone Cohesion and Coupling<\/a><br \/>\nJiang, Zhen Ming and Hassan, Ahmed E. and Holt, Richard C. &#8211; Visualizing Clone Cohesion and Coupling &#8211; Proceedings of the XIII Asia Pacific Software Engineering Conference &#8211; 2006<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/1133105.1133106\">Supporting the Analysis of Clones in Software Systems: Research Articles<\/a><br \/>\nKapser, Cory J. and Godfrey, Michael W. &#8211; Supporting the Analysis of Clones in Software Systems: Research Articles &#8211; J. Softw. Maint. Evol. &#8211; 2006<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1137983.1137999\">Program Element Matching for Multi-Version Program Analyses<\/a><br \/>\nKim, Miryung and Notkin, David &#8211; Program Element Matching for Multi-Version Program Analyses &#8211; Proceedings of the 2006 International Workshop on Mining Software Repositories &#8211; 2006<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/221653862_GPLAG_Detection_of_software_plagiarism_by_program_dependence_graph_analysis\">GPLAG: Detection of software plagiarism by program dependence graph analysis<\/a><br \/>\nLiu, Chao and Chen, Fen and Han, Jiawei and Yu, Philip &#8211; GPLAG: Detection of software plagiarism by program dependence graph analysis &#8211; Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining &#8211; 2006<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/30815580_Detection_of_Plagiarism_in_University_Projects_Using_Metrics-based_Spectral_Similarity\">Detection of Plagiarism in University Projects Using Metrics-based Spectral Similarity<\/a><br \/>\nMerlo, Ettore &#8211; Detection of Plagiarism in University Projects Using Metrics-based Spectral Similarity &#8211; Proceedings of Dagstuhl Seminar 06301: Duplication, Redun- dancy, and Similarity in Software &#8211; 2006<\/p>\n<p><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/11767077_6\">Bauhaus &#8212; A Tool Suite for Program Analysis and Reverse Engineering<\/a><br \/>\nRaza, Aoun and Vogel, Gunther and Pl\\&#8221;odereder, Erhard &#8211; Bauhaus &#8212; A Tool Suite for Program Analysis and Reverse Engineering &#8211; Reliable Software Technologies &#8212; Ada-Europe 2006 &#8211; 2006<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1137983.1138000\">Detecting Similar Java Classes Using Tree Algorithms<\/a><br \/>\nSager, Tobias and Bernstein, Abraham and Pinzger, Martin and Kiefer, Christoph &#8211; Detecting Similar Java Classes Using Tree Algorithms &#8211; Proceedings of the 2006 International Workshop on Mining Software Repositories &#8211; 2006<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1185448.1185597\">Phoenix-Based Clone Detection Using Suffix Trees<\/a><br \/>\nTairas, Robert and Gray, Jeff &#8211; Phoenix-Based Clone Detection Using Suffix Trees &#8211; Proceedings of the 44th Annual Southeast Regional Conference &#8211; 2006<\/p>\n<hr \/>\n<h1>2005<\/h1>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1081706.1081733\">Detecting Higher-Level Similarity Patterns in Programs<\/a><br \/>\nBasit, Hamid Abdul and Jarzabek, Stan &#8211; Detecting Higher-Level Similarity Patterns in Programs &#8211; Proceedings of the 10th European Software Engineering Conference Held Jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering &#8211; 2005<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1081706.1081737\">An Empirical Study of Code Clone Genealogies<\/a><br \/>\nKim, Miryung and Sazawal, Vibha and Notkin, David and Murphy, Gail &#8211; An Empirical Study of Code Clone Genealogies &#8211; Proceedings of the 10th European Software Engineering Conference Held Jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering &#8211; 2005<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/1541846\">Cloning by accident: an empirical study of source code cloning across software systems<\/a><br \/>\nR. Al-Ekram and C. Kapser and R. Holt and M. Godfrey &#8211; Cloning by accident: an empirical study of source code cloning across software systems &#8211; 2005 International Symposium on Empirical Software Engineering, 2005. &#8211; 2005<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/1553588\">Beyond templates: a study of clones in the STL and some general implications<\/a><br \/>\nH. A. Basit and D. C. Rajapakse and S. Jarzabek &#8211; Beyond templates: a study of clones in the STL and some general implications &#8211; Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005. &#8211; 2005<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/1542064\">On the use of clone detection for identifying crosscutting concern code<\/a><br \/>\nM. Bruntink and A. van Deursen and R. van Engelen and T. Tourwe &#8211; On the use of clone detection for identifying crosscutting concern code &#8211; IEEE Transactions on Software Engineering &#8211; 2005<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/221391160_An_Empirical_Study_on_Limits_of_Clone_Unification_Using_Generics\">An Empirical Study on Limits of Clone Unification Using Generics.<\/a><br \/>\nBasit, Hamid and Rajapakse, Damith and Jarzabek, Stan &#8211; An Empirical Study on Limits of Clone Unification Using Generics. &#8211; Proceedings of the 17th International Conference on Software Engineering and Knowledge Engineering (SEKE) &#8211; 2005<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1007\/11531371_35\">An Investigation of Cloning in Web Applications<\/a><br \/>\nRajapakse, Damith C. and Jarzabek, Stan &#8211; An Investigation of Cloning in Web Applications &#8211; Proceedings of the 5th International Conference on Web Engineering &#8211; 2005<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/1421049\">Understanding cloned patterns in Web applications<\/a><br \/>\nA. De Lucia and R. Francese and G. Scanniello and G. Tortora &#8211; Understanding cloned patterns in Web applications &#8211; 13th International Workshop on Program Comprehension (IWPC&#8217;05) &#8211; 