Computer Science ›› 2019, Vol. 46 ›› Issue (8): 224-232.doi: 10.11896/j.issn.1002-137X.2019.08.037
• Software & Database Technology • Previous Articles Next Articles
SHE Rong-rong, ZHANG Li-ping
CLC Number:
[1]BALAZINSKA M,MERLO E,DAGENAIS M,et al.Advanced Clone-analysis to Support Object-oriented System Refactoring[C]∥Proceedings of the Seventh Working Conference on Reverse Engineering.IEEE press,2000:98-107. [2]KIM M,SAZAWAL V,NOTKIN D,et al.An empirical study of code clone genealogies [J].AcmSigsoft Software Engineering Notes,2005,30(5):187-196. [3]ROY C K,CORDY J R,KOSCHKE R.Comparison and evaluation of code clone detection techniques and tools:A qualitative approach[J].Science of Computer Programming,2009,74(7):470-495. [4]ROY C K,CORDY J R.Near-miss function clones in open source software:an empirical study[J].Journal of Software Maintenance & Evolution Research & Practice,2010,22(3):165-189. [5]BASIT H A,PUGLISII S J,SMYTH W F,et al.Efficient token based clone detection with flexible tokenization[C]∥TheJoint Meeting on European Software Engineering Conference and the ACM Sigsoft Symposium on the Foundations of Software Engineering:Companion Papers.ACM,2007:513-516. [6]DUALA-EKOKO E,ROBILLARD M P.Clonetracker:tool support for code clone management[C]∥Proceedings of the 2008 International Conference on Software Engineering.New York:ACM,2008:843-846. [7]APDAN M,AKTAS M,YIGITI M.On the Structural Code Clone Detection Problem:A Survey and Software Metric Based Approach[C]∥Computational Science and Its Applications(ICCSA 2014).Springer International Publishing,2014:492-507. [8]CUOMO A,SANTONE A,VILLANO U.A novel approach based on formal methods for clone detection[C]∥Proceedings of the 2012 International Workshop on Software Clones.Pisca-taway,NJ:IEEE,2012:8-14. [9]CALEFATO F,LANUBILE F,MALLARDO T.Function clone detection in web applications:a semiautomatedapproach[J].Journal of Web Engineering,2004,3(1):3-21. [10]ZHANG J J,WANG C H,ZHANG L P,et al.Clone code detection based on Token edit distance [J].Journal of Computer Applications,2015(12):3536-3543.(in Chinese) 张久杰,王春晖,张丽萍,等.基于Token编辑距离检测克隆代码[J].计算机应用,2015(12):3536-3543. [11]BARBOUR L,KHOMH F,ZOU Y.Late propagation in software clones[C]∥Proceedings of the 27th IEEE International Conference on Software Maintenance.Washington DC:IEEE Computer Society,2011:273-282. [12]SAHA R K,ROY C K,SCHNEIDER K A.An automatic framework for extracting and classifying near-miss clone genealogies[C]∥IEEE International Conference on Software Maintenance.IEEE,2011:293-302. [13]HOTTA K,HIGO Y,KUSUMOTO S.Clone Tracking based on Similarity of CRD[J].Technical Report of IeiceSs,2013:113-117. [14]ZHANG R X,ZHANG L P,WANG CH,et al.Clonal group mapping method based on topic modeling technology[J].Computer Engineering and Design,2015(6):1524-1529.(in Chinese) 张瑞霞,张丽萍,王春晖,等.基于主题建模技术的克隆群映射方法[J].计算机工程与设计,2015(6):1524-1529. [15]GÖDE N,KOSCHKE R.Incremental Clone Detection[C]∥European Conference on Software Maintenance & Reengineering.2009:219-228. [16]GE G S,LIU D S,HOU M.Software multi-version clonal group mapping method based on LDA and DBSCAN[J].Journal of Computer Applications,2017,34(2):481-486.(in Chinese) 葛广帅,刘东升,侯敏.基于LDA和DBSCAN的软件多版本克隆群映射方法[J].计算机应用研究,2017,34(2):481-486. [17]BARBOUR L,KHOMH F,ZOU Y.An empirical study of faults in late propagation clone genealogies[J].Journal of Software:Evolution and Process,2013,25(11):1139-1165. [18]KIM M,SAZAWAL V,NOTKKIN D,et al.An Empirical Study of Code Clone Genealogies[C]∥Proceedings of the 2005 10th European Software Engineering Conference Held Jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering.New York:ACM,2005:187-196. [19]SAHA R K,ROY C K,SCHNEIDER K A.An automatic framework for extracting and classifying near-miss clone genealogies[C]∥Proceedings of the 2011 IEEE International Conference on Software Maintenance.Piscataway,NJ:IEEE,2011:293-302. [20]MENG C,SU X H,WANG T T,et al.A New Clone Group Mapping Algorithm for Extracting Clone Genealogy on Multi-version Software[C]∥International Conference on Instrumentation.2013:848-853. [21]GE G S,LIU D S,ZHANG L P,et al.Evolutionary Trace Construction and Pattern Recognition of Clone Code Based on Graph Model[J].Computer Engineering,2017,43(5):47-54.(in Chinese) 葛广帅,刘东升,张丽萍,等.基于图模型的克隆代码演化痕迹构建及模式识别[J].计算机工程,2017,43(5):47-54. [22]OPDYKE W F.Refactoring Object Frame Works [M].Illinois:University of Illinois at Urban-Champaign,1992:18-35. [23]BIAN Y X.Research on Process Extraction Method of Reconfigurable Clone Code [D].Harbin:Harbin Institute of Techno-logy,2014.