Class information for: |
Basic class information |
Class id | #P | Avg. number of references |
Database coverage of references |
---|---|---|---|
23745 | 336 | 29.0 | 27% |
Hierarchy of classes |
The table includes all classes above and classes immediately below the current class. |
Cluster id | Level | Cluster label | #P |
---|---|---|---|
0 | 4 | BIOCHEMISTRY & MOLECULAR BIOLOGY//CELL BIOLOGY//ONCOLOGY | 4064930 |
90 | 3 | MATHEMATICAL & COMPUTATIONAL BIOLOGY//BIOINFORMATICS//BMC BIOINFORMATICS | 77178 |
3201 | 2 | GRAPHICAL REPRESENTATION//AUTHORSHIP ATTRIBUTION//CODE CLONE | 2089 |
23745 | 1 | CODE CLONE//SOFTWARE BIRTHMARK//PLAGIARISM DETECTION | 336 |
Terms with highest relevance score |
rank | Term | termType | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|---|
1 | CODE CLONE | authKW | 1640354 | 6% | 95% | 19 |
2 | SOFTWARE BIRTHMARK | authKW | 1272298 | 4% | 100% | 14 |
3 | PLAGIARISM DETECTION | authKW | 1144615 | 7% | 55% | 23 |
4 | SOFTWARE PROTECTION | authKW | 656577 | 5% | 43% | 17 |
5 | SOFTWARE CLONES | authKW | 646245 | 2% | 89% | 8 |
6 | CLONE DETECTION | authKW | 619609 | 4% | 45% | 15 |
7 | SOFTWARE WATERMARKING | authKW | 484680 | 2% | 67% | 8 |
8 | SOFTWARE PLAGIARISM DETECTION | authKW | 454392 | 1% | 100% | 5 |
9 | SOFTWARE THEFT DETECTION | authKW | 454392 | 1% | 100% | 5 |
10 | CLONE EVOLUTION | authKW | 363514 | 1% | 100% | 4 |
Web of Science journal categories |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | Computer Science, Software Engineering | 13452 | 46% | 0% | 155 |
2 | Computer Science, Information Systems | 4195 | 29% | 0% | 98 |
3 | Computer Science, Theory & Methods | 3268 | 27% | 0% | 92 |
4 | Computer Science, Hardware & Architecture | 860 | 9% | 0% | 31 |
5 | Computer Science, Artificial Intelligence | 516 | 11% | 0% | 36 |
6 | Education, Scientific Disciplines | 260 | 4% | 0% | 15 |
7 | Engineering, Electrical & Electronic | 245 | 18% | 0% | 60 |
8 | Computer Science, Interdisciplinary Applications | 218 | 7% | 0% | 25 |
9 | Engineering, General | 91 | 4% | 0% | 15 |
10 | Information Science & Library Science | 62 | 2% | 0% | 8 |
Address terms |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | ATLANMOD TEAM INRIA EMN | 90878 | 0% | 100% | 1 |
2 | BANKING INFORMAT ENGN | 90878 | 0% | 100% | 1 |
3 | CHINA DEV S | 90878 | 0% | 100% | 1 |
4 | COMP SCI SECUR | 90878 | 0% | 100% | 1 |
5 | CYBER FORENS TRAINING ALLIANCE CANADA | 90878 | 0% | 100% | 1 |
6 | DIRECTORATE GEN EDUC CULTURE EAC | 90878 | 0% | 100% | 1 |
7 | EUTRONSEC INFOSECURITY | 90878 | 0% | 100% | 1 |
8 | FUNCT CONFIGURAT GRP | 90878 | 0% | 100% | 1 |
9 | INGN IINGEN | 90878 | 0% | 100% | 1 |
10 | INTELLIGENT NETWORKS NETWORK SECUR MOEK | 90878 | 0% | 100% | 1 |
Journals |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | EMPIRICAL SOFTWARE ENGINEERING | 20776 | 3% | 2% | 10 |
2 | JOURNAL OF SOFTWARE MAINTENANCE AND EVOLUTION-RESEARCH AND PRACTICE | 15276 | 2% | 3% | 6 |
3 | JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS | 12061 | 2% | 2% | 6 |
4 | LANGUAGE RESOURCES AND EVALUATION | 7439 | 1% | 2% | 5 |
5 | IEEE SECURITY & PRIVACY | 7032 | 2% | 1% | 7 |
6 | DIGITAL INVESTIGATION | 5286 | 1% | 1% | 5 |
7 | IEEE TRANSACTIONS ON EDUCATION | 3987 | 3% | 0% | 9 |
8 | IEEE TRANSACTIONS ON SOFTWARE ENGINEERING | 3835 | 3% | 0% | 11 |
9 | COMPUTERS & SECURITY | 3719 | 2% | 1% | 7 |
10 | SOFTWARE QUALITY JOURNAL | 3112 | 1% | 1% | 4 |
Author Key Words |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
LCSH search | Wikipedia search |
---|---|---|---|---|---|---|---|
1 | CODE CLONE | 1640354 | 6% | 95% | 19 | Search CODE+CLONE | Search CODE+CLONE |
