default search action
Yoshiki Higo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j17]Yoshiki Higo:
Dataset of Functionally Equivalent Java Methods and Its Application to Evaluating Clone Detection Tools. IEICE Trans. Inf. Syst. 107(6): 751-760 (2024) - [j16]Shiyu Yang, Tetsuya Kanda, Daniel M. Germán, Yoshiki Higo:
Unveiling Python Version Compatibility Challenges in Code Snippets on Stack Overflow. IEICE Trans. Inf. Syst. 107(8): 1007-1015 (2024) - 2021
- [j15]Yoshiki Higo, Alexander Serebrenik:
Introduction to Special Issue on Source Code Analysis and Manipulation. J. Syst. Softw. 177: 110949 (2021) - 2020
- [j14]Yoshiki Higo, Shinpei Hayashi, Hideaki Hata, Meiyappan Nagappan:
Ammonia: an approach for deriving project-specific bug patterns. Empir. Softw. Eng. 25(3): 1951-1979 (2020) - [j13]Yoshiki Higo, Shinpei Hayashi, Shinji Kusumoto:
On tracking Java methods with Git mechanisms. J. Syst. Softw. 165: 110571 (2020) - 2019
- [j12]Bushra Aloraini, Meiyappan Nagappan, Daniel M. Germán, Shinpei Hayashi, Yoshiki Higo:
An empirical study of security warnings from static application security testing tools. J. Syst. Softw. 158 (2019) - 2016
- [j11]Nils Göde, Yoshiki Higo, Rainer Koschke:
Special section on software clones. Softw. Qual. J. 24(4): 879-881 (2016) - 2015
- [j10]Jiachen Yang, Keisuke Hotta, Yoshiki Higo, Hiroshi Igaki, Shinji Kusumoto:
Classification model for code clones based on machine learning. Empir. Softw. Eng. 20(4): 1095-1125 (2015) - [j9]Eunjong Choi, Norihiro Yoshida, Yoshiki Higo, Katsuro Inoue:
Proposing and Evaluating Clone Detection Approaches with Preprocessing Input Source Files. IEICE Trans. Inf. Syst. 98-D(2): 325-333 (2015) - 2014
- [j8]Keisuke Hotta, Jiachen Yang, Yoshiki Higo, Shinji Kusumoto:
How Accurate Is Coarse-grained Clone Detection?: Comparision with Fine-grained Detectors. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 63 (2014) - [j7]Rainer Koschke, Nils Göde, Yoshiki Higo:
Preface to the Proceedings of the Eighth International Workshop on Software Clones. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 63 (2014) - 2012
- [j6]Keisuke Hotta, Yui Sasaki, Yukiko Sano, Yoshiki Higo, Shinji Kusumoto:
An Empirical Study on the Impact of Duplicate Code. Adv. Softw. Eng. 2012: 938296:1-938296:22 (2012) - [j5]Dotri Quoc, Kazuo Kobori, Norihiro Yoshida, Yoshiki Higo, Katsuro Inoue:
ModiChecker: Accessibility Excessiveness Analysis Tool for Java Program. Inf. Media Technol. 7(4): 1401-1407 (2012) - 2011
- [j4]T. Edagawa, T. Akaike, Yoshiki Higo, Shinji Kusumoto, Shigeo Hanabusa, T. Shibamoto:
Function point measurement from Web application source code based on screen transitions and database accesses. J. Syst. Softw. 84(6): 976-984 (2011) - 2008
- [j3]Yoshiki Higo, Shinji Kusumoto, Katsuro Inoue:
A metric-based approach to identifying refactoring opportunities for merging code clones in a Java software system. J. Softw. Maintenance Res. Pract. 20(6): 435-461 (2008) - 2007
