2008 23rd IEEE/ACM International Conference on Automated Software Engineering - Workshops 2008
DOI: 10.1109/asew.2008.4686327
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating the relation between changeability decay and the characteristics of clones and methods

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0
2

Year Published

2010
2010
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 20 publications
(28 reference statements)
0
7
0
2
Order By: Relevance
“…It was widely believed that cloned code is a code smell and many empirical studies of clone properties [20,21,26,36,15] have investigated differences between cloned and non-cloned code.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…It was widely believed that cloned code is a code smell and many empirical studies of clone properties [20,21,26,36,15] have investigated differences between cloned and non-cloned code.…”
Section: Introductionmentioning
confidence: 99%
“…To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. ESEC/FSE '13, August [18][19][20][21][22][23][24][25][26]2013, Saint Petersburg, Russia Copyright 13 ACM 978-1-4503-2237-9/13/08 ...$15.00.…”
Section: Introductionmentioning
confidence: 99%
“…There are several reports on the experiences of such code clone analyses on open source software [3], [6], [9], [10]. Recently, code clone detections and analyses have started to be applied to industrial software systems in companies [12]: however, few reports on industrial software systems are open to the public because of security or other kinds of reasons.…”
Section: Introductionmentioning
confidence: 97%
“…Although using tools increases the reliability, by following the same protocol in all case studies and reducing possible bias, it also increases the chances of undetected problems in the data collection and analysis. However, these tools are the result of several iterations analyzing the evolution of clones [15,13,14] and therefore the number of undetected bugs should be low. Notice that choices in the experiment setup could affect significantly the types of clones found, and therefore their evolution.…”
Section: Threats To Validitymentioning
confidence: 99%
“…In previous work we measured changes and co-changes of methods while cloned vs. while not cloned [15], we compared the ease to change cloned methods vs. not-cloned-methods [13], and the relation between method characteristics and their ease to change [14]. Our previous work tried to find trends on the effect of clones in methods using measurements that depended on the periods cloned and not cloned of each method analyzed.…”
Section: Introductionmentioning
confidence: 99%