A Survey of Software Clone Detection Techniques
Abdullah Sheneamer,Jugal Kalita +1 more
Reads0
Chats0
TLDR
In this study, code clones, common types of clones, phases of clone detection, the state-ofthe-art in code clone detection techniques and tools, and challenges faced byclone detection techniques are discussed.Abstract:
If two fragments of source code are identical or similar to each other, they are called code clones. Code clones introduce difficulties in software maintenance and cause bug propagation. Software clones occur due to several reasons such as code reuse by copying pre-existing fragments, coding style, and repeated computation using duplicated functions with slight changes in variables or data structures used. If a code fragment is edited, it will have to be checked against all related code clones to see if they need to be modified as well. Removal, avoidance or refactoring of cloned code are other important issues in software maintenance. However, several research studies have demonstrated that removal or refactoring of cloned code is sometimes harmful. In this study, code clones, common types of clones, phases of clone detection, the state-ofthe-art in code clone detection techniques and tools, and challenges faced by clone detection techniques are discussed.read more
Citations
More filters
Clone Detection in Automotive Model-Based Development.
Florian Deissenboeck,Benjamin Hummel,Elmar Jürgens,Bernhard Schätz,Stefan Wagner,Jean-François Girard,Stefan Teuchert +6 more
TL;DR: In this paper, the authors present an approach for the automatic detection of clones in large models as they are used in model-based development of control systems, which can be applied to most graphical data-flow languages.
Proceedings ArticleDOI
Oreo: detection of clones in the twilight zone
TL;DR: Ore is presented, a novel approach to source code clone detection that not only detects Type-1 to Type-3 clones accurately, but is also capable of detecting harder-to-detect clones in the Twilight Zone.
Proceedings ArticleDOI
Oreo: Detection of Clones in the Twilight Zone
TL;DR: In this article, the authors present Oreo, a novel approach to source code clone detection that not only detects Type-1 to Type-3 clones accurately, but is also capable of detecting harder-to-detect clones in the Twilight Zone.
Journal ArticleDOI
Code smells and refactoring: A tertiary systematic review of challenges and observations
Guilherme Lacerda,Guilherme Lacerda,Fabio Petrillo,Marcelo Soares Pimenta,Yann-Gaël Guéhéneuc +4 more
TL;DR: In this article, the authors present a tertiary systematic literature review of previous surveys, secondary systematic literature reviews, and systematic mappings on code smells and refactoring, and identify the main observations (what we know) and challenges (What we do not know) on code smell and reusability.
References
More filters
Book
Data Mining: Concepts and Techniques
TL;DR: This book presents dozens of algorithms and implementation examples, all in pseudo-code and suitable for use in real-world, large-scale data mining projects, and provides a comprehensive, practical look at the concepts and techniques you need to get the most out of real business data.
Journal ArticleDOI
Identification of common molecular subsequences.
TL;DR: This letter extends the heuristic homology algorithm of Needleman & Wunsch (1970) to find a pair of segments, one from each of two long sequences, such that there is no other Pair of segments with greater similarity (homology).
Proceedings Article
The MD5 Message-Digest Algorithm
TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.