2005<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/1401931\">Using origin analysis to detect merging and splitting of source code entities<\/a><br \/>\nM. W. Godfrey and L. Zou &#8211; Using origin analysis to detect merging and splitting of source code entities &#8211; IEEE Transactions on Software Engineering &#8211; 2005<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1109\/ICSM.2005.52\">Improved Tool Support for the Investigation of Duplication in Software<\/a><br \/>\nKapser, Cory and Godfrey, Michael W. &#8211; Improved Tool Support for the Investigation of Duplication in Software &#8211; Proceedings of the 21st IEEE International Conference on Software Maintenance &#8211; 2005<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1083142.1083146\">Using a Clone Genealogy Extractor for Understanding and Supporting Evolution of Code Clones<\/a><br \/>\nKim, Miryung and Notkin, David &#8211; Using a Clone Genealogy Extractor for Understanding and Supporting Evolution of Code Clones &#8211; Proceedings of the 2005 International Workshop on Mining Software Repositories &#8211; 2005<\/p>\n<p><a href=\"https:\/\/www.semanticscholar.org\/paper\/SDD%3A-high-performance-code-clone-detection-system-Lee-Jeong\/d1828876ce5cf3360228b91da5a19c4c76ceb56d\">SDD: high performance code clone detection system for large scale source code<\/a><br \/>\nS. Lee and Iryoung Jeong &#8211; SDD: high performance code clone detection system for large scale source code &#8211; Proceedings of the Object Oriented Programming Sys- tems Languages and Applications Companion to the 20th annual ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications (OOPSLA) &#8211; 2005<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1081706.1081755\">PR-Miner: Automatically Extracting Implicit Programming Rules and Detecting Violations in Large Software Code<\/a><br \/>\nLi, Zhenmin and Zhou, Yuanyuan &#8211; PR-Miner: Automatically Extracting Implicit Programming Rules and Detecting Violations in Large Software Code &#8211; Proceedings of the 10th European Software Engineering Conference Held Jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering &#8211; 2005<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/1068009.1068191\">Hybridizing Evolutionary Algorithms and Clustering Algorithms to Find Source-Code Clones<\/a><br \/>\nSutton, Andrew and Kagdi, Huzefa and Maletic, Jonathan I. and Volkert, L. Gwenn &#8211; Hybridizing Evolutionary Algorithms and Clustering Algorithms to Find Source-Code Clones &#8211; Proceedings of the 7th Annual Conference on Genetic and Evolutionary Computation &#8211; 2005<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/1595830\">Archeology of code duplication: recovering duplication chains from small duplication fragments<\/a><br \/>\nR. Wettel and R. Marinescu &#8211; Archeology of code duplication: recovering duplication chains from small duplication fragments &#8211; 7th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC&#8217;05) &#8211; 2005<\/p>\n<hr \/>\n<h1>2004<\/h1>\n<p><a>Practical Language-Independent Detection of near-Miss Clones<\/a><br \/>\nCordy, James R. and Dean, Thomas R. and Synytskyy, Nikita &#8211; Practical Language-Independent Detection of near-Miss Clones &#8211; Proceedings of the 2004 Conference of the Centre for Advanced Studies on Collaborative Research &#8211; 2004<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/1357826\">Linear complexity object-oriented similarity for clone detection and software evolution analyses<\/a><br \/>\nE. Merlo and G. Antoniol and M. Di Penta and V. F. Rollo &#8211; Linear complexity object-oriented similarity for clone detection and software evolution analyses &#8211; 20th IEEE International Conference on Software Maintenance, 2004. Proceedings. &#8211; 2004<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/1374310\">Insights into system-wide code duplication<\/a><br \/>\nM. Rieger and S. Ducasse and M. Lanza &#8211; Insights into system-wide code duplication &#8211; 11th Working Conference on Reverse Engineering &#8211; 2004<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/1334772\">Aiding comprehension of cloning through categorization<\/a><br \/>\nC. Kapser and M. W. Godfrey &#8211; Aiding comprehension of cloning through categorization &#8211; Proceedings. 7th International Workshop on Principles of Software Evolution, 2004. &#8211; 2004<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/1334896\">An ethnographic study of copy and paste programming practices in OOPL<\/a><br \/>\nMiryung Kim and L. Bergman and T. Lau and D. Notkin &#8211; An ethnographic study of copy and paste programming practices in OOPL &#8211; Proceedings. 2004 International Symposium on Empirical Software Engineering, 2004. ISESE &#8217;04. &#8211; 2004<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/221553743_DMSR_Program_Transformations_for_Practical_Scalable_Software_Evolution\">DMS\u00ae: Program Transformations for Practical Scalable Software Evolution<\/a><br \/>\nBaxter, Ira and Pidgeon, Christopher and Mehlich, Michael &#8211; DMS\u00ae: Program Transformations for Practical Scalable Software Evolution &#8211; Proceedings of International Conference on Software Engineering &#8211; 2004<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/986537.986585\">Plagiarism Detection in Software Designs<\/a><br \/>\nBelkhouche, B. and Nix, Anastasia and Hassell, Johnette &#8211; Plagiarism Detection in Software Designs &#8211; Proceedings of the 42nd Annual Southeast Regional Conference &#8211; 2004<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/2011138.2011140\">Function Clone Detection in Web Applications: A Semiautomated Approach<\/a><br \/>\nCalefato, Fabio and Lanubile, Filippo and Mallardo, Teresa &#8211; Function Clone Detection in Web Applications: A Semiautomated Approach &#8211; J. Web Eng. &#8211; 2004<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/997817.997857\">Locality-Sensitive Hashing Scheme Based on p-Stable Distributions<\/a><br \/>\nDatar, Mayur and Immorlica, Nicole and Indyk, Piotr and Mirrokni, Vahab S. &#8211; Locality-Sensitive Hashing Scheme Based on p-Stable Distributions &#8211; Proceedings of the Twentieth Annual Symposium on Computational Geometry &#8211; 2004<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/998682.1006829\">Reengineering Web Applications Based on Cloned Pattern Analysis<\/a><br \/>\n&#8211; Reengineering Web Applications Based on Cloned Pattern Analysis &#8211; Proceedings of the 12th IEEE International Workshop on Program Comprehension &#8211; 2004<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/220901303_Identifying_reusable_components_in_web_applications\">Identifying reusable components in web applications.<\/a><br \/>\nDi Lucca, Giuseppe and Fasolino, Anna and Tramontana, Porfirio and Carlini, Ugo &#8211; Identifying reusable components in web applications. &#8211; roceedings of the IASTED International Con- ference on Software Engineering &#8211; 2004<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/220845849_ARIES_Refactoring_support_environment_based_on_code_clone_analysis\">ARIES: Refactoring support environment based on code clone analysis.<\/a><br \/>\nHigo, Yoshiki and Kamiya, Toshihiro and Kusumoto, Shinji and Inoue, Katsuro &#8211; ARIES: Refactoring support environment based on code clone analysis. &#8211; Proceedings of the IASTED Conference on Software Engineering and Applications &#8211; 2004<\/p>\n<p><a href=\"https:\/\/www.semanticscholar.org\/paper\/Control-Flow-Graph-Based-Aspect-Mining-Krinke-Breu\/62f141c2965e626776411b3dd5ed573860798810\">Control-Flow-Graph-Based Aspect Mining<\/a><br \/>\nJens Krinke and Silvia Breu &#8211; Control-Flow-Graph-Based Aspect Mining &#8211; Proceedings of the 1st Workshop on Aspect Reverse Engineering (WARE) &#8211; 2004<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/234126993_A_Comparison_of_Source_Code_Plagiarism_Detection_Engines\">A Comparison of Source Code Plagiarism Detection Engines<\/a><br \/>\nLancaster, Thomas and Culwin, Fintan &#8211; A Comparison of Source Code Plagiarism Detection Engines &#8211; Computer Science Education &#8211; 2004<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/2816272.2816322\">Source Code Retrieval Using Conceptual Similarity<\/a><br \/>\nMishne, Gilad and de Rijke, Maarten &#8211; Source Code Retrieval Using Conceptual Similarity &#8211; Coupling Approaches, Coupling Media and Coupling Languages for Information Retrieval &#8211; 2004<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1109\/VLHCC.2004.35\">Managing Duplicated Code with Linked Editing<\/a><br \/>\nToomim, Michael and Begel, Andrew and Graham, Susan L. &#8211; Managing Duplicated Code with Linked Editing &#8211; Proceedings of the 2004 IEEE Symposium on Visual Languages &#8211; Human Centric Computing &#8211; 2004<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1109\/SCAM.2004.5\">Clone Detection in Source Code by Frequent Itemset Techniques<\/a><br \/>\nWahler, Vera and Seipel, Dietmar and Gudenberg, Jurgen Wolff v. and Fischer, Gregor &#8211; Clone Detection in Source Code by Frequent Itemset Techniques &#8211; Proceedings of the Source Code Analysis and Manipulation, Fourth IEEE International Workshop &#8211; 2004<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/979743.979752\">The Second International Workshop on Detection of Software Clones: Workshop Report<\/a><br \/>\nWalenstein, Andrew and Lakhotia, Arun and Koschke, Rainer &#8211; The Second International Workshop on Detection of Software Clones: Workshop Report &#8211; SIGSOFT Softw. Eng. Notes &#8211; 2004<\/p>\n<hr \/>\n<h1>2003<\/h1>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/950792.951349\">Problems Creating Task-Relevant Clone Detection Reference Data<\/a><br \/>\nWalenstein, Andrew and Jyoti, Nitin and Li, Junwei and Yang, Yun and Lakhotia, Arun &#8211; Problems Creating Task-Relevant Clone Detection Reference Data &#8211; Proceedings of the 10th Working Conference on Reverse Engineering &#8211; 2003<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/1231219\">Reconstruction of successful software evolution using clone detection<\/a><br \/>\nF. Van Rysselberghe and S. Demeyer &#8211; Reconstruction of successful software evolution using clone detection &#8211; Sixth International Workshop on Principles of Software Evolution, 2003. Proceedings. &#8211; 2003<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/1760267.1760299\">Code Compaction of Matching Single-Entry Multiple-Exit Regions<\/a><br \/>\nChen, Wen-Ke and Li, Bengu and Gupta, Rajiv &#8211; Code Compaction of Matching Single-Entry Multiple-Exit Regions &#8211; Proceedings of the 10th International Conference on Static Analysis &#8211; 2003<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/2897841_Sifting_out_the_Mud_Low_Level_C_Code_Reuse\">Sifting out the Mud: Low Level C++ Code Reuse<\/a><br \/>\nDe Sutter, Bjorn and Bruno, Sutter and Bus, Bruno and De Bosschere, Koen &#8211; Sifting out the Mud: Low Level C++ Code Reuse &#8211; Proceedings of the 17th ACM SIGPLAN Conference on Object- oriented Programming, Systems, Languages, and Applications (OOPSLA) &#8211; 2003<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/851042.857059\">Are Decomposition Slices Clones?