Seventh International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC'05) 2005
DOI: 10.1109/synasc.2005.20
|View full text |Cite
|
Sign up to set email alerts
|

Archeology of code duplication: recovering duplication chains from small duplication fragments

Abstract: Code duplication is a common problem, and a wellknown sign of bad design. As

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0
1

Year Published

2009
2009
2021
2021

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 47 publications
(33 citation statements)
references
References 12 publications
(19 reference statements)
0
32
0
1
Order By: Relevance
“…Our matching algorithm is similar to that of DuDe [13] with two differences. First, our technique is language dependent due to the usage of an abstract syntax tree (AST) parser for accurate tokenization of the code elements.…”
Section: ) Algorithmmentioning
confidence: 99%
See 2 more Smart Citations
“…Our matching algorithm is similar to that of DuDe [13] with two differences. First, our technique is language dependent due to the usage of an abstract syntax tree (AST) parser for accurate tokenization of the code elements.…”
Section: ) Algorithmmentioning
confidence: 99%
“…First, our technique is language dependent due to the usage of an abstract syntax tree (AST) parser for accurate tokenization of the code elements. The parser is different from Dude [13], which detects code elements using regular expressions. Second, we only support Type-1 and Type-2 clones whereas DuDe supports Type-1, Type-2, and some Type-3 clones.…”
Section: ) Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…There are many methods of code similarity detection known in the literature, such as string-based [6,7], token-based [2,3,8,9], or Program Dependence Graph-based [1,13,14]. Every method focuses on different features of code.…”
Section: Hardmentioning
confidence: 99%
“…To answer the question whether code duplication may create problems during refactoring, we computed both internal and external code duplication using the clone detector from [Wettel and Marinescu 2005]. This clone detector was preferred as it is very easy to configure, works at a lexical-syntax level (as opposed to more complex clone detectors that need semantic analysis), is robust, and freely available.…”
Section: Code Duplication Analysismentioning
confidence: 99%