Software clone detection: A systematic review

D Rattan, R Bhatia, M Singh - Information and Software Technology, 2013‏ - Elsevier
CONTEXT: Reusing software by means of copy and paste is a frequent activity in software
development. The duplicated code is known as a software clone and the activity is known as …

The vision of software clone management: Past, present, and future (keynote paper)

CK Roy, MF Zibran, R Koschke - 2014 Software Evolution …, 2014‏ - ieeexplore.ieee.org
Duplicated code or code clones are a kind of code smell that have both positive and
negative impacts on the development and maintenance of software systems. Software clone …

A survey on clone refactoring and tracking

M Mondal, CK Roy, KA Schneider - Journal of Systems and Software, 2020‏ - Elsevier
Code clones, identical or nearly similar code fragments in a software system's code-base,
have mixed impacts on software evolution and maintenance. Focusing on the issues of …

Conflict‐aware optimal scheduling of prioritised code clone refactoring

MF Zibran, CK Roy - IET software, 2013‏ - Wiley Online Library
Duplicated or similar source code, also known as code clones, are possible malicious 'code
smells' that may need to be removed through refactoring to enhance maintainability. Among …

A constraint programming approach to conflict-aware optimal scheduling of prioritized code clone refactoring

MF Zibran, CK Roy - … Conference on Source Code Analysis and …, 2011‏ - ieeexplore.ieee.org
Duplicated code, also known as code clones, are one of the malicious ‘ code smells' that
often need to be removed through refactoring for enhancing maintainability. Among all the …

Exposing I/O concurrency with informed prefetching

RH Patterson, GA Gibson - Proceedings of 3rd International …, 1994‏ - ieeexplore.ieee.org
Informed prefetching provides a simple mechanism for I/O-intensive, cache-ineffective
applications to efficiently exploit highly-parallel I/O subsystems such as disk arrays. This …

[PDF][PDF] The road to software clone management: A survey

MF Zibran, CK Roy - Dept. Comput. Sci., Univ. of Saskatchewan …, 2012‏ - Citeseer
1 Yearly number of distinct authors contributing to clone research... 5 2 Categories of
publications on software clone research in different years 5 3 Proportion of publications in …

A naturally protective epitope of limited variability as an influenza vaccine target

CP Thompson, J Lourenço, AA Walters… - Nature …, 2018‏ - nature.com
Current antigenic targets for influenza vaccine development are either highly immunogenic
epitopes of high variability or conserved epitopes of low immunogenicity. This requires …

An empirical study of code clones: Density, entropy, and patterns

B Hu, D Yu, Y Wu, T Hu, Y Cai - Science of computer programming, 2025‏ - Elsevier
In recent years, there has been a growing consensus among researchers regarding the dual
nature of code clones. While some instances of code are valuable for reuse or extraction as …

Prioritizing code clone detection results for clone management

RD Venkatasubramanyam, S Gupta… - 2013 7th International …, 2013‏ - ieeexplore.ieee.org
Clone detection through tools is a common practice in the software industry. Associated with
clone detection is code clone management, which includes taking informed decisions for …