scispace - formally typeset
Open AccessJournal ArticleDOI

Comparison and evaluation of code clone detection techniques and tools: A qualitative approach

TLDR
A qualitative comparison and evaluation of the current state-of-the-art in clone detection techniques and tools is provided, and a taxonomy of editing scenarios that produce different clone types and a qualitative evaluation of current clone detectors are evaluated.
About
This article is published in Science of Computer Programming.The article was published on 2009-05-01 and is currently open access. It has received 989 citations till now.

read more

Citations
More filters
Proceedings ArticleDOI

Deep learning code fragments for code clone detection

TL;DR: This work introduces learning-based detection techniques where everything for representing terms and fragments in source code is mined from the repository, and compared its approach to a traditional structure-oriented technique and found that it detected clones that were either undetected or suboptimally reported by the prominent tool Deckard.
Proceedings ArticleDOI

SourcererCC: scaling code clone detection to big-code

TL;DR: In this article, a token-based clone detector, SourcererCC, is proposed to detect both exact and near-miss clones from large inter-project repositories using a standard workstation.
Journal ArticleDOI

Software clone detection: A systematic review

TL;DR: An extensive systematic literature review of software clones in general and software clone detection in particular calls for an increased awareness of the potential benefits of software clone management, and identifies the need to develop semantic and model clone detection techniques.
Proceedings ArticleDOI

A measurement study of google play

TL;DR: The usefulness of PlayDrone is demonstrated in decompiling and analyzing application content by exploring four previously unaddressed issues: the characterization of Google Play application content at large scale and its evolution over time, library usage in applications and its impact on application portability, duplicative application content in Google Play, and the ineffectiveness of OAuth and related service authentication mechanisms.
Proceedings Article

An Evaluation Framework for Plagiarism Detection

TL;DR: Empirical evidence is given that the construction of tailored training corpora for plagiarism detection can be automated, and hence be done on a large scale.
References
More filters
Book

Refactoring: Improving the Design of Existing Code

TL;DR: Almost every expert in Object-Oriented Development stresses the importance of iterative development, but how do you add function to the existing code base while still preserving its design integrity?
Journal ArticleDOI

CCFinder: a multilinguistic token-based code clone detection system for large scale source code

TL;DR: A new clone detection technique, which consists of the transformation of input source text and a token-by-token comparison, is proposed, which has effectively found clones and the metrics have been able to effectively identify the characteristics of the systems.
Journal ArticleDOI

A Space-Economical Suffix Tree Construction Algorithm

TL;DR: A new algorithm is presented for constructing auxiliary digital search trees to aid in exact-match substring searching that has the same asymptotic running time bound as previously published algorithms, but is more economical in space.
Proceedings ArticleDOI

Clone detection using abstract syntax trees

TL;DR: The paper presents simple and practical methods for detecting exact and near miss clones over arbitrary program fragments in program source code by using abstract syntax trees and suggests that clone detection could be useful in producing more structured code, and in reverse engineering to discover domain concepts and their implementations.
Proceedings ArticleDOI

DECKARD: Scalable and Accurate Tree-Based Detection of Code Clones

TL;DR: This paper presents an efficient algorithm for identifying similar subtrees and apply it to tree representations of source code and implemented this algorithm as a clone detection tool called DECKARD and evaluated it on large code bases written in C and Java including the Linux kernel and JDK.
Related Papers (5)