- [j2]Yoshiki Higo, Toshihiro Kamiya, Shinji Kusumoto, Katsuro Inoue:
Method and implementation for investigating code clones in a software system. Inf. Softw. Technol. 49(9-10): 985-998 (2007) - 2005
- [j1]Yoshiki Higo, Toshihiro Kamiya, Shinji Kusumoto, Katsuro Inoue:
ARIES: refactoring support tool for code clone. ACM SIGSOFT Softw. Eng. Notes 30(4): 1-4 (2005)
Conference and Workshop Papers
- 2024
- [c119]Ramita Deeprom, Shiyu Yang, Yoshiki Higo, Morakot Choetkiertikul, Chaiyong Ragkhitwetsagul:
Challenges in Adopting LLaMA: An Empirical Study of Discussions on Stack Overflow. QuASoQ@APSEC 2024: 35-42 - [c118]Shota Hori, Shinsuke Matsumoto, Yoshiki Higo, Shinji Kusumoto, Kazuya Yasuda, Shinji Itoh, Phan Thi Thanh Huyen:
The Effects of Semantic Information on LLM-Based Program Repair. PROFES 2024: 377-385 - [c117]Ryutaro Inoue, Yoshiki Higo:
Improving Accuracy of LLM-based Code Clone Detection U sing Functionally Equivalent Methods. SERA 2024: 24-27 - [c116]Chihiro Yoshida, Makoto Matsushita, Yoshiki Higo:
Estimating the Difficulty of Programming Problems Using Fine-tuned LLM. SERA 2024: 28-34 - [c115]Wataru Otoda, Tetsuya Kanda, Yuki Manabe, Katsuro Inoue, Yoshiki Higo:
SBOM Challenges for Developers: From Analysis of Stack Overflow Questions. SERA 2024: 43-46 - [c114]Hikaru Kubo, Yoshiki Higo, Shinji Kusumoto:
Revisiting Program Suitability for Fault Localization with Large Dataset and Various Mutation Operators. SERA 2024: 107-114 - [c113]Rio Kishimoto, Tetsuya Kanda, Yuki Manabe, Katsuro Inoue, Yoshiki Higo:
Osmy: A Tool for Periodic Software Vulnerability Assessment and File Integrity Verification using SPDX Documents. SANER 2024: 445-449 - [c112]Pongpop Lapvikai, Chaiyong Ragkhitwetsagul, Morakot Choetkiertikul, Yoshiki Higo:
Autorepairability: A New Software Quality Characteristic. SANER 2024: 787-791 - 2023
- [c111]Kazuki Yokoi, Eunjong Choi, Norihiro Yoshida, Joji Okada, Yoshiki Higo:
Cost-Benefit Analysis for Modernizing a Large-Scale Industrial System. APSEC 2023: 441-449 - [c110]Shiyu Yang, Tetsuya Kanda, Davide Pizzolotto, Daniel M. Germán, Yoshiki Higo:
PyVerDetector: A Chrome Extension Detecting the Python Version of Stack Overflow Code Snippets. ICPC 2023: 25-29 - [c109]Ryoga Watanabe, Yoshiki Higo, Shinji Kusumoto:
Impacts of Program Structures on Code Coverage of Generated Test Suites. PROFES (1) 2023: 355-362 - [c108]Haruka Yoshioka, Yoshiki Higo, Shinsuke Matsumoto, Shinji Kusumoto, Shinji Itoh, Phan Thi Thanh Huyen:
Do Exceptional Behavior Tests Matter on Spectrum-Based Fault Localization? PROFES (1) 2023: 399-414 - 2022
- [c107]Yoshiki Higo, Shinsuke Matsumoto, Shinji Kusumoto, Kazuya Yasuda:
Constructing Dataset of Functionally Equivalent Java Methods Using Automated Test Generation Techniques. MSR 2022: 682-686 - [c106]Masashi Iriyama, Yoshiki Higo, Shinji Kusumoto:
