Login / Signup

Examining the effectiveness of using concolic analysis to detect code clones.

Daniel E. KrutzSamuel A. MalachowskyEmad Shihab
Published in: SAC (2015)
Keyphrases
  • database
  • statistical analysis
  • detection algorithm
  • detection method
  • analysis tool
  • neural network
  • artificial intelligence
  • cooperative
  • data analysis
  • mobile devices
  • image analysis
  • anomaly detection