Information Technology Reference
In-Depth Information
17. Gabel, M., Jiang, L., Su, Z.: Scalable detection of semantic clones. In: Proceedings
of the 30th International Conference on Software Engineering, ICSE 2008, pp. 321-
330. ACM, New York (2008),
http://doi.acm.org/10.1145/1368088.1368132
18. Garlan, D.: Software architecture: a roadmap. In: Proceedings of the Conference
on the Future of Software Engineering, ICSE 2000, pp. 91-101. ACM, New York
(2000), http://doi.acm.org/10.1145/336512.336537
19. Gonen, M., Alpaydin, E.: Multiple kernel learning algorithms. J. Mach. Learn.
Res., 2211-2268 (July 2011)
20. Hofmann, T., Scholkopf, B., Smola, A.J.: Kernel methods in machine learning.
Annals of Statistics 36(3), 1171-1220 (2008),
http://www.projecteuclid.org/DPubS?verb=Displayversion=
1.0service=UIhandle=euclid.aos/1211819561page=record
21. Jiang, L., Misherghi, G., Su, Z., Glondu, S.: Deckard: Scalable and accurate tree-
based detection of code clones. In: Proceedings of the 29th International Confer-
ence on Software Engineering, ICSE 2007, pp. 96-105. IEEE Computer Society,
Washington, DC (2007), http://dx.doi.org/10.1109/ICSE.2007.30
22. Johnson, J.H.: Identifying redundancy in source code using fingerprints. In: Proc.
Conf. Centre for Advanced Studies on Collaborative Research (CASCON), pp.
171-183. IBM Press (1993)
23. Kamiya, T., Kusumoto, S., Inoue, K.: Ccfinder: A multilinguistic token-based code
clone detection system for large scale source code. IEEE Trans. Software Eng. 28(7),
654-670 (2002)
24. Kleinberg, J.M.: Authoritative sources in a hyperlinked environment. Journal of
the ACM 46, 604-632 (1999), http://doi.acm.org/10.1145/324133.324140
25. Komondoor, R., Horwitz, S.: Using slicing to identify duplication in source code.
In: Cousot, P. (ed.) SAS 2001. LNCS, vol. 2126, pp. 40-56. Springer, Heidelberg
(2001)
26. Koschke, R.: Atomic architectural component recovery for program understanding
and evolution. Softwaretechnik-Trends (2000),
http://www.iste.uni-stuttgart.de/ps/rainer/thesis
27. Koschke, R., Falke, R., Frenzel, P.: Clone detection using abstract syntax sux
trees. In: WCRE 2006: Proceedings of the 13th Working Conference on Reverse
Engineering, pp. 253-262. IEEE Computer Society, Washington, DC (2006)
28. Krinke, J.: Identifying Similar Code with Program Dependence Graphs. In: Proc.
Working Conf. Reverse Engineering (WCRE), pp. 301-309. IEEE Computer Soci-
ety Press (2001)
29. Kuhn, A., Ducasse, S., Gırba, T.: Semantic clustering: Identifying topics in source
code. Information and Software Technology 49, 230-243 (2007),
http://portal.acm.org/citation.cfm?id=1224560.1224698
30. Landwehr, N., Passerini, A., Raedt, L., Frasconi, P.: Fast learning of relational
kernels. Mach. Learn. 78(3), 305-342 (2010),
http://dx.doi.org/10.1007/s10994-009-5163-1
31. Lehman, M.M.: Programs, life cycles, and laws of software evolution. Proc.
IEEE 68(9), 1060-1076 (1980)
32. Leitao, A.M.: Detection of redundant code using r 2 d 2 . Software Quality Jour-
nal 12(4), 361-382 (2004)
33. Maletic, J.I., Marcus, A.: Supporting program comprehension using semantic and
structural information. In: Proceedings of the 23rd International Conference on
Software Engineering, ICSE 2001, pp. 103-112. IEEE Computer Society, Washing-
ton, DC (2001), http://portal.acm.org/citation.cfm?id=381473.381484
 
Search WWH ::




Custom Search