1ROY C K, ZIBRAN M F, KOSCHKE R. The vision of software clone management: past, present, and future (keynote paper) [ C]/! Proceedings of the 2014 IEEE Conference on Software Main- tenance, Reengineering and Reverse Engineering. Piscataway: IEEE_ 2014:18-33.
2BELLON S, KOSCHKE R, ANTONIOL G, et al. Comparison and evaluation of clone detection tools [ J]. IEEE Transactions on Soft- ware Engineering, 2007, 33(9): 577-591.
3ROY C K, CORDY J R. NICAD: Accurate detection of near-miss intentional clones using flexible pretty-printing and code normaliza- tion [ C]// Proceedings of the 16th IEEE Conference on Program Comprehension. Piscataway: IEEE, 2008: 172- 181.
4KAMIYA T, KUSUMOTO S, INOUE K. CCFinder: a multilinguis- tic token-based code clone detection system for large scale source code [ J]. IEEE Transactions on Software Engineering, 2002, 28 (7) : 654 -670.
5TOOMEY W. Ctcompare: code clone detection using hashed token sequences [ C]// Proceedings of the 6th IEEE International Work- shop on Software Clones. Piscataway: IEEE, 2012:92 -93.
6LAVOIE T, MERLO E. Automated type-3 clone oracle using Leven- shtein metric [ C]// Proceedings of the 5th International Workshop on Software Clones. New York: ACM, 2011:34 -40.
7WAHLER V, SEIPEL D, GUDENBERG J, et al. Clone detection in source code by frequent itemset techniques [ C]//Proceedings of the 4th International Workshop on Source Code Analysis and Manip- ulation. Piscataway: IEEE, 2004: 128-135.
8DAVEY N, BARSON P, FIELD S, et al. The development of a software clone detector [ J]. International Journal of Applied Soft- ware Technology, 1995, 1(3/4): 219-236.
9LAVOIE T, MERLO E. About metrics for clone detection [J/OL]// Electronic Communications of the EASST, 2014, 63. http://journal. ub. tu-berlin, de/eceasst/article/viewFile/923/915.
10KRINKE J. Identifying similar code with program dependence graphs [ C]// Proceedings of the 8th Working Conference on Re- verse Engineering. Piscataway: IEEE, 2001:301-309.