Computer Science ›› 2017, Vol. 44 ›› Issue (4): 165-168.doi: 10.11896/j.issn.1002-137X.2017.04.036
Previous Articles Next Articles
LIU Dong-rui, LIU Dong-sheng, ZHANG Li-ping, HOU Min and WANG Chun-hui
[1] ZHANG S K,WANG L F,YANG F Q.Architecture Based Software Developing Model[J].World Sci-Tech,1999,21(3):31-35(in Chinese) 张世琨,王立福,杨芙清.基于体系结构的软件开发模式[J].世界科技研究与发展,1999,21(3):31-35. [2] ZHANG R X,ZHANG L P,WANG H,et al.A Novel Approach for Clone Group Mapping by using Topic Modeling[J].International Journal of Software Engineering & Applications,2015,6(2). [3] ROY C K.Detection and analysis of near-miss software clones[C]∥IEEE International Conference on Software Maintenance.2009:447-450. [4] BALAZINSKA M,MERLO E,Dagenais M,et al.AdvancedClone-Analysis to Support Object-Oriented System Refactoring[C]∥Conference on Reverse Engineering.IEEE Computer Socie-ty,2000. [5] KAPSER C J,GODFREY M W.“Cloning considered harmful” considered harmful:patterns of cloning in software[J].Empirical Software Engineering,2008,13(6):645-692. [6] WEI W U,ZHANG M X.Research on the Application of Software Reuse Technology Based on Components[J].Journal of Shanxi Datong University(Natural Science Edition),2009,25(1):8-10.(in Chinese) 武伟,张明新.基于构件的软件复用技术应用研究[J].山西大同学报(自然科学版),2009,25(1):8-10. [7] ZIBRAN M F,ROY C K.The Road to Software Clone Management:A Survey:Technical Report 2012-03[R].The University of Saskatchewan,Canada,2012:1-66. [8] CHATTERJI D,CARVER J C,KRAFT N A.Cloning:Theneed to understand developer intent[C]∥2013 7th International Workshop on Software Clones (IWSC).IEEE,2013:14-15. [9] MANDAL M,ROY C K,SCHNEIDER K A.Automatic ranking of clones for refactoring through mining association rules[C]∥IEEE Conference on Software Maintenance,Reengineering and Reverse Engineering.IEEE,2014:114-123. [10] FOWLER M,BECK K,BRANT J,et al.Refactoring:Improving the Design of Existing Code[M].Addison Wesley,1999. [11] ZIBRAN M F,ROY C K.Conflict-aware optimal scheduling of prioritized code clone refactoring[J].IET Software,2013:7(7):167-186. [12] ROY K C,CORDY J.Near-miss function clones in open source software:an empirical study[J].Journal of Software Maintenance & Evolution Research & Practice,2010,22(3):165-189. [13] LEE S,BAE G,CHAE H,et al.Automated scheduling forclone-based refactoring using a competent ga[J].Softw.Pract.Exper.,2010,41(5):521-550. [14] MONDEN A,NAKAE D,KAMIYA T,et al.Software Quality Analysis by Code Clones in Industrial Legacy Software[C]∥IEEE International Symposium on Software Metrics.IEEE Computer Society,2002:1-8. [15] PLSCH R,HENTSCHEL A,SAFT M,et al.The EMISQmethod and its tool support-expert-based evaluation of internal software quality[J].Innovations in Systems and Software Engineering,2008,4(1):3-15. [16] VENKATASUBRAMANYAM R D,Gupta S,SINGH H K.Prioritizing code clone detection results for clone management[C]∥2013 7th International Workshop on Software Clones (IWSC).IEEE,2013:30-36. [17] FRANK E,HALL M,HOLMES G,et al.Weka-A MachineLearning Workbench for Data Mining[M]∥Data Mining and Knowledge Discovery Handbook.Springer US,2009:1269-1277. [18] KIM M,SAZAWAL V,NOTKIN D,et al.An empirical study of code clone genealogies[J].ACM Sigsoft Software Engineering Notes,2005,30(5):187-196. [19] TU Y,ZHANG L P,WANG C H,et al.Clone genealogies extraction based on software evolution over multiple versions[J].Journal of Computer Applications,2015,35(4):1169-1173.(in Chinese) 涂颖,张丽萍,王春晖,等.基于软件多版本演化提取克隆谱系[J].计算机应用,2015,3(4):1169-1173. [20] YUN L L,ZHANG L P,YU C H,et al.Predicting inconsistent change probability of code clone based on latent Dirichlet allocation model[J].Journal of Computer Applications,2014,4(6):1788-1791.(in Chinese) 尹丽丽,张丽萍,王春晖,等.基于潜在狄利克雷分配模型预测克隆代码不一致变化的可能性[J].计算机应用,2014,4(6):1788-1791. [21] FlawFinder.http://www.dwheeler.com/flawfinder/. [22] DALE M.Static analysis of the VoteHere VHTi reference implementation source code using Flawfinder and RATS.http://cisa.umbc.edu/courses/cmsc/444/fall05/studentprojects/dale.pdf. [23] WEI Z Q,et al.Improved Bayesian Network Structure Learning with Node Ordering via K2 Algorithm[M]∥Intelligent Computing Methodologies.Springer International Publishing,2014:44-55. [24] COOPER G F,HERSKOVITS E.A Bayesian method for the in-duction of probabilistic networks from data[J].Machine Lear-ning,1992,9(4):309-347. |
No related articles found! |
|