[HTML][HTML] A systematic mapping study of clone visualization

M Hammad, HA Basit, S Jarzabek, R Koschke - Computer Science Review, 2020 - Elsevier
Knowing code clones (similar code fragments) is helpful in software maintenance and re-
engineering. As clone detectors return huge numbers of clones, visualization techniques …

SAGA: efficient and large-scale detection of near-miss clones with GPU acceleration

G Li, Y Wu, CK Roy, J Sun, X Peng… - 2020 IEEE 27th …, 2020 - ieeexplore.ieee.org
Clone detection on large code repository is necessary for many big code analysis tasks. The
goal is to provide rich information on identical and similar code across projects. Detecting …

An empirical comparison on the results of different clone detection setups for c-based projects

Y Zhou, J Chen, Y Shi, B Chen… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Code clones have been used in many different software maintenance and evaluation tasks
in practice (eg, change proportion and evolution, refactoring, and vulnerability …

Incremental origin analysis of source code files

D Steidl, B Hummel, E Juergens - … of the 11th Working Conference on …, 2014 - dl.acm.org
The history of software systems tracked by version control systems is often incomplete
because many file movements are not recorded. However, static code analyses that mine …

A survey on goal-oriented visualization of clone data

HA Basit, M Hammad, R Koschke - 2015 IEEE 3rd Working …, 2015 - ieeexplore.ieee.org
Comprehending software clones is necessary for a number of activities in software
development. The comprehension of software clones is challenged by the sheer volume of …

Extraction of product evolution tree from source code of product variants

T Kanda, T Ishio, K Inoue - … of the 17th International Software Product …, 2013 - dl.acm.org
A large number of software products may be derived from an original single product.
Although software product line engineering is advocated as an effective approach to …

What do we need to know about clones? deriving information needs from user goals

HA Basit, M Hammad, S Jarzabek… - 2015 IEEE 9th …, 2015 - ieeexplore.ieee.org
Clone detection can be used to achieve diverse objectives such as refactoring, program
understanding, bug localization, and plagiarism detection, etc. Each goal takes a different …

Incremental map-reduce on repository history

J Härtel, R Lämmel - 2020 IEEE 27th International Conference …, 2020 - ieeexplore.ieee.org
Work on Mining Software Repositories typically involves processing abstractions of
resources on individual revisions. A corresponding processing of abstractions of resource …

Querying spatiotemporal XML using DataFox

Y Chen, P Revesz - … Conference on Web Intelligence (WI 2003), 2003 - ieeexplore.ieee.org
We describe DataFoX, which is a new query language for XML documents and extends
Datalog with support for trees as the domain of the variables. We also introduce for DataFoX …

Approximating the evolution history of software from source code

T Kanda, T Ishio, K Inoue - IEICE TRANSACTIONS on Information …, 2015 - search.ieice.org
Once a software product has been released, a large number of software products may be
derived from an original single product. Management and maintenance of product variants …