메뉴 건너뛰기




Volumn , Issue , 2008, Pages 153-162

Scenario-based comparison of clone detection techniques

Author keywords

[No Author keywords available]

Indexed keywords

CLONE DETECTION; DETECTION TECHNIQUES; INTERNATIONAL CONFERENCES; PROGRAM COMPREHENSION;

EID: 71149091724     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICPC.2008.42     Document Type: Conference Paper
Times cited : (59)

References (47)
  • 1
    • 34548259865 scopus 로고    scopus 로고
    • Finding Clones with Dup: Analysis of an Experiment
    • B. Baker. Finding Clones with Dup: Analysis of an Experiment. IEEE TSE, 33(9):608-621, 2007.
    • (2007) IEEE TSE , vol.33 , Issue.9 , pp. 608-621
    • Baker, B.1
  • 2
    • 0029222025 scopus 로고
    • On Finding Duplication and Near-Duplication in Large Software Systems
    • B. Buker. On Finding Duplication and Near-Duplication in Large Software Systems. In WCRE, pp. 86-95, 1995.
    • (1995) WCRE , pp. 86-95
    • Buker, B.1
  • 4
    • 37849021096 scopus 로고    scopus 로고
    • Efficient Token Based Clone Detection with Flexible Tokenization
    • H. Bask, S. Pugliesi, W. Smyth, A. Turpin and S.Jarzabek. Efficient Token Based Clone Detection with Flexible Tokenization. In ESEC/FSE, pp. 513-515, 2007.
    • (2007) ESEC/FSE , pp. 513-515
    • Bask, H.1    Pugliesi, S.2    Smyth, W.3    Turpin, A.4    Jarzabek, S.5
  • 5
    • 53849090475 scopus 로고    scopus 로고
    • Project Bauhaus
    • Project Bauhaus, http://www.bauhaus-stuttgart.de.
  • 6
    • 0032311601 scopus 로고    scopus 로고
    • Clone Detection Using Abstract Syntax Trees
    • I. Baxter, A. Yahin, L. Moura and M. Anna. Clone Detection Using Abstract Syntax Trees. In ICSM. pp. 368-377, 1998.
    • (1998) ICSM , pp. 368-377
    • Baxter, I.1    Yahin, A.2    Moura, L.3    Anna, M.4
  • 7
    • 34548228440 scopus 로고    scopus 로고
    • Comparison and Evaluation of Clone Detection Tools
    • S. Bellon, R. Koschke, G. Antoniol, J. Krinke and E. Merlo. Comparison and Evaluation of Clone Detection Tools. IEEE TSE, 33(9):577-591, 2007.
    • (2007) IEEE TSE , vol.33 , Issue.9 , pp. 577-591
    • Bellon, S.1    Koschke, R.2    Antoniol, G.3    Krinke, J.4    Merlo, E.5
  • 8
    • 34548812113 scopus 로고    scopus 로고
    • Evaluating Clone Detection Tools for Use during Preventative Maintenance
    • E. Burd and J. Bailey. Evaluating Clone Detection Tools for Use during Preventative Maintenance. In SCAM, pp. 36-43, 2002.
    • (2002) SCAM , pp. 36-43
    • Burd, E.1    Bailey, J.2
  • 9
    • 35348852053 scopus 로고    scopus 로고
    • Function Clone Detection in Web Applications: A Semiautomated Approach
    • F. Calefato, F. Lanubile and T. Mallardo. Function Clone Detection in Web Applications: A Semiautomated Approach. J. of Weh Eng., 3(1):3-21, 2004.
    • (2004) J. of Weh Eng , vol.3 , Issue.1 , pp. 3-21
    • Calefato, F.1    Lanubile, F.2    Mallardo, T.3
  • 11
    • 84952201613 scopus 로고
    • Dotplot: A program for exploring self-similarity in millions of lines for text and code
    • K. Church and J. Helfman. Dotplot: A program for exploring self-similarity in millions of lines for text and code. J. of American Stat. Ass., 2(2):153-174, 1993.
    • (1993) J. of American Stat. Ass , vol.2 , Issue.2 , pp. 153-174
    • Church, K.1    Helfman, J.2
  • 12
    • 32344442609 scopus 로고    scopus 로고
    • Practical Language-Independent Detection of Near-Miss Clones
    • J.R. Cordy, T.R. Dean and N. Synytskyy. Practical Language-Independent Detection of Near-Miss Clones. In CASCON, pp. 29-40, 2004.
    • (2004) CASCON , pp. 29-40
    • Cordy, J.R.1    Dean, T.R.2    Synytskyy, N.3
  • 13
    • 32344434402 scopus 로고
    • The Development of a Software Clone Detector
    • N. Davey, P. Barson, S. Field and R. Frank. The Development of a Software Clone Detector. J. App. Soft. Tech., 1(3/4):219-236, 1995.
    • (1995) J. App. Soft. Tech , vol.1 , Issue.3-4 , pp. 219-236
    • Davey, N.1    Barson, P.2    Field, S.3    Frank, R.4
  • 14
    • 0036389629 scopus 로고    scopus 로고
    • An Approach to Identify Duplicated Web
    • G. Di Lucca, M. Penta and A. Fasolino. An Approach to Identify Duplicated Web Pages. In COMPSAC, pp. 481-486, 2002.
    • (2002) COMPSAC , pp. 481-486
    • Di Lucca, G.1    Penta, M.2    Fasolino, A.3
  • 15
    • 53849113169 scopus 로고    scopus 로고
    • Tool Dupman http://sourceforge.net/projects/dupman
    • Tool Dupman
  • 16
    • 0033308732 scopus 로고    scopus 로고
    • A Language Independent Approach for Detecting Duplicated Code
    • S. Ducasse, M. Rieger and S. Demeyer. A Language Independent Approach for Detecting Duplicated Code. In ICSM, pp. 109-118, 1999.
    • (1999) ICSM , pp. 109-118
    • Ducasse, S.1    Rieger, M.2    Demeyer, S.3
  • 17
    • 51149108069 scopus 로고    scopus 로고
    • Clone Detection via Structural Abstraction
    • W. Evans and C. Fraser. Clone Detection via Structural Abstraction. In WCRE, pp. 150-159, 2007.
    • (2007) WCRE , pp. 150-159
    • Evans, W.1    Fraser, C.2
  • 19
    • 1442344984 scopus 로고    scopus 로고
    • D. Gitchell and N. Tran. Sim: A utility for detecting similarity in computer programs. In SIGCSE Bulletin, 31(1): 266-270, 1999.
    • D. Gitchell and N. Tran. Sim: A utility for detecting similarity in computer programs. In SIGCSE Bulletin, 31(1): 266-270, 1999.
  • 20
    • 34548767669 scopus 로고    scopus 로고
    • DECKARD: Scalable and Accurate Tree-based Detection of Code Clones
    • L. Jiang. G. Misherghi, Z. Su and S. Glondu. DECKARD: Scalable and Accurate Tree-based Detection of Code Clones. In ICSE, pp. 96-105, 2007.
    • (2007) ICSE , pp. 96-105
    • Jiang, L.1    Misherghi, G.2    Su, Z.3    Glondu, S.4
  • 21
    • 53849147395 scopus 로고
    • Visualizing Textual Redundancy in Legacy Source
    • J. Johnson. Visualizing Textual Redundancy in Legacy Source. In CASCCW, pp. 171-183, 1994.
    • (1994) CASCCW , pp. 171-183
    • Johnson, J.1
  • 22
    • 0036648690 scopus 로고    scopus 로고
    • CCFinder: A Multilinguistic Token-Based Code Clone Detection System for Large Scale Source Code
    • T. Kamiya, S. Kusumoto and K. Inoue. CCFinder: A Multilinguistic Token-Based Code Clone Detection System for Large Scale Source Code. IEEE TSE, 28(7):654-670, 2002.
    • (2002) IEEE TSE , vol.28 , Issue.7 , pp. 654-670
    • Kamiya, T.1    Kusumoto, S.2    Inoue, K.3
  • 23
    • 84890052317 scopus 로고    scopus 로고
    • Using Slicing to Identify Duplication in Source Code
    • R. Komondoor and S. Horwitz. Using Slicing to Identify Duplication in Source Code. In SAS, pp. 40-56, 2001.
    • (2001) SAS , pp. 40-56
    • Komondoor, R.1    Horwitz, S.2
  • 24
  • 25
    • 34948876329 scopus 로고    scopus 로고
    • Clone Detection Using Abstract Syntax Suffix Trees
    • R. Koschke, R. Falke and P. Frenzel. Clone Detection Using Abstract Syntax Suffix Trees. In WCRE, pp. 253-262, 2006.
