U. Manber, “Finding Similar Files In a Large File System”, Proc. 1994 Winter Usenix Technical Conference, Jan. 1994, pp. 1-10. |
B. S. Baker, “Parameterized Pattern Matching: Algorithms and Applications,” J. Comput. Syst. Sci. 52(1), Feb. 1996, pp. 28-42. |
B. S. Baker, “Parameterized Duplication In Strings: Algorithms and an Application to Software Maintenance,” SIAM J. Computing, 26(5), Oct. 1997, pp. 1343-1362. |
E. W. Myers, “An O(ND) Difference Algorithm and Its Variations,” Algorithmica, 1986, pp. 1:251-266. |
B. S. Baker, “On Finding Duplication and Near-duplication in Large Software Systems,” Second Working Conference on Reverse Engineering,1995, pp. 86-95. |
H.L. Berghel and D.L. Sallach, “Measurements of Program Similarity in Identical Task Environments,” SIGPLAN Notices, 9(8), Aug. 1984, pp. 65-76. |
S. Brin, J. Davis, and H. Garcia-Molina, “Copy Detection Mechanisms For Digital Documents,” Proceedings of the ACM Special Interest Group on Management of Data (SIGMOD), 1995, pp. 1-21. |
A. Broder, S. Glassman, M. Manasse, and G. Zweig, “Syntactic Clustering of the Web,” Proceedings of the Sixth International World Wide Web Conference, Apr. 1997, pp. 391-404. |
K.W. Church and J. I. Helfman, “Dotplot: A Program For Exploring Self-similarity In Millions of Lines of Text and Code,” Journal of Computational and Graphical Statistics, 2(2), Jun. 1993, pp. 153-174. |
N. Heintz, “Scalable Document Fingerprinting,” Proceedings of the Second USENIX Workshop on Electronic Commerce, Nov. 18-21, 1996, pp. 1-10. |
S. Horwitz, “Identifying the Semantic and Textural Differences Between Two Versions of a Program,” Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), Jun. 1990, pp. 234-245. |
H.T. Jankowitz, “Detecting Plagiarism in Student PASCAL Programs,” Computer Journal, 31(1),1988, pp. 1-8. |
J. H. Johnson, “Substring Matching For Clone Detection and Change Tracking,” Proc. International Conf. on Software Maintenance, 1994, pp. 1-7. |
PocketSoft. .RTPatch Professional, Feb. 23, 1998 http://www.pocketsoft.com/products.html, pp. 1-4. |
T. Proebsting and S. A. Watterson, Krakatoa: Decompilation in Java (does bytecode reveal source:). USENIX Conference on Object-oriented Technologies and Systems, Jun. 1997, pp. 1-13. |
N. Shivakumar and H. Garcia-Molina, “Building a Scalable and Accurate Copy Detection Mechanism,” Proceedings of 1st ACM International Conference on Digital Libraries (DL'96), Mar. 1996, pp. 1-9. |
T. Yan and H. Garcia-Molina, “Duplicate Detection In Information Dissemination,” VLDB Conference, Zurich, Sep. 1995, pp.66-77. |