<\/a><br \/>\nGallagher, Keith and Layman, Lucas &#8211; Are Decomposition Slices Clones? &#8211; Proceedings of the 11th IEEE International Workshop on Program Comprehension &#8211; 2003<\/p>\n<p><a href=\"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/5318\">Software Maintenance<\/a><br \/>\nGrubb, Penny and Takang, Armstrong A &#8211; Software Maintenance &#8211; World Scientificg &#8211; 2003<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/244275094_A_Taxonomy_of_Clones_in_Source_Code_The_Re-Engineers_Most_Wanted_List\">A Taxonomy of Clones in Source Code: The Re-Engineers Most Wanted List<\/a><br \/>\nKapser, Cory and Godfrey, Michael &#8211; A Taxonomy of Clones in Source Code: The Re-Engineers Most Wanted List &#8211; Proceedings of the 2nd International Workshop on Detection of Software Clones (IWDSC) &#8211; 2003<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/1199187\">Effective, automatic procedure extraction<\/a><br \/>\nR. Komondoor and S. Horwitz &#8211; Effective, automatic procedure extraction &#8211; 11th IEEE International Workshop on Program Comprehension, 2003. &#8211; 2003<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/851042.857044\">Towards a Clone Detection Benchmark Suite and Results Archive<\/a><br \/>\nLakhotia, Arun and Li, Junwei and Walenstein, Andrew and Yang, Yun &#8211; Towards a Clone Detection Benchmark Suite and Results Archive &#8211; Proceedings of the 11th IEEE International Workshop on Program Comprehension &#8211; 2003<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/872754.873583\">Finding Function Clones in Web Applications<\/a><br \/>\nLanubile, Filippo and Mallardo, Teresa &#8211; Finding Function Clones in Web Applications &#8211; Proceedings of the Seventh European Conference on Software Maintenance and Reengineering &#8211; 2003<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1109\/TSE.2003.1232284\">Polymetric Views-A Lightweight Visual Approach to Reverse Engineering<\/a><br \/>\nLanza, Michele and Ducasse, St\\&#8217;ephane &#8211; Polymetric Views-A Lightweight Visual Approach to Reverse Engineering &#8211; IEEE Trans. Softw. Eng. &#8211; 2003<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/2832828_Finding_Plagiarisms_among_a_Set_of_Programs_with_JPlag\">Finding Plagiarisms among a Set of Programs with JPlag<\/a><br \/>\nPrechelt, Lutz and Malpohl, Guido &#8211; Finding Plagiarisms among a Set of Programs with JPlag &#8211; Journal of Universal Computer Science &#8211; 2003<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/1199204\">Using clustering to support the migration from static to dynamic web pages<\/a><br \/>\nF. Ricca and P. Tonella &#8211; Using clustering to support the migration from static to dynamic web pages &#8211; 11th IEEE International Workshop on Program Comprehension, 2003. &#8211; 2003<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/872757.872770\">Winnowing: Local Algorithms for Document Fingerprinting<\/a><br \/>\nSchleimer, Saul and Wilkerson, Daniel S. and Aiken, Alex &#8211; Winnowing: Local Algorithms for Document Fingerprinting &#8211; Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data &#8211; 2003<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/1234008\">Resolution of static clones in dynamic Web pages<\/a><br \/>\nN. Synytskyy and J. R. Cordy and T. Dean &#8211; Resolution of static clones in dynamic Web pages &#8211; Fifth IEEE International Workshop on Web Site Evolution, 2003. Theme: Architecture. Proceedings. &#8211; 2003<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/229018949_Clone_detector_evaluation_can_be_improved_Ideas_from_information_retrieval\">Clone detector evaluation can be improved: Ideas from information retrieval<\/a><br \/>\nWalenstein, Andrew and Lakhotia, Arun &#8211; Clone detector evaluation can be improved: Ideas from information retrieval &#8211; Proceedings of the 2nd International Workshop on Detection of Software Clones (IWDSC) &#8211; 2003<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/950792.951375\">Detecting Merging and Splitting Using Origin Analysis<\/a><br \/>\nZou, Lijie and Godfrey, Michael W. &#8211; Detecting Merging and Splitting Using Origin Analysis &#8211; Proceedings of the 10th Working Conference on Reverse Engineering &#8211; 2003<\/p>\n<hr \/>\n<h1>2002<\/h1>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/1183002\">On detection of gapped code clones using gap locations<\/a><br \/>\nY. Ueda and T. Kamiya and S. Kusumoto and K. Inoue &#8211; On detection of gapped code clones using gap locations &#8211; Ninth Asia-Pacific Software Engineering Conference, 2002. &#8211; 2002<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/1134103\">Evaluating clone detection tools for use during preventative maintenance<\/a><br \/>\nE. Burd and J. Bailey &#8211; Evaluating clone detection tools for use during preventative maintenance &#8211; Proceedings. Second IEEE International Workshop on Source Code Analysis and Manipulation &#8211; 2002<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/1019480\">CCFinder: a multilinguistic token-based code clone detection system for large scale source code<\/a><br \/>\nT. Kamiya and S. Kusumoto and K. Inoue &#8211; CCFinder: a multilinguistic token-based code clone detection system for large scale source code &#8211; IEEE Transactions on Software Engineering &#8211; 2002<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/220610329_Analyzing_cloning_evolution_in_the_Linux_kernel\">Analyzing cloning evolution in the Linux kernel<\/a><br \/>\nAntoniol, Giuliano and Umberto, Villano and Merlo, Ettore and Di Penta, Massimiliano &#8211; Analyzing cloning evolution in the Linux kernel &#8211; Information &amp; Software Technology &#8211; 2002<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/1045051\">An approach to identify duplicated web pages<\/a><br \/>\nG. A. Di Lucca and M. Di Penta and A. R. Fasolino &#8211; An approach to identify duplicated web pages &#8211; Proceedings 26th Annual International Computer Software and Applications &#8211; 2002<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/646972.713674\">On Software Maintenance Process Improvement Based on Code Clone Analysis<\/a><br \/>\nHigo, Yoshiki and Ueda, Yasushi and Kamiya, Toshihro and Kusumoto, Shinji and Inoue, Katsuro &#8211; On Software Maintenance Process Improvement Based on Code Clone Analysis &#8211; Proceedings of the 4th International Conference on Product Focused Software Process Improvement &#8211; 2002<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/876882.879732\">Extensible Language-Aware Merging<\/a><br \/>\n&#8211; Extensible Language-Aware Merging &#8211; Proceedings of the International Conference on Software Maintenance (ICSM\u201902) &#8211; 2002<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/645984.675865\">Investigating Large Software System Evolution: The Linux Kernel<\/a><br \/>\nMerlo, Ettore and Dagenais, Michel and Bachand, P. and Sormani, J. S. and Gradara, S. and Antoniol, Giuliano &#8211; Investigating Large Software System Evolution: The Linux Kernel &#8211; Proceedings of the 26th International Computer Software and Applications Conference on Prolonging Software Life: Development and Redevelopment &#8211; 2002<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/1021334\">An integrated approach for studying architectural evolution<\/a><br \/>\nQiang Tu and M. W. Godfrey &#8211; An integrated approach for studying architectural evolution &#8211; Proceedings 10th International Workshop on Program Comprehension &#8211; 2002<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/1011326\">Gemini: maintenance support environment based on code clone analysis<\/a><br \/>\nY. Ueda and T. Kamiya and S. Kusumoto and K. Inoue &#8211; Gemini: maintenance support environment based on code clone analysis &#8211; Proceedings Eighth IEEE Symposium on Software Metrics &#8211; 2002<\/p>\n<hr \/>\n<h1>2001<\/h1>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/989796\">Identification of high-level concept clones in source code<\/a><br \/>\nA. Marcus and J. I. Maletic &#8211; Identification of high-level concept clones in source code &#8211; Proceedings 16th Annual International Conference on Automated Software Engineering (ASE 2001) &#8211; 2001<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/972740\">Modeling clones evolution through time series<\/a><br \/>\nG. Antoniol and G. Casazza and M. Di Penta and E. Merlo &#8211; Modeling clones evolution through time series &#8211; Proceedings IEEE International Conference on Software Maintenance. ICSM 2001 &#8211; 2001<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/832308.837121\">Reverse Engineering to Achieve Maintainable WWW Sites<\/a><br \/>\nBoldyreff, Cornelia and Kewish, Richard &#8211; Reverse Engineering to Achieve Maintainable WWW Sites &#8211; Proceedings of the Eighth Working Conference on Reverse Engineering (WCRE\u201901) &#8211; 2001<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/3929803_Identifying_clones_in_the_Linux_Kernel\">Identifying clones in the Linux Kernel<\/a><br \/>\nCasazza, G. and Antoniol, Giuliano and Umberto, Villano and Merlo, E. and Di Penta, Massimiliano &#8211; Identifying clones in the Linux Kernel &#8211; Proceedings. First IEEE International Workshop on Source Code Analysis and Manipulation &#8211; 2001<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/502034.502042\">An Empirical Study of Operating Systems Errors<\/a><br \/>\nChou, Andy and Yang, Junfeng and Chelf, Benjamin and Hallem, Seth and Engler, Dawson &#8211; An Empirical Study of Operating Systems Errors &#8211; Proceedings of the Eighteenth ACM Symposium on Operating Systems Principles &#8211; 2001<\/p>\n<p><a href=\"https:\/\/www.semanticscholar.org\/paper\/Clone-Analysis-in-the-Web-Era%3A-an-Approach-to-Web-Caprio-Casazza\/ee6e8f646ed0313f5a9ab3529ee2fa32e9a07019\">Clone Analysis in the Web Era: an Approach to Identify Cloned Web Pages<\/a><br \/>\nFrancesco Di Caprio and Gerardo Casazza and Massimiliano Di Penta and Umberto Villano &#8211; Clone Analysis in the Web Era: an Approach to Identify Cloned Web Pages &#8211; Proceedings of the 7th IEEE Workshop on Empirical Studies of Software Maintenance (WESS) &#8211; 2001<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/919132\">Reengineering analysis of object-oriented systems via duplication analysis<\/a><br \/>\nF. Fioravanti and G. Migliarese and P. Nesi &#8211; Reengineering analysis of object-oriented systems via duplication analysis &#8211; Proceedings of the 23rd International Conference on Software Engineering. ICSE 2001 &#8211; 2001<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/602461.602482\">Growth, Evolution, and Structural Change in Open Source Software<\/a><br \/>\nGodfrey, Michael and Tu, Qiang &#8211; Growth, Evolution, and Structural Change in Open Source Software &#8211; Proceedings of the 4th International Workshop on Principles of Software Evolution &#8211; 2001<\/p>\n<p><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/3-540-45309-1_25\">Tool Demonstration: Finding Duplicated Code Using Program Dependences<\/a><br \/>\nKomondoor, Raghavan and Horwitz, Susan &#8211; Tool Demonstration: Finding Duplicated Code Using Program Dependences &#8211; Programming Languages and Systems &#8211; 2001<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/647170.718283\">Using Slicing to Identify Duplication in Source Code<\/a><br \/>\nKomondoor, Raghavan and Horwitz, Susan &#8211; Using Slicing to Identify Duplication in Source Code &#8211; Proceedings of the 8th International Symposium on Static Analysis &#8211; 2001<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/832308.837142\">Identifying Similar Code with Program Dependence Graphs<\/a><br \/>\nKrinke, Jens &#8211; Identifying Similar Code with Program Dependence Graphs &#8211; Proceedings of the Eighth Working Conference on Reverse Engineering (WCRE\u201901) &#8211; 2001<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/919085\">Supporting program comprehension using semantic and structural information<\/a><br \/>\nJ. I. Maletic and A. Marcus &#8211; Supporting program comprehension using semantic and structural information &#8211; Proceedings of the 23rd International Conference on Software Engineering. ICSE 2001 &#8211; 2001<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/647055.715910\">Interactive Simultaneous Editing of Multiple Text Regions<\/a><br \/>\nMiller, Robert C. and Myers, Brad