Abstract is missing.
- ForewordJames R. Cordy, Katsuro Inoue, Rainer Koschke. [doi]
- An accurate estimation of the Levenshtein distance using metric trees and Manhattan distanceThierry Lavoie, Ettore Merlo. 1-7 [doi]
- A novel approach based on formal methods for clone detectionAntonio Cuomo, Antonella Santone, Umberto Villano. 8-14 [doi]
- Claims and beliefs about code clones: Do we agree as a community? A surveyDebarshi Chatterji, Jeffrey C. Carver, Nicholas A. Kraft. 15-21 [doi]
- Clone detection using rolling hashing, suffix trees and dagification: A case studyMikkel Jonsson Thomsen, Fritz Henglein. 22-28 [doi]
- Dispersion of changes in cloned and non-cloned codeManishankar Mondal, Chanchal K. Roy, Kevin A. Schneider. 29-35 [doi]
- Java bytecode clone detection via relaxation on code fingerprint and Semantic Web reasoningIman Keivanloo, Chanchal K. Roy, Juergen Rilling. 36-42 [doi]
- Mining object-oriented design models for detecting identical design structuresUmut Tekin, Ural Erdemir, Feza Buzluca. 43-49 [doi]
- Safe clone-based refactoring through stereotype identification and iso-generationNic Volanschi. 50-56 [doi]
- A case study on applying clone technology to an industrial application frameworkEray Tüzün, Emre Er. 57-61 [doi]
- A method for proactive moderation of code clones in IDEsRadhika D. Venkatasubramanyam, Himanshu K. Singh, K. Ravikanth. 62-66 [doi]
- Industrial application of clone change management systemYuki Yamanaka, Eunjong Choi, Norihiro Yoshida, Katsuro Inoue, Tateki Sano. 67-71 [doi]
- A common conceptual model for clone detection resultsCory Kapser, Jan Harder, Ira D. Baxter. 72-73 [doi]
- Conte∗t clones or re-thinking clone on a call graphToshihiro Kamiya. 74-75 [doi]
- Filtering clones for individual user based on machine learning analysisJiachen Yang, Keisuke Hotta, Yoshiki Higo, Hiroshi Igaki, Shinji Kusumoto. 76-77 [doi]
- Near-miss model clone detection for Simulink modelsManar H. Alalfi, James R. Cordy, Thomas R. Dean, Matthew Stephan, Andrew Stevenson. 78-79 [doi]
- Semantic clone detection using method IOE-behaviorRochelle Elva, Gary T. Leavens. 80-81 [doi]
- Shuffling and randomization for scalable source code clone detectionIman Keivanloo, Chanchal K. Roy, Juergen Rilling, Philippe Charland. 82-83 [doi]
- Towards qualitative comparison of Simulink model clone detection approachesMatthew Stephan, Manar H. Alalfi, Andrew Stevenson, James R. Cordy. 84-85 [doi]
- Using edge bundle views for clone visualizationBenedikt Hauptmann, Veronika Bauer, Maximilian Junker. 86-87 [doi]
- We have all of the clones, now what? Toward integrating clone analysis into software quality assessmentWei Wang, Michael W. Godfrey. 88-89 [doi]
- What clone coverage can tellNils Göde, Benjamin Hummel, Elmar Jürgens. 90-91 [doi]
- Ctcompare: Code clone detection using hashed token sequencesWarren Toomey. 92-93 [doi]
- Experience of finding inconsistently-changed bugs in code clones of mobile softwareKatsuro Inoue, Yoshiki Higo, Norihiro Yoshida, Eunjong Choi, Shinji Kusumoto, Kyonghwan Kim, Wonjin Park, Eunha Lee. 94-95 [doi]
- Visualizing code clone outbreak: An industrial case studyKentaro Yoshimura, Ryota Mibe. 96-97 [doi]