not allowed
not allowed
Digital Rights Management (DRM)
The publisher has supplied this book in encrypted form, which means that you need to install free software in order to unlock and read it. To read this e-book you have to create Adobe ID More info here. Ebook can be read and downloaded up to 6 devices (single user with the same Adobe ID).
Required software
To read this ebook on a mobile device (phone or tablet) you'll need to install this free app: PocketBook Reader (iOS / Android)
To download and read this eBook on a PC or Mac you need Adobe Digital Editions (This is a free app specially developed for eBooks. It's not the same as Adobe Reader, which you probably already have on your computer.)
You can't read this ebook with Amazon Kindle
Chapter 1: Introduction to Code Clone Analysis.
Chapter 2: CCFinderX.
Chapter 3: NiCad.
Chapter 4: SourcererCC.
Chapter 5: Oreo: Scaling Clone Detection Beyond Near-miss Clones.
Chapter 6: CCLearner.
Chapter 7: BigCloneBench.
Chapter 8: Visualization of Clones.
Chapter 9: Source Code Clone Search.
Chapter 10: Code Similarity in Clone Detection.
Chapter 11: Is Late Propagation a Harmful Code Clone Evolutionary Pattern? An Empirical Study.
Chapter 12: Summary on the Stability of Code Clones and Current Research Trends.
Chapter 13: Identifying Refactoring-oriented Clones and Inferring How They Can Be Merged.
Chapter 14:Clone Evolution and Management.
Chapter 15: Sometimes, cloning is a sound design decision!.
Chapter 16: IWSC(D): From Research to Practice.