A. &#8211; Interactive Simultaneous Editing of Multiple Text Regions &#8211; Proceedings of the General Track: 2001 USENIX Annual Technical Conference &#8211; 2001<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/832308.837151\">CRAFT: A Framework for Evaluating Software Clustering Results in the Absence of Benchmark Decompositions<\/a><br \/>\nMitchell, Brian S. and Mancoridis, Spiros &#8211; CRAFT: A Framework for Evaluating Software Clustering Results in the Absence of Benchmark Decompositions &#8211; Proceedings of the Eighth Working Conference on Reverse Engineering (WCRE\u201901) &#8211; 2001<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/832308.837160\">Generating Robust Parsers Using Island Grammars<\/a><br \/>\nMoonen, Leon &#8211; Generating Robust Parsers Using Island Grammars &#8211; Proceedings of the Eighth Working Conference on Reverse Engineering (WCRE\u201901) &#8211; 2001<\/p>\n<hr \/>\n<h1>2000<\/h1>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/891457\">Advanced clone-analysis to support object-oriented system refactoring<\/a><br \/>\nM. Balazinska and E. Merlo and M. Dagenais and B. Lague and K. Kontogiannis &#8211; Advanced clone-analysis to support object-oriented system refactoring &#8211; Proceedings Seventh Working Conference on Reverse Engineering &#8211; 2000<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/349214.349233\">Compiler Techniques for Code Compaction<\/a><br \/>\nDebray, Saumya K. and Evans, William and Muth, Robert and De Sutter, Bjorn &#8211; Compiler Techniques for Code Compaction &#8211; ACM Trans. Program. Lang. Syst. &#8211; 2000<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/2430208_A_Language_Independent_Approach_for_Detecting_Duplicated_Code\">A Language Independent Approach for Detecting Duplicated Code<\/a><br \/>\nDucasse, St\u00e9phane and Rieger, Matthias and Demeyer, Serge &#8211; A Language Independent Approach for Detecting Duplicated Code &#8211; Conference on Software Maintenance &#8211; 2000<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/221335508_The_costs_and_benefits_of_cloning_in_a_lazy_functional_language\">The costs and benefits of cloning in a lazy functional language<\/a><br \/>\nFaxen, Karl-Filip &#8211; The costs and benefits of cloning in a lazy functional language &#8211; 2nd Scottish Functional Programming Workshop (SFP) &#8211; 2000<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/883030\">Evolution in open source software: a case study<\/a><br \/>\nGodfrey and Qiang Tu &#8211; Evolution in open source software: a case study &#8211; Proceedings 2000 International Conference on Software Maintenance &#8211; 2000<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1109\/32.859533\">Predicting Fault Incidence Using Software Change History<\/a><br \/>\nGraves, Todd L. and Karr, Alan F. and Marron, J. S. and Siy, Harvey &#8211; Predicting Fault Incidence Using Software Change History &#8211; IEEE Trans. Softw. Eng. &#8211; 2000<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/325694.325713\">Semantics-Preserving Procedure Extraction<\/a><br \/>\nKomondoor, Raghavan and Horwitz, Susan &#8211; Semantics-Preserving Procedure Extraction &#8211; Proceedings of the 27th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages &#8211; 2000<\/p>\n<hr \/>\n<h1>1999<\/h1>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/809750\">Measuring clone based reengineering opportunities<\/a><br \/>\nM. Balazinska and E. Merlo and M. Dagenais and B. Lague and K. Kontogiannis &#8211; Measuring clone based reengineering opportunities &#8211; Proceedings Sixth International Software Metrics Symposium (Cat. No.PR00403) &#8211; 1999<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/806971\">Partial redesign of Java software systems based on clone analysis<\/a><br \/>\nM. Balazinska and E. Merlo and M. Dagenais and B. Lague and K. Kontogiannis &#8211; Partial redesign of Java software systems based on clone analysis &#8211; Sixth Working Conference on Reverse Engineering (Cat. No.PR00303) &#8211; 1999<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/314500.314968\">Parameterized Diff<\/a><br \/>\nBaker, Brenda S. &#8211; Parameterized Diff &#8211; Proceedings of the Tenth Annual ACM-SIAM Symposium on Discrete Algorithms &#8211; 1999<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/301618.301655\">Enhanced Code Compression for Embedded RISC Processors<\/a><br \/>\nCooper, Keith D. and McIntosh, Nathaniel &#8211; Enhanced Code Compression for Embedded RISC Processors &#8211; Proceedings of the ACM SIGPLAN 1999 Conference on Programming Language Design and Implementation &#8211; 1999<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/792497\">Building documentation generators<\/a><br \/>\nA. Van Deursen and T. Kuipers &#8211; Building documentation generators &#8211; Proceedings IEEE International Conference on Software Maintenance &#8211; 1999 (ICSM&#8217;99). &#8216;Software Maintenance for Business Change&#8217; (Cat. No.99CB36360) &#8211; 1999<\/p>\n<p><a href=\"https:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.65.6604&amp;rep=rep1&amp;type=pdf\">Removing Clones from the Code<\/a><br \/>\nRichard Fanta, V\u00e1clav Rajlich &#8211; Removing Clones from the Code &#8211; Journal of Software Maintenance &#8211; 1999<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1145\/299649.299783\">Sim: A Utility for Detecting Similarity in Computer Programs<\/a><br \/>\nGitchell, David and Tran, Nicholas &#8211; Sim: A Utility for Detecting Similarity in Computer Programs &#8211; The Proceedings of the Thirtieth SIGCSE Technical Symposium on Computer Science Education &#8211; 1999<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/520033.858251\">Extending Software Quality Assessment Techniques to Java Systems<\/a><br \/>\nPatenaude, Jean-Francois and Merlo, Ettore and Dagenais, Michel and Lagu\\&#8221;e, Bruno &#8211; Extending Software Quality