Comparison and Evaluation of Clone Detection Tools S Bellon, R Koschke, G Antoniol, J Krinke, E Merlo IEEE Trans. Software Eng 33 (9), 577-591, 2007 | 1078 | 2007 |
Identifying similar code with program dependence graphs J Krinke Proceedings eighth working conference on reverse engineering, 301-309, 2001 | 972 | 2001 |
A study of consistent and inconsistent changes to code clones J Krinke 14th Working Conference on Reverse Engineering (WCRE 2007), 170-178, 2007 | 275 | 2007 |
Static slicing of threaded programs J Krinke Proceedings of the 1998 ACM SIGPLAN-SIGSOFT workshop on Program analysis for …, 1998 | 227 | 1998 |
Is cloned code more stable than non-cloned code? J Krinke 2008 Eighth IEEE International Working Conference on Source Code Analysis …, 2008 | 215 | 2008 |
Searching for better configurations: a rigorous approach to clone evaluation T Wang, M Harman, Y Jia, J Krinke Proceedings of the 2013 9th Joint Meeting on Foundations of Software …, 2013 | 211 | 2013 |
Aspect mining using event traces S Breu, J Krinke Proceedings. 19th International Conference on Automated Software Engineering …, 2004 | 205 | 2004 |
Search based software engineering for software product line engineering: a survey and directions for future work M Harman, Y Jia, J Krinke, WB Langdon, J Petke, Y Zhang Proceedings of the 18th International Software Product Line Conference …, 2014 | 174 | 2014 |
Efficient path conditions in dependence graphs for software safety analysis G Snelting, T Robschink, J Krinke ACM Transactions on Software Engineering and Methodology (TOSEM) 15 (4), 410-457, 2006 | 170 | 2006 |
Context-sensitive slicing of concurrent programs J Krinke ESEC/FSE 28 (5), 178-187, 2003 | 151 | 2003 |
A Comparison of Code Similarity Analysers C Ragkhitwetsagul, J Krinke, D Clark Empirical Software Engineering 23, 2018 | 141 | 2018 |
Dynamic path conditions in dependence graphs C Hammer, M Grimme, J Krinke Proceedings of the 2006 ACM SIGPLAN symposium on Partial evaluation and …, 2006 | 140 | 2006 |
Advanced slicing of sequential and concurrent programs J Krinke 20th IEEE International Conference on Software Maintenance, 2004 …, 2004 | 120 | 2004 |
Toxic code snippets on stack overflow C Ragkhitwetsagul, J Krinke, M Paixao, G Bianco, R Oliveto IEEE Transactions on Software Engineering 47 (3), 560-581, 2019 | 119 | 2019 |
Deep parameter optimisation F Wu, W Weimer, M Harman, Y Jia, J Krinke Proceedings of the 2015 Annual Conference on Genetic and Evolutionary …, 2015 | 115 | 2015 |
ORBS: Language-Independent Program Slicing D Binkley, N Gold, M Harman, S Islam, J Krinke, S Yoo Foundations of Software Engineering, 12, 2014 | 115 | 2014 |
Comparative Stability of Cloned and Non-cloned Code: An Empirical Study M Mondal, CK Roy, MS Rahman, RK Saha, J Krinke, KA Schneider 27th ACM Symposium on Applied Computing, 2012 | 108 | 2012 |
Is cloned code older than non-cloned code? J Krinke 5th International Workshop on Detection of Software Clones (IWSC), 28-33, 2011 | 99 | 2011 |
How Double-Fetch Situations turn into Double-Fetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel P Wang, J Krinke, K Lu, G Li, S Dodier-Lazaro USENIX Security Symposium, 2017 | 78 | 2017 |
Interference analysis for AspectJ M Störzer, J Krinke Foundations of Aspect-Oriented Languages, 35-44, 2003 | 75 | 2003 |