Sciweavers

134 search results - page 3 / 27
» Detecting Clones in Business Applications
Sort
View
WCRE
1999
IEEE
13 years 11 months ago
Partial Redesign of Java Software Systems Based on Clone Analysis
Code duplication, plausibly caused by copying source code and slightly modifying it, is often observed in large systems. Clone detection and documentation have been investigated b...
Magdalena Balazinska, Ettore Merlo, Michel Dagenai...
BMCBI
2010
161views more  BMCBI 2010»
13 years 4 months ago
LTC: a novel algorithm to improve the efficiency of contig assembly for physical mapping in complex genomes
Background: Physical maps are the substrate of genome sequencing and map-based cloning and their construction relies on the accurate assembly of BAC clones into large contigs that...
Zeev Frenkel, Etienne Paux, David I. Mester, Cathe...
WSE
2003
IEEE
14 years 21 days ago
Evaluation Methods for Web Application Clustering
ing Business UML Diagrams from Web Applications G. Di Lucca, University of Sannio, Italy; A. Fasolino, P. Tramontana, U. De Carlini, University of Naples, Italy (25 min) Developmen...
Paolo Tonella, Filippo Ricca, Emanuele Pianta, Chr...
ICSE
2010
IEEE-ACM
13 years 6 months ago
Code clone detection in practice
Due to the negative impact of code cloning on software maintenance efforts as well as on program correctness [4–6], the duplication of code is generally viewed as problematic. ...
Florian Deissenboeck, Benjamin Hummel, Elmar J&uum...
ICSE
2007
IEEE-ACM
14 years 7 months ago
DECKARD: Scalable and Accurate Tree-Based Detection of Code Clones
Detecting code clones has many software engineering applications. Existing approaches either do not scale to large code bases or are not robust against minor code modifications. I...
Ghassan Misherghi, Lingxiao Jiang, Stéphane...