Toxic code snippets on stack overflow

C Ragkhitwetsagul, J Krinke, M Paixao… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Online code clones are code fragments that are copied from software projects or online
sources to Stack Overflow as examples. Due to an absence of a checking mechanism after …

Searching for better configurations: a rigorous approach to clone evaluation

T Wang, M Harman, Y Jia, J Krinke - Proceedings of the 2013 9th Joint …, 2013 - dl.acm.org
Clone detection finds application in many software engineering activities such as
comprehension and refactoring. However, the confounding configuration choice problem …

[HTML][HTML] A systematic mapping study of clone visualization

M Hammad, HA Basit, S Jarzabek, R Koschke - Computer Science Review, 2020 - Elsevier
Knowing code clones (similar code fragments) is helpful in software maintenance and re-
engineering. As clone detectors return huge numbers of clones, visualization techniques …

[PDF][PDF] A survey of software clone detection techniques

A Sheneamer, J Kalita - International Journal of Computer …, 2016 - scholar.archive.org
If two fragments of source code are identical or similar to each other, they are called code
clones. Code clones introduce difficulties in software maintenance and cause bug …

Towards learning (dis)-similarity of source code from program contrasts

Y Ding, L Buratti, S Pujar, A Morari, B Ray… - arXiv preprint arXiv …, 2021 - arxiv.org
Understanding the functional (dis)-similarity of source code is significant for code modeling
tasks such as software vulnerability and code clone detection. We present DISCO (DIS …

Method-level code clone detection through LWH (Light Weight Hybrid) approach

E Kodhai, S Kanmani - Journal of Software Engineering Research and …, 2014 - Springer
Background Many researchers have investigated different techniques to automatically detect
duplicate code in programs exceeding thousand lines of code. These techniques have …

Contrastive learning for source code with structural and functional properties

Y Ding, L Buratti, S Chakraborty, S Pujar, A Morari… - 2021 - openreview.net
Pre-trained transformer models have recently shown promises for understanding the source
code. Most existing works expect to understand code from the textual features and limited …

Clone detection on large scala codebases

W Rahman, Y Xu, F Pu, J Xuan, X Jia… - 2020 IEEE 14th …, 2020 - ieeexplore.ieee.org
Code clones are identical or similar code segments. The wide existence of code clones can
increase the cost of maintenance and jeopardise the quality of software. The research …

A tree kernel based approach for clone detection

A Corazza, S Di Martino, V Maggio… - 2010 IEEE …, 2010 - ieeexplore.ieee.org
Reusing software by copying and pasting is a common practice in software development.
This phenomenon is widely known as code cloning. Problems with clones are mainly due to …

Droidclone: Attack of the android malware clones-a step towards stopping them

S Alam, I Sogukpinar - Computer Science and Information Systems, 2021 - doiserbia.nb.rs
Code clones are frequent in use because they can be created fast with little effort and
expense. Especially for malware writers, it is easier to create a clone of the original than …