Sciweavers

412 search results - page 10 / 83
» Incremental Clone Detection
Sort
View
ICSE
2009
IEEE-ACM
14 years 8 months ago
Do code clones matter?
Code cloning is not only assumed to inflate maintenance costs but also considered defect-prone as inconsistent changes to code duplicates can lead to unexpected behavior. Conseque...
Benjamin Hummel, Elmar Jürgens, Florian Deiss...
PERVASIVE
2009
Springer
14 years 2 months ago
Securing RFID Systems by Detecting Tag Cloning
Cloning of RFID tags can lead to financial losses in many commercial RFID applications. There are two general strategies to provide security: prevention and detection. The securit...
Mikko Lehtonen, Daniel Ostojic, Alexander Ilic, Fl...
WETICE
2002
IEEE
14 years 22 days ago
A Mobile Agent Clone Detection System with Itinerary Privacy
We propose a system for the detection of unauthorized cloning of mobile agents by malicious hosts. The system can detect clones after the fact, identify the culprit, and then seek...
T. C. Lam, Victor K. Wei
TOG
2008
111views more  TOG 2008»
13 years 7 months ago
Clone attack! Perception of crowd variety
When simulating large crowds, it is inevitable that the models and motions of many virtual characters will be cloned. However, the perceptual impact of this trade-off has never be...
Rachel McDonnell, Michéal Larkin, Simon Dob...
ISESE
2005
IEEE
14 years 1 months ago
Cloning by accident: an empirical study of source code cloning across software systems
One of the key goals of open source development is the sharing of knowledge, experience, and solutions that pertain to a software system and its problem domain. Source code clonin...
Raihan Al-Ekram, Cory Kapser, Richard C. Holt, Mic...