P. Albert, S. Arenas, G. Genaim, D. Puebla, and . Zanardini, Cost analysis of object-oriented bytecode programs, Theor. Comput. Sci, vol.413, issue.1, pp.142-159, 2012.

C. Alias and D. Barthou, Algorithm recognition based on demand-driven data-flow analysis, Proceedings of the 10th Working Conference on Reverse Engineering (WCRE), pp.296-305, 2003.

A. Blass, N. Dershowitz, and Y. Gurevich, When are two algorithms the same?, Bull. Symbolic Logic, vol.15, issue.2, pp.145-168, 2009.

A. R. Bradley, Z. Manna, and H. B. Sipma, What's decidable about arrays, Proc. of VMCAI'06, vol.3855, pp.427-442, 2006.

P. Cousot and N. Halbwachs, Automatic discovery of linear restraints among variables of a program, Conference Record of the Fifth Annual ACM Symposium on Principles of Programming Languages, POPL'78, pp.84-96, 1978.

C. Dandois and W. Vanhoof, Semantic code clones in logic programs, Proc. of the 22nd International Symposium on LogicBased Program Synthesis and Transformation (LOPSTR'12), vol.7844, pp.35-50, 2012.

F. De-angelis, A. Fioravanti, M. Pettorossi, and . Proietti, Semanticsbased generation of verification conditions by program specialization, Proceedings of the 17th International Symposium on Principles and Practice of Declarative Programming, pp.91-102, 2015.

J. A. Gange, P. Navas, H. Schachte, P. J. Søndergaard, and . Stuckey, Horn clauses as an intermediate representation for program analysis and transformation, TPLP, vol.15, issue.4-5, pp.526-542, 2015.

D. Green, R. Luckham, T. Balzer, C. Cheatham, and . Rich, Report on a knowledge-based software assistant, 1983.

J. Jaffar and J. L. Lassez, Constraint logic programming, Proc. of the ACM Symposium on Principles of Programming Languages, pp.111-119, 1987.

J. Jaffar, M. J. Maher, K. Marriott, and P. J. Stuckey, The semantics of constraint logic programs, Journal of Logic Programming, vol.37, issue.1-3, pp.1-46, 1998.

T. Lindholm and F. Yellin, The Java TM Virtual Machine Specification, 1999.

J. W. Lloyd-;-b, G. Martino, and . Iannello, PAP recognizer: A tool for automatic recognition of parallelizable patterns, 4th International Workshop on Program Comprehension (WPC), p.164, 1987.

R. Metzger and Z. Wen, Automatic Algorithm Recognition and Replacement, 2000.

E. Payet and F. Mesnard, Non-termination of Dalvik bytecode via compilation to CLP, Proc. of the 14th International Workshop on Termination (WST'14), pp.65-69, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01451692

J. C. Peralta, J. P. Gallagher, and H. Saglam, Analysis of imperative programs through analysis of constraint logic programs, Static Analysis, 5th International Symposium, SAS '98, pp.246-261, 1998.

A. Pettorossi and M. Proietti, Transformation of logic programs, Handbook of Logic in Artificial Intelligence and Logic Programming, vol.5, pp.697-787, 1998.

C. Rich, H. E. Shrobe, and R. C. Waters, Overview of the programmer's apprentice, Proceedings of the Sixth International Joint Conference on Artificial Intelligence (IJCAI), pp.827-828, 1979.

F. Spoto, F. Mesnard, and . Payet, A termination analyzer for Java bytecode based on path-length, ACM Trans. Program. Lang. Syst, vol.32, issue.3, 2010.
URL : https://hal.archives-ouvertes.fr/hal-01186167

M. D. Storey, Theories, methods and tools in program comprehension: Past, present and future, 13th International Workshop on Program Comprehension (IWPC), pp.181-191, 2005.

G. Szilágyi, T. Gyimóthy, and J. Ma?uszy´nskima?uszy´nski, Static and dynamic slicing of constraint logic programs, Automated Software Engineering, vol.9, issue.1, pp.41-65, 2002.

A. Taherkhani, Using decision tree classifiers in source code analysis to recognize algorithms: An experiment with sorting algorithms, Comput. J, vol.54, issue.11, pp.1845-1860, 2011.
DOI : 10.1093/comjnl/bxr025

A. Taherkhani and L. Malmi, Beacon-and schema-based method for recognizing algorithms from students' source code, Journal of Educational Data Mining, vol.5, issue.2, pp.69-101, 2013.

M. Wills, Automated program recognition: A feasibility demonstration, Artificial Intelligence, vol.45, issue.1-2, pp.113-171, 1990.
DOI : 10.1016/0004-3702(90)90039-3

M. Wills, Flexible control for program recognition, Proceedings of Working Conference on Reverse Engineering (WCRE), pp.134-143, 1993.
DOI : 10.1109/wcre.1993.287771

Y. Zhang, D. Jhi, P. Wu, S. Liu, and . Zhu, A first step towards algorithm plagiarism detection, Proceedings of the 2012 International Symposium on Software Testing and Analysis, ISSTA 2012, pp.111-121, 2012.
DOI : 10.1145/2338965.2336767

URL : http://www.cse.psu.edu/~szhu/papers/ISSTA_alg_plagrism.pdf

F. Zhang, H. Huang, S. Zhu, D. Wu, and P. Liu, Viewdroid: Towards obfuscation-resilient mobile application repackaging detection, Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec '14, pp.25-36, 2014.