Assessment Techniques to Java Systems &#8211; Proceedings of the 7th International Workshop on Program Comprehension &#8211; 1999<\/p>\n<hr \/>\n<h1>1998<\/h1>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/1268256.1268271\">Deducing Similarities in Java Sources from Bytecodes<\/a><br \/>\nBaker, Brenda S. and Manber, Udi &#8211; Deducing Similarities in Java Sources from Bytecodes &#8211; Proceedings of the Annual Conference on USENIX Annual Technical Conference &#8211; 1998<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/783160.783170\">Clones Occurence in Large Object Oriented Software Packages<\/a><br \/>\nDagenais, Michel and Merlo, Ettore and Lagu\\&#8221;e, Bruno and Proulx, Daniel &#8211; Clones Occurence in Large Object Oriented Software Packages &#8211; Proceedings of the 1998 Conference of the Centre for Advanced Studies on Collaborative Research &#8211; 1998<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/832305.837023\">An Intermediate Representation for Reverse Engineering Analyses<\/a><br \/>\nKoschke, R. and Girard, J.-F. and W\\&#8221;urthner, M. &#8211; An Intermediate Representation for Reverse Engineering Analyses &#8211; Proceedings of the Working Conference on Reverse Engineering (WCRE\u201998) &#8211; 1998<\/p>\n<hr \/>\n<h1>1997<\/h1>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/624575\">Evaluation experiments on the detection of programming patterns using software metrics<\/a><br \/>\nK. Kontogiannis &#8211; Evaluation experiments on the detection of programming patterns using software metrics &#8211; Proceedings of the Fourth Working Conference on Reverse Engineering &#8211; 1997<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1137\/S0097539793246707\">Parameterized Duplication in Strings: Algorithms and an Application to Software Maintenance<\/a><br \/>\nBaker, Brenda S. &#8211; Parameterized Duplication in Strings: Algorithms and an Application to Software Maintenance &#8211; SIAM J. Comput. &#8211; 1997<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/5726969\">Investigating the maintenance implications of the replication of code<\/a><br \/>\nE. Burd and M. Munro &#8211; Investigating the maintenance implications of the replication of code &#8211; 1997 Proceedings International Conference on Software Maintenance &#8211; 1997<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/645545.853273\">Assessing the Benefits of Incorporating Function Clone Detection in a Development Process<\/a><br \/>\nLague, Bruno and Proulx, Daniel and Mayrand, Jean and Merlo, Ettore M. and Hudepohl, John &#8211; Assessing the Benefits of Incorporating Function Clone Detection in a Development Process &#8211; Proceedings of the International Conference on Software Maintenance &#8211; 1997<\/p>\n<hr \/>\n<h1>1996<\/h1>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/565012\">Experiment on the automatic detection of function clones in a software system using metrics<\/a><br \/>\nMayrand and Leblanc and Merlo &#8211; Experiment on the automatic detection of function clones in a software system using metrics &#8211; 1996 Proceedings of International Conference on Software Maintenance &#8211; 1996<\/p>\n<p><a href=\"http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0022000096900033\">Parameterized Pattern Matching: Algorithms and Applications<\/a><br \/>\nBrenda S. Baker &#8211; Parameterized Pattern Matching: Algorithms and Applications &#8211; Journal of Computer and System Sciences &#8211; 1996<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1109\/64.546588\">On the Internet, Software Should Be Milked, Not Brewed<\/a><br \/>\nFlammia, Giovanni &#8211; On the Internet, Software Should Be Milked, Not Brewed &#8211; IEEE Expert: Intelligent Systems and Their Applications &#8211; 1996<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/246277.246285\">Dotplot Patterns: A Literal Look at Pattern Languages<\/a><br \/>\nHelfman, Jonathan &#8211; Dotplot Patterns: A Literal Look at Pattern Languages &#8211; Theor. Pract. Object Syst. &#8211; 1996<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/782052.782068\">Navigating the Textual Redundancy Web in Legacy Source<\/a><br \/>\nJohnson, J. Howard &#8211; Navigating the Textual Redundancy Web in Legacy Source &#8211; Proceedings of the 1996 Conference of the Centre for Advanced Studies on Collaborative Research &#8211; 1996<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/265619.265626\">Pattern Matching for Clone and Concept Detection<\/a><br \/>\nKontogiannis, K. A. and Demori, R. and Merlo, E. and Galler, M. and Bernstein, M. &#8211; Pattern Matching for Clone and Concept Detection &#8211; Reverse Engineering &#8211; 1996<\/p>\n<hr \/>\n<h1>1995<\/h1>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/514697\">On finding duplication and near-duplication in large software systems<\/a><br \/>\nB. S. Baker &#8211; On finding duplication and near-duplication in large software systems &#8211; Proceedings of 2nd Working Conference on Reverse Engineering &#8211; 1995<\/p>\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/30383319_The_Development_of_a_Software_Clone_Detector\">The Development of a Software Clone Detector<\/a><br \/>\nDavey, Neil and Barson, Paul and Field, S.D.H. and Frank, Ray and Tansley, Stewart &#8211; The Development of a Software Clone Detector &#8211; International Journal of Applied Software Technology &#8211; 1995<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/795662.796302\">Faster Algorithms for the Construction of Parameterized Suffix Trees<\/a><br \/>\nRao Kosaraju, S. &#8211; Faster Algorithms for the Construction of Parameterized Suffix Trees &#8211; Proceedings of the 36th Annual Symposium on Foundations of Computer Science &#8211; 1995<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1109\/32.489076\">On \u201cA Framework for Source Code Search Using Program Patterns\u201d<\/a><br \/>\nDevanbu, Prem &#8211; On \u201cA