default search action
Eunjong Choi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Juntong Hong, Eunjong Choi, Osamu Mizuno:
A Combined Alignment Model for Code Search. IEICE Trans. Inf. Syst. 107(3): 257-267 (2024) - [j6]Kinari Nishiura, Eun-Hye Choi, Eunjong Choi, Osamu Mizuno:
Two improving approaches for faulty interaction localization using logistic regression analysis. Softw. Qual. J. 32(3): 1039-1073 (2024) - [c38]Juntong Hong, Eunjong Choi, Kinari Nishiura, Osamu Mizuno:
Global Alignment Learning for Code Search. SERA 2024: 334-339 - [c37]Soshi Inoue, Kinari Nishiura, Eunjong Choi, Osamu Mizuno:
Analyzing the Inpact of Formal Methods on Isuue Trends Using BERTopic. SERA 2024: 340-345 - [c36]Hiroya Watanabe, Masanari Kondo, Eunjong Choi, Osamu Mizuno:
Benefits and Pitfalls of Token-Level SZZ: An Empirical Study on OSS Projects. SANER 2024: 776-786 - [i3]Wenqing Zhu, Norihiro Yoshida, Toshihiro Kamiya, Eunjong Choi, Hiroaki Takada:
Development and Benchmarking of Multilingual Code Clone Detector. CoRR abs/2409.06176 (2024) - 2023
- [j5]Khine Yin Mon, Masanari Kondo, Eunjong Choi, Osamu Mizuno:
Commit-Based Class-Level Defect Prediction for Python Projects. IEICE Trans. Inf. Syst. 106(2): 157-165 (2023) - [c35]Kazuki Yokoi, Eunjong Choi, Norihiro Yoshida, Joji Okada, Yoshiki Higo:
Cost-Benefit Analysis for Modernizing a Large-Scale Industrial System. APSEC 2023: 441-449 - [c34]Masanari Kondo, Shinobu Saito, Yukako Iimura, Eunjong Choi, Osamu Mizuno, Yasutaka Kamei, Naoyasu Ubayashi:
Towards Better Online Communication for Future Software Development in Industry. COMPSAC 2023: 1619-1624 - [c33]Eunjong Choi, Norihiro Fuke, Yuji Fujiwara, Norihiro Yoshida, Katsuro Inoue:
Investigating the Generalizability of Deep Learning-based Clone Detectors. ICPC 2023: 181-185 - [e3]Shane McIntosh, Eunjong Choi, Steffen Herbold:
Proceedings of the 19th International Conference on Predictive Models and Data Analytics in Software Engineering, PROMISE 2023, San Francisco, CA, USA, 8 December 2023. ACM 2023 [contents] - 2022
- [c32]Wenqing Zhu, Norihiro Yoshida, Toshihiro Kamiya, Eunjong Choi, Hiroaki Takada:
MSCCD: grammar pluggable clone detection based on ANTLR parser generation. ICPC 2022: 460-470 - [c31]Masanari Kondo, Shinobu Saito, Yukako Iimura, Eunjong Choi, Osamu Mizuno, Yasutaka Kamei, Naoyasu Ubayashi:
Challenges and Future Research Direction for Microtask Programming in Industry. MSR 2022: 103-104 - [e2]Tsuyoshi Nakajima, Toshihiro Komiyama, Eunjong Choi, Erina Makihara, Hironori Washizaki:
Joint Short Paper Proceedings of the 4th International Workshop on Experience with SQuaRE Series and Its Future Direction, and 1st Asia-Pacific Software Engineering and Diversity, Equity, and Inclusion Workshop co-located with 29th Asia-Pacific Software Engineering Conference (APSEC 2022), Tokyo, Dec 6, 2022. CEUR Workshop Proceedings 3356, CEUR-WS.org 2022 [contents] - [i2]Wenqing Zhu, Norihiro Yoshida, Toshihiro Kamiya, Eunjong Choi, Hiroaki Takada:
MSCCD: Grammar Pluggable Clone Detection Based on ANTLR Parser Generation. CoRR abs/2204.01028 (2022) - 2021
- [p1]Norihiro Yoshida, Eunjong Choi:
Clone Evolution and Management. Code Clone Analysis 2021: 197-208 - 2020
