Source Code Analysis and Manipulation, Fourth IEEE International Workshop On
DOI: 10.1109/scam.2004.6
|View full text |Cite
|
Sign up to set email alerts
|

Clone detection in source code by frequent itemset techniques

Abstract: In this paper we describe a new approach for the detection of clones in source code, which is inspired by the concept of frequent itemsets from data mining.The source code is represented as an abstract syntax tree in XML. Currently, such XML representations exist for instance for Java, C++, or PROLOG. Our approach is very flexible; it can be configured easily to work with multiple programming languages.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
63
0

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 86 publications
(66 citation statements)
references
References 11 publications
0
63
0
Order By: Relevance
“…In the area of code clone detection, there are tokenbased [19], [28], AST-based [14], [29], and semantics-based techniques [30]. Previous work [12], [31] performed comparisons between the existing code clone detection techniques.…”
Section: B Code Clone Detectionmentioning
confidence: 99%
“…In the area of code clone detection, there are tokenbased [19], [28], AST-based [14], [29], and semantics-based techniques [30]. Previous work [12], [31] performed comparisons between the existing code clone detection techniques.…”
Section: B Code Clone Detectionmentioning
confidence: 99%
“…Techniques that detect many clones (high recall) also return many code fragments which are not clones (lower precision). In turn, techniques with a high precision will usually have a lower recall [27].…”
Section: Related Workmentioning
confidence: 99%
“…An itemset is called frequent, if it occurs in a percentage that exceeds a certain given support count σ [27]:…”
Section: Sequential Pattern Miningmentioning
confidence: 99%
See 1 more Smart Citation
“…Nahler et. al [33] gave the approach which convert the AST into XML and then by using data mining technique [1] it extract the clones. This approach was further refined by Evas & Fraser [15] to find near miss clones by using only AST leaves rather than the tree, but again it was not able to detect much of the exact clones.…”
Section: International Journal Of Computer Applications (0975 -8887) mentioning
confidence: 99%