- Gail C. Murphy University of British Columbia, Vancouver, B.C. Canada http://www.cs.washington.edu/homes/miryung/cge.]]Google Scholar
- http://www.graphviz.org.]]Google Scholar
- Micromodels of Software: Lightweight Modelling and Analysis with Alloy. http://alloy.mit.edu, 2004.]]Google Scholar
- G. Antoniol, M. D. Penta, and E. Merlo. An automatic approach to identify class evolution discontinuities. In Proc. of the Int'l Workshop on Principles of Software Evolution, pages 31--40, 2004.]] Google ScholarDigital Library
- G. Antoniol, U. Villano, E. Merlo, and M. D. Penta. Analyzing cloning evolution in the Linux kernel. Information & Software Technology, 44(13):755--765, 2002.]]Google ScholarCross Ref
- B. S. Baker. A program for identifying duplicated code. Computing Science and Statistics, 24:49--57, 1992.]]Google Scholar
- M. Balazinska, E. Merlo, M. Dagenais, B. Laguë, and K. Kontogiannis. Measuring clone based reengineering opportunities. In Proc. of the Int'l Software Metrics Symposium, pages 292--303, 1999.]] Google ScholarDigital Library
- M. Balazinska, E. Merlo, M. Dagenais, B. Laguë, and K. Kontogiannis. Partial redesign of Java software systems based on clone analysis. In Proc. of the Working Conference on Reverse Engineering, pages 326--336, 1999.]] Google ScholarDigital Library
- H. A. Basit, D. C. Rajapakse, and S. Jarzabek. Beyond templates: a study of clones in the STL and some general implications. In Proc. of the Int'l Conf. on Software Engineering, pages 451--459, 2005.]] Google ScholarDigital Library
- I. D. Baxter, A. Yahin, L. M. de Moura, M. Sant'Anna, and L. Bier. Clone detection using abstract syntax trees. In Proc. of the Int'l Conf. on Software Maintenance, pages 368--377, 1998.]] Google ScholarDigital Library
- K. Beck. extreme Programming explained, embrace change. Addison-Wesley, 2000.]] Google ScholarDigital Library
- E. Burd and J. Bailey. Evaluating clone detection tools for use during preventative maintenance. In Proc. of the Int'l Workshop on Source Code Analysis and Manipulation, pages 36--43, 2002.]] Google ScholarDigital Library
- S. Ducasse, M. Rieger, and S. Demeyer. A language independent approach for detecting duplicated code. In Proc. of the Int'l Conf. on Software Maintenance, pages 109--118, 1999.]] Google ScholarDigital Library
- M. Fowler. Refactoring: Improving the Design of Existing Code. Addison-Wesley, 2000.]] Google ScholarDigital Library
- M. Godfrey and Q. Tu. Tracking structural evolution using origin analysis. In Proc. of the Int'l Workshop on Principles of Software Evolution, pages 117--119, 2002.]] Google ScholarDigital Library
- GRASE-Lab. User Manual: Kenyon. http://dforge.cse.ucsc.edu/projects/kenyon, 2005.]]Google Scholar
- Y. Higo, T. Kamiya, S. Kusumoto, and K. Inoue. Refactoring support based on code clone analysis. In Proc. of the Product Focused Software Process Improvement Int'l Conference, pages 220--233, 2004.]] Google ScholarDigital Library
- J. H. Johnson. Identifying redundancy in source code using fingerprints. In Proc. of the Conference of the Centre for Advanced Studies on Collaborative Research, pages 171--183. IBM Press, 1993.]] Google ScholarDigital Library
- T. Kamiya, S. Kusumoto, and K. Inoue. CCFinder: A multilinguistic token-based code clone detection system for large scale source code. IEEE Trans. Software Eng., 28(7):654--670, 2002.]] Google ScholarDigital Library
- M. Kim, L. Bergman, T. A. Lau, and D. Notkin. An ethnographic study of copy and paste programming practices in OOPL. In Proc. of the Int'l Symposium on Empirical Software Engineering, pages 83--92, 2004.]] Google ScholarDigital Library
- M. Kim and D. Notkin. Using a clone genealogy extractor for understanding and supporting evolution of code clones. In Proc. of the Workshop on Mining Software Repositories, pages 17--23, 2005.]] Google ScholarDigital Library
