【正文】
ic text classification using cosinesimilarity and Latent Semantic Indexing[J]. Journal of King Saud University Computer andInformation Sciences, 2016. [7]Ducasse S, phane, Rieger M, et al. A language independent approach for detecting duplicatedcode. In: ICSM[J]. 2000:109118. [8]Roy C K, Cordy J R. NICAD: Accurate Detection of NearMiss Intentional Clones UsingFlexible PrettyPrinting and Code Normalization[C]// The, IEEE International Conference onProgram Comprehension. IEEE Computer Society, 2008:172181. [9]Baker B S. On finding duplication and nearduplication in large software systems[C]//Reverse Engineering,1995. Proceedings of, Working Conference on. IEEE, 1995:8695. [10]Baker B S. Parameterized Duplication in Strings: Algorithms and an Application to SoftwareMaintenance[J]. Siam Journal on Computing, 1997, 26(5):13431362. [11]Juergens E, Deissenboeck F, Hummel B. Clone Detective A workbench for clone detectionresearch[C]// IEEE, International Conference on Software En [12]Higo Y, Kamiya T, Kusumoto S, et al. Method and implementation for investigating codeclones in a software system[J]. Information Software Technology, 2007,49(9ndash。10):985998. [13]Livieri S, Higo Y, Matushita M, et al. VeryLarge Scale Code Clone Analysis and Visualization of Open Source Programs Using Distributed CCFinder:DCCFinder[C]//International Conference on Software Engineering. IEEE, 2007:106115. 附件下載: