The vision of software clone management: Past, present, and future (keynote paper)
Duplicated code or code clones are a kind of code smell that have both positive and
negative impacts on the development and maintenance of software systems. Software clone …
negative impacts on the development and maintenance of software systems. Software clone …
AI writes, we analyze: The ChatGPT python code saga
In this study, we quantitatively analyze 1,756 AI-written Python code snippets in the DevGPT
dataset and evaluate them for quality and security issues. We systematically distinguish the …
dataset and evaluate them for quality and security issues. We systematically distinguish the …
Sbom generation tools under microscope: A focus on the npm ecosystem
Generating accurate Software Bill of Materials (SBOM) is challenging due to the complex
dependencies in the diverse components used in software and also the way software is built …
dependencies in the diverse components used in software and also the way software is built …
Security vulnerabilities in categories of clones and non-cloned code: An empirical study
Background: Software security has drawn immense importance in the recent years. While
efforts are expected in minimizing security vulnerabilities in source code, the developers' …
efforts are expected in minimizing security vulnerabilities in source code, the developers' …
What changes in where? an empirical study of bug-fixing change patterns
A deep understanding of the common patterns of bug-fixing changes is useful in several
ways:(a) such knowledge can help developers in proactively avoiding coding patterns that …
ways:(a) such knowledge can help developers in proactively avoiding coding patterns that …
Exposing I/O concurrency with informed prefetching
RH Patterson, GA Gibson - Proceedings of 3rd International …, 1994 - ieeexplore.ieee.org
Informed prefetching provides a simple mechanism for I/O-intensive, cache-ineffective
applications to efficiently exploit highly-parallel I/O subsystems such as disk arrays. This …
applications to efficiently exploit highly-parallel I/O subsystems such as disk arrays. This …
On the characteristics of buggy code clones: A code quality perspective
Code clone is an immensely studied code smell. Not all the clones in a software system are
equally harmful. Earlier work studied various traits of clones including their stability and …
equally harmful. Earlier work studied various traits of clones including their stability and …
Investigating near-miss micro-clones in evolving software
Code clones are the same or nearly similar code fragments in a software system's code-
base. While the existing studies have extensively studied regular code clones in software …
base. While the existing studies have extensively studied regular code clones in software …
gcad: A near-miss clone genealogy extractor to support clone evolution analysis
Understanding the evolution of code clones is important for both developers and
researchers to understand the maintenance implications of clones and to design robust …
researchers to understand the maintenance implications of clones and to design robust …
基于软件多版本演化提取克隆谱系
涂颖, 张丽萍, 王春晖, 侯敏, 刘东升 - 计算机应用, 2015 - joca.cn
针对单个版本克隆检测结果不足以体现克隆特征这一问题, 从软件多版本中自动提取克隆谱系,
获得克隆在软件演化过程中表现出的模式和特征. 首先基于克隆代码Token …
获得克隆在软件演化过程中表现出的模式和特征. 首先基于克隆代码Token …