Follow
Keisuke Hotta
Title
Cited by
Cited by
Year
Is duplicate code more frequently modified than non-duplicate code in software evolution? An empirical study on open source software
K Hotta, Y Sano, Y Higo, S Kusumoto
Proceedings of the Joint ERCIM Workshop on Software Evolution (EVOL) and …, 2010
1362010
Hey! are you committing tangled changes?
H Kirinuki, Y Higo, K Hotta, S Kusumoto
Proceedings of the 22nd International Conference on Program Comprehension …, 2014
962014
Identifying, tailoring, and suggesting form template method refactoring opportunities with program dependence graph
K Hotta, Y Higo, S Kusumoto
2012 16th European conference on software maintenance and reengineering, 53-62, 2012
822012
Gapped code clone detection with lightweight source code analysis
H Murakami, K Hotta, Y Higo, H Igaki, S Kusumoto
2013 21st International Conference on Program Comprehension (ICPC), 93-102, 2013
812013
Inter-project functional clone detection toward building libraries-an empirical study on 13,000 projects
T Ishihara, K Hotta, Y Higo, H Igaki, S Kusumoto
2012 19th Working Conference on Reverse Engineering, 387-391, 2012
712012
Classification model for code clones based on machine learning
J Yang, K Hotta, Y Higo, H Igaki, S Kusumoto
Empirical Software Engineering 20, 1095-1125, 2015
572015
Folding repeated instructions for improving token-based code clone detection
H Murakami, K Hotta, Y Higo, H Igaki, S Kusumoto
2012 IEEE 12th international working conference on source code analysis and …, 2012
382012
Enhancement of CRD-based clone tracking
Y Higo, K Hotta, S Kusumoto
Proceedings of the 2013 International Workshop on Principles of Software …, 2013
262013
Experience report: How effective is automated program repair for industrial software?
K Noda, Y Nemoto, K Hotta, H Tanida, S Kikuchi
2020 IEEE 27th International Conference on Software Analysis, Evolution and …, 2020
242020
How accurate is coarse-grained clone detection?: Comparision with fine-grained detectors
K Hotta, J Yang, Y Higo, S Kusumoto
Electronic Communications of the EASST 63, 2014
242014
Clustering commits for understanding the intents of implementation
K Yamauchi, J Yang, K Hotta, Y Higo, S Kusumoto
2014 IEEE international conference on software maintenance and evolution …, 2014
202014
Filtering clones for individual user based on machine learning analysis
J Yang, K Hotta, Y Higo, H Igaki, S Kusumoto
2012 6th International Workshop on Software Clones (IWSC), 76-77, 2012
202012
An empirical study on the impact of duplicate code
K Hotta, Y Sasaki, Y Sano, Y Higo, S Kusumoto
Advances in Software Engineering 2012, 2012
202012
Does return null matter?
S Kimura, K Hotta, Y Higo, H Igaki, S Kusumoto
2014 Software Evolution Week-IEEE Conference on Software Maintenance …, 2014
162014
Reusing reused code
T Ishihara, K Hotta, Y Higo, S Kusumoto
2013 20th Working Conference on Reverse Engineering (WCRE), 457-461, 2013
152013
Generating clone references with less human subjectivity
Y Yuki, Y Higo, K Hotta, S Kusumoto
2016 IEEE 24th International Conference on Program Comprehension (ICPC), 1-4, 2016
142016
Splitting commits via past code changes
H Kirinuki, Y Higo, K Hotta, S Kusumoto
2016 23rd Asia-Pacific Software Engineering Conference (APSEC), 129-136, 2016
132016
Revealing purity and side effects on functions for reusing java libraries
J Yang, K Hotta, Y Higo, S Kusumoto
Software Reuse for Dynamic Systems in the Cloud and Beyond: 14th …, 2014
132014
Toward improving ability to repair bugs automatically: a patch candidate location mechanism using code similarity
H Yokoyama, Y Higo, K Hotta, T Ohta, K Okano, S Kusumoto
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 1364-1370, 2016
122016
How much do code repositories include peripheral modifications?
N Kusunoki, K Hotta, Y Higo, S Kusumoto
2013 20th Asia-Pacific Software Engineering Conference (APSEC) 2, 19-24, 2013
122013
The system can't perform the operation now. Try again later.
Articles 1–20