• Publications
  • Influence
Comparison and evaluation of code clone detection techniques and tools: A qualitative approach
TLDR
A qualitative comparison and evaluation of the current state-of-the-art in clone detection techniques and tools is provided, and a taxonomy of editing scenarios that produce different clone types and a qualitative evaluation of current clone detectors are evaluated.
A Survey on Software Clone Detection Research
TLDR
The state of the art in clone detection research is surveyed, the clone terms commonly used in the literature are described along with their corresponding mappings to the commonly used clone types and several open problems related to clone detectionResearch are pointed out.
NICAD: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization
  • C. Roy, J. Cordy
  • Computer Science
    16th IEEE International Conference on Program…
  • 10 June 2008
TLDR
A new language- specific parser-based but lightweight clone detection approach exploiting a novel application of a source transformation system that is capable of finding near-miss clones with high precision and recall, and with reasonable performance.
The TXL source transformation language
  • J. Cordy
  • Computer Science
    Sci. Comput. Program.
  • 1 August 2006
TLDR
The history, evolution and concepts of TXL are outlined, with emphasis on its distinctive style and philosophy, and examples of its use in expressing and applying recent new paradigms in language processing are given.
Recognizing Mathematical Expressions Using Tree Transformation
TLDR
A robust and efficient system for recognizing typeset and handwritten mathematical notation that allows robust handling of unexpected input, increases the scalability of the system, and provides the groundwork for handling dialects of mathematical notation.
The NiCad Clone Detector
  • J. Cordy, C. Roy
  • Computer Science
    IEEE 19th International Conference on Program…
  • 22 June 2011
The NiCad Clone Detector is a scalable, flexible clone detection tool designed to implement the NiCad (Automated Detection of Near-Miss Intentional Clones) hybrid clone detection method in a
A survey of self-management in dynamic software architecture specifications
TLDR
A survey of 14 formal specification approaches based on graphs, process algebras, logic, and other formalisms for dynamic software architectures to evaluate the ability of each approach to specify self-managing systems as well as the ability to address issues regarding expressiveness and scalability.
Mutation Operators for Concurrent Java (J2SE 5.0)
TLDR
This paper provides an overview of concurrency constructs in J2SE 5.0 and a new set of concurrent mutation operators and justifies the operators by categorizing them with an existing bug pattern taxonomy for concurrency.
TXL - A Language for Programming Language Tools and Applications
  • J. Cordy
  • Computer Science
    Electron. Notes Theor. Comput. Sci.
  • 31 December 2004
TLDR
The history, evolution and concepts of TXL are outlined with emphasis on what makes it different from other language manipulation tools, and examples of its use in expressing and applying recent new paradigms in language processing are given.
Near-miss function clones in open source software: an empirical study
  • C. Roy, J. Cordy
  • Computer Science
    J. Softw. Maintenance Res. Pract.
  • 2010
TLDR
This paper examines more than twenty open source C, Java and C# systems, including the entire Linux Kernel, Apache httpd, J2SDK-Swing and db4o, and compares their use of cloned code in several different dimensions, including language, clone size, clone similarity, clone location and clone density.
...
1
2
3
4
5
...