Studying clone evolution using incremental clone detection
N Göde, R Koschke - Journal of Software: Evolution and …, 2013 - Wiley Online Library
Finding, understanding and managing software clones—passages of duplicated source
code—is of large interest in research and practice. Analyzing the evolution of clones across …
code—is of large interest in research and practice. Analyzing the evolution of clones across …
Clone evolution: a systematic review
Detection of code clones—similar or identical source code fragments—is of concern both to
researchers and to practitioners. An analysis of the clone detection results for a single …
researchers and to practitioners. An analysis of the clone detection results for a single …
Incremental clone detection
N Göde, R Koschke - 2009 13th European conference on …, 2009 - ieeexplore.ieee.org
Finding, understanding and managing software clones-passages of duplicated source code-
is of large interest in research and practice. There is an abundance of techniques to detect …
is of large interest in research and practice. There is an abundance of techniques to detect …
Nil: large-scale detection of large-variance clones
T Nakagawa, Y Higo, S Kusumoto - Proceedings of the 29th ACM Joint …, 2021 - dl.acm.org
A code clone (in short, clone) is a code fragment that is identical or similar to other code
fragments in source code. Clones generated by a large number of changes to copy-and …
fragments in source code. Clones generated by a large number of changes to copy-and …
An automatic framework for extracting and classifying near-miss clone genealogies
Extracting code clone genealogies across multiple versions of a program and classifying
them according to their change patterns underlies the study of code clone evolution. While …
them according to their change patterns underlies the study of code clone evolution. While …
A data mining approach for detecting higher-level clones in software
HA Basit, S Jarzabek - IEEE Transactions on Software …, 2009 - ieeexplore.ieee.org
Code clones are similar program structures recurring in variant forms in software system (s).
Several techniques have been proposed to detect similar code fragments in software, so …
Several techniques have been proposed to detect similar code fragments in software, so …
[PDF][PDF] A survey of software clone detection techniques
A Sheneamer, J Kalita - International Journal of Computer …, 2016 - scholar.archive.org
If two fragments of source code are identical or similar to each other, they are called code
clones. Code clones introduce difficulties in software maintenance and cause bug …
clones. Code clones introduce difficulties in software maintenance and cause bug …
Comparison and evaluation of code clone detection techniques and tools: A qualitative approach
Over the last decade many techniques and tools for software clone detection have been
proposed. In this paper, we provide a qualitative comparison and evaluation of the current …
proposed. In this paper, we provide a qualitative comparison and evaluation of the current …
Near‐miss function clones in open source software: an empirical study
The new hybrid clone detection tool NICAD combines the strengths and overcomes the
limitations of both text‐based and AST‐based clone detection techniques and exploits novel …
limitations of both text‐based and AST‐based clone detection techniques and exploits novel …
Comparison and evaluation of clone detection tools
S Bellon, R Koschke, G Antoniol… - IEEE Transactions on …, 2007 - ieeexplore.ieee.org
Many techniques for detecting duplicated source code (software clones) have been
proposed in the past. However, it is not yet clear how these techniques compare in terms of …
proposed in the past. However, it is not yet clear how these techniques compare in terms of …