2014 Software Evolution Week - IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering (CSMR-WCRE) 2014
DOI: 10.1109/csmr-wcre.2014.6747168
|View full text |Cite
|
Sign up to set email alerts
|

The vision of software clone management: Past, present, and future (Keynote paper)

Abstract: Duplicated code or code clones are a kind of code smell that have both positive and negative impacts on the development and maintenance of software systems. Software clone research in the past mostly focused on the detection and analysis of code clones, while research in recent years extends to the whole spectrum of clone management. In the last decade, three surveys appeared in the literature, which cover the detection, analysis, and evolutionary characteristics of code clones. This paper presents a comprehen… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
50
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 86 publications
(50 citation statements)
references
References 130 publications
(193 reference statements)
0
50
0
Order By: Relevance
“…Recall has been very difficult for tool developers to measure as it requires knowledge of the clones that exist in a software system [25,24]. Manually inspecting a system for clones is non-trivial.…”
Section: Recallmentioning
confidence: 99%
See 4 more Smart Citations
“…Recall has been very difficult for tool developers to measure as it requires knowledge of the clones that exist in a software system [25,24]. Manually inspecting a system for clones is non-trivial.…”
Section: Recallmentioning
confidence: 99%
“…These existing techniques have a number of limitations. The novel scalable algorithms [14,15] do not support Type-3 near-miss clones, where minor to significant editing activities might have taken place in the copy/pasted fragments, and therefore miss a large portion of the clones, since there are more Type-3 in the repositories than other types [24,26,30]. Type-3 clones can be the most needed in large-scale clone detection applications [24,19,6].…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations