Two-Pass technique for clone detection and type classification using tree-based convolution neural network

YB Jo, J Lee, CJ Yoo - Applied Sciences, 2021 - mdpi.com
Appropriate reliance on code clones significantly reduces development costs and hastens
the development process. Reckless cloning, in contrast, reduces code quality and ultimately …

Using the uniqueness of global identifiers to determine the provenance of Python software source code

Y Sun, D German, S Zacchiroli - Empirical Software Engineering, 2023 - Springer
We consider the problem of identifying the provenance of free/open source software (FOSS)
and specifically the need of identifying where reused source code has been copied from. We …

[PDF][PDF] Comprehensively meld code clone identifier for replicated source code identification in diverse web browsers

R Dhaya, R Kanthavel - Journal of trends in Computer Science …, 2020 - researchgate.net
The emergence and the progress in the process of reusing the software's, has caused
difficulties in the maintaining the software codes and the corresponding depositories …

On cloud computing infrastructure for existing code-clone detection algorithms

A Walker, T Cerny - ACM SIGAPP Applied Computing Review, 2020 - dl.acm.org
Microservice Architecture (MSA) is becoming a design standard for modern cloud-based
software systems. However, even though cloud-based applications have been thoroughly …

Differentiators and detectors

A Mili - Information Processing Letters, 2021 - Elsevier
Given two programs, say P and Q, a differentiator is a test suite T such that execution of P
and Q on T produces different outcomes; this concept is used in mutation testing, where it is …

An experimental comparison of clone detection techniques using Java bytecode

JG Schneider, SU Lee - 2022 29th Asia-Pacific Software …, 2022 - ieeexplore.ieee.org
It is generally accepted in Software Engineering that code clones–often the result of copy-
and-paste of existing code–result in poorer maintainability of software systems …

Source Code Anti-Plagiarism: AC# Implementation Using the Routing Approach

F d'Amore, L Zarfati - Proceedings of Seventh International Congress on …, 2022 - Springer
Despite the approaches proposed so far, software plagiarism is still a problem which has not
been solved entirely yet. The approach introduced throughout this paper is about a source …

Sur l'élaboration de meilleures techniques pour l'apprentissage auto-supervisé des représentations du code

L Maes - 2023 - papyrus.bib.umontreal.ca
Les représentations du code apprises par les modèles d'apprentissage profond sont une
composante cruciale pour certaines applications en génie logiciel telles que la recherche de …

Mutation testing-based evaluation framework for evaluating software clone detection tools

P Gautam, H Saini - Reliability and Risk Assessment in Engineering …, 2020 - Springer
Mutation testing has become a prominent research area in the past few decades. The
mutation testing has been basically used in the testing society. It is a type of software testing …

[PDF][PDF] Effects of Code Clone on Software Quality

M Sirshar, M Ayoub, SF Khan, S Fatima - Academia. edu, 2019 - academia.edu
This paper presents explanation about effects on software quality due to code clone. Code
clones are a main source of software defects. Code clones are the replicated code which …