    • (2006) WCRE , pp. 253-262
    • Koschke, R.1    Falke, R.2    Frenzel, P.3
  • 26
    • 64549100783 scopus 로고    scopus 로고
    • Survey of Research on Software Clones
    • 24pp
    • R. Koschke. Survey of Research on Software Clones. In Dagstuhl Seminar 06301, 24pp., 2006.
    • (2006) Dagstuhl Seminar 06301
    • Koschke, R.1
  • 27
    • 0034770139 scopus 로고    scopus 로고
    • Identifying Similar Code with Program Dependence Graphs
    • J. Krinke. Identifying Similar Code with Program Dependence Graphs. In WCRE, pp. 301-309, 2001.
    • (2001) WCRE , pp. 301-309
    • Krinke, J.1
  • 28
    • 85126165687 scopus 로고    scopus 로고
    • SDD: High performance Code Clone Detection System for Large Scale Source Code
    • S. Lee and I. Jeong. SDD: High performance Code Clone Detection System for Large Scale Source Code. In OOPSLA, pp. 140-141, 2005.
    • (2005) OOPSLA , pp. 140-141
    • Lee, S.1    Jeong, I.2
  • 29
    • 4444250414 scopus 로고    scopus 로고
    • 2. Soft. Qual. J., 12(4):361-382, 2004.
    • 2. Soft. Qual. J., 12(4):361-382, 2004.
  • 30
    • 33749559863 scopus 로고    scopus 로고
    • C. Liu, C. Chen, J. Han and P. Yu. GPLAG: Detection of Software Plagiarism by Program Dependence Graph Analysis.In KDD. pp. 872-881, 2006.
    • C. Liu, C. Chen, J. Han and P. Yu. GPLAG: Detection of Software Plagiarism by Program Dependence Graph Analysis.In KDD. pp. 872-881, 2006.
  • 31
    • 34548789572 scopus 로고    scopus 로고
    • Very-Large Scale Code Clone Analysis and Visualization of Open Source Programs Using Distributed CCFinder
    • S. Livieri, Y. Higo, M. Matsushita, K. Inoue: Very-Large Scale Code Clone Analysis and Visualization of Open Source Programs Using Distributed CCFinder. In ICSE, pp. 106-115, 2007.
    • (2007) ICSE , pp. 106-115
    • Livieri, S.1    Higo, Y.2    Matsushita, M.3    Inoue, K.4
  • 32
    • 33645819206 scopus 로고    scopus 로고
    • CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code
    • Z. Li, S. Lu, S. Myagmar, and Y. Zhou. CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code. IEEE TSE, 32(3): 176-192, 2006.
    • (2006) IEEE TSE , vol.32 , Issue.3 , pp. 176-192
    • Li, Z.1    Lu, S.2    Myagmar, S.3    Zhou, Y.4
  • 33
    • 85043988965 scopus 로고
    • Finding Similar Files in a Large File System
    • U. Manber. Finding Similar Files in a Large File System. In USENIX Winter, pp. 1-10, 1994.
    • (1994) USENIX Winter , pp. 1-10
    • Manber, U.1
  • 34
    • 85116901733 scopus 로고    scopus 로고
    • Identification of High-level Concept Clones in Source Code
    • A. Marcus and J. Maletic. Identification of High-level Concept Clones in Source Code. In ASE, pp. 107-114, 2001.
    • (2001) ASE , pp. 107-114
    • Marcus, A.1    Maletic, J.2
  • 35
    • 0030407014 scopus 로고    scopus 로고
    • Experiment on the Automatic Detection of Function Clones in a Software System Using Metrics
    • J. Mayrand, C. Leblanc and E. Merlo. Experiment on the Automatic Detection of Function Clones in a Software System Using Metrics. In ICSM. pp. 244-253, 1996.
    • (1996) ICSM , pp. 244-253
    • Mayrand, J.1    Leblanc, C.2    Merlo, E.3
  • 36
    • 53849090118 scopus 로고    scopus 로고
    • Source Code Enhancement Using Reduction of Duplicated Code
    • S. Nasehi, G. Sotudeh and M. Gomrokchi. Source Code Enhancement Using Reduction of Duplicated Code. In IASTED SE, 2007.
    • (2007) IASTED SE
