skip to main content
10.1145/1808901acmconferencesBook PagePublication PagesicseConference Proceedingsconference-collections
IWSC '10: Proceedings of the 4th International Workshop on Software Clones
ACM2010 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ICSE '10: 32nd International Conference on Software Engineering Cape Town South Africa 8 May 2010
ISBN:
978-1-60558-980-0
Published:
08 May 2010
Sponsors:
SIGSOFT, IEEE CS
Next Conference
Bibliometrics
Skip Abstract Section
Abstract

Software clones are identical or similar pieces of code or design. Clones are known to be closely related to various issues on software engineering, such as software quality, complexity, architecture, refactoring, evolution, licensing, plagiarism, and so on. Various characteristics of software systems can be uncovered through the clone analysis, and system restructuring can be performed by merging clones.

The purpose of this workshop is to continue to solidify and give shape to this research/application area and community. More specifically, the goals are to bring together researchers and practitioners from around the world to evaluate the current state of research and applications, discuss common problems, discover new opportunities for collaboration, exchange ideas, and envision new areas of research and applications.

This workshop should be highly relevant to industrial participants as well as academic researchers. This is because software clones are now closely related to many issues in software practice such as software quality, architecture design, maintenance, and so on.

In this, the 4th international clone workshop, we will intensively discuss on broader topics of software clones.

Skip Table Of Content Section
research-article
Achieving accurate clone detection results

Many existing clone detection approaches produce substantial amounts of clones that are irrelevant to software engineers. These false positives significantly hinder adoption of clone detection in practice and can lead to inaccurate research conclusions. ...

research-article
Actively comparing clones inside the code editor

Tool support for code clones can improve software quality and maintainability. While significant research has been done in locating clones in existing source code, there has been less of a research focus on proactively tracking and supporting copy-paste-...

research-article
Are scripting languages really different?

Scripting languages such as Python, Perl, Ruby and PHP are increasingly important in new software systems as web technology becomes a dominant force. These languages are often spoken of as having different properties, in particular with respect to ...

research-article
Challenging cloning related problems with GPU-based algorithms

Graphics Processing Unit (GPU) have been around for a while. Although they are primarily used for high-end 3D graphics processing, their use is now acknowledged for general massive parallel computing. This paper presents an original technique based on [...

research-article
Clone removal: fact or fiction?

Despite ongoing research in the field of code duplication, clone research has not yet investigated when and how developers remove clones. We think knowing how developers select candidates for removal and what techniques they use to eliminate duplication ...

research-article
Distinguishing copies from originals in software clones

Cloning is widespread in today's systems where automated assistance is required to locate cloned code. Although the evolution of clones has been studied for many years, no attempt has been made so far to automatically distinguish the original source ...

research-article
Finding similar defects using synonymous identifier retrieval

When we encounter a defect in one part of a program, it is very important to find other parts of the program that may contain similar defects. In this paper, we propose a novel system to find similar defects in the large collection of source code. This ...

research-article
Model clone detection in practice

Cloned code is considered harmful for two reasons: (1) multiple, possibly unnecessary, duplicates of code increase maintenance costs and, (2) inconsistent changes to cloned code can create faults and, hence, lead to incorrect program behavior. Likewise, ...

research-article
Tracking clones' imprint

Cloning imprint is the lasting effect of cloning on applications. This paper aims to analyze the clone imprint over time, in terms of the extension of cloning, the persistence of clones in methods, and the stability of cloned methods. Such level of ...

research-article
Are clones harmful for maintenance?

We often find clones in semantically related programs parts. This semantic relationship, not clones, is a prime reason for maintenance problems, as semantically related program parts must be changed in sync no matter of clones.

Only clones resulting ...

research-article
Classifying code clones with configuration

To answer the question, "Which kind of code clone has deleterious effects on maintainability?" this paper proposes a classification of code clones with a configuration (or Makefile) that determines which set of source files are compiled and linked.

research-article
Clone detection by exploiting assembler

In this position paper, we describe work-in-progress in detecting source code clones by means of analyzing and comparing the assembler that is produced when the source code is compiled.

research-article
A hybrid approach (syntactic and textual) to clone detection

Code clone detection has been so far tackled with several approaches (mainly textual, syntactic, and semantic), each performing best w.r.t. specific metrics and against consolidated but specific benchmarks. Hybrid approaches have been recently proposed ...

research-article
Hot clones, maintaining a link between software clones across repositories

Code duplication is common in current programming-practice: programmers search for snippets of code, incorporate them into their projects and then modify them to their needs. In today's practice, no automated scheme is in place to inform both parties of ...

research-article
Issues in clone classification for dataflow languages

While clone detection and classification research for textual source code is well-established, clones in visual dataflow languages have only recently received attention. The accepted existing clone classification framework does not adequately capture ...

research-article
Quo vadis, clone management?

Although potential benefits are frequently mentioned in the literature, empirical evidence is missing to concretize the costs and benefits of clone management. Without precise estimation of the expected gain, clone management will hardly ever become a ...

research-article
Toward identifying inter-project clone sets for building useful libraries

The present paper discusses how clone sets can be generated from an very large amount of source code. The knowledge of clone sets can help to manage software asset. For example, we can figure out the state of the asset easier, or we can build more ...

research-article
Towards a multi-scale approach for source code approximate match report

Finding exact clones in source code can be efficiently handled using classical exact substring or subtree pattern matching techniques inspired from genomics applications. These methods may be wisely employed as a foundation to sketch new techniques ...

Contributors
  • Osaka University
  • Bialystok University of Technology
  • University of Bremen
  • Queen’s University

Recommendations