Comparison and Evaluation of Clone Detection Tools S Bellon, R Koschke, G Antoniol, J Krinke, E Merlo IEEE Trans. Software Eng 33 (9), 577-591, 2007 | 1039 | 2007 |
Identifying similar code with program dependence graphs J Krinke Proceedings Eighth Working Conference on Reverse Engineering, 301-309, 2001 | 944 | 2001 |
A study of consistent and inconsistent changes to code clones J Krinke 14th Working Conference on Reverse Engineering (WCRE 2007), 170-178, 2007 | 275 | 2007 |
Static slicing of threaded programs J Krinke Proceedings of the 1998 ACM SIGPLAN-SIGSOFT workshop on Program analysis for …, 1998 | 228 | 1998 |
Is cloned code more stable than non-cloned code? J Krinke 2008 Eighth IEEE International Working Conference on Source Code Analysis …, 2008 | 213 | 2008 |
Aspect mining using event traces S Breu, J Krinke Proceedings. 19th International Conference on Automated Software Engineering …, 2004 | 206 | 2004 |
Searching for better configurations: a rigorous approach to clone evaluation T Wang, M Harman, Y Jia, J Krinke Proceedings of the 2013 9th Joint Meeting on Foundations of Software …, 2013 | 202 | 2013 |
Efficient path conditions in dependence graphs for software safety analysis G Snelting, T Robschink, J Krinke ACM Transactions on Software Engineering and Methodology (TOSEM) 15 (4), 410-457, 2006 | 174 | 2006 |
Search based software engineering for software product line engineering: a survey and directions for future work M Harman, Y Jia, J Krinke, WB Langdon, J Petke, Y Zhang Proceedings of the 18th International Software Product Line Conference …, 2014 | 170 | 2014 |
Context-sensitive slicing of concurrent programs J Krinke ESEC/FSE 28 (5), 178-187, 2003 | 147 | 2003 |
Dynamic path conditions in dependence graphs C Hammer, M Grimme, J Krinke Proceedings of the 2006 ACM SIGPLAN symposium on Partial evaluation and …, 2006 | 135 | 2006 |
A Comparison of Code Similarity Analysers C Ragkhitwetsagul, J Krinke, D Clark Empirical Software Engineering 23, 2018 | 124 | 2018 |
Advanced slicing of sequential and concurrent programs J Krinke 20th IEEE International Conference on Software Maintenance, 2004 …, 2004 | 121 | 2004 |
Deep parameter optimisation F Wu, W Weimer, M Harman, Y Jia, J Krinke Proceedings of the 2015 Annual Conference on Genetic and Evolutionary …, 2015 | 108 | 2015 |
Comparative Stability of Cloned and Non-cloned Code: An Empirical Study M Mondal, CK Roy, MS Rahman, RK Saha, J Krinke, KA Schneider 27th ACM Symposium on Applied Computing, 2012 | 105 | 2012 |
Toxic code snippets on stack overflow C Ragkhitwetsagul, J Krinke, M Paixao, G Bianco, R Oliveto IEEE Transactions on Software Engineering 47 (3), 560-581, 2019 | 102 | 2019 |
ORBS: Language-Independent Program Slicing D Binkley, N Gold, M Harman, S Islam, J Krinke, S Yoo Foundations of Software Engineering, 12, 2014 | 101 | 2014 |
Is cloned code older than non-cloned code? J Krinke 5th International Workshop on Detection of Software Clones (IWSC), 28-33, 2011 | 100 | 2011 |
Interference analysis for AspectJ M Störzer, J Krinke Foundations of Aspect-Oriented Languages, 35-44, 2003 | 72 | 2003 |
How Double-Fetch Situations turn into Double-Fetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel P Wang, J Krinke, K Lu, G Li, S Dodier-Lazaro USENIX Security Symposium, 2017 | 67 | 2017 |