Evaluating clone detection tools with bigclonebench

J Svajlenko, CK Roy - 2015 IEEE international conference on …, 2015 - ieeexplore.ieee.org
Many clone detection tools have been proposed in the literature. However, our knowledge of
their performance in real software systems is limited, particularly their recall. In this paper …

[PDF][PDF] Detecting and measuring similarity in code clones

R Smith, S Horwitz - … of the International workshop on Software …, 2009 - pages.cs.wisc.edu
Most previous work on code-clone detection has focused on finding identical clones, or
clones that are identical up to identifiers and literal values. However, it is often important to …

[PDF][PDF] A survey on software clone detection research

CK Roy, JR Cordy - Queen's School of computing TR, 2007 - research.cs.queensu.ca
Code duplication or copying a code fragment and then reuse by pasting with or without any
modifications is a well known code smell in software maintenance. Several studies show …

[PDF][PDF] A case for structural clones

HA Basit, S Jarzabek - Proc. Int. Workshop on Software Clones …, 2009 - academia.edu
In previous work, we introduced the concept of structural clone as recurring configurations of
simple clones (ie, similar code fragments). We also described a technique for detection of …

Raters' reliability in clone benchmarks construction

A Charpentier, JR Falleri, F Morandat… - Empirical Software …, 2017 - Springer
Cloned code often complicates code maintenance and evolution and must therefore be
effectively detected. One of the biggest challenges for clone detectors is to reduce the …

Comparison and evaluation of code clone detection techniques and tools: A qualitative approach

CK Roy, JR Cordy, R Koschke - Science of computer programming, 2009 - Elsevier
Over the last decade many techniques and tools for software clone detection have been
proposed. In this paper, we provide a qualitative comparison and evaluation of the current …

Index-based code clone detection: incremental, distributed, scalable

B Hummel, E Juergens, L Heinemann… - 2010 IEEE …, 2010 - ieeexplore.ieee.org
Although numerous different clone detection approaches have been proposed to date, not a
single one is both incremental and scalable to very large code bases. They thus cannot …

How clones are maintained: An empirical study

L Aversano, L Cerulo, M Di Penta - 11th European Conference …, 2007 - ieeexplore.ieee.org
Despite the conventional wisdom concerning the risks related to the use of source code
cloning as a software development strategy, several studies appeared in literature indicated …

VisCad: flexible code clone analysis support for NiCad

M Asaduzzaman, CK Roy, KA Schneider - Proceedings of the 5th …, 2011 - dl.acm.org
Clone detector results can be better understood with tools that support visualization and
facilitate in-depth analysis. In this tool demo paper we present VisCad, a comprehensive …

On the structural code clone detection problem: a survey and software metric based approach

M Kapdan, M Aktas, M Yigit - … Science and Its Applications–ICCSA 2014 …, 2014 - Springer
Unnecessary repeated codes (clones) have not been well documented and are difficult to
maintain. Code clones may become an important problem in software development cycle …