James R Cordy
TitleCited byYear
Comparison and evaluation of code clone detection techniques and tools: A qualitative approach
CK Roy, JR Cordy, R Koschke
Science of computer programming 74 (7), 470-495, 2009
A survey on software clone detection research
CK Roy, JR Cordy
Queen’s School of Computing TR 541 (115), 64-68, 2007
The TXL source transformation language
JR Cordy
Science of Computer Programming 61 (3), 190-210, 2006
NICAD: Accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization
CK Roy, JR Cordy
2008 16th iEEE international conference on program comprehension, 172-181, 2008
A survey of self-management in dynamic software architecture specifications
JS Bradbury, JR Cordy, J Dingel, M Wermelinger
Proceedings of the 1st ACM SIGSOFT workshop on Self-managed systems, 28-33, 2004
A survey of table recognition
R Zanibbi, D Blostein, JR Cordy
Document Analysis and Recognition 7 (1), 1-16, 2004
TXL: A rapid prototyping system for programming language dialects
JR Cordy, CD Halpern-Hamu, E Promislow
Computer Languages 16 (1), 97-107, 1991
Recognizing mathematical expressions using tree transformation
R Zanibbi, D Blostein, JR Cordy
IEEE Transactions on pattern analysis and machine intelligence 24 (11), 1455 …, 2002
Comprehending reality-practical barriers to industrial adoption of software maintenance automation
JR Cordy
11th IEEE International Workshop on Program Comprehension, 2003., 196-205, 2003
Source transformation in software engineering using the TXL transformation system
JR Cordy, TR Dean, AJ Malton, KA Schneider
Information and Software Technology 44 (13), 827-837, 2002
A mutation/injection-based automatic framework for evaluating code clone detection tools
CK Roy, JR Cordy
2009 International Conference on Software Testing, Verification, and …, 2009
The NiCad clone detector
JR Cordy, CK Roy
2011 IEEE 19th International Conference on Program Comprehension, 219-220, 2011
A syntactic theory of software architecture
TR Dean, JR Cordy
IEEE Transactions on Software Engineering 21 (4), 302-313, 1995
An empirical study of function clones in open source software
CK Roy, JR Cordy
2008 15th Working Conference on Reverse Engineering, 81-90, 2008
TXL-a language for programming language tools and applications
JR Cordy
Electronic notes in theoretical computer science 110, 3-31, 2004
The TURING programming language
RC Holt, JR Cordy
Communications of the ACM 31 (12), 1988
Practical language-independent detection of near-miss clones
JR Cordy, TR Dean, N Synytskyy
Proceedings of the 2004 conference of the Centre for Advanced Studies on …, 2004
Legacy system evolution towards service-oriented architecture
AA Almonaies, JR Cordy, TR Dean
International Workshop on SOA Migration and Evolution, 53-62, 2010
Mutation operators for concurrent Java (J2SE 5.0)
JS Bradbury, JR Cordy, J Dingel
Second Workshop on Mutation Analysis (Mutation 2006-ISSRE Workshops 2006), 11-11, 2006
Scenario-based comparison of clone detection techniques
CK Roy, JR Cordy
2008 16th IEEE International Conference on Program Comprehension, 153-162, 2008
The system can't perform the operation now. Try again later.
Articles 1–20