Software clone detection: A systematic review

D Rattan, R Bhatia, M Singh - Information and Software Technology, 2013 - Elsevier
CONTEXT: Reusing software by means of copy and paste is a frequent activity in software
development. The duplicated code is known as a software clone and the activity is known as …

The vision of software clone management: Past, present, and future (keynote paper)

CK Roy, MF Zibran, R Koschke - 2014 Software Evolution …, 2014 - ieeexplore.ieee.org
Duplicated code or code clones are a kind of code smell that have both positive and
negative impacts on the development and maintenance of software systems. Software clone …

[PDF][PDF] 软件分析技术进展

梅宏, 王千祥, 张路, 王戟 - 计算机学报, 2009 - cjc.ict.ac.cn
摘要软件分析技术的研究已有较长历史, 相关成果也在软件生命周期的不同阶段中得到了广泛
应用. 软件生命周期中不同活动所需要的软件分析技术既不完全相同, 又有许多交叠 …

Conflict‐aware optimal scheduling of prioritised code clone refactoring

MF Zibran, CK Roy - IET software, 2013 - Wiley Online Library
Duplicated or similar source code, also known as code clones, are possible malicious 'code
smells' that may need to be removed through refactoring to enhance maintainability. Among …

A survey on clone refactoring and tracking

M Mondal, CK Roy, KA Schneider - Journal of Systems and Software, 2020 - Elsevier
Code clones, identical or nearly similar code fragments in a software system's code-base,
have mixed impacts on software evolution and maintenance. Focusing on the issues of …

A constraint programming approach to conflict-aware optimal scheduling of prioritized code clone refactoring

MF Zibran, CK Roy - … Conference on Source Code Analysis and …, 2011 - ieeexplore.ieee.org
Duplicated code, also known as code clones, are one of the malicious ‘ code smells' that
often need to be removed through refactoring for enhancing maintainability. Among all the …

Exposing I/O concurrency with informed prefetching

RH Patterson, GA Gibson - Proceedings of 3rd International …, 1994 - ieeexplore.ieee.org
Informed prefetching provides a simple mechanism for I/O-intensive, cache-ineffective
applications to efficiently exploit highly-parallel I/O subsystems such as disk arrays. This …

[PDF][PDF] The road to software clone management: A survey

MF Zibran, CK Roy - Dept. Comput. Sci., Univ. of Saskatchewan …, 2012 - Citeseer
1 Yearly number of distinct authors contributing to clone research... 5 2 Categories of
publications on software clone research in different years 5 3 Proportion of publications in …

[HTML][HTML] A naturally protective epitope of limited variability as an influenza vaccine target

CP Thompson, J Lourenço, AA Walters… - Nature …, 2018 - nature.com
Current antigenic targets for influenza vaccine development are either highly immunogenic
epitopes of high variability or conserved epitopes of low immunogenicity. This requires …

Prioritizing code clone detection results for clone management

RD Venkatasubramanyam, S Gupta… - 2013 7th International …, 2013 - ieeexplore.ieee.org
Clone detection through tools is a common practice in the software industry. Associated with
clone detection is code clone management, which includes taking informed decisions for …