2013
DOI: 10.1016/j.infsof.2013.01.008
|View full text |Cite
|
Sign up to set email alerts
|

Software clone detection: A systematic review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
151
0
7

Year Published

2016
2016
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 309 publications
(168 citation statements)
references
References 204 publications
0
151
0
7
Order By: Relevance
“…Rattan et al [22] found at least 70 clone detectors in the literature, almost double the 40 found by Roy et al [27] in 2009. However, very few tools target scalability to very large repositories.…”
Section: Related Workmentioning
confidence: 83%
“…Rattan et al [22] found at least 70 clone detectors in the literature, almost double the 40 found by Roy et al [27] in 2009. However, very few tools target scalability to very large repositories.…”
Section: Related Workmentioning
confidence: 83%
“…The latter has been of increasing interest in the software engineering research community under the term ''cloning.'' In particular, clones that resulted from copy&paste can now be detected reliably (Rattan, Bhatia & Singh, 2013). In our own research with companies, we often found rates of redundant code caused by copy&paste in the range of 20%-30% (Wagner, 2013).…”
Section: Introductionmentioning
confidence: 90%
“…Even clones with additional changes (inconsistent, near-miss or type-3 clones) can be detected by several detection approaches and tools (Kamiya, Kusumoto & Inoue, 2002;Deissenboeck et al, 2008;Jiang et al, 2007a). There are also two surveys (Koschke, 2007;Roy & Cordy, 2007) and a systematic literature review (Rattan, Bhatia & Singh, 2013) on this topic. Tiarks, Koschke & Falke (2011) investigated in particular type-3 clones and also their differences.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A program dependency graph (PDG) represents control and data flow dependencies of a function of source code (Rattan et al, 2013). In other words, it considers the semantic information encoded in the dependency graph.…”
Section: Graph Basedmentioning
confidence: 99%