Sciweavers

206 search results - page 9 / 42
» Code clone detection in practice
Sort
View
ISESE
2005
IEEE
15 years 5 months ago
Cloning by accident: an empirical study of source code cloning across software systems
One of the key goals of open source development is the sharing of knowledge, experience, and solutions that pertain to a software system and its problem domain. Source code clonin...
Raihan Al-Ekram, Cory Kapser, Richard C. Holt, Mic...
FASE
2009
Springer
15 years 3 months ago
Accurate and Efficient Structural Characteristic Feature Extraction for Clone Detection
Abstract. Structure-oriented approaches in clone detection have become popular in both code-based and model-based clone detection. However, existing methods for capturing structura...
Hoan Anh Nguyen, Tung Thanh Nguyen, Nam H. Pham, J...
ICDCS
2008
IEEE
15 years 6 months ago
Real-Time Detection of Clone Attacks in Wireless Sensor Networks
A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attac...
Kai Xing, Fang Liu, Xiuzhen Cheng, David Hung-Chan...
ADHOCNETS
2009
Springer
15 years 6 months ago
DHT-Based Detection of Node Clone in Wireless Sensor Networks
Abstract. Wireless sensor networks are vulnerable to the node clone attack because of low-cost, resource-constrained sensor nodes, and uncontrolled environments where they are left...
Zhijun Li, Guang Gong
SE
2008
15 years 1 months ago
Static Bug Detection Through Analysis of Inconsistent Clones
Existing software systems contain a significant amount of duplicated code. Such redundancy can negatively impact program correctness, since inconsistent updates to duplicated code ...
Elmar Jürgens, Benjamin Hummel, Florian Deiss...