- [c30]Shogo Tokui, Norihiro Yoshida, Eunjong Choi, Katsuro Inoue:
Clone Notifier: Developing and Improving the System to Notify Changes of Code Clones. SANER 2020: 642-646
2010 – 2019
- 2019
- [j4]Md. Rejaul Karim, Akinori Ihara, Eunjong Choi, Hajimu Iida:
Identifying and predicting key features to support bug reporting. J. Softw. Evol. Process. 31(12) (2019) - [c29]Norihiro Yoshida, Seiya Numata, Eunjong Choi, Katsuro Inoue:
Proactive clone recommendation system for extract method refactoring. IWOR@ICSE 2019: 67-70 - [c28]Hirotaka Honda, Shogo Tokui, Kazuki Yokoi, Eunjong Choi, Norihiro Yoshida, Katsuro Inoue:
CCEvovis: a clone evolution visualization system for software maintenance. ICPC 2019: 122-125 - [c27]Yuji Fujiwara, Norihiro Yoshida, Eunjong Choi, Katsuro Inoue:
Code-to-Code Search Based on Deep Neural Network and Code Mutation. IWSC 2019: 1-7 - [c26]Kyohei Uemura, Akira Mori, Eunjong Choi, Hajimu Iida:
Tracking Method-Level Clones and a Case Study. IWSC 2019: 27-33 - [e1]Eunjong Choi, Daqing Hou:
13th IEEE International Workshop on Software Clones, IWSC 2019, Hangzhou, China, February 24, 2019. IEEE 2019, ISBN 978-1-7281-1805-5 [contents] - 2018
- [c25]Eunjong Choi, Daiki Tanaka, Norihiro Yoshida, Kenji Fujiwara, Daniel Port, Hajimu Iida:
An Investigation of the Relationship between Extract Method and Change Metrics: A Case Study of JEdit. APSEC 2018: 653-657 - [c24]Yuichi Semura, Norihiro Yoshida, Eunjong Choi, Katsuro Inoue:
Multilingual Detection of Code Clones Using ANTLR Grammar Definitions. APSEC 2018: 673-677 - [c23]Kazuki Yokoi, Eunjong Choi, Norihiro Yoshida, Katsuro Inoue:
Investigating Vector-Based Detection of Code Clones Using BigCloneBench. APSEC 2018: 699-700 - [c22]Kisub Kim, Dongsun Kim, Tegawendé F. Bissyandé, Eunjong Choi, Li Li, Jacques Klein, Yves Le Traon:
FaCoY: a code-to-code search engine. ICSE 2018: 946-957 - [c21]Boldizsár Németh, Eunjong Choi, Erina Makihara, Hajimu Iida:
Investigating Compilation Errors of Students Learning Haskell. TFPIE@TFP 2018: 52-64 - [i1]Eunjong Choi, Kenji Fujiwara, Norihiro Yoshida, Shinpei Hayashi:
A Survey of Refactoring Detection Techniques Based on Change History Analysis. CoRR abs/1808.02320 (2018) - 2017
- [c20]Yuichi Semura, Norihiro Yoshida, Eunjong Choi, Katsuro Inoue:
CCFinderSW: Clone Detection Tool with Flexible Multilingual Tokenization. APSEC 2017: 654-659 - [c19]Kyohei Uemura, Akira Mori, Kenji Fujiwara, Eunjong Choi, Hajimu Iida:
Detecting and analyzing code clones in HDL. IWSC 2017: 1-7 - [c18]Katsuhisa Maruyama, Shinpei Hayashi, Norihiro Yoshida, Eunjong Choi:
Frame-based behavior preservation in refactoring. SANER 2017: 573-574 - 2016
- [c17]Norihiro Yoshida, Tsubasa Saika, Eunjong Choi, Ali Ouni, Katsuro Inoue:
Revisiting the relationship between code smells and refactoring. ICPC 2016: 1-4 - [c16]Shogo Tsutsumi, Eunjong Choi, Norihiro Yoshida, Katsuro Inoue:
Graph-based approach for detecting impure refactoring from version commits. IWoR@ASE 2016: 13-16 - [c15]Seiya Numata, Norihiro Yoshida, Eunjong Choi, Katsuro Inoue:
On the Effectiveness of Vector-Based Approach for Supporting Simultaneous Editing of Software Clones. PROFES 2016: 560-567 - [c14]Tsubasa Saika, Eunjong Choi, Norihiro Yoshida, Shusuke Haruna, Katsuro Inoue:
Do Developers Focus on Severe Code Smells? PPAP@SANER 2016: 1-3 - [c13]Yuta Nakamura, Eunjong Choi, Norihiro Yoshida, Shusuke Haruna, Katsuro Inoue:
Towards Detection and Analysis of Interlanguage Clones for Multilingual Web Applications. IWSC 2016: 17-18 - 2015
- [j3]Eunjong Choi, Norihiro Yoshida, Yoshiki Higo, Katsuro Inoue:
Proposing and Evaluating Clone Detection Approaches with Preprocessing Input Source Files. IEICE Trans. Inf. Syst. 98-D(2): 325-333 (2015) - [c12]Eunjong Choi, Norihiro Yoshida, Raula Gaikovina Kula, Katsuro Inoue:
What do practitioners ask about code clone? a preliminary investigation of stack overflow. IWSC 2015: 49-50 - [c11]Yong Jin, Xin Yang, Raula Gaikovina Kula, Eunjong Choi, Katsuro Inoue, Hajimu Iida:
Quick Trigger on Stack Overflow: A Study of Gamification-Influenced Member Tendencies. MSR 2015: 434-437 - 2014
- [j2]Norihiro Yoshida, Eunjong Choi, Yuki Yamanaka, Katsuro Inoue:
How We Know the Practical Impact of Clone Analysis. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 63 (2014) - [j1]Eunjong Choi, Norihiro Yoshida, Katsuro Inoue:
An Investigation into the Characteristics of Merged Code Clones during Software Evolution. IEICE Trans. Inf. Syst. 97-D(5): 1244-1253 (2014) - [c10]Tsubasa Saika, Eunjong Choi, Norihiro Yoshida, Akira Goto, Shusuke Haruna, Katsuro Inoue:
What Kinds of Refactorings are Co-Occurred? An Analysis of Eclipse Usage Datasets. IWESEP 2014: 31-36 - [c9]Manamu Sano, Eunjong Choi, Norihiro Yoshida, Yuki Yamanaka, Katsuro Inoue:
Supporting clone analysis with tag cloud visualization. InnoSWDev@SIGSOFT FSE 2014: 94-99 - 2013
- [c8]Akira Goto, Norihiro Yoshida, Masakazu Ioka, Eunjong Choi, Katsuro Inoue:
Method differentiator using slice-based cohesion metrics. AOSD (Companion) 2013: 11-14 - [c7]Yuki Yamanaka, Eunjong Choi, Norihiro Yoshida, Katsuro Inoue, Tateki Sano:
Applying clone change notification system into an industrial development process. ICPC 2013: 199-206 - [c6]Akira Goto, Norihiro Yoshida, Masakazu Ioka, Eunjong Choi, Katsuro Inoue:
How to extract differences from similar programs? A cohesion metric approach. IWSC 2013: 23-29 - [c5]Norihiro Yoshida, Eunjong Choi, Katsuro Inoue:
Active support for clone refactoring: a perspective. WRT@SPLASH 2013: 13-16 - 2012
- [c4]Eunjong Choi, Norihiro Yoshida, Katsuro Inoue:
What kind of and how clones are refactored?: a case study of three OSS projects. WRT@ICSE 2012: 1-7 - [c3]Yuki Yamanaka, Eunjong Choi, Norihiro Yoshida, Katsuro Inoue, Tateki Sano:
Industrial application of clone change management system. IWSC 2012: 67-71 - [c2]Katsuro Inoue, Yoshiki Higo, Norihiro Yoshida, Eunjong Choi, Shinji Kusumoto, Kyonghwan Kim, Wonjin Park, Eunha Lee:
Experience of finding inconsistently-changed bugs in code clones of mobile software. IWSC 2012: 94-95 - 2011
- [c1]Eunjong Choi, Norihiro Yoshida, Takashi Ishio, Katsuro Inoue, Tateki Sano:
Extracting code clones for refactoring using combinations of clone metrics. IWSC 2011: 7-13
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-14 23:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint