2010 7th IEEE Working Conference on Mining Software Repositories (MSR 2010) 2010
DOI: 10.1109/msr.2010.5463293
|View full text |Cite
|
Sign up to set email alerts
|

Finding file clones in FreeBSD Ports Collection

Abstract: Abstract-In Open Source System (OSS) development, software components are often imported and reused; for this reason we might expect that files are copied in multiple projects (file clones). In this paper, we propose a file clone detection tool called FCFinder and show the analysis performed with it on the FreeBSD Ports Collection, a large OSS project collection. We found many file clones among similar or related projects, which are systematically introduced from base projects.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
20
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
4

Relationship

2
7

Authors

Journals

citations
Cited by 26 publications
(20 citation statements)
references
References 8 publications
0
20
0
Order By: Relevance
“…For example, Ossher et al [25] and Schwarz et al [31] use clone detection to determine the prevalence of reuse within open source development community. Inoue et al [30] use largescale clone detection for studying the evolution of cloned files across similar software systems. Koschke [21] studies the application of large-scale inter-system clone detection for license infringement detection.…”
Section: Introductionmentioning
confidence: 99%
“…For example, Ossher et al [25] and Schwarz et al [31] use clone detection to determine the prevalence of reuse within open source development community. Inoue et al [30] use largescale clone detection for studying the evolution of cloned files across similar software systems. Koschke [21] studies the application of large-scale inter-system clone detection for license infringement detection.…”
Section: Introductionmentioning
confidence: 99%
“…Sasaki et al proposed an approach that detects identical files and then investigate the characteristics of them [18]. This study identifies identical files without any (or just slight) modifications in comments or headers using MD5 hash values of the tokenized files.…”
Section: Related Workmentioning
confidence: 99%
“…Usually, software clones come into existence when a developer decides to copy-paste a code snippet from elsewhere in the system that solves a problem that is highly similar to the one under consideration. Empirical studies show that software clones often comprise 10%-20% of total source code base for large software systems of many application domains, such as operating systems [42], development environments [37], and database systems [40]. Code duplication offers developers a shortcut to reuse an existing design.…”
Section: Introductionmentioning
confidence: 99%