Jens Krinke
Jens Krinke
Associate Professor in Computer Science, University College London
Verified email at - Homepage
Cited by
Cited by
Comparison and Evaluation of Clone Detection Tools
S Bellon, R Koschke, G Antoniol, J Krinke, E Merlo
IEEE Trans. Software Eng 33 (9), 577-591, 2007
Identifying similar code with program dependence graphs
J Krinke
Proceedings eighth working conference on reverse engineering, 301-309, 2001
A study of consistent and inconsistent changes to code clones
J Krinke
14th Working Conference on Reverse Engineering (WCRE 2007), 170-178, 2007
Static slicing of threaded programs
J Krinke
Proceedings of the 1998 ACM SIGPLAN-SIGSOFT workshop on Program analysis for …, 1998
Is cloned code more stable than non-cloned code?
J Krinke
2008 Eighth IEEE International Working Conference on Source Code Analysis …, 2008
Searching for better configurations: a rigorous approach to clone evaluation
T Wang, M Harman, Y Jia, J Krinke
Proceedings of the 2013 9th Joint Meeting on Foundations of Software …, 2013
Aspect mining using event traces
S Breu, J Krinke
Proceedings. 19th International Conference on Automated Software Engineering …, 2004
Search based software engineering for software product line engineering: a survey and directions for future work
M Harman, Y Jia, J Krinke, WB Langdon, J Petke, Y Zhang
Proceedings of the 18th International Software Product Line Conference …, 2014
Efficient path conditions in dependence graphs for software safety analysis
G Snelting, T Robschink, J Krinke
ACM Transactions on Software Engineering and Methodology (TOSEM) 15 (4), 410-457, 2006
Context-sensitive slicing of concurrent programs
J Krinke
ESEC/FSE 28 (5), 178-187, 2003
Dynamic path conditions in dependence graphs
C Hammer, M Grimme, J Krinke
Proceedings of the 2006 ACM SIGPLAN symposium on Partial evaluation and …, 2006
A Comparison of Code Similarity Analysers
C Ragkhitwetsagul, J Krinke, D Clark
Empirical Software Engineering 23, 2018
Advanced slicing of sequential and concurrent programs
J Krinke
20th IEEE International Conference on Software Maintenance, 2004 …, 2004
Toxic code snippets on stack overflow
C Ragkhitwetsagul, J Krinke, M Paixao, G Bianco, R Oliveto
IEEE Transactions on Software Engineering 47 (3), 560-581, 2019
Deep parameter optimisation
F Wu, W Weimer, M Harman, Y Jia, J Krinke
Proceedings of the 2015 Annual Conference on Genetic and Evolutionary …, 2015
ORBS: Language-Independent Program Slicing
D Binkley, N Gold, M Harman, S Islam, J Krinke, S Yoo
Foundations of Software Engineering, 12, 2014
Comparative Stability of Cloned and Non-cloned Code: An Empirical Study
M Mondal, CK Roy, MS Rahman, RK Saha, J Krinke, KA Schneider
27th ACM Symposium on Applied Computing, 2012
Is cloned code older than non-cloned code?
J Krinke
5th International Workshop on Detection of Software Clones (IWSC), 28-33, 2011
How Double-Fetch Situations turn into Double-Fetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel
P Wang, J Krinke, K Lu, G Li, S Dodier-Lazaro
USENIX Security Symposium, 2017
Interference analysis for AspectJ
M Störzer, J Krinke
Foundations of Aspect-Oriented Languages, 35-44, 2003
The system can't perform the operation now. Try again later.
Articles 1–20