Sciweavers

1629 search results - page 51 / 326
» Infeasible Code Detection
Sort
View
ISSRE
2003
IEEE
14 years 3 months ago
A Framework for Tamper Detection Marking of Mobile Applications
Today’s applications are highly mobile; we download software from the Internet, machine executable code arrives attached to electronic mail, and Java applets increase the functi...
Mike Jochen, Lisa M. Marvel, Lori L. Pollock
SIGSOFT
2007
ACM
14 years 11 months ago
Efficient token based clone detection with flexible tokenization
Code clones are similar code fragments that occur at multiple locations in a software system. Detection of code clones provides useful information for maintenance, reengineering, ...
Hamid Abdul Basit, Stan Jarzabek
ICSE
2009
IEEE-ACM
14 years 11 months ago
CloneDetective - A workbench for clone detection research
The area of clone detection has considerably evolved over the last decade, leading to approaches with better results, but at the same time using more elaborate algorithms and tool...
Benjamin Hummel, Elmar Jürgens, Florian Deiss...
ACMSE
2006
ACM
14 years 4 days ago
Phoenix-based clone detection using suffix trees
A code clone represents a sequence of statements that are duplicated in multiple locations of a program. Clones often arise in source code as a result of multiple cut/paste operat...
Robert Tairas, Jeff Gray
ICSE
2008
IEEE-ACM
14 years 11 months ago
Scalable detection of semantic clones
Several techniques have been developed for identifying similar code fragments in programs. These similar fragments, referred to as code clones, can be used to identify redundant c...
Mark Gabel, Lingxiao Jiang, Zhendong Su