Sciweavers

412 search results - page 14 / 83
» Incremental Clone Detection
Sort
View
JSAC
2010
188views more  JSAC 2010»
13 years 2 months ago
Random-walk based approach to detect clone attacks in wireless sensor networks
Abstract--Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, a...
Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqin...
IWPSE
2003
IEEE
14 years 1 months ago
Reconstruction of Successful Software Evolution Using Clone Detection
In modern software engineering, researchers regard a software system as an organic life form that must continue to evolve to remain successful. Unfortunately, little is known abou...
Filip Van Rysselberghe, Serge Demeyer
SCAM
2009
IEEE
14 years 2 months ago
An Assessment of Type-3 Clones as Detected by State-of-the-Art Tools
Rebecca Tiarks, Rainer Koschke, Raimar Falke
ICSM
1998
IEEE
14 years 3 days ago
Clone Detection Using Abstract Syntax Trees
Ira D. Baxter, Andrew Yahin, Leonardo Mendon&ccedi...