메뉴 건너뛰기




Volumn , Issue , 2009, Pages 157-166

A mutation / injection-based automatic framework for evaluating code clone detection tools

Author keywords

[No Author keywords available]

Indexed keywords

ACCURACY MEASURES; AUTOMATED METHODS; CLONE DETECTION; CODE CLONE DETECTION; EMPIRICAL EVALUATIONS; MANUAL INTERVENTION; PRECISION AND RECALL; REAL SYSTEMS; RECALL AND PRECISION; SOFTWARE CLONE DETECTION;

EID: 69949085058     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICSTW.2009.18     Document Type: Conference Paper
Times cited : (163)

References (43)
  • 2
    • 26044454396 scopus 로고    scopus 로고
    • Is Mutation an Appropriate Tool for Testing Experiments?
    • J. H. Andrews, L. C. Briand and Y. Labiche. Is Mutation an Appropriate Tool for Testing Experiments? In ICSE, pp. 402-411, 2005.
    • (2005) ICSE , pp. 402-411
    • Andrews, J.H.1    Briand, L.C.2    Labiche, Y.3
  • 3
    • 34547677997 scopus 로고    scopus 로고
    • How Clones are Maintained: An Empirical Study
    • L. Aversano, L. Cerulo, and Massimiliano Di Penta. How Clones are Maintained: An Empirical Study. In CSMR, pp. 81-90, 2007.
    • (2007) CSMR , pp. 81-90
    • Aversano, L.1    Cerulo, L.2    Di Penta, M.3
  • 4
    • 34548259865 scopus 로고    scopus 로고
    • Finding Clones with Dup: Analysis of an Experiment
    • B. Baker. Finding Clones with Dup: Analysis of an Experiment. In IEEE TSE, 33(9):608-621, 2007.
    • (2007) IEEE TSE , vol.33 , Issue.9 , pp. 608-621
    • Baker, B.1
  • 5
    • 0029222025 scopus 로고
    • On Finding Duplication and Near-Duplication in Large Software Systems
    • B. Baker. On Finding Duplication and Near-Duplication in Large Software Systems. In WCRE, pp. 86-95, 1995.
    • (1995) WCRE , pp. 86-95
    • Baker, B.1
  • 8
    • 0032311601 scopus 로고    scopus 로고
    • Clone Detection Using Abstract Syntax Trees
    • I. Baxter, A. Yahin, L. Moura and M. Anna. Clone Detection Using Abstract Syntax Trees. In ICSM, pp. 368-377, 1998.
    • (1998) ICSM , pp. 368-377
    • Baxter, I.1    Yahin, A.2    Moura, L.3    Anna, M.4
  • 10
    • 34548228440 scopus 로고    scopus 로고
    • Comparison and Evaluation of Clone Detection Tools
    • S. Bellon, R. Koschke, G. Antoniol, J. Krinke and E. Merlo. Comparison and Evaluation of Clone Detection Tools. IEEE TSE, 33(9):577-591, 2007.
    • (2007) IEEE TSE , vol.33 , Issue.9 , pp. 577-591
    • Bellon, S.1    Koschke, R.2    Antoniol, G.3    Krinke, J.4    Merlo, E.5
  • 11
    • 48049108256 scopus 로고    scopus 로고
    • Comparative Assessment of Testing and Model Checking Using Program Mutation
    • J. Bradbury, J.R. Cordy and J. Dingel. Comparative Assessment of Testing and Model Checking Using Program Mutation. In Mutation pp. 210-219, 2007.
    • (2007) Mutation , pp. 210-219
    • Bradbury, J.1    Cordy, J.R.2    Dingel, J.3
  • 12
    • 30344449773 scopus 로고    scopus 로고
    • On the Use of Clone Detection for Identifying Crosscutting Concern Code
    • M. Bruntink, A. Deursen, R. Engelen and T. Tourwe. On the Use of Clone Detection for Identifying Crosscutting Concern Code. IEEE TSE, 31(10):804-818, 2005.
    • (2005) IEEE TSE , vol.31 , Issue.10 , pp. 804-818
    • Bruntink, M.1    Deursen, A.2    Engelen, R.3    Tourwe, T.4
  • 13
    • 34548812113 scopus 로고    scopus 로고
    • Evaluating Clone Detection Tools for Use during Preventative Maintenance
    • E. Burd, J. Bailey. Evaluating Clone Detection Tools for Use during Preventative Maintenance. In SCAM, pp. 36-43, 2002.
    • (2002) SCAM , pp. 36-43
    • Burd, E.1    Bailey, J.2
  • 14
    • 33646831658 scopus 로고    scopus 로고
    • The TXL source transformation language
    • J.R. Cordy. The TXL source transformation language. In Science of Computer Programming, 61(3):190-210, 2006.
    • (2006) Science of Computer Programming , vol.61 , Issue.3 , pp. 190-210
    • Cordy, J.R.1
  • 15
    • 32344435327 scopus 로고    scopus 로고
    • On the Effectiveness of Clone Detection by String Matching
    • S. Ducasse, O. Nierstrasz and M. Rieger. On the Effectiveness of Clone Detection by String Matching. JSME: Research and Practice, 18(1): 37-58, 2006.
    • (2006) JSME: Research and Practice , vol.18 , Issue.1 , pp. 37-58
    • Ducasse, S.1    Nierstrasz, O.2    Rieger, M.3
  • 16
    • 0033308732 scopus 로고    scopus 로고
    • A Language Independent Approach for Detecting Duplicated Code
    • S. Ducasse, M. Rieger and S. Demeyer. A Language Independent Approach for Detecting Duplicated Code. In ICSM, pp. 109-118, 1999.
    • (1999) ICSM , pp. 109-118
    • Ducasse, S.1    Rieger, M.2    Demeyer, S.3
  • 17
    • 51149108069 scopus 로고    scopus 로고
    • Clone Detection via Structural Abstraction
    • W. Evans and C. Fraser. Clone Detection via Structural Abstraction. In WCRE, pp. 150-159, 2007.
    • (2007) WCRE , pp. 150-159
    • Evans, W.1    Fraser, C.2
  • 18
    • 56749179725 scopus 로고    scopus 로고
    • Empirical Evaluation of Clone Detection Using Syntax Suffix Trees
    • to appear
    • R. Falke, R. Koschke and P. Frenzel. Empirical Evaluation of Clone Detection Using Syntax Suffix Trees. Empirical Software Engineering, 43 pp., 2008 (to appear).
    • Empirical Software Engineering , vol.43 , pp. 2008
    • Falke, R.1    Koschke, R.2    Frenzel, P.3
  • 19
    • 57349194546 scopus 로고    scopus 로고
    • Scalable Detection of Semantic Clones
    • M. Gabel, L. Jiang and Z. Su. Scalable Detection of Semantic Clones. In ICSE, pp. 321-330, 2008.
    • (2008) ICSE , pp. 321-330
    • Gabel, M.1    Jiang, L.2    Su, Z.3
  • 20
    • 69949088512 scopus 로고    scopus 로고
    • Feb 2008
    • The Gzip-1.2.4 http://www.gzip.org/(Feb 2008).
    • The Gzip-1.2.4
  • 21
    • 84924253147 scopus 로고    scopus 로고
    • June 2006
    • The JHotDraw: http://www.jhotdraw.org/(June 2006)
    • The JHotDraw
  • 22
    • 34548767669 scopus 로고    scopus 로고
    • DECKARD: Scalable and Accurate Tree-based Detection of Code Clones
    • L. Jiang, G. Misherghi, Z. Su and S. Glondu. DECKARD: Scalable and Accurate Tree-based Detection of Code Clones. In ICSE, pp. 96-105, 2007.
    • (2007) ICSE , pp. 96-105
    • Jiang, L.1    Misherghi, G.2    Su, Z.3    Glondu, S.4
  • 23
    • 84962184978 scopus 로고
    • Substring Matching for Clone Detection and Change Tracking
    • J. Johnson. Substring Matching for Clone Detection and Change Tracking. In ICSM, pp. 120-126, 1994.
    • (1994) ICSM , pp. 120-126
    • Johnson, J.1
  • 24
    • 0036648690 scopus 로고    scopus 로고
    • CCFinder: A Multilinguistic Token-Based Code Clone Detection System for Large Scale Source Code
    • T. Kamiya, S. Kusumoto and K. Inoue. CCFinder: A Multilinguistic Token-Based Code Clone Detection System for Large Scale Source Code. IEEE TSE, 28(7):654-670, 2002.
    • (2002) IEEE TSE , vol.28 , Issue.7 , pp. 654-670
    • Kamiya, T.1    Kusumoto, S.2    Inoue, K.3
  • 25
    • 34548718935 scopus 로고    scopus 로고
    • Cloning Considered Harmful Considered Harmful
    • C. Kapser and M. Godfrey. "Cloning Considered Harmful" Considered Harmful. In WCRE, pp. 19-28, 2006.
    • (2006) WCRE , pp. 19-28
    • Kapser, C.1    Godfrey, M.2
  • 26
    • 11244253656 scopus 로고    scopus 로고
    • Aiding Comprehension of Cloning Through Categorization
    • C. Kapser, and M. Godfrey. Aiding Comprehension of Cloning Through Categorization. In IWPSE'04, pp. 85-94, 2004.
    • (2004) IWPSE'04 , pp. 85-94
    • Kapser, C.1    Godfrey, M.2
  • 27
    • 11244317212 scopus 로고    scopus 로고
    • An Ethnographic Study of Copy and Paste Programming Practices in OOPL
    • M. Kim, L. Bergman, T. Lau and D. Notkin. An Ethnographic Study of Copy and Paste Programming Practices in OOPL. In ISESE, pp. 83-92, 2004.
    • (2004) ISESE , pp. 83-92
    • Kim, M.1    Bergman, L.2    Lau, T.3    Notkin, D.4
  • 28
    • 32344450436 scopus 로고    scopus 로고
    • An Empirical Study of Code Clone Genealogies
    • M. Kim and G. Murphy. An Empirical Study of Code Clone Genealogies. In FSE, pp. 187-196, 2005.
    • (2005) FSE , pp. 187-196
    • Kim, M.1    Murphy, G.2
  • 29
    • 84890052317 scopus 로고    scopus 로고
    • Using Slicing to Identify Duplication in Source Code
    • R. Komondoor and S. Horwitz. Using Slicing to Identify Duplication in Source Code. In SAS, pp. 40-56, 2001.
    • (2001) SAS , pp. 40-56
    • Komondoor, R.1    Horwitz, S.2
  • 30
  • 31
    • 0031346714 scopus 로고    scopus 로고
    • Evaluation Experiments on the Detection of Programming Patterns using Metrics
    • K. Kontogiannis. Evaluation Experiments on the Detection of Programming Patterns using Metrics. In WCRE, pp. 44-54, 1997.
    • (1997) WCRE , pp. 44-54
    • Kontogiannis, K.1
  • 32
    • 34948876329 scopus 로고    scopus 로고
    • Clone Detection Using Abstract Syntax Suffix Trees
    • R. Koschke, R. Falke and P. Frenzel. Clone Detection Using Abstract Syntax Suffix Trees. In WCRE, pp. 253-262, 2006.
    • (2006) WCRE , pp. 253-262
    • Koschke, R.1    Falke, R.2    Frenzel, P.3
  • 33
    • 0034770139 scopus 로고    scopus 로고
    • Identifying Similar Code with Program Dependence Graphs
    • J. Krinke. Identifying Similar Code with Program Dependence Graphs. In WCRE, pp. 301-309, 2001.
    • (2001) WCRE , pp. 301-309
    • Krinke, J.1
  • 34
    • 33645819206 scopus 로고    scopus 로고
    • CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code
    • Z. Li, S. Lu, S. Myagmar and Y. Zhou. CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code. IEEE TSE, 32(3):176-192, 2006.
    • (2006) IEEE TSE , vol.32 , Issue.3 , pp. 176-192
    • Li, Z.1    Lu, S.2    Myagmar, S.3    Zhou, Y.4
  • 35
    • 85116901733 scopus 로고    scopus 로고
    • Identification of High-level Concept Clones in Source Code
    • A. Marcus and J. Maletic. Identification of High-level Concept Clones in Source Code. In ASE, pp. 107-114, 2001.
    • (2001) ASE , pp. 107-114
    • Marcus, A.1    Maletic, J.2
  • 36
    • 0030407014 scopus 로고    scopus 로고
    • Experiment on the Automatic Detection of Function Clones in a Software System Using Metrics
    • J. Mayrand, C. Leblanc and E. Merlo. Experiment on the Automatic Detection of Function Clones in a Software System Using Metrics. In ICSM, pp. 244-253, 1996.
    • (1996) ICSM , pp. 244-253
    • Mayrand, J.1    Leblanc, C.2    Merlo, E.3
  • 37
    • 71149111492 scopus 로고    scopus 로고
    • NICAD: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization
    • C.K. Roy and J.R. Cordy. NICAD: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization. In ICPC, pp. 172-181, 2008.
    • (2008) ICPC , pp. 172-181
    • Roy, C.K.1    Cordy, J.R.2
  • 38
    • 71149091724 scopus 로고    scopus 로고
    • Scenario-Based Comparison of Clone Detection Techniques
    • C.K. Roy and J.R. Cordy. Scenario-Based Comparison of Clone Detection Techniques. In ICPC, pp. 153-162, 2008.
    • (2008) ICPC , pp. 153-162
    • Roy, C.K.1    Cordy, J.R.2
  • 39
    • 69949090791 scopus 로고    scopus 로고
    • C.K. Roy and J.R. Cordy. A Survey on Software Clone Detection Research. Queen's School of Computing TR 2007-541, 115 pp., 2007.
    • C.K. Roy and J.R. Cordy. A Survey on Software Clone Detection Research. Queen's School of Computing TR 2007-541, 115 pp., 2007.
  • 40
    • 57049182540 scopus 로고    scopus 로고
    • Towards a Mutation-Based Automatic Framework for Evaluating Clone DetectionTools
    • C.K. Roy and J.R. Cordy. Towards a Mutation-Based Automatic Framework for Evaluating Clone DetectionTools. In C3S2E, Student Poster, pp. 137-140, 2008.
    • (2008) C3S2E, Student Poster , pp. 137-140
    • Roy, C.K.1    Cordy, J.R.2
  • 41
    • 57749209364 scopus 로고    scopus 로고
    • An Empirical Study of Function Clones in Open Source Software
    • C.K. Roy and J.R. Cordy. An Empirical Study of Function Clones in Open Source Software. In WCRE 2008, pp. 81-90, 2008.
    • (2008) WCRE 2008 , pp. 81-90
    • Roy, C.K.1    Cordy, J.R.2
  • 42
    • 15844401604 scopus 로고    scopus 로고
    • Evaluating Clone Detection Techniques from a Refactoring Perspective
    • F. Rysselberghe and S. Demeyer. Evaluating Clone Detection Techniques from a Refactoring Perspective. In ASE, pp. 336-339, 2004.
    • (2004) ASE , pp. 336-339
    • Rysselberghe, F.1    Demeyer, S.2
  • 43
    • 0346151254 scopus 로고    scopus 로고
    • Problems Creating Task-relevant Clone Detection Reference Data
    • A. Walenstein, N. Jyoti, J. Li, Y. Yang, A. Lakhotia. Problems Creating Task-relevant Clone Detection Reference Data. In WCRE, pp. 285-295, 2003.
    • (2003) WCRE , pp. 285-295
    • Walenstein, A.1    Jyoti, N.2    Li, J.3    Yang, Y.4    Lakhotia, A.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.