- R. Komondoor and S. Horwitz. Using slicing to identify duplication in source code. In SAS, pages 40--56, 2001.]] Google ScholarDigital Library
- R. Komondoor and S. Horwitz. Effective, automatic procedure extraction. In Proc. of the Int'l Workshop on Program Comprehension, pages 33--43, 2003.]] Google ScholarDigital Library
- J. Krinke. Identifying similar code with program dependence graphs. In Proc. of the Working Conference on Reverse Engineering, pages 301--309, 2001.]] Google ScholarDigital Library
- B. Laguë, D. Proulx, J. Mayrand, E. Merlo, and J. P. Hudepohl. Assessing the benefits of incorporating function clone detection in a development process. In Proc. of the Int'l Conf. on Software Maintenance, pages 314--321, 1997.]] Google ScholarDigital Library
- Z. Li, S. Lu, S. Myagmar, and Y. Zhou. CP-Miner: A tool for finding copy-paste and related bugs in operating system code. In Proc. of Operating System Design and Implementation, pages 289--302, 2004.]] Google ScholarDigital Library
- J. Mayrand, C. Leblanc, and E. Merlo. Experiment on the automatic detection of function clones in a software system using metrics. In Proc. of the Int'l Conf. on Software Maintenance, page 244, 1996.]] Google ScholarDigital Library
- E. Merlo, G. Antoniol, M. D. Penta, and V. F. Rollo. Linear complexity object-oriented similarity for clone detection and software evolution analyses. In Proc. of the Int'l Conf. on Software Maintenance, pages 412--416, 2004.]] Google ScholarDigital Library
- R. C. Miller and B. A. Myers. Interactive simultaneous editing of multiple text regions. In USENIX Annual Technical Conference, General Track, pages 161--174, 2001.]] Google ScholarDigital Library
- E. Nickell and I. Smith. Extreme programming and software clones. In Workshop on Software Clones, 2003.]]Google Scholar
- K. Sullivan, P. Chalasani, S. Jha, and V. Sazawal. Software Design as an Investment Activity: A Real Options Perspective in Real Options and Business Strategy: Applications to Decision Making. Risk Books, November 1999.]]Google Scholar
- M. Toomim, A. Begel, and S. L. Graham. Managing duplicated code with linked editing. In Proc. of the Int'l Symposium on Visual Languages and Human-Centric Computing, pages 173--180, 2004.]] Google ScholarDigital Library
- Y. Ueda, T. Kamiya, S. Kusumoto, and K. Inoue. On detection of gapped code clones using gap locations. In Proc. of the Asia-Pacific Software Engineering Conference, pages 327--336, 2002.]] Google ScholarDigital Library
- T. Zimmermann and P. Weiβgerber. Preprocessing CVS data for fine-grained analysis. In Proc. of the Workshop on Mining Software Repositories, pages 2--6, 2004.]]Google ScholarCross Ref
- L. Zou and M. W. Godfrey. Detecting merging and splitting using origin analysis. In Proc. of the Working Conference on Reverse Engineering, pages 146--154, 2003.]] Google ScholarDigital Library
Index Terms
- An empirical study of code clone genealogies
Recommendations
A metric-based approach to identifying refactoring opportunities for merging code clones in a Java software system
A code clone is a code fragment that has other code fragments identical or similar to it in the source code. The presence of code clones is generally regarded as one factor that makes software maintenance more difficult. For example, if a code fragment ...
Evaluating Code Clone Genealogies at Release Level: An Empirical Study
SCAM '10: Proceedings of the 2010 10th IEEE Working Conference on Source Code Analysis and ManipulationCode clone genealogies show how clone groups evolve with the evolution of the associated software system, and thus could provide important insights on the maintenance implications of clones. In this paper, we provide an in-depth empirical study for ...
Comments