Classification of Changes Based on API. PROFES 2022: 61-70 - [c105]Riku Takaichi, Yoshiki Higo, Shinsuke Matsumoto, Shinji Kusumoto, Toshiyuki Kurabayashi, Hiroyuki Kirinuki, Haruto Tanno:
Are NLP Metrics Suitable for Evaluating Generated Code? PROFES 2022: 531-537 - [c104]Haruka Yoshioka, Yoshiki Higo, Shinji Kusumoto:
Improving Weighted-SBFL by Blocking Spectrum. SCAM 2022: 253-263 - [c103]Hiroyuki Kirinuki, Shinsuke Matsumoto, Yoshiki Higo, Shinji Kusumoto:
Web Element Identification by Combining NLP and Heuristic Search for Web Testing. SANER 2022: 1055-1065 - 2021
- [c102]Yoshiki Higo, Junnosuke Matsumoto, Shinji Kusumoto:
Tree-based Mining of Fine-grained Code Changes to Detect Unknown Change Patterns. APSEC 2021: 61-71 - [c101]Hiroto Watanabe, Shinsuke Matsumoto, Yoshiki Higo, Shinji Kusumoto, Toshiyuki Kurabayashi, Hiroyuki Kirinuki, Haruto Tanno:
Applying Multi-Objective Genetic Algorithm for Efficient Selection on Program Generation. APSEC 2021: 515-519 - [c100]Akira Fujimoto, Yoshiki Higo, Shinji Kusumoto:
Towards Accurate File Tracking Based on AST Differences. APSEC 2021: 553-558 - [c99]Hiroyuki Kirinuki, Shinsuke Matsumoto, Yoshiki Higo, Shinji Kusumoto:
NLP-assisted Web Element Identification Toward Script-free Testing. ICSME 2021: 639-643 - [c98]Tomoaki Tsuru, Tasuku Nakagawa, Shinsuke Matsumoto, Yoshiki Higo, Shinji Kusumoto:
Type-2 Code Clone Detection for Dockerfiles. IWSC 2021: 1-7 - [c97]Tasuku Nakagawa, Yoshiki Higo, Shinji Kusumoto:
NIL: large-scale detection of large-variance clones. ESEC/SIGSOFT FSE 2021: 830-841 - [c96]Sho Ogino, Yoshiki Higo, Shinji Kusumoto:
Evaluating Bug Prediction under Realistic Settings. SANER 2021: 491-495 - 2020
- [c95]Yoshiki Higo, Shinsuke Matsumoto, Taeyoung Kim, Shinji Kusumoto:
How Weak Reference is Used in Java Projects? APSEC 2020: 445-449 - [c94]Tasuku Nakagawa, Yoshiki Higo, Shinji Kusumoto:
CLIONE: Clone Modification Support for Pull Request Based Development. APSEC 2020: 455-459 - [c93]Aoi Maejima, Yoshiki Higo, Junnosuke Matsumoto, Shinji Kusumoto:
Does This Code Change Affect Program Behavior? Identifying Nonbehavioral Changes with Bytecode. COMPSAC 2020: 1103-1104 - [c92]Ryoko Izuta, Shinsuke Matsumoto, Yoshiki Higo, Shinji Kusumoto:
Program Repairing History as Git Repository. ICSE (Workshops) 2020: 15-16 - [c91]Yui Sasaki, Yoshiki Higo, Shinsuke Matsumoto, Shinji Kusumoto:
SBFL-Suitability: A Software Characteristic for Fault Localization. ICSME 2020: 702-706 - [c90]Tetsushi Kuma, Yoshiki Higo, Shinsuke Matsumoto, Shinji Kusumoto:
Improving the Accuracy of Spectrum-based Fault Localization for Automated Program Repair. ICPC 2020: 376-380 - [c89]Akira Fujimoto, Yoshiki Higo, Junnosuke Matsumoto, Shinji Kusumoto:
Staged Tree Matching for Detecting Code Move across Files. ICPC 2020: 396-400 - 2019
- [c88]Masayuki Doi, Yoshiki Higo, Shinji Kusumoto:
A Code Clone Curation - Towards Scalable and Incremental Clone Detection -. QuASoQ@APSEC 2019: 19-26 - [c87]Tasuku Nakagawa, Yoshiki Higo, Junnosuke Matsumoto, Shinji Kusumoto:
How Compact Will My System Be? A Fully-Automated Way to Calculate LoC Reduced by Clone Refactoring. APSEC 2019: 284-291 - [c86]Kaisei Hanayama, Shinsuke Matsumoto, Yoshiki Higo, Shinji Kusumoto:
Achievements Visualization in Programming Education. COMPSAC (1) 2019: 926-927 - [c85]Junnosuke Matsumoto, Yoshiki Higo, Hiroyuki Matsuo, Ryo Arima, Shinsuke Matsumoto, Shinji Kusumoto:
GenProg Meets Cluster Computing. IWESEP 2019: 37-42 - [c84]Junichi Hayashi, Yoshiki Higo, Shinsuke Matsumoto, Shinji Kusumoto:
Impacts of daylight saving time on software development. MSR 2019: 502-506 - [c83]Junnosuke Matsumoto, Yoshiki Higo, Shinji Kusumoto:
Beyond GumTree: a hybrid approach to generate edit scripts. MSR 2019: 550-554 - [c82]Yuya Tomida, Yoshiki Higo, Shinsuke Matsumoto, Shinji Kusumoto:
Visualizing Code Genealogy: How Code is Evolutionarily Fixed in Program Repair? VISSOFT 2019: 23-27 - [c81]Hiroyuki Matsuo, Shinsuke Matsumoto, Yoshiki Higo, Shinji Kusumoto:
Madoop: Improving Browser-Based Volunteer Computing Based on Modern Web Technologies. SANER 2019: 634-638 - 2018
- [c80]Yoshiki Higo, Shinsuke Matsumoto, Ryo Arima, Akito Tanikado, Keigo Naitou, Junnosuke Matsumoto, Yuya Tomida, Shinji Kusumoto:
kGenProg: A High-Performance, High-Extensibility and High-Portability APR System. APSEC 2018: 697-698 - [c79]Ryo Arima, Yoshiki Higo, Shinji Kusumoto:
Toward refactoring evaluation with code naturalness. ICPC 2018: 316-319 - [c78]Keigo Naitou, Akito Tanikado, Shinsuke Matsumoto, Yoshiki Higo, Shinji Kusumoto, Hiroyuki Kirinuki, Toshiyuki Kurabayashi, Haruto Tanno:
Toward introducing automated program repair techniques to industrial software development. ICPC 2018: 332-335 - [c77]Masayuki Doi, Yoshiki Higo, Ryo Arima, Kento Shimonaka, Shinji Kusumoto:
On the naturalness of auto-generated code: can we identify auto-generated code automatically? ICPC 2018: 340-343 - [c76]Kento Shimonaka, Yoshiki Higo, Junnosuke Matsumoto, Keigo Naito, Shinji Kusumoto:
Towards automated generation of Java methods: A way of automated reuse-based programming. IWSC 2018: 30-36 - [c75]Yoshiki Higo, Shinsuke Matsumoto, Shinji Kusumoto, Takashi Fujinami, Takashi Hoshino:
Correlation analysis between code clone metrics and project data on the same specification projects. IWSC 2018: 37-43 - [c74]Ryo Arima, Yoshiki Higo, Shinji Kusumoto:
A study on inappropriately partitioned commits: how much and what kinds of IP commits in Java projects? MSR 2018: 336-340 - 2017
- [c73]Ayaka Imazato, Yoshiki Higo, Keisuke Hotta, Shinji Kusumoto:
Finding Extract Method Refactoring Opportunities by Analyzing Development History. COMPSAC (1) 2017: 190-195 - [c72]Akito Tanikado, Haruki Yokoyama, Masahiro Yamamoto, Soichi Sumi, Yoshiki Higo, Shinji Kusumoto:
New Strategies for Selecting Reuse Candidates on Automated Program Repair. COMPSAC (2) 2017: 266-267 - [c71]Ryo Arima, Yoshiki Higo, Shinji Kusumoto:
Investigation and Detection of Split Commit. COMPSAC (2) 2017: 268-269 - [c70]Yoshiki Higo, Shinji Kusumoto:
Flattening Code for Metrics Measurement and Analysis. ICSME 2017: 494-498 - [c69]Haruki Yokoyama, Yoshiki Higo, Shinji Kusumoto:
Evaluating Automated Program Repair Using Characteristics of Defects. IWESEP 2017: 47-52 - [c68]Yusuke Sabi, Yoshiki Higo, Shinji Kusumoto:
Rearranging the order of program statements for code clone detection. IWSC 2017: 15-21 - [c67]Shamsa Abid, Salman Javed, Momna Naseem, Suleman Shahid, Hamid Abdul Basit, Yoshiki Higo:
Codeease: harnessing method clone structures for reuse. IWSC 2017: 24-30 - [c66]Yusuke Yuki, Yoshiki Higo, Shinji Kusumoto:
A technique to detect multi-grained code clones. IWSC 2017: 54-60 - [c65]Yoshiki Higo, Akio Ohtani, Shinji Kusumoto:
Generating simpler AST edit scripts by considering copy-and-paste. ASE 2017: 532-542 - 2016
- [c64]Hiroyuki Kirinuki, Yoshiki Higo, Keisuke Hotta, Shinji Kusumoto:
Splitting Commits via Past Code Changes. APSEC 2016: 129-136 - [c63]Hiroki Nakajima, Yoshiki Higo, Haruki Yokoyama, Shinji Kusumoto:
Toward Developer-like Automated Program Repair - Modification Comparisons between GenProg and Developers. APSEC 2016: 241-248 - [c62]Naoto Ogura, Jiachen Yang, Keisuke Hotta, Yoshiki Higo, Shinji Kusumoto:
Hey! Are you injecting side effect?: A tool for detecting purity changes in java methods. ICPC 2016: 1-3 - [c61]Yusuke Yuki, Yoshiki Higo, Keisuke Hotta, Shinji Kusumoto:
Generating clone references with less human subjectivity. ICPC 2016: 1-4 - [c60]Haruki Yokoyama, Yoshiki Higo, Keisuke Hotta, Takafumi Ohta, Kozo Okano, Shinji Kusumoto:
Toward improving ability to repair bugs automatically: a patch candidate location mechanism using code similarity. SAC 2016: 1364-1370 - [c59]Kento Shimonaka, Soichi Sumi, Yoshiki Higo, Shinji Kusumoto:
Identifying Auto-Generated Code by Using Machine Learning Techniques. IWESEP@SANER 2016: 18-23 - [c58]Ryotaro Kou, Yoshiki Higo, Shinji Kusumoto:
A Capable Crossover Technique on Automatic Program Repair. IWESEP@SANER 2016: 45-50 - 2015
- [c57]Soichi Sumi, Yoshiki Higo, Keisuke Hotta, Shinji Kusumoto:
Toward improving graftability on automated program repair. ICSME 2015: 511-515 - [c56]Jiachen Yang, Keisuke Hotta, Yoshiki Higo, Shinji Kusumoto:
Towards purity-guided refactoring in Java. ICSME 2015: 521-525 - [c55]Tomoya Ishihara, Yoshiki Higo, Shinji Kusumoto:
How Often Is Necessary Code Missing? - A Controlled Experiment -. ICSR 2015: 156-163 - [c54]Jiachen Yang, Keisuke Hotta, Yoshiki Higo, Shinji Kusumoto:
Revealing Purity and Side Effects on Functions for Reusing Java Libraries. ICSR 2015: 314-329 - [c53]Yusuke Sabi, Hiroaki Murakami, Yoshiki Higo, Shinji Kusumoto:
Reordering results of keyword-based code search for supporting simultaneous code changes. ICPC 2015: 289-290 - [c52]Akio Ohtani, Yoshiki Higo, Tomoya Ishihara, Shinji Kusumoto:
On the level of code suggestion for reuse. IWSC 2015: 26-32 - [c51]Takafumi Ohta, Hiroaki Murakami, Hiroshi Igaki, Yoshiki Higo, Shinji Kusumoto:
Source code reuse evaluation by using real/potential copy and paste. IWSC 2015: 33-39 - [c50]Yoshiki Higo, Akio Ohtani, Shinpei Hayashi, Hideaki Hata, Shinji Kusumoto:
Toward Reusing Code Changes. MSR 2015: 372-376 - [c49]Hiroaki Murakami, Yoshiki Higo, Shinji Kusumoto:
ClonePacker: A tool for clone set visualization. SANER 2015: 474-478 - 2014
- [c48]Hiroaki Murakami, Keisuke Hotta, Yoshiki Higo, Shinji Kusumoto:
Predicting Next Changes at the Fine-Grained Level. APSEC (1) 2014: 119-126 - [c47]Shuhei Kimura, Keisuke Hotta, Yoshiki Higo, Hiroshi Igaki, Shinji Kusumoto:
Does return null matter? CSMR-WCRE 2014: 244-253 - [c46]Rainer Koschke, Nils Göde, Yoshiki Higo:
International workshop on software clones. CSMR-WCRE 2014: 477 - [c45]Kenji Yamauchi, Jiachen Yang, Keisuke Hotta, Yoshiki Higo, Shinji Kusumoto:
Clustering Commits for Understanding the Intents of Implementation. ICSME 2014: 406-410 - [c44]Hiroyuki Kirinuki, Yoshiki Higo, Keisuke Hotta, Shinji Kusumoto:
Hey! are you committing tangled changes? ICPC 2014: 262-265 - [c43]Yoshiki Higo, Shinji Kusumoto:
MPAnalyzer: a tool for finding unintended inconsistencies in program source code. ASE 2014: 843-846 - [c42]Hiroaki Murakami, Yoshiki Higo, Shinji Kusumoto:
A dataset of clone references with gaps. MSR 2014: 412-415 - [c41]Ayaka Imazato, Keisuke Hotta, Yoshiki Higo, Shinji Kusumoto:
Predicting Risky Clones Based on Machine Learning. PROFES 2014: 294-297 - [c40]Yoshiki Higo, Shinji Kusumoto:
How should we measure functional sameness from program source code? an exploratory study on Java methods. SIGSOFT FSE 2014: 294-305 - 2013
- [c39]Noa Kusunoki, Keisuke Hotta, Yoshiki Higo, Shinji Kusumoto:
How Much Do Code Repositories Include Peripheral Modifications? APSEC (2) 2013: 19-24 - [c38]Tetsuo Yamamoto, Norihiro Yoshida, Yoshiki Higo:
Seamless Code Reuse with Source Code Corpus. APSEC (2) 2013: 31-36 - [c37]Yui Sasaki, Yoshiki Higo, Shinji Kusumoto:
Reordering Program Statements for Improving Readability. CSMR 2013: 361-364 - [c36]Hiroaki Murakami, Keisuke Hotta, Yoshiki Higo, Hiroshi Igaki, Shinji Kusumoto:
Gapped code clone detection with lightweight source code analysis. ICPC 2013: 93-102 - [c35]Yoshiki Higo, Keisuke Hotta, Shinji Kusumoto:
Enhancement of CRD-based clone tracking. IWPSE 2013: 28-37 - [c34]Yoshiki Higo, Shinji Kusumoto:
Identifying clone removal opportunities based on co-evolution analysis. IWPSE 2013: 63-67 - [c33]Ayaka Imazato, Yui Sasaki, Yoshiki Higo, Shinji Kusumoto:
Improving Process of Source Code Modification Focusing on Repeated Code. PROFES 2013: 298-312 - [c32]Tomoya Ishihara, Keisuke Hotta, Yoshiki Higo, Shinji Kusumoto:
Reusing reused code. WCRE 2013: 457-461 - 2012
- [c31]Yui Sasaki, Tomoya Ishihara, Keisuke Hotta, Hideaki Hata, Yoshiki Higo, Hiroshi Igaki, Shinji Kusumoto:
Preprocessing of Metrics Measurement Based on Simplifying Program Structures. APSEC Workshops 2012: 120-127 - [c30]Norihiro Yoshida, Yoshiki Higo, Shinji Kusumoto, Katsuro Inoue:
An Experience Report on Analyzing Industrial Software Systems Using Code Clone Detection Techniques. APSEC 2012: 310-313 - [c29]Keisuke Hotta, Yoshiki Higo, Shinji Kusumoto:
Identifying, Tailoring, and Suggesting Form Template Method Refactoring Opportunities with Program Dependence Graph. CSMR 2012: 53-62 - [c28]Yoshiki Higo, Shinji Kusumoto:
How often do unintended inconsistencies happen? Deriving modification patterns and detecting overlooked code fragments. ICSM 2012: 222-231 - [c27]Shuhei Kimura, Yoshiki Higo, Hiroshi Igaki, Shinji Kusumoto:
Move code refactoring with dynamic analysis. ICSM 2012: 575-578 - [c26]Keisuke Hotta, Yoshiki Higo, Hiroshi Igaki, Shinji Kusumoto:
CRat: A refactoring support tool for Form Template Method. ICPC 2012: 250-252 - [c25]Jiachen Yang, Keisuke Hotta, Yoshiki Higo, Hiroshi Igaki, Shinji Kusumoto:
Filtering clones for individual user based on machine learning analysis. IWSC 2012: 76-77 - [c24]Katsuro Inoue, Yoshiki Higo, Norihiro Yoshida, Eunjong Choi, Shinji Kusumoto, Kyonghwan Kim, Wonjin Park, Eunha Lee:
Experience of finding inconsistently-changed bugs in code clones of mobile software. IWSC 2012: 94-95 - [c23]Hiroaki Murakami, Keisuke Hotta, Yoshiki Higo, Hiroshi Igaki, Shinji Kusumoto:
Folding Repeated Instructions for Improving Token-Based Code Clone Detection. SCAM 2012: 64-73 - [c22]Umekawa Kohichi, Hiroshi Igaki, Yoshiki Higo, Shinji Kusumoto:
A Study of Student Experience Metrics for Software Development PBL. SNPD 2012: 465-469 - [c21]Tomoya Ishihara, Keisuke Hotta, Yoshiki Higo, Hiroshi Igaki, Shinji Kusumoto:
Inter-Project Functional Clone Detection Toward Building Libraries - An Empirical Study on 13, 000 Projects. WCRE 2012: 387-391 - 2011
- [c20]Yoshiki Higo, Shinji Kusumoto:
Code Clone Detection on Specialized PDGs with Heuristics. CSMR 2011: 75-84 - [c19]Tomoko Kanemitsu, Yoshiki Higo, Shinji Kusumoto:
A visualization method of program dependency graph for identifying extract method opportunity. WRT@ICSE 2011: 8-14 - [c18]Yoshiki Higo, Akira Saitoh, Goro Yamada, Tatsuya Miyake, Shinji Kusumoto, Katsuro Inoue:
A Pluggable Tool for Measuring Software Metrics from Source Code. IWSM/Mensura 2011: 3-12 - [c17]Yoshiki Higo, Yasushi Ueda, Minoru Nishino, Shinji Kusumoto:
Incremental Code Clone Detection: A PDG-based Approach. WCRE 2011: 3-12 - 2010
- [c16]Keisuke Hotta, Yukiko Sano, Yoshiki Higo, Shinji Kusumoto:
Is duplicate code more frequently modified than non-duplicate code in software evolution?: an empirical study on open source software. EVOL/IWPSE 2010: 73-82 - [c15]Yoshiki Higo, Kensuke Tanaka, Shinji Kusumoto:
Toward identifying inter-project clone sets for building useful libraries. IWSC 2010: 87-88 - 2009
- [c14]Yoshiki Higo, Ken-ichi Sawa, Shinji Kusumoto:
Problematic Code Clones Identification Using Multiple Detection Results. APSEC 2009: 365-372 - [c13]Yoshiki Higo, Shinji Kusumoto:
Enhancing Quality of Code Clone Detection with Program Dependency Graph. WCRE 2009: 315-316 - 2008
- [c12]Yoshiki Higo, Yoshihiro Matsumoto, Shinji Kusumoto, Katsuro Inoue:
Refactoring Effect Estimation Based on Complexity Metrics. Australian Software Engineering Conference 2008: 219-228 - [c11]Tatsuya Miyake, Yoshiki Higo, Katsuro Inoue:
A metric-based approach for reconstructing methods in object-oriented systems. WoSQ@ICSE 2008: 53-58 - [c10]Yoshiki Higo, Kenji Murao, Shinji Kusumoto, Katsuro Inoue:
Predicting fault-prone modules based on metrics transitions. DEFECTS 2008: 6-10 - 2007
- [c9]Yoshiki Higo, Yasushi Ueda, Shinji Kusumoto, Katsuro Inoue:
Simultaneous Modification Support based on Code Clone Analysis. APSEC 2007: 262-269 - [c8]Simone Livieri, Yoshiki Higo, Makoto Matsushita, Katsuro Inoue:
Very-Large Scale Code Clone Analysis and Visualization of Open Source Programs Using Distributed CCFinder: D-CCFinder. ICSE 2007: 106-115 - [c7]Simone Livieri, Yoshiki Higo, Makoto Matsushita, Katsuro Inoue:
Analysis of the Linux Kernel Evolution Using Code Clone Coverage. MSR 2007: 22 - 2006
- [c6]Yoshiki Mitani, Nahomi Kikuchi, Tomoko Matsumura, Satoshi Iwamura, Yoshiki Higo, Katsuro Inoue, Mike Barker, Ken-ichi Matsumoto:
Effects of software industry structure on a research framework for empirical software engineering. ICSE 2006: 616-619 - 2005
- [c5]Yoshiki Higo, Toshihiro Kamiya, Shinji Kusumoto, Katsuro Inoue:
ARIES: refactoring support tool for code clone. WoSQ@ICSE 2005: 53-56 - [c4]Norihiro Yoshida, Yoshiki Higo, Toshihiro Kamiya, Shinji Kusumoto, Katsuro Inoue:
On Refactoring Support Based on Code Clone Dependency Relation. IEEE METRICS 2005: 16 - 2004
- [c3]Yoshiki Higo, Toshihiro Kamiya, Shinji Kusumoto, Katsuro Inoue:
ARIES: Refactoring support environment based on code clone analysis. IASTED Conf. on Software Engineering and Applications 2004: 222-229 - [c2]Yoshiki Higo, Toshihiro Kamiya, Shinji Kusumoto, Katsuro Inoue:
Refactoring Support Based on Code Clone Analysis. PROFES 2004: 220-233 - 2002
- [c1]Yoshiki Higo, Yasushi Ueda, Toshihiro Kamiya, Shinji Kusumoto, Katsuro Inoue:
On Software Maintenance Process Improvement Based on Code Clone Analysis. PROFES 2002: 185-197
Parts in Books or Collections
- 2021
- [p1]Yoshiki Higo:
Identifying Refactoring-Oriented Clones and Inferring How They Can Be Merged. Code Clone Analysis 2021: 183-196
Informal and Other Publications
- 2020
- [i2]Yoshiki Higo, Shinpei Hayashi, Hideaki Hata, Meiyappan Nagappan:
Ammonia: An Approach for Deriving Project-specific Bug Patterns. CoRR abs/2001.09630 (2020) - [i1]Yoshiki Higo, Shinpei Hayashi, Shinji Kusumoto:
On Tracking Java Methods with Git Mechanisms. CoRR abs/2003.05336 (2020)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-18 19:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint