A survey of software refactoring

T Mens, T Tourwé - IEEE Transactions on software engineering, 2004 - ieeexplore.ieee.org
We provide an extensive overview of existing research in the field of software refactoring.
This research is compared and discussed based on a number of different criteria: the …

Deckard: Scalable and accurate tree-based detection of code clones

L Jiang, G Misherghi, Z Su… - … Conference on Software …, 2007 - ieeexplore.ieee.org
Detecting code clones has many software engineering applications. Existing approaches
either do not scale to large code bases or are not robust against minor code modifications. In …

Sha** program repair space with existing patches and similar code

J Jiang, Y **ong, H Zhang, Q Gao, X Chen - Proceedings of the 27th …, 2018 - dl.acm.org
Automated program repair (APR) has great potential to reduce bug-fixing effort and many
approaches have been proposed in recent years. APRs are often treated as a search …

[PDF][PDF] A survey on software clone detection research

CK Roy, JR Cordy - Queen's School of computing TR, 2007 - research.cs.queensu.ca
Code duplication or copying a code fragment and then reuse by pasting with or without any
modifications is a well known code smell in software maintenance. Several studies show …

Behind the intent of extract method refactoring: A systematic literature review

EA AlOmar, MW Mkaouer, A Ouni - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Background: Code refactoring is widely recognized as an essential software engineering
practice to improve the understandability and maintainability of the source code. The Extract …

Using slicing to identify duplication in source code

R Komondoor, S Horwitz - International static analysis symposium, 2001 - Springer
Programs often have a lot of duplicated code, which makes both understanding and
maintenance more difficult. This problem can be alleviated by detecting duplicated code …

Droidchameleon: evaluating android anti-malware against transformation attacks

V Rastogi, Y Chen, X Jiang - Proceedings of the 8th ACM SIGSAC …, 2013 - dl.acm.org
Mobile malware threats have recently become a real concern. In this paper, we evaluate the
state-of-the-art commercial mobile antimalware products for Android and test how resistant …

SOA-based integration of the internet of things in enterprise services

P Spiess, S Karnouskos, D Guinard… - … conference on web …, 2009 - ieeexplore.ieee.org
Advances in the areas of embedded systems, computing, and networking are leading to an
infrastructure composed of millions of heterogeneous devices. These devices will not simply …

Scalable detection of semantic clones

M Gabel, L Jiang, Z Su - … of the 30th international conference on …, 2008 - dl.acm.org
Several techniques have been developed for identifying similar code fragments in programs.
These similar fragments, referred to as code clones, can be used to identify redundant code …

Catch me if you can: Evaluating android anti-malware against transformation attacks

V Rastogi, Y Chen, X Jiang - IEEE Transactions on Information …, 2013 - ieeexplore.ieee.org
Mobile malware threats (eg, on Android) have recently become a real concern. In this paper,
we evaluate the state-of-the-art commercial mobile anti-malware products for Android and …