Follow
James R Cordy
Title
Cited by
Cited by
Year
Comparison and evaluation of code clone detection techniques and tools: A qualitative approach
CK Roy, JR Cordy, R Koschke
Science of computer programming 74 (7), 470-495, 2009
12662009
A survey on software clone detection research
CK Roy, JR Cordy
Queen’s School of Computing TR 541 (115), 64-68, 2007
9952007
NICAD: Accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization
CK Roy, JR Cordy
2008 16th iEEE international conference on program comprehension, 172-181, 2008
6372008
The TXL source transformation language
JR Cordy
Science of Computer Programming 61 (3), 190-210, 2006
5112006
A survey of table recognition: Models, observations, transformations, and inferences
R Zanibbi, D Blostein, JR Cordy
Document Analysis and Recognition 7, 1-16, 2004
4132004
A survey of self-management in dynamic software architecture specifications
JS Bradbury, JR Cordy, J Dingel, M Wermelinger
Proceedings of the 1st ACM SIGSOFT workshop on Self-managed systems, 28-33, 2004
3972004
Recognizing mathematical expressions using tree transformation
R Zanibbi, D Blostein, JR Cordy
IEEE Transactions on pattern analysis and machine intelligence 24 (11), 1455 …, 2002
3142002
The NiCad clone detector
JR Cordy, CK Roy
2011 IEEE 19th International Conference on Program Comprehension, 219-220, 2011
3012011
TXL: A rapid prototyping system for programming language dialects
JR Cordy, CD Halpern-Hamu, E Promislow
Computer Languages 16 (1), 97-107, 1991
2811991
A mutation/injection-based automatic framework for evaluating code clone detection tools
CK Roy, JR Cordy
2009 international conference on software testing, verification, and …, 2009
2432009
Comprehending reality-practical barriers to industrial adoption of software maintenance automation
JR Cordy
11th IEEE International Workshop on Program Comprehension, 2003., 196-205, 2003
2212003
Source transformation in software engineering using the TXL transformation system
JR Cordy, TR Dean, AJ Malton, KA Schneider
Information and Software Technology 44 (13), 827-837, 2002
1932002
An empirical study of function clones in open source software
CK Roy, JR Cordy
2008 15th Working Conference on Reverse Engineering, 81-90, 2008
1872008
TXL-a language for programming language tools and applications
JR Cordy
Electronic notes in theoretical computer science 110, 3-31, 2004
1492004
Practical language-independent detection of near-miss clones
JR Cordy, TR Dean, N Synytskyy
Proceedings of the 2004 conference of the Centre for Advanced Studies on …, 2004
1422004
A syntactic theory of software architecture
TR Dean, JR Cordy
IEEE Transactions on Software Engineering 21 (4), 302-313, 1995
1401995
The TURING programming language
RC Holt, JR Cordy
Communications of the ACM 31 (12), 1988
1391988
Legacy system evolution towards service-oriented architecture
AA Almonaies, JR Cordy, TR Dean
International Workshop on SOA Migration and Evolution, 53-62, 2010
1332010
Automating the extraction of rights and obligations for regulatory compliance
N Kiyavitskaya, N Zeni, TD Breaux, AI Antón, JR Cordy, L Mich, ...
Conceptual Modeling-ER 2008: 27th International Conference on Conceptual …, 2008
1322008
Mutation operators for concurrent Java (J2SE 5.0)
JS Bradbury, JR Cordy, J Dingel
Second Workshop on Mutation Analysis (Mutation 2006-ISSRE Workshops 2006), 11-11, 2006
1322006
The system can't perform the operation now. Try again later.
Articles 1–20