Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,299 papers from all fields of science
Search
Sign In
Create Free Account
Duplicate code
Known as:
Clone Detection
, Code clone
, Code duplication
Duplicate code is a computer programming term for a sequence of source code that occurs more than once, either within a program or across different…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
29 relations
Abstract syntax tree
Anti-pattern
Array data structure
Aspect weaver
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Batch Clone Detection in RFID-enabled supply chain
Jie Shi
,
Su Mon Kywe
,
Yingjiu Li
IEEE International Conference on RFID
2014
Corpus ID: 12508899
Radio Frequency IDentification (RFID) technology plays an important role in deterring counterfeit products. There are, however…
Expand
2012
2012
CSI: Compressed sensing-based clone identification in sensor networks
Chia-Mu Yu
,
Chun-Shien Lu
,
S. Kuo
IEEE International Conference on Pervasive…
2012
Corpus ID: 9093547
The clone detection, aiming to detect the illegal copies with all of the credentials of legitimate sensor nodes, is of great…
Expand
2012
2012
A novel approach based on formal methods for clone detection
Antonio Cuomo
,
A. Santone
,
Umberto Villano
International Workshop on Software Clones
2012
Corpus ID: 6837685
This paper presents an approach based on formal methods for detecting code clones. The methodology followed performs the analysis…
Expand
2012
2012
What kind of and how clones are refactored?: a case study of three OSS projects
Eunjong Choi
,
Norihiro Yoshida
,
Katsuro Inoue
WRT '12
2012
Corpus ID: 12758901
Although code clone (i.e. a code fragment that has similar or identical fragments) is regarded as one of the most typical bad…
Expand
2010
2010
Achieving accurate clone detection results
Elmar Jürgens
,
Nils Göde
International Workshop on Software Clones
2010
Corpus ID: 7112076
Many existing clone detection approaches produce substantial amounts of clones that are irrelevant to software engineers. These…
Expand
Highly Cited
2009
Highly Cited
2009
SHINOBI: A Tool for Automatic Code Clone Detection in the IDE
Shinji Kawaguchi
,
Takanobu Yamashina
,
+4 authors
Hajimu Iida
Working Conference on Reverse Engineering
2009
Corpus ID: 606547
Recent research has acknowledged that code clones decrease the maintainability and reliability of software programs, thus it is…
Expand
2008
2008
Detecting Clones in Business Applications
Jin Guo
,
Ying Zou
Working Conference on Reverse Engineering
2008
Corpus ID: 7138352
A business application automates a collection of business processes. A business process describes how a set of logically related…
Expand
2005
2005
Daily bacterioplankton dynamics in a sub-Saharan estuary (Senegal River, West Africa): a mesocosm study
M. Troussellier
,
P. Got
,
+4 authors
M. Bouvy
2005
Corpus ID: 56076227
Temporal variability in bacterial communities was studied on a daily scale in the estuar- ine part of the largest river on the…
Expand
Highly Cited
2004
Highly Cited
2004
Design and Evaluation of an Automated Aspect Mining Tool
D. Shepherd
,
Emily Hill
,
L. Pollock
Software Engineering Research and Practice
2004
Corpus ID: 17402049
Also presented at the 2005 Mid-Atlantic Student Workshop on Programming Languages and Systems (MASPLAS) in April 2005.
1998
1998
Genetic variation in pea (Pisum) dehydrins: sequence elements responsible for length differences between dehydrin alleles and between dehydrin loci in Pisum sativum L.
E. Grosselindemann
,
M. Robertson
,
J. Wilmer
,
P. Chandler
Theoretical and Applied Genetics
1998
Corpus ID: 13618157
Abstract The electrophoretic patterns of dehydrins extracted from mature seeds of a range of pea (Pisum) species revealed…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE