Code smells and refactoring: A tertiary systematic review of challenges and observations
Refactoring and smells have been well researched by the software-engineering research
community these past decades. Several secondary studies have been published on code …
community these past decades. Several secondary studies have been published on code …
Software clone detection: A systematic review
CONTEXT: Reusing software by means of copy and paste is a frequent activity in software
development. The duplicated code is known as a software clone and the activity is known as …
development. The duplicated code is known as a software clone and the activity is known as …
A comparison of code similarity analysers
Copying and pasting of source code is a common activity in software engineering. Often, the
code is not copied as it is and it may be modified for various purposes; eg refactoring, bug …
code is not copied as it is and it may be modified for various purposes; eg refactoring, bug …
A systematic literature review on bad smells–5 w's: which, when, what, who, where
EV de Paulo Sobrinho, A De Lucia… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
Bad smells are sub-optimal code structures that may represent problems needing attention.
We conduct an extensive literature review on bad smells relying on a large body of …
We conduct an extensive literature review on bad smells relying on a large body of …
The vision of software clone management: Past, present, and future (keynote paper)
Duplicated code or code clones are a kind of code smell that have both positive and
negative impacts on the development and maintenance of software systems. Software clone …
negative impacts on the development and maintenance of software systems. Software clone …
Revolver: An automated approach to the detection of evasive web-based malware
In recent years, attacks targeting web browsers and their plugins have become a prevalent
threat. Attackers deploy web pages that contain exploit code, typically written in HTML and …
threat. Attackers deploy web pages that contain exploit code, typically written in HTML and …
A systematic literature review on the use of machine learning in code clone research
Context: Research related to code clones includes detection of clones in software systems,
analysis, visualization and management of clones. Detection of semantic clones and …
analysis, visualization and management of clones. Detection of semantic clones and …
Bundled visualization of dynamicgraph and trail data
C Hurter, O Ersoy, SI Fabrikant… - IEEE transactions on …, 2013 - ieeexplore.ieee.org
Depicting change captured by dynamic graphs and temporal paths, or trails, is hard. We
present two techniques for simplified visualization of such data sets using edge bundles …
present two techniques for simplified visualization of such data sets using edge bundles …
A systematic literature review: code bad smells in java source code
Code smell is an indication of a software designing problem. The presence of code smells
can have a severe impact on the software quality. Smells basically refers to the structure of …
can have a severe impact on the software quality. Smells basically refers to the structure of …
A systematic literature review on the detection of smells and their evolution in object‐oriented and service‐oriented systems
This systematic literature review paper investigates the key techniques employed to identify
smells in different paradigms of software engineering from object‐oriented (OO) to service …
smells in different paradigms of software engineering from object‐oriented (OO) to service …