共 50 条
- [21] VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery 2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 595 - 614
- [22] To Enhance the Code Clone Detection Algorithm by using Hybrid Approach for detection of code clones 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2017, : 192 - 198
- [23] Semantic Code Clone Detection Method for Distributed Enterprise Systems PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE (CLOSER), 2022, : 27 - 37
- [24] On the Comprehension of Code Clone Visualizations: A Controlled Study using Eye Tracking 2015 IEEE 15TH INTERNATIONAL WORKING CONFERENCE ON SOURCE CODE ANALYSIS AND MANIPULATION (SCAM), 2015, : 161 - 170
- [25] Comparison and Evaluation of Clone Detection Techniques with Different Code Representations 2023 IEEE/ACM 45TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ICSE, 2023, : 332 - 344
- [27] Gapped Code Clone Detection with Lightweight Source Code Analysis 2013 IEEE 21ST INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION (ICPC), 2013, : 93 - 102
- [28] A Survey on Code Clone, Its Behavior and Applications NETWORKING COMMUNICATION AND DATA KNOWLEDGE ENGINEERING, VOL 2, 2018, 4 : 27 - 39
- [29] CloneTracker: Tool Support for Code Clone Management ICSE'08 PROCEEDINGS OF THE THIRTIETH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, 2008, : 843 - 846
- [30] Comparison and Visualization of Code Clone Detection Results PROCEEDINGS OF THE 2020 IEEE 14TH INTERNATIONAL WORKSHOP ON SOFTWARE CLONES (IWSC '20), 2020, : 45 - 51