(in Chinese) 边奕心.可重构克隆代码的过程提取方法研究[D].哈尔滨:哈尔滨工业大学,2014. [24]BAKOTA T.Tracking the Evolution of Code Clones[C]∥The 37th International Conference on Current Trends in Theory and Practice of Computer Science.Novy′Smokovec,Slovakia:Sprin-ger,2011:86-98. [25]MONDAL M,ROY C K,SCHNEIDER K A.SPCP-Miner:A tool for mining code clones that are important for refactoring or tracking[C]∥IEEE,International Conference on Software Analysis,Evolution and Reengineering.IEEE,2015:484-488. [26]HIGO Y,KUSUMOTO S,INOUE K.A metric-based approach to identifying refactoring opportunities for merging code clones in a Java software system[J].Journal of Software Maintenance and Evolution:Research and Practice,2008,20(6):435-461. [27]LIU D R,LIU D S,ZHANG L P,et al.Prediction of cloned code quality based on Bayesian network[J].Computer Science,2017,44(4):165-168.(in Chinese) 刘冬瑞,刘东升,张丽萍,等.基于贝叶斯网络预测克隆代码质量[J].计算机科学,2017,44(4):165-168. [28]SHE R R,ZHANG L P,HOU M,et al.Method for recommending clone reconstruction based on decision tree[J].Journal of Computer Applications,2018,38(7):213-219,245.(in Chinese) 折蓉蓉,张丽萍,侯敏,等.基于决策树推荐克隆重构的方法[J].计算机应用,2018,38(7):213-219,245. [29]STEIDL D.Feature-based detection of bugs in clones[C]∥International Workshop on Software Clones.IEEE,2013:76-82. [30]WANG H,ZHANG L P,YAN S,et al.Feature selection model in cloned code harmful prediction[J].Journal of Computer Applications,2017,37(4):1135-1142.(in Chinese) 王欢,张丽萍,闫盛,等.克隆代码有害性预测中的特征选择模型[J].计算机应用,2017,37(4):1135-1142. [31]WANG W,GODFREY M W.Recommending Clones for Refactoring Using Design,Context,and History[C]∥IEEE International Conference on Software Maintenance and Evolution.IEEE Computer Society,2014:331-340. |
[1] | ZHANG Yuan, KANG Le, GONG Zhao-hui, ZHANG Zhi-hong. Related Transaction Behavior Detection in Futures Market Based on Bi-LSTM [J]. Computer Science, 2022, 49(7): 31-39. |
[2] | ZENG Zhi-xian, CAO Jian-jun, WENG Nian-feng, JIANG Guo-quan, XU Bin. Fine-grained Semantic Association Video-Text Cross-modal Entity Resolution Based on Attention Mechanism [J]. Computer Science, 2022, 49(7): 106-112. |
[3] | CHENG Cheng, JIANG Ai-lian. Real-time Semantic Segmentation Method Based on Multi-path Feature Extraction [J]. Computer Science, 2022, 49(7): 120-126. |
[4] | LIU Wei-ye, LU Hui-min, LI Yu-peng, MA Ning. Survey on Finger Vein Recognition Research [J]. Computer Science, 2022, 49(6A): 1-11. |
[5] | GAO Yuan-hao, LUO Xiao-qing, ZHANG Zhan-cheng. Infrared and Visible Image Fusion Based on Feature Separation [J]. Computer Science, 2022, 49(5): 58-63. |
[6] | ZUO Jie-ge, LIU Xiao-ming, CAI Bing. Outdoor Image Weather Recognition Based on Image Blocks and Feature Fusion [J]. Computer Science, 2022, 49(3): 197-203. |
[7] | REN Shou-peng, LI Jin, WANG Jing-ru, YUE Kun. Ensemble Regression Decision Trees-based lncRNA-disease Association Prediction [J]. Computer Science, 2022, 49(2): 265-271. |
[8] | ZHANG Shi-peng, LI Yong-zhong. Intrusion Detection Method Based on Denoising Autoencoder and Three-way Decisions [J]. Computer Science, 2021, 48(9): 345-351. |
[9] | FENG Xia, HU Zhi-yi, LIU Cai-hua. Survey of Research Progress on Cross-modal Retrieval [J]. Computer Science, 2021, 48(8): 13-23. |
[10] | ZHANG Li-qian, LI Meng-hang, GAO Shan-shan, ZHANG Cai-ming. Summary of Computer-assisted Tongue Diagnosis Solutions for Key Problems [J]. Computer Science, 2021, 48(7): 256-269. |
[11] | BAO Yu-xuan, LU Tian-liang, DU Yan-hui, SHI Da. Deepfake Videos Detection Method Based on i_ResNet34 Model and Data Augmentation [J]. Computer Science, 2021, 48(7): 77-85. |
[12] | CHEN Yang, WANG Jin-liang, XIA Wei, YANG Hao, ZHU Run, XI Xue-feng. Footprint Image Clustering Method Based on Automatic Feature Extraction [J]. Computer Science, 2021, 48(6A): 255-259. |
[13] | LI Na-na, WANG Yong, ZHOU Lin, ZOU Chun-ming, TIAN Ying-jie, GUO Nai-wang. DDoS Attack Random Forest Detection Method Based on Secondary Screening of Feature Importance [J]. Computer Science, 2021, 48(6A): 464-467. |
[14] | LEI Jian-mei, ZENG Ling-qiu, MU Jie, CHEN Li-dong, WANG Cong, CHAI Yong. Reverse Diagnostic Method Based on Vehicle EMC Standard Test and Machine Learning [J]. Computer Science, 2021, 48(6): 190-195. |
[15] | LI Meng-he, XU Hong-ji, SHI Lei-xin, ZHAO Wen-jie, LI Juan. Multi-person Activity Recognition Based on Bone Keypoints Detection [J]. Computer Science, 2021, 48(4): 138-143. |
|