Sciweavers

412 search results - page 14 / 83
» Incremental Clone Detection
Sort
View
JSAC
2010
188views more  JSAC 2010»
14 years 10 months ago
Random-walk based approach to detect clone attacks in wireless sensor networks
Abstract--Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, a...
Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqin...
121
Voted
IWPSE
2003
IEEE
15 years 8 months ago
Reconstruction of Successful Software Evolution Using Clone Detection
In modern software engineering, researchers regard a software system as an organic life form that must continue to evolve to remain successful. Unfortunately, little is known abou...
Filip Van Rysselberghe, Serge Demeyer
70
Voted
SCAM
2009
IEEE
15 years 10 months ago
An Assessment of Type-3 Clones as Detected by State-of-the-Art Tools
Rebecca Tiarks, Rainer Koschke, Raimar Falke
ICSM
1998
IEEE
15 years 7 months ago
Clone Detection Using Abstract Syntax Trees
Ira D. Baxter, Andrew Yahin, Leonardo Mendon&ccedi...