Author of the publication

Toward identifying inter-project clone sets for building useful libraries.

, , and . IWSC, page 87-88. ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Empirical Study on the Impact of Duplicate Code., , , , and . Adv. Softw. Eng., (2012)MPAnalyzer: a tool for finding unintended inconsistencies in program source code., and . ASE, page 843-846. ACM, (2014)On Software Maintenance Process Improvement Based on Code Clone Analysis., , , , and . PROFES, volume 2559 of Lecture Notes in Computer Science, page 185-197. Springer, (2002)Revealing Purity and Side Effects on Functions for Reusing Java Libraries., , , and . ICSR, volume 8919 of Lecture Notes in Computer Science, page 314-329. Springer, (2015)Simultaneous Modification Support based on Code Clone Analysis., , , and . APSEC, page 262-269. IEEE Computer Society, (2007)How Compact Will My System Be? A Fully-Automated Way to Calculate LoC Reduced by Clone Refactoring., , , and . APSEC, page 284-291. IEEE, (2019)ARIES: Refactoring Support Environment Based on Code Clone Analysis, , , and . Proc. IASTED Intl'l Conf. Software Engineering and Applications, page 222--229. (2002)ARIES: Refactoring support environment based on code clone analysis., , , and . IASTED Conf. on Software Engineering and Applications, page 222-229. IASTED/ACTA Press, (2004)On tracking Java methods with Git mechanisms., , and . J. Syst. Softw., (2020)An empirical study of security warnings from static application security testing tools., , , , and . J. Syst. Softw., (2019)