The Community for Technology Leaders
2015 IEEE 9th International Workshop on Software Clones (IWSC) (2015)
Montreal, QC, Canada
March 6, 2015 to March 6, 2015
ISBN: 978-1-4673-6914-5
TABLE OF CONTENTS

Foreword (PDF)

pp. iii

An execution-semantic and content-and-context-based code-clone detection and analysis (Abstract)

Toshihiro Kamiya , Department of Media Architecture, School of Systems Information Science, Future University Hakodate, Japan
pp. 1-7

Code clone detection using wavelets (Abstract)

Siim Karus , University of Tartu, Estonia
Karl Kilgi , University of Tartu, Estonia
pp. 8-14

Performance impact of lazy deletion in metric trees for incremental clone analysis (Abstract)

Thierry Lavoie , Departement de genie informatique et logiciel Polytechnique MontrĀ“eal Montreal, Canada
Ettore Merlo , Departement de genie informatique et logiciel Polytechnique MontrĀ“eal Montreal, Canada
pp. 15-18

An empirical study of identical function clones in CRAN (Abstract)

Maelick Claes , Software Engineering Lab & Ecologie numerique des Milieux aquatiques Lab COMPLEXYS Research Institute, University of Mons, Belgium
Tom Mens , Software Engineering Lab & Ecologie numerique des Milieux aquatiques Lab COMPLEXYS Research Institute, University of Mons, Belgium
Narjisse Tabout , Software Engineering Lab & Ecologie numerique des Milieux aquatiques Lab COMPLEXYS Research Institute, University of Mons, Belgium
Philippe Grosjean , Software Engineering Lab & Ecologie numerique des Milieux aquatiques Lab COMPLEXYS Research Institute, University of Mons, Belgium
pp. 19-25

On the level of code suggestion for reuse (Abstract)

Akio Ohtani , Graduate School of Information Science and Technology, Osaka University, Japan
Yoshiki Higo , Graduate School of Information Science and Technology, Osaka University, Japan
Tomoya Ishihara , Graduate School of Information Science and Technology, Osaka University, Japan
Shinji Kusumoto , Graduate School of Information Science and Technology, Osaka University, Japan
pp. 26-32

Source code reuse evaluation by using real/potential copy and paste (Abstract)

Takafumi Ohta , Graduate School of Information Science and Technology, Osaka University, Japan
Hiroaki Murakami , Graduate School of Information Science and Technology, Osaka University, Japan
Hiroshi Igaki , Graduate School of Information Science and Technology, Osaka University, Japan
Yoshiki Higo , Graduate School of Information Science and Technology, Osaka University, Japan
Shinji Kusumoto , Graduate School of Information Science and Technology, Osaka University, Japan
pp. 33-39

Tool support for managing method clones (Abstract)

Hamid Abdul Basit , Syed Babar Ali School of Science and Engineering Lahore University of Management Sciences, Pakistan
Hassan Shahid Khan , Syed Babar Ali School of Science and Engineering Lahore University of Management Sciences, Pakistan
Fahad Hamid , Syed Babar Ali School of Science and Engineering Lahore University of Management Sciences, Pakistan
Irtza Suhail , Syed Babar Ali School of Science and Engineering Lahore University of Management Sciences, Pakistan
pp. 40-46

Analysis and visualization for clone refactoring (Abstract)

Minhaz F. Zibran , Department of Computer Science, University of New Orleans, LA, USA
pp. 47-48

What do practitioners ask about code clone? a preliminary investigation of stack overflow (Abstract)

Eunjong Choi , Graduate School of Information Science and Technology, Osaka University, Japan
Norihiro Yoshida , Graduate School of Information Science, Nagoya University, Japan
Raula Gaikovina Kula , Graduate School of Information Science and Technology, Osaka University, Japan
Katsuro Inoue , Graduate School of Information Science and Technology, Osaka University, Japan
pp. 49-50

What do we need to know about clones? deriving information needs from user goals (Abstract)

Hamid Abdul Basit , Computer Science Dpt. SBASSE, LUMS, Pakistan
Muhammad Hammad , Punjab Information Technology Board (PITB), Pakistan
Stan Jarzabek , Computer Science Dpt. SoC, NUS, Singapore
Rainer Koschke , Dpt. of Mathematics and Informatics University of Bremen, Germany
pp. 51-57
88 ms
(Ver 3.3 (11022016))