20th IEEE International Conference on Software Maintenance, 2004. Proceedings.
DOI: 10.1109/icsm.2004.1357804
|View full text |Cite
|
Sign up to set email alerts
|

An evaluation of clone detection techniques for identifying crosscutting concerns

Abstract: C e n t r u m v o o r W i s k u n d e e n I n f o r m a t i c a Software ENgineeringAn Evaluation of Clone Detection Techniques for Identifying Crosscutting Concerns ABSTRACT Code implementing a crosscutting concern is often spread over many different parts of an application. Identifying such code automatically greatly improves both the maintainability and the evolvability of the application. First of all, it allows a developer to more easily find the places in the code that must be changed when the concern ch… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
51
0

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 66 publications
(52 citation statements)
references
References 14 publications
1
51
0
Order By: Relevance
“…Two clone detection tools implementing matching on tokens and abstract syntax trees respectively, are evaluated by [3] on an industrial C component. In this component, four dedicated crosscutting concerns were manually identified.…”
Section: Related Workmentioning
confidence: 99%
“…Two clone detection tools implementing matching on tokens and abstract syntax trees respectively, are evaluated by [3] on an industrial C component. In this component, four dedicated crosscutting concerns were manually identified.…”
Section: Related Workmentioning
confidence: 99%
“…Another example of an implementation idiom of CCCs is "code duplication". Bruntink et al [3] use clone detection to find aspect candidates in a C-based system ASML. The main limitation of such approaches is that, they only provide individual aspect candidates, without grouping similar elements to groups.…”
Section: Related Workmentioning
confidence: 99%
“…Functions related to these mechanisms are summarized in Table 1 as listed in [15], where the bolded functions are function-like macros 3 , and the others are inlined functions. The call sites of these function-like macros or inlined functions represent symptoms of the synchronization concern.…”
Section: An Aspect Mining Examplementioning
confidence: 99%
“…Some other approaches rely on clone detection techniques to detect scattered code in the form of crosscutting concerns: Bruntink [21,22,23] [24] analyse version archives for crosscutting concerns. They consider methods to be part of a crosscutting concern when they are changed together in the same transaction and additionally the changes are the same, that is a call to the same method is inserted.…”
Section: Related Workmentioning
confidence: 99%