Cost analysis of object-oriented bytecode programs, Theor. Comput. Sci, vol.413, issue.1, pp.142-159, 2012. ,
Algorithm recognition based on demand-driven data-flow analysis, Proceedings of the 10th Working Conference on Reverse Engineering (WCRE), pp.296-305, 2003. ,
When are two algorithms the same?, Bull. Symbolic Logic, vol.15, issue.2, pp.145-168, 2009. ,
What's decidable about arrays, Proc. of VMCAI'06, vol.3855, pp.427-442, 2006. ,
Automatic discovery of linear restraints among variables of a program, Conference Record of the Fifth Annual ACM Symposium on Principles of Programming Languages, POPL'78, pp.84-96, 1978. ,
Semantic code clones in logic programs, Proc. of the 22nd International Symposium on LogicBased Program Synthesis and Transformation (LOPSTR'12), vol.7844, pp.35-50, 2012. ,
Semanticsbased generation of verification conditions by program specialization, Proceedings of the 17th International Symposium on Principles and Practice of Declarative Programming, pp.91-102, 2015. ,
Horn clauses as an intermediate representation for program analysis and transformation, TPLP, vol.15, issue.4-5, pp.526-542, 2015. ,
Report on a knowledge-based software assistant, 1983. ,
Constraint logic programming, Proc. of the ACM Symposium on Principles of Programming Languages, pp.111-119, 1987. ,
The semantics of constraint logic programs, Journal of Logic Programming, vol.37, issue.1-3, pp.1-46, 1998. ,
The Java TM Virtual Machine Specification, 1999. ,
PAP recognizer: A tool for automatic recognition of parallelizable patterns, 4th International Workshop on Program Comprehension (WPC), p.164, 1987. ,
Automatic Algorithm Recognition and Replacement, 2000. ,
Non-termination of Dalvik bytecode via compilation to CLP, Proc. of the 14th International Workshop on Termination (WST'14), pp.65-69, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01451692
Analysis of imperative programs through analysis of constraint logic programs, Static Analysis, 5th International Symposium, SAS '98, pp.246-261, 1998. ,
Transformation of logic programs, Handbook of Logic in Artificial Intelligence and Logic Programming, vol.5, pp.697-787, 1998. ,
Overview of the programmer's apprentice, Proceedings of the Sixth International Joint Conference on Artificial Intelligence (IJCAI), pp.827-828, 1979. ,
A termination analyzer for Java bytecode based on path-length, ACM Trans. Program. Lang. Syst, vol.32, issue.3, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-01186167
Theories, methods and tools in program comprehension: Past, present and future, 13th International Workshop on Program Comprehension (IWPC), pp.181-191, 2005. ,
Static and dynamic slicing of constraint logic programs, Automated Software Engineering, vol.9, issue.1, pp.41-65, 2002. ,
Using decision tree classifiers in source code analysis to recognize algorithms: An experiment with sorting algorithms, Comput. J, vol.54, issue.11, pp.1845-1860, 2011. ,
DOI : 10.1093/comjnl/bxr025
Beacon-and schema-based method for recognizing algorithms from students' source code, Journal of Educational Data Mining, vol.5, issue.2, pp.69-101, 2013. ,
Automated program recognition: A feasibility demonstration, Artificial Intelligence, vol.45, issue.1-2, pp.113-171, 1990. ,
DOI : 10.1016/0004-3702(90)90039-3
Flexible control for program recognition, Proceedings of Working Conference on Reverse Engineering (WCRE), pp.134-143, 1993. ,
DOI : 10.1109/wcre.1993.287771
A first step towards algorithm plagiarism detection, Proceedings of the 2012 International Symposium on Software Testing and Analysis, ISSTA 2012, pp.111-121, 2012. ,
DOI : 10.1145/2338965.2336767
URL : http://www.cse.psu.edu/~szhu/papers/ISSTA_alg_plagrism.pdf
Viewdroid: Towards obfuscation-resilient mobile application repackaging detection, Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec '14, pp.25-36, 2014. ,