


default search action
4th IWSC 2010: Cape Town, South Africa
- Katsuro Inoue, Stanislaw Jarzabek, Rainer Koschke, James R. Cordy:

Proceeding of the 4th ICSE International Workshop on Software Clones, IWSC 2010, Cape Town, South Africa, May 2010. ACM 2010, ISBN 978-1-60558-980-0 - Elmar Jürgens, Nils Göde:

Achieving accurate clone detection results. 1-8 - Ferosh Jacob, Daqing Hou, Patricia Jablonski:

Actively comparing clones inside the code editor. 9-16 - Chanchal K. Roy, James R. Cordy:

Are scripting languages really different? 17-24 - Thierry Lavoie, Michael Eilers-Smith, Ettore Merlo:

Challenging cloning related problems with GPU-based algorithms. 25-32 - Nils Göde:

Clone removal: fact or fiction? 33-40 - Jens Krinke

, Nicolas Gold, Yue Jia, David W. Binkley:
Distinguishing copies from originals in software clones. 41-48 - Norihiro Yoshida, Takeshi Hattori, Katsuro Inoue:

Finding similar defects using synonymous identifier retrieval. 49-56 - Florian Deissenboeck, Benjamin Hummel, Elmar Jürgens, Michael Pfaehler, Bernhard Schätz:

Model clone detection in practice. 57-64 - Angela Lozano, Michel Wermelinger:

Tracking clones' imprint. 65-72 - Stan Jarzabek, Yinxing Xue:

Are clones harmful for maintenance? 73-74 - Toshihiro Kamiya:

Classifying code clones with configuration. 75-76 - Ian J. Davis, Michael W. Godfrey:

Clone detection by exploiting assembler. 77-78 - Marco Funaro, Daniele Braga, Alessandro Campi

, Carlo Ghezzi:
A hybrid approach (syntactic and textual) to clone detection. 79-80 - Nikolaus E. Schwarz, Erwann Wernli, Adrian Kuhn:

Hot clones, maintaining a link between software clones across repositories. 81-82 - Nicolas Gold, Jens Krinke

, Mark Harman
, David W. Binkley:
Issues in clone classification for dataflow languages. 83-84 - Jan Harder, Nils Göde:

Quo vadis, clone management? 85-86 - Yoshiki Higo, Kensuke Tanaka, Shinji Kusumoto:

Toward identifying inter-project clone sets for building useful libraries. 87-88 - Michel Chilowicz, Étienne Duris, Gilles Roussel:

Towards a multi-scale approach for source code approximate match report. 89-90

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














