2005
DOI: 10.1109/tse.2005.114
|View full text |Cite
|
Sign up to set email alerts
|

On the use of clone detection for identifying crosscutting concern code

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
74
0

Year Published

2007
2007
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 107 publications
(74 citation statements)
references
References 26 publications
0
74
0
Order By: Relevance
“…The most evident and significant (p-value=< 2.2 · 10 −16 ) difference occurs when a new pattern (C)lass is added: also in this case the number of changes is higher when considering the extended change. Moreover, in Tomcat it is possible to note that the amount of changes involving methods (AMI 5 , M, MI 6 ) is higher in the co-change than in the extended change, even though such a difference is not statistically significant. Differently from JHotDraw, for Tomcat implementation changes (I) tend to induce more extended changes than co-changes in the crosscutting.…”
Section: Resultsmentioning
confidence: 96%
See 2 more Smart Citations
“…The most evident and significant (p-value=< 2.2 · 10 −16 ) difference occurs when a new pattern (C)lass is added: also in this case the number of changes is higher when considering the extended change. Moreover, in Tomcat it is possible to note that the amount of changes involving methods (AMI 5 , M, MI 6 ) is higher in the co-change than in the extended change, even though such a difference is not statistically significant. Differently from JHotDraw, for Tomcat implementation changes (I) tend to induce more extended changes than co-changes in the crosscutting.…”
Section: Resultsmentioning
confidence: 96%
“…Differently from JHotDraw, for Tomcat implementation changes (I) tend to induce more extended changes than co-changes in the crosscutting. This because Tomcat is a larger system, involving more developers, and thus the maintenance of classes impacted by pattern change is delayed and, above all, it might be performed by a developer different from who maintained 5 AMI=changes in Attributes, Method signatures, and Implementations 6 MI=changes in Method signatures and Implementations the pattern.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Some other approaches rely on clone detection techniques to detect scattered code in the form of crosscutting concerns: Bruntink [21,22,23] [24] analyse version archives for crosscutting concerns. They consider methods to be part of a crosscutting concern when they are changed together in the same transaction and additionally the changes are the same, that is a call to the same method is inserted.…”
Section: Related Workmentioning
confidence: 99%
“…Whilst that list covers the more common applications, similarity assessment is used in many other areas, too. Examples include finding similar bug fixes (Hartmann et al 2010), identifying cross-cutting concerns (Bruntink et al 2005), program comprehension (Maletic and Marcus 2001), code recommendation (Holmes and Murphy 2005), and example extraction (Moreno et al 2015).…”
Section: Introductionmentioning
confidence: 99%