2011 18th Working Conference on Reverse Engineering 2011
DOI: 10.1109/wcre.2011.13
|View full text |Cite
|
Sign up to set email alerts
|

Internet-scale Real-time Code Clone Search Via Multi-level Indexing

Abstract: Finding lines of code similar to a code fragment across large knowledge bases in fractions of a second is a new branch of code clone research also known as real-time code clone search. Among the requirements real-time code clone search has to meet are scalability, short response time, scalable incremental corpus updates, and support for type-1, type-2, and type-3 clones. We conducted a set of empirical studies on a large open source code corpus to gain insight about its characteristics. We used these results t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
31
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 32 publications
(31 citation statements)
references
References 8 publications
0
31
0
Order By: Relevance
“…Koshke [20] used suffix trees to scale license violation detection between a subject system and a large inter-project repository. Keivanloo et al [19] use an index approach to scale clone search to large inter-project repositories. Chen et al [6] implement a technique for detecting cloned Android applications across large application markets.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Koshke [20] used suffix trees to scale license violation detection between a subject system and a large inter-project repository. Keivanloo et al [19] use an index approach to scale clone search to large inter-project repositories. Chen et al [6] implement a technique for detecting cloned Android applications across large application markets.…”
Section: Related Workmentioning
confidence: 99%
“…clone detection can be used for mining library candidates [15], detecting similar mobile applications [6], license violation detection [20,9], reverse engineering product lines [12,9], finding the provenance of a component [8], and code search [19,18]. Large-scale clone detection allows researchers to study cloning in large software ecosystems (e.g., Debian), or study cloning in open-source development communities (e.g., GitHub).…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…There are various kinds of clone detection techniques, based on similarities among strings, tokens, syntax trees, dependency graphs, and even program memory states and functionalities [9], [10], [29], [32], [33], [37], [40], [49], [56], [58]. With the evolving software, there are also studies aiming to detect clones incrementally and improve the clone detection efficiency when programs change [18], [20], [43].…”
Section: Studies On Code Clonesmentioning
confidence: 99%