Framework for Source Code Search Using Program Patterns\u201d &#8211; IEEE Trans. Softw. Eng. &#8211; 1995<\/p>\n<hr \/>\n<h1>1994<\/h1>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/336783\">Substring matching for clone detection and change tracking<\/a><br \/>\nJohnson &#8211; Substring matching for clone detection and change tracking &#8211; Proceedings 1994 International Conference on Software Maintenance &#8211; 1994<\/p>\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/5387326\">Investigating reverse engineering technologies for the CAS program understanding project<\/a><br \/>\nE. Buss and R. De Mori and W. M. Gentleman and J. Henshaw and H. Johnson and K. Kontogiannis and E. Merlo and H. A. Muller and J. Mylopoulos and S. Paul and A. Prakash and M. Stanley and S. R. Tilley and J. Troster and K. Wong &#8211; Investigating reverse engineering technologies for the CAS program understanding project &#8211; IBM Systems Journal &#8211; 1994<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/782185.782217\">Visualizing Textual Redundancy in Legacy Source<\/a><br \/>\nJohnson, J. Howard &#8211; Visualizing Textual Redundancy in Legacy Source &#8211; Proceedings of the 1994 Conference of the Centre for Advanced Studies on Collaborative Research &#8211; 1994<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/1267074.1267076\">Finding Similar Files in a Large File System<\/a><br \/>\nManber, Udi &#8211; Finding Similar Files in a Large File System &#8211; Proceedings of the USENIX Winter 1994 Technical Conference on USENIX Winter 1994 Technical Conference &#8211; 1994<\/p>\n<hr \/>\n<h1>1993<\/h1>\n<p><a href=\"https:\/\/amstat.tandfonline.com\/doi\/abs\/10.1080\/10618600.1993.10474605\">Dotplot: A Program for Exploring Self-Similarity in Millions of Lines of Text and Code<\/a><br \/>\nKenneth Ward Church and Jonathan Isaac Helfman &#8211; Dotplot: A Program for Exploring Self-Similarity in Millions of Lines of Text and Code &#8211; Journal of Computational and Graphical Statistics &#8211; 1993<\/p>\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.5555\/962289.962305\">Identifying Redundancy in Source Code Using Fingerprints<\/a><br \/>\nJohnson, J. Howard &#8211; Identifying Redundancy in Source Code Using Fingerprints &#8211; Proceedings of the 1993 Conference of the Centre for Advanced Studies on Collaborative Research: Software Engineering &#8211; Volume 1 &#8211; 1993<\/p>\n<hr \/>\n<h1>1992<\/h1>\n<p><a href=\"http:\/\/citeseerx.ist.psu.edu\/viewdoc\/summary?doi=10.1.1.550.4540\">A program for identifying duplicated code<\/a><br \/>\nBrenda S. Baker &#8211; A program for identifying duplicated code &#8211; Computing Science and Statistics &#8211; 1992<\/p>\n<hr \/>\n<h1>1988<\/h1>\n<p><a href=\"https:\/\/doi.org\/10.1093\/comjnl\/31.1.1\">Detecting Plagiarism in Student Pascal Programs<\/a><br \/>\nJankowitz, H. T. &#8211; Detecting Plagiarism in Student Pascal Programs &#8211; Comput. J. &#8211; 1988<\/p>\n<hr \/>\n<h1>1987<\/h1>\n<p><a href=\"https:\/\/doi.org\/10.1145\/24039.24041\">The Program Dependence Graph and Its Use in Optimization<\/a><br \/>\nFerrante, Jeanne and Ottenstein, Karl J. and Warren, Joe D. &#8211; The Program Dependence Graph and Its Use in Optimization &#8211; ACM Trans. Program. Lang. Syst. &#8211; 1987<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1147\/rd.312.0249\">Efficient Randomized Pattern-Matching Algorithms<\/a><br \/>\nKarp, Richard M. and Rabin, Michael O. &#8211; Efficient Randomized Pattern-Matching Algorithms &#8211; IBM J. Res. Dev. &#8211; 1987<\/p>\n<hr \/>\n<h1>1986<\/h1>\n<p><a href=\"https:\/\/doi.org\/10.1145\/5657.5658\">Combinatorics, Complexity, and Randomness<\/a><br \/>\nKarp, Richard M. &#8211; Combinatorics, Complexity, and Randomness &#8211; Commun. ACM &#8211; 1986<\/p>\n<hr \/>\n<h1>1981<\/h1>\n<p><a href=\"https:\/\/doi.org\/10.1145\/800037.800954\">A Tool That Detects Plagiarism in Pascal Programs<\/a><br \/>\nGrier, Sam &#8211; A Tool That Detects Plagiarism in Pascal Programs &#8211; Proceedings of the Twelfth SIGCSE Technical Symposium on Computer Science Education &#8211; 1981<\/p>\n<hr \/>\n<h1>1976<\/h1>\n<p><a href=\"https:\/\/doi.org\/10.1145\/321941.321946\">A Space-Economical Suffix Tree Construction Algorithm<\/a><br \/>\nMcCreight, Edward M. &#8211; A Space-Economical Suffix Tree Construction Algorithm &#8211; J. ACM &#8211; 1976<\/p>\n<hr \/>\n<h1>1975<\/h1>\n<p><a href=\"https:\/\/doi.org\/10.1145\/360825.360861\">A Linear Space Algorithm for Computing Maximal Common Subsequences<\/a><br \/>\nHirschberg, D. S. &#8211; A Linear Space Algorithm for Computing Maximal Common Subsequences &#8211; Commun. ACM &#8211; 1975<\/p>\n<hr \/>\n","protected":false},"excerpt":{"rendered":"<p>Code Clone Literature by Year We used scripts to generate the html file from the bib files. Please excuse the foreign characters and typos. A few of the publications might have been listed multiple times for the same reason as well. Also please submit new articles using the submit menu if you think you have [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-93","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/clones.usask.ca\/clones\/wp-json\/wp\/v2\/pages\/93","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/clones.usask.ca\/clones\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/clones.usask.ca\/clones\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/clones.usask.ca\/clones\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/clones.usask.ca\/clones\/wp-json\/wp\/v2\/comments?post=93"}],"version-history":[{"count":26,"href":"https:\/\/clones.usask.ca\/clones\/wp-json\/wp\/v2\/pages\/93\/revisions"}],"predecessor-version":[{"id":296,"href":"https:\/\/clones.usask.ca\/clones\/wp-json\/wp\/v2\/pages\/93\/revisions\/296"}],"wp:attachment":[{"href":"https:\/\/clones.usask.ca\/clones\/wp-json\/wp\/v2\/media?parent=93"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}