    • Nasehi, S.1    Sotudeh, G.2    Gomrokchi, M.3
  • 37
    • 84970889390 scopus 로고    scopus 로고
    • Extending Software Quality Assessment Techniques to Java Systems
    • J. Patenaude, E. Merlo, M. Dagenais, and B. Lague. Extending Software Quality Assessment Techniques to Java Systems. In IWPC, pp. 49-56, 1999.
    • (1999) IWPC , pp. 49-56
    • Patenaude, J.1    Merlo, E.2    Dagenais, M.3    Lague, B.4
  • 38
    • 53849113833 scopus 로고    scopus 로고
    • C.K. Roy and J.R. Cordy. A Survey on Software Clone Detection Research. Queen's Technical Report:541, 115pp., 2007.
    • C.K. Roy and J.R. Cordy. A Survey on Software Clone Detection Research. Queen's Technical Report:541, 115pp., 2007.
  • 39
    • 71149111492 scopus 로고    scopus 로고
    • NICAD: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization
    • 10pp
    • C.K. Roy and J.R. Cordy. NICAD: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization. In ICPC, 10pp., 2008.
    • (2008) ICPC
    • Roy, C.K.1    Cordy, J.R.2
  • 40
    • 27744514010 scopus 로고    scopus 로고
    • Evaluating Clone Detection Techniques
    • 12pp
    • F. Rysselberghe and S. Demeyer. Evaluating Clone Detection Techniques. In ELISA 12pp., 2003.
    • (2003) ELISA
    • Rysselberghe, F.1    Demeyer, S.2
  • 41
    • 15844401604 scopus 로고    scopus 로고
    • Evaluating Clone Detection Techniques from a Refactoring Perspective
    • F. Rysselberghe and S. Demeyer. Evaluating Clone Detection Techniques from a Refactoring Perspective. In ASE, pp. 336-339, 2004.
    • (2004) ASE , pp. 336-339
    • Rysselberghe, F.1    Demeyer, S.2
  • 42
    • 53849097897 scopus 로고    scopus 로고
    • Tool SimScan. http://www.blue-edge.bg/simscan/
    • Tool SimScan
  • 43
    • 34248359450 scopus 로고    scopus 로고
    • Phoenix-Based Clone Detection Using Suffix Trees
    • R. Tairas and J. Gray. Phoenix-Based Clone Detection Using Suffix Trees. In ACM-SE, pp. 679-684, 2006.
    • (2006) ACM-SE , pp. 679-684
    • Tairas, R.1    Gray, J.2
  • 44
    • 84948985305 scopus 로고    scopus 로고
    • On Detection of Gapped Code Clones Using Gap Locations
    • Y. Ueda, T. Kamiya, S. Kusumoto and K. Inoue. On Detection of Gapped Code Clones Using Gap Locations. In APSEC, pp. 327-336, 2002.
    • (2002) APSEC , pp. 327-336
    • Ueda, Y.1    Kamiya, T.2    Kusumoto, S.3    Inoue, K.4
  • 45
    • 14344258876 scopus 로고    scopus 로고
    • Clone Detection in Source Code by Frequent Itemset Techniques
    • V. Wahler, D. Seipel, J. Gudenberg and G. Fischer. Clone Detection in Source Code by Frequent Itemset Techniques. In SCAM, pp. 128-135, 2004.
    • (2004) SCAM , pp. 128-135
    • Wahler, V.1    Seipel, D.2    Gudenberg, J.3    Fischer, G.4
  • 46
    • 33847207801 scopus 로고    scopus 로고
    • Archeology of Code Duplication: Recovering Duplication Chains From Small Duplication Fragments
    • 8pp
    • R. Wettel and R. Marinescu. Archeology of Code Duplication: Recovering Duplication Chains From Small Duplication Fragments. In SYNASC, 8pp., 2005.
    • (2005) SYNASC
    • Wettel, R.1    Marinescu, R.2
  • 47
    • 0026185673 scopus 로고
    • Identifying Syntactic Differences Between Two Programs
    • W. Yang. Identifying Syntactic Differences Between Two Programs. Soft.-Prac. and Exper., 21(7):739-155, 1991.
    • (1991) Soft.-Prac. and Exper , vol.21 , Issue.7 , pp. 739-155
    • Yang, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.