2 | SOFTWARE BIRTHMARK | 1272298 | 4% | 100% | 14 | Search SOFTWARE+BIRTHMARK | Search SOFTWARE+BIRTHMARK |
3 | PLAGIARISM DETECTION | 1144615 | 7% | 55% | 23 | Search PLAGIARISM+DETECTION | Search PLAGIARISM+DETECTION |
4 | SOFTWARE PROTECTION | 656577 | 5% | 43% | 17 | Search SOFTWARE+PROTECTION | Search SOFTWARE+PROTECTION |
5 | SOFTWARE CLONES | 646245 | 2% | 89% | 8 | Search SOFTWARE+CLONES | Search SOFTWARE+CLONES |
6 | CLONE DETECTION | 619609 | 4% | 45% | 15 | Search CLONE+DETECTION | Search CLONE+DETECTION |
7 | SOFTWARE WATERMARKING | 484680 | 2% | 67% | 8 | Search SOFTWARE+WATERMARKING | Search SOFTWARE+WATERMARKING |
8 | SOFTWARE PLAGIARISM DETECTION | 454392 | 1% | 100% | 5 | Search SOFTWARE+PLAGIARISM+DETECTION | Search SOFTWARE+PLAGIARISM+DETECTION |
9 | SOFTWARE THEFT DETECTION | 454392 | 1% | 100% | 5 | Search SOFTWARE+THEFT+DETECTION | Search SOFTWARE+THEFT+DETECTION |
10 | CLONE EVOLUTION | 363514 | 1% | 100% | 4 | Search CLONE+EVOLUTION | Search CLONE+EVOLUTION |
Core articles |
The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c: (1) Number of references referring to publications in the class. (2) Share of total number of active references referring to publications in the class. (3) Age of the article. New articles get higher score than old articles. (4) Citation rate, normalized to year. |
Rank | Reference | # ref. in cl. |
Shr. of ref. in cl. |
Citations |
---|---|---|---|---|
1 | RATTAN, D , BHATIA, R , SINGH, M , (2013) SOFTWARE CLONE DETECTION: A SYSTEMATIC REVIEW.INFORMATION AND SOFTWARE TECHNOLOGY. VOL. 55. ISSUE 7. P. 1165 -1199 | 24 | 80% | 29 |
2 | MISIC, M , SUSTRAN, Z , PROTIC, J , (2016) A COMPARISON OF SOFTWARE TOOLS FOR PLAGIARISM DETECTION IN PROGRAMMING ASSIGNMENTS.INTERNATIONAL JOURNAL OF ENGINEERING EDUCATION. VOL. 32. ISSUE 2. P. 738 -748 | 12 | 80% | 1 |
3 | CHEUNG, WT , RYU, S , KIM, S , (2016) DEVELOPMENT NATURE MATTERS: AN EMPIRICAL STUDY OF CODE CLONES IN JAVASCRIPT APPLICATIONS.EMPIRICAL SOFTWARE ENGINEERING. VOL. 21. ISSUE 2. P. 517 -564 | 13 | 72% | 0 |
4 | TIAN, ZZ , LIU, T , ZHENG, QH , FAN, M , ZHUANG, EY , YANG, ZJ , (2016) EXPLOITING THREAD-RELATED SYSTEM CALLS FOR PLAGIARISM DETECTION OF MULTITHREADED PROGRAMS.JOURNAL OF SYSTEMS AND SOFTWARE. VOL. 119. ISSUE . P. 136 -148 | 10 | 83% | 0 |
5 | FLORES, E , BARRON-CEDENO, A , MORENO, L , ROSSO, P , (2015) UNCOVERING SOURCE CODE REUSE IN LARGE-SCALE ACADEMIC ENVIRONMENTS.COMPUTER APPLICATIONS IN ENGINEERING EDUCATION. VOL. 23. ISSUE 3. P. 383 -390 | 10 | 83% | 1 |
6 | CHATTERJI, D , CARVER, JC , KRAFT, NA , (2016) CODE CLONES AND DEVELOPER BEHAVIOR: RESULTS OF TWO SURVEYS OF THE CLONE RESEARCH COMMUNITY.EMPIRICAL SOFTWARE ENGINEERING. VOL. 21. ISSUE 4. P. 1476 -1508 | 8 | 100% | 0 |
7 | WANG, TT , SU, XH , MA, PJ , WANG, KC , (2014) DETECTION OF SEMANTICALLY SIMILAR CODE.FRONTIERS OF COMPUTER SCIENCE. VOL. 8. ISSUE 6. P. 996 -1011 | 11 | 73% | 1 |
8 | STOJANOVIC, S , RADIVOJEVIC, Z , CVETANOVIC, M , (2015) APPROACH FOR ESTIMATING SIMILARITY BETWEEN PROCEDURES IN DIFFERENTLY COMPILED BINARIES.INFORMATION AND SOFTWARE TECHNOLOGY. VOL. 58. ISSUE . P. 259 -271 | 10 | 71% | 2 |
9 | CHARPENTIER, A , FALLERI, JR , MORANDAT, F , YAHIA, EB , REVEILLERE, L , (2017) RATERS' RELIABILITY IN CLONE BENCHMARKS CONSTRUCTION.EMPIRICAL SOFTWARE ENGINEERING. VOL. 22. ISSUE 1. P. 235 -258 | 7 | 100% | 0 |
10 | ROY, CK , CORDY, JR , KOSCHKE, R , (2009) COMPARISON AND EVALUATION OF CODE CLONE DETECTION TECHNIQUES AND TOOLS: A QUALITATIVE APPROACH.SCIENCE OF COMPUTER PROGRAMMING. VOL. 74. ISSUE 7. P. 470 -495 | 10 | 63% | 140 |
Classes with closest relation at Level 1 |