Sciweavers

4 search results - page 1 / 1
» An Assessment of Type-3 Clones as Detected by State-of-the-A...
Sort
View
SCAM
2009
IEEE
14 years 15 days ago
An Assessment of Type-3 Clones as Detected by State-of-the-Art Tools
Rebecca Tiarks, Rainer Koschke, Raimar Falke
ICSE
2007
IEEE-ACM
14 years 5 months ago
Tracking Code Clones in Evolving Software
Code clones are generally considered harmful in software development, and the predominant approach is to try to eliminate them through refactoring. However, recent research has pr...
Ekwa Duala-Ekoko, Martin P. Robillard
ICSM
2009
IEEE
14 years 12 days ago
Managing code clones using dynamic change tracking and resolution
Code cloning is widely recognized as a threat to the maintainability of source code. As such, many clone detection and removal strategies have been proposed. However, some clones ...
Michiel de Wit, Andy Zaidman, Arie van Deursen
ICASSP
2010
IEEE
13 years 6 months ago
Geometric tampering estimation by means of a SIFT-based forensic analysis
In many application scenarios digital images play a basic role and often it is important to assess if their content is realistic or has been manipulated to mislead watcher’s opi...
Irene Amerini, Lamberto Ballan, Roberto Caldelli, ...