2020
DOI: 10.1016/j.cosrev.2020.100266
|View full text |Cite
|
Sign up to set email alerts
|

A systematic mapping study of clone visualization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 19 publications
(11 citation statements)
references
References 127 publications
0
11
0
Order By: Relevance
“…Clone-Seeker(Manual) Clone-Seeker(Automatic) Id MRR P@1 P@5 P@10 MRR P@1 P@5 P@10 MRR P@1 P@5 P@10 p00001 0.5 0 0.8 0.9 0.33 0 0.4 0.3 0.5 0 0.8 0.9 p00003 1 1 1 0.9 [25], [82]). We plan to investigate whether our approach can be used for different clone types and granularities in the future.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Clone-Seeker(Manual) Clone-Seeker(Automatic) Id MRR P@1 P@5 P@10 MRR P@1 P@5 P@10 MRR P@1 P@5 P@10 p00001 0.5 0 0.8 0.9 0.33 0 0.4 0.3 0.5 0 0.8 0.9 p00003 1 1 1 0.9 [25], [82]). We plan to investigate whether our approach can be used for different clone types and granularities in the future.…”
Section: Discussionmentioning
confidence: 99%
“…Code clones are usually categorized as Type-1, Type-2, Type-3 and Type-4 (Roy et al, 2009;Hammad et al, 2020b) clones, based on their level of similarity with each other. Type-1 clones are same code fragments, except for dissimilarities in comments, layout, and whitespace.…”
Section: Introductionmentioning
confidence: 99%
“…, on a larger dataset or larger pre-trained GPT-2 models). We also plan to investigate how to tackle different types and granularity levels of code clones such as simple clones, structural clones, file clones, and clones of other artifact types such as models ( Babur, Cleophas & van den Brand, 2019 ; Hammad et al, 2020b ; Hammad et al, 2021 ). Moreover, we plan to perform a comparative study by evaluating different IR techniques such as BERT; pretrained word embedding techniques such as word2vec ( Mikolov et al, 2013 ) and GLOVE ( Pennington, Socher & Manning, 2014 ); and code query formulation techniques ( Lu et al, 2015 , Nie et al, 2016 ).…”
Section: Discussionmentioning
confidence: 99%
“… Abid (2019) have previously used clone methods for code recommendation, however, the approach used a different similarity measure based on API calls for recommending relevant clone methods. Clones are generally considered to be harmful for a software system, and mainly researchers work on techniques for avoiding and eliminating clones ( Yoshida et al, 2019 ; Wang & Godfrey, 2014 ; Basit et al, 2015 ; Basit, Hammad & Koschke, 2015 ; Hammad et al, 2020b ). Clone refactoring recommendation systems have been developed for this purpose.…”
Section: Related Workmentioning
confidence: 99%
“…is information helps the practitioners, researchers, and organizations in a certain way [12][13][14][15]. e set of DQs is as follows: DQ1: who are the most active researchers in the field of analyzing election prediction on Twitter?…”
Section: Aim and Research Questionsmentioning
confidence: 99%