Sciweavers

799 search results - page 5 / 160
» Visualization of clone detection results
Sort
View
DAGSTUHL
2006
13 years 10 months ago
Managing Known Clones: Issues and Open Questions
Many software systems contained cloned code, i.e., segments of code that are highly similar to each other, typically because one has been copied from the other, and then possibly m...
Kostas Kontogiannis
C3S2E
2008
ACM
13 years 10 months ago
Towards a mutation-based automatic framework for evaluating code clone detection tools
In the last decade, a great many code clone detection tools have been proposed. Such a large number of tools calls for a quantitative comparison, and there have been several attem...
Chanchal Kumar Roy, James R. Cordy
ADHOCNETS
2009
Springer
14 years 3 months ago
DHT-Based Detection of Node Clone in Wireless Sensor Networks
Abstract. Wireless sensor networks are vulnerable to the node clone attack because of low-cost, resource-constrained sensor nodes, and uncontrolled environments where they are left...
Zhijun Li, Guang Gong
APSEC
2007
IEEE
14 years 24 days ago
Simultaneous Modification Support based on Code Clone Analysis
Maintaining software systems becomes more difficult as their size and complexity increase. One factor that makes software maintenance more difficult is the presence of code clones...
Yoshiki Higo, Yasushi Ueda, Shinji Kusumoto, Katsu...
BMCBI
2005
302views more  BMCBI 2005»
13 years 8 months ago
CGHPRO - A comprehensive data analysis tool for array CGH
Background: Array CGH (Comparative Genomic Hybridisation) is a molecular cytogenetic technique for the genome wide detection of chromosomal imbalances. It is based on the cohybrid...
Wei Chen, Fikret Erdogan, H.-Hilger Ropers, Steffe...