09:00 | Welcome and Opening (5 min) |
|
09:05 | Session 1: Detection I |
|
09:05 | Full papers (15 min each) |
|
| An Accurate Estimation of the Levenshtein Distance Using Metric Trees and Manhattan Distance |
| Thierry Lavoie and Ettore Merlo |
|
| Java Bytecode Clone Detection via Relaxation on Code Fingerprint and Semantic Web Reasoning |
| Iman Keivanloo, Chanchal K. Roy and Juergen Rilling |
|
| Clone Detection Using Rolling Hashing, Suffix Trees and Dagification: A Case Study |
| Mikkel Jonsson Thomsen and Fritz Henglein |
|
09:50 | Position papers (5 min each) |
|
| A Common Conceptual Model for Clone Detection Results |
| Cory Kapser, Jan Harder and Ira Baxter |
|
| Filtering Clones for Individual User Based on Machine Learning Analysis |
| Jiachen Yang, Keisuke Hotta, Yoshiki Higo, Hiroshi Igaki and Shinji Kusumoto |
|
| Shuffling and Randomization for Scalable Source Code Clone Detection |
| Iman Keivanloo, Chanchal K. Roy, Juergen Rilling and Philippe Charland |
|
10:05 | Discussion (25 min) |
|
10:30 | Coffee Break |
|
11:00 | Session 2: Detection II |
|
11:00 | Full papers (15 min each) |
|
| A Novel Approach Based on Formal Methods for Clone Detection |
| Antonio Cuomo, Antonella Santone and Umberto Villano |
|
| Mining Object-Oriented Design Models for Detecting Identical Design Structures |
| Umut Tekin, Ural Erdemir and Feza Buzluca |
|
| Safe Clone-Based Refactoring through Stereotype Identification and ISO-Generation |
| Nic Volanschi |
|
11:45 | Position papers (5 min each) |
|
| Near-Miss Model Clone Detection for Simulink Models |
| Manar Alalfi, James R. Cordy, Thomas Dean, Matthew Stephan and Andrew Stevenson |
|
| Semantic Clone Detection Using Method IOE-Behavior |
| Rochelle Elva and Gary T. Leavens |
|
| Towards Qualitative Comparison of Simulink Model Clone Detection Approaches |
| Matthew Stephan, Manar Alalfi, Andrew Stevenson and James R. Cordy |
|
| Conte*t Clones or Re-thinking Clone on a Call Graph |
| Toshihiro Kamiya |
|
12:05 | Discussion (25 min) |
|
12:30 | Lunch Break |
|
14:00 | Session 3: Management |
|
14:00 | Full papers (15 min each) |
|
| Claims and Beliefs about Code Clones: Do We Agree as a Community? A Survey |
| Debarshi Chatterji, Jeffrey Carver and Nicholas A. Kraft |
|
| Dispersion of Changes in Cloned and Non-cloned Code |
| Manishankar Mondal, Chanchal K. Roy and Kevin A. Schneider |
|
14:30 | Position papers (5 min each) |
|
| Using Edge Bundle Views for Clone Visualization |
| Benedikt Hauptmann, Veronika Bauer and Maximilian Junker |
|
| We Have All of the Clones, Now What? Toward Integrating Clone Analysis into Software Quality Assessment |
| Wei Wang and Michael Godfrey |
|
| What Clone Coverage Can Tell |
| Nils Göde, Benjamin Hummel and Elmar Juergens |
|
14:45 | Discussion (25 min) |
|
15:10 | Tools (5 min each) |
|
| Ctcompare: Code Clone Detection Using Hashed Token Sequences |
| Warren Toomey |
|
| Experience of Finding Inconsistently-Changed Bugs in Code Clones of Mobile Software |
| Katsuro Inoue, Yoshiki Higo, Norihiro Yoshida, Eunjong Choi, Shinji Kusumoto, Kyonghwan Kim, Wonjin Park and Eunha Lee |
|
| Visualizing Code Clone Outbreak: An Industrial Case Study |
| Kentaro Yoshimura and Ryota Mibe |
|
15:30 | Coffee Break + Tool Demonstrations |
|
16:00 | Session 4: Industrial Track |
|
16:00 | Industrial Papers (10 min each) |
|
| A Case Study on Applying Clone Technology to an Industrial Application Framework |
| Eray Tüzün and Emre Er |
|
| A Method for Proactive Moderation of Code Clones in IDEs |
| Radhika Venkatasubramanyam, Himanshu Singh and K Ravikanth |
|
| Industrial Application of Clone Change Management System |
| Yuki Yamanaka, Eunjong Choi, Norihiro Yoshida, Katsuro Inoue and Tateki Sano |
|
16:30 | Discussion (15min) |
|
16:45 | Panel Discussion (35min) |
|
17:20 | Awards and Closing (10 min) |
|
17:30 | End |
|
19:00 | Unofficial dinner at Zeughauskeller (Pay by yourself) |
|