skip to main content
10.1145/1081706.1081737acmconferencesArticle/Chapter ViewAbstractPublication PagesfseConference Proceedingsconference-collections
Article

An empirical study of code clone genealogies

Authors Info & Claims
Published:01 September 2005Publication History
First page image

References

  1. Gail C. Murphy University of British Columbia, Vancouver, B.C. Canada http://www.cs.washington.edu/homes/miryung/cge.]]Google ScholarGoogle Scholar
  2. http://www.graphviz.org.]]Google ScholarGoogle Scholar
  3. Micromodels of Software: Lightweight Modelling and Analysis with Alloy. http://alloy.mit.edu, 2004.]]Google ScholarGoogle Scholar
  4. G. Antoniol, M. D. Penta, and E. Merlo. An automatic approach to identify class evolution discontinuities. In Proc. of the Int'l Workshop on Principles of Software Evolution, pages 31--40, 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. G. Antoniol, U. Villano, E. Merlo, and M. D. Penta. Analyzing cloning evolution in the Linux kernel. Information & Software Technology, 44(13):755--765, 2002.]]Google ScholarGoogle ScholarCross RefCross Ref
  6. B. S. Baker. A program for identifying duplicated code. Computing Science and Statistics, 24:49--57, 1992.]]Google ScholarGoogle Scholar
  7. M. Balazinska, E. Merlo, M. Dagenais, B. Laguë, and K. Kontogiannis. Measuring clone based reengineering opportunities. In Proc. of the Int'l Software Metrics Symposium, pages 292--303, 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. Balazinska, E. Merlo, M. Dagenais, B. Laguë, and K. Kontogiannis. Partial redesign of Java software systems based on clone analysis. In Proc. of the Working Conference on Reverse Engineering, pages 326--336, 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. H. A. Basit, D. C. Rajapakse, and S. Jarzabek. Beyond templates: a study of clones in the STL and some general implications. In Proc. of the Int'l Conf. on Software Engineering, pages 451--459, 2005.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. I. D. Baxter, A. Yahin, L. M. de Moura, M. Sant'Anna, and L. Bier. Clone detection using abstract syntax trees. In Proc. of the Int'l Conf. on Software Maintenance, pages 368--377, 1998.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. K. Beck. extreme Programming explained, embrace change. Addison-Wesley, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. E. Burd and J. Bailey. Evaluating clone detection tools for use during preventative maintenance. In Proc. of the Int'l Workshop on Source Code Analysis and Manipulation, pages 36--43, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. S. Ducasse, M. Rieger, and S. Demeyer. A language independent approach for detecting duplicated code. In Proc. of the Int'l Conf. on Software Maintenance, pages 109--118, 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. Fowler. Refactoring: Improving the Design of Existing Code. Addison-Wesley, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. M. Godfrey and Q. Tu. Tracking structural evolution using origin analysis. In Proc. of the Int'l Workshop on Principles of Software Evolution, pages 117--119, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. GRASE-Lab. User Manual: Kenyon. http://dforge.cse.ucsc.edu/projects/kenyon, 2005.]]Google ScholarGoogle Scholar
  17. Y. Higo, T. Kamiya, S. Kusumoto, and K. Inoue. Refactoring support based on code clone analysis. In Proc. of the Product Focused Software Process Improvement Int'l Conference, pages 220--233, 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. J. H. Johnson. Identifying redundancy in source code using fingerprints. In Proc. of the Conference of the Centre for Advanced Studies on Collaborative Research, pages 171--183. IBM Press, 1993.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. T. Kamiya, S. Kusumoto, and K. Inoue. CCFinder: A multilinguistic token-based code clone detection system for large scale source code. IEEE Trans. Software Eng., 28(7):654--670, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. M. Kim, L. Bergman, T. A. Lau, and D. Notkin. An ethnographic study of copy and paste programming practices in OOPL. In Proc. of the Int'l Symposium on Empirical Software Engineering, pages 83--92, 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. Kim and D. Notkin. Using a clone genealogy extractor for understanding and supporting evolution of code clones. In Proc. of the Workshop on Mining Software Repositories, pages 17--23, 2005.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. R. Komondoor and S. Horwitz. Using slicing to identify duplication in source code. In SAS, pages 40--56, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. R. Komondoor and S. Horwitz. Effective, automatic procedure extraction. In Proc. of the Int'l Workshop on Program Comprehension, pages 33--43, 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. J. Krinke. Identifying similar code with program dependence graphs. In Proc. of the Working Conference on Reverse Engineering, pages 301--309, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. B. Laguë, D. Proulx, J. Mayrand, E. Merlo, and J. P. Hudepohl. Assessing the benefits of incorporating function clone detection in a development process. In Proc. of the Int'l Conf. on Software Maintenance, pages 314--321, 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Z. Li, S. Lu, S. Myagmar, and Y. Zhou. CP-Miner: A tool for finding copy-paste and related bugs in operating system code. In Proc. of Operating System Design and Implementation, pages 289--302, 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. J. Mayrand, C. Leblanc, and E. Merlo. Experiment on the automatic detection of function clones in a software system using metrics. In Proc. of the Int'l Conf. on Software Maintenance, page 244, 1996.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. E. Merlo, G. Antoniol, M. D. Penta, and V. F. Rollo. Linear complexity object-oriented similarity for clone detection and software evolution analyses. In Proc. of the Int'l Conf. on Software Maintenance, pages 412--416, 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. R. C. Miller and B. A. Myers. Interactive simultaneous editing of multiple text regions. In USENIX Annual Technical Conference, General Track, pages 161--174, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. E. Nickell and I. Smith. Extreme programming and software clones. In Workshop on Software Clones, 2003.]]Google ScholarGoogle Scholar
  31. K. Sullivan, P. Chalasani, S. Jha, and V. Sazawal. Software Design as an Investment Activity: A Real Options Perspective in Real Options and Business Strategy: Applications to Decision Making. Risk Books, November 1999.]]Google ScholarGoogle Scholar
  32. M. Toomim, A. Begel, and S. L. Graham. Managing duplicated code with linked editing. In Proc. of the Int'l Symposium on Visual Languages and Human-Centric Computing, pages 173--180, 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Y. Ueda, T. Kamiya, S. Kusumoto, and K. Inoue. On detection of gapped code clones using gap locations. In Proc. of the Asia-Pacific Software Engineering Conference, pages 327--336, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. T. Zimmermann and P. Weiβgerber. Preprocessing CVS data for fine-grained analysis. In Proc. of the Workshop on Mining Software Repositories, pages 2--6, 2004.]]Google ScholarGoogle ScholarCross RefCross Ref
  35. L. Zou and M. W. Godfrey. Detecting merging and splitting using origin analysis. In Proc. of the Working Conference on Reverse Engineering, pages 146--154, 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. An empirical study of code clone genealogies

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      ESEC/FSE-13: Proceedings of the 10th European software engineering conference held jointly with 13th ACM SIGSOFT international symposium on Foundations of software engineering
      September 2005
      402 pages
      ISBN:1595930140
      DOI:10.1145/1081706
      • cover image ACM SIGSOFT Software Engineering Notes
        ACM SIGSOFT Software Engineering Notes  Volume 30, Issue 5
        September 2005
        462 pages
        ISSN:0163-5948
        DOI:10.1145/1095430
        Issue’s Table of Contents

      Copyright © 2005 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 September 2005

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate112of543submissions,21%

      Upcoming Conference

      FSE '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader