The Community for Technology Leaders
2012 6th International Workshop on Software Clones (IWSC 2012) (2012)
Zurich
June 4, 2012 to June 4, 2012
ISBN: 978-1-4673-1794-8
TABLE OF CONTENTS

An accurate estimation of the Levenshtein distance using metric trees and Manhattan distance (PDF)

Thierry Lavoie , Departement de genie informatique et logiciel, Ecole Polytechnique de Montreal, Montreal, Canada
Ettore Merlo , Departement de genie informatique et logiciel, Ecole Polytechnique de Montreal, Montreal, Canada
pp. 1-7

A novel approach based on formal methods for clone detection (PDF)

Antonio Cuomo , Dept. of Engineering, University of Sannio, Benevento, Italy
Antonella Santone , Dept. of Engineering, University of Sannio, Benevento, Italy
Umberto Villano , Dept. of Engineering, University of Sannio, Benevento, Italy
pp. 8-14

Claims and beliefs about code clones: Do we agree as a community? A survey (PDF)

Debarshi Chatterji , Department of Computer Science, University of Alabama, Tuscaloosa, AL, USA
Jeffrey C. Carver , Department of Computer Science, University of Alabama, Tuscaloosa, AL, USA
Nicholas A. Kraft , Department of Computer Science, University of Alabama, Tuscaloosa, AL, USA
pp. 15-21

Clone detection using rolling hashing, suffix trees and dagification: A case study (Abstract)

Mikkel Jonsson Thomsen , Dept. of Computer Science (DIKU) University of Copenhagen, Denmark
Fritz Henglein , Dept. of Computer Science (DIKU) University of Copenhagen, Denmark
pp. 22-28

Dispersion of changes in cloned and non-cloned code (PDF)

Manishankar Mondal , University of Saskatchewan, Canada
Chanchal K. Roy , University of Saskatchewan, Canada
Kevin A. Schneider , University of Saskatchewan, Canada
pp. 29-35

Java bytecode clone detection via relaxation on code fingerprint and Semantic Web reasoning (PDF)

Iman Keivanloo , Department of Computer Science, Concordia University, Canada
Chanchai K. Roy , Department of Computer Science, University of Saskatchewan, Canada
Juergen Rilling , Department of Computer Science, Concordia University, Canada
pp. 36-42

Mining object-oriented design models for detecting identical design structures (PDF)

Umut Tekin , Center of Research for Advanced Technologies of Informatics & Information Security, Kocaeli, Turkey
Ural Erdemir , Center of Research for Advanced Technologies of Informatics & Information Security, Kocaeli, Turkey
Feza Buzluca , Computer Engineering Department, Istanbul Technical University, Istanbul, Turkey
pp. 43-49

A case study on applying clone technology to an industrial application framework (PDF)

Eray Tuzun , Havelsan A.Ş, Ankara, Turkey
Emre Er , Havelsan A.Ş, Ankara, Turkey
pp. 57-61

A method for proactive moderation of code clones in IDEs (PDF)

Radhika D. Venkatasubramanyam , Corporate Research and Technologies, India, Siemens Information Systems Limited, Bangalore, India
Himanshu Kumar Singh , Corporate Research and Technologies, India, Siemens Information Systems Limited, Bangalore, India
K. Ravikanth , Corporate Research and Technologies, India, Siemens Information Systems Limited, Bangalore, India
pp. 62-66

Industrial application of clone change management system (PDF)

Yuki Yamanaka , Graduate School of Information Science and Technology, Osaka University, Japan
Eunjong Choi , Graduate School of Information Science and Technology, Osaka University, Japan
Norihiro Yoshida , Graduate School of Information Science, Nara Institute of Science and Technology, Japan
Katsuro Inoue , Graduate School of Information Science and Technology, Osaka University, Japan
Tateki Sano , Software Process Innovation and Standardization Division, NEC Corporation, Japan
pp. 67-71

A common conceptual model for clone detection results (PDF)

Cory J. Kapser , Techtonic Arts Inc., Calgary, Alberta, Canada
Jan Harder , University of Bremen, Bremen, Germany
Ira Baxter , Semantic Designs, Inc., Austin, Texas, USA
pp. 72-73

Conte∗t clones or re-thinking clone on a call graph (PDF)

Toshihiro Kamiya , Dept. Media Architecture, Sch. Systems Information Science, Future Univ. Hakodate, Japan
pp. 74-75

Filtering clones for individual user based on machine learning analysis (PDF)

Jiachen Yang , Graduate School of Information Science and Technology, Osaka University, 1-5, Yamadaoka, Suita, Osaka, 565-0871, Japan
Keisuke Hotta , Graduate School of Information Science and Technology, Osaka University, 1-5, Yamadaoka, Suita, Osaka, 565-0871, Japan
Yoshiki Higo , Graduate School of Information Science and Technology, Osaka University, 1-5, Yamadaoka, Suita, Osaka, 565-0871, Japan
Hiroshi Igaki , Graduate School of Information Science and Technology, Osaka University, 1-5, Yamadaoka, Suita, Osaka, 565-0871, Japan
Shinji Kusumoto , Graduate School of Information Science and Technology, Osaka University, 1-5, Yamadaoka, Suita, Osaka, 565-0871, Japan
pp. 76-77

Near-miss model clone detection for Simulink models (PDF)

Manar H. Alalfi , School of Computing, Queen's University, Kingston, Canada
James R. Cordy , School of Computing, Queen's University, Kingston, Canada
Thomas R. Dean , School of Computing, Queen's University, Kingston, Canada
Matthew Stephan , School of Computing, Queen's University, Kingston, Canada
Andrew Stevenson , School of Computing, Queen's University, Kingston, Canada
pp. 78-79

Semantic clone detection using method IOE-behavior (PDF)

Rochelle Elva , University of Central Florida, Orlando FL, 32816
Gary T. Leavens , University of Central Florida, Orlando FL, 32816
pp. 80-81

Shuffling and randomization for scalable source code clone detection (PDF)

Iman Keivanloo , Department of Computer Science, Concordia University, Canada
Chanchal K. Roy , Department of Computer Science, University of Saskatchewan, Canada
Juergen Rilling , Department of Computer Science, Concordia University, Canada
Philippe Charland , System of Systems Section, Defence R&D Canada - Valcartier
pp. 82-83

Towards qualitative comparison of Simulink model clone detection approaches (PDF)

Matthew Stephan , School of Computing, Queen's University, Kingston, ON, Canada
Manar H. Alafi , School of Computing, Queen's University, Kingston, ON, Canada
Andrew Stevenson , School of Computing, Queen's University, Kingston, ON, Canada
James R. Cordy , School of Computing, Queen's University, Kingston, ON, Canada
pp. 84-85

Using edge bundle views for clone visualization (PDF)

Benedikt Hauptmann , Technische Universität München, Garching b. München, Germany
Veronika Bauer , Technische Universität München, Garching b. München, Germany
Maximilian Junker , Technische Universität München, Garching b. München, Germany
pp. 86-87

We have all of the clones, now what? Toward integrating clone analysis into software quality assessment (PDF)

Wei Wang , David R. Cheriton School of Computer Science, University of Waterloo, Waterloo, ON, Canada
Michael W. Godfrey , David R. Cheriton School of Computer Science, University of Waterloo, Waterloo, ON, Canada
pp. 88-89

What clone coverage can tell (PDF)

Nils Gode , CQSE GmbH, Germany
Benjamin Hummel , CQSE GmbH, Germany
Elmar Juergens , CQSE GmbH, Germany
pp. 90-91

Ctcompare: Code clone detection using hashed token sequences (PDF)

Warren Toomey , School of IT, Bond University, Robina, Qld. Australia
pp. 92-93

Experience of finding inconsistently-changed bugs in code clones of mobile software (PDF)

Katsuro Inoue , Osaka University Osaka, Japan
Yoshiki Higo , Osaka University Osaka, Japan
Norihiro Yoshida , Osaka University Osaka, Japan
Eunjong Choi , Osaka University Osaka, Japan
Shinji Kusumoto , Osaka University Osaka, Japan
Kyonghwan Kim , Samsung Electronics Co. Suwon, South Korea
Wonjin Park , Samsung Electronics Co. Suwon, South Korea
Eunha Lee , Samsung Electronics Co. Suwon, South Korea
pp. 94-95

Visualizing code clone outbreak: An industrial case study (PDF)

Kentaro Yoshimura , Yokohama Research Laboratory, Hitachi, Ltd., Yokohama, Japan
Ryota Mibe , Yokohama Research Laboratory, Hitachi, Ltd., Yokohama, Japan
pp. 96-97
81 ms
(Ver 3.3 (11022016))