Toxic code snippets on stack overflow
Online code clones are code fragments that are copied from software projects or online
sources to Stack Overflow as examples. Due to an absence of a checking mechanism after …
sources to Stack Overflow as examples. Due to an absence of a checking mechanism after …
Searching for better configurations: a rigorous approach to clone evaluation
Clone detection finds application in many software engineering activities such as
comprehension and refactoring. However, the confounding configuration choice problem …
comprehension and refactoring. However, the confounding configuration choice problem …
[HTML][HTML] A systematic mapping study of clone visualization
Knowing code clones (similar code fragments) is helpful in software maintenance and re-
engineering. As clone detectors return huge numbers of clones, visualization techniques …
engineering. As clone detectors return huge numbers of clones, visualization techniques …
[PDF][PDF] A survey of software clone detection techniques
A Sheneamer, J Kalita - International Journal of Computer …, 2016 - scholar.archive.org
If two fragments of source code are identical or similar to each other, they are called code
clones. Code clones introduce difficulties in software maintenance and cause bug …
clones. Code clones introduce difficulties in software maintenance and cause bug …
Towards learning (dis)-similarity of source code from program contrasts
Understanding the functional (dis)-similarity of source code is significant for code modeling
tasks such as software vulnerability and code clone detection. We present DISCO (DIS …
tasks such as software vulnerability and code clone detection. We present DISCO (DIS …
Method-level code clone detection through LWH (Light Weight Hybrid) approach
Background Many researchers have investigated different techniques to automatically detect
duplicate code in programs exceeding thousand lines of code. These techniques have …
duplicate code in programs exceeding thousand lines of code. These techniques have …
Contrastive learning for source code with structural and functional properties
Pre-trained transformer models have recently shown promises for understanding the source
code. Most existing works expect to understand code from the textual features and limited …
code. Most existing works expect to understand code from the textual features and limited …
Clone detection on large scala codebases
Code clones are identical or similar code segments. The wide existence of code clones can
increase the cost of maintenance and jeopardise the quality of software. The research …
increase the cost of maintenance and jeopardise the quality of software. The research …
A tree kernel based approach for clone detection
Reusing software by copying and pasting is a common practice in software development.
This phenomenon is widely known as code cloning. Problems with clones are mainly due to …
This phenomenon is widely known as code cloning. Problems with clones are mainly due to …
Droidclone: Attack of the android malware clones-a step towards stopping them
S Alam, I Sogukpinar - Computer Science and Information Systems, 2021 - doiserbia.nb.rs
Code clones are frequent in use because they can be created fast with little effort and
expense. Especially for malware writers, it is easier to create a clone of the original than …
expense. Especially for malware writers, it is easier to create a clone of the original than …