메뉴 건너뛰기




Volumn 22, Issue 3, 2010, Pages 165-189

Near-miss function clones in open source software: An empirical study

Author keywords

Empirical study; Near miss function clones; Open source software

Indexed keywords

CLONE DETECTION; CLONE DETECTION TECHNIQUES; EMPIRICAL STUDIES; EMPIRICAL STUDY; IN-DEPTH STUDY; LINUX KERNEL; NOVEL APPLICATIONS; ONLINE REPOSITORIES; OPEN SOURCE SOFTWARE; OPEN SOURCES; SOFTWARE SYSTEMS; SOURCE TRANSFORMATION; VALIDATED RESULTS;

EID: 77950141808     PISSN: 1532060X     EISSN: 15320618     Source Type: Journal    
DOI: 10.1002/smr.416     Document Type: Conference Paper
Times cited : (71)

References (41)
  • 1
    • 56749132226 scopus 로고    scopus 로고
    • 'Cloning Considered Harmful' considered harmful: Patterns of cloning in software
    • Kapser C, Godfrey MW. 'Cloning Considered Harmful' considered harmful: Patterns of cloning in software. Empirical Software Engineering 2008; 13(6): 645-692.
    • (2008) Empirical Software Engineering , vol.13 , Issue.6 , pp. 645-692
    • Kapser, C.1    Godfrey, M.W.2
  • 2
    • 34547677997 scopus 로고    scopus 로고
    • How clones are maintained: An empirical study
    • Aversano L, Cerulo L, Di Penta M. How clones are maintained: An empirical study. CSMR, 2007; 81-90.
    • (2007) CSMR , pp. 81-90
    • Aversano, L.1    Cerulo, L.2    Di Penta, M.3
  • 3
    • 32344450436 scopus 로고    scopus 로고
    • An empirical study of code clone genealogies
    • Kim M, Sazawal V, Notkin D, Murphy G. An empirical study of code clone genealogies. FSE, 2005; 187-196.
    • (2005) FSE , pp. 187-196
    • Kim, M.1    Sazawal, V.2    Notkin, D.3    Murphy, G.4
  • 5
    • 53849147395 scopus 로고
    • Visualizing textual redundancy in legacy source
    • Johnson J. Visualizing textual redundancy in legacy source. CASCON, 1994; 171-183.
    • (1994) CASCON , pp. 171-183
    • Johnson, J.1
  • 6
    • 33645819206 scopus 로고    scopus 로고
    • CP-Miner: Finding copy-paste and related bugs in large-scale software code
    • Li Z, Lu S, Myagmar S, Zhou Y. CP-Miner: Finding copy-paste and related bugs in large-scale software code. IEEE Transactions on Software Engineering 2006; 32(3): 176-192.
    • (2006) IEEE Transactions on Software Engineering , vol.32 , Issue.3 , pp. 176-192
    • Li, Z.1    Lu, S.2    Myagmar, S.3    Zhou, Y.4
  • 7
    • 0030407014 scopus 로고    scopus 로고
    • Experiment on the automatic detection of function clones in a software system using metrics
    • Mayrand J, Leblanc C, Merlo E. Experiment on the automatic detection of function clones in a software system using metrics. ICSM, 1996; 244-253.
    • (1996) ICSM , pp. 244-253
    • Mayrand, J.1    Leblanc, C.2    Merlo, E.3
  • 10
    • 64549135034 scopus 로고    scopus 로고
    • Comparison and evaluation of clone detection techniques and tools: A qualitative approach
    • Roy CK, Cordy JR, Koschke R. Comparison and evaluation of clone detection techniques and tools: A qualitative approach. Science of Computer Programming 2009; 74: 470-495.
    • (2009) Science of Computer Programming , vol.74 , pp. 470-495
    • Roy, C.K.1    Cordy, J.R.2    Koschke, R.3
  • 11
    • 71149091724 scopus 로고    scopus 로고
    • Scenario-based comparison of clone detection techniques
    • Roy CK, Cordy JR. Scenario-based comparison of clone detection techniques. ICPC, 2008; 153-162.
    • (2008) ICPC , pp. 153-162
    • Roy, C.K.1    Cordy, J.R.2
  • 14
    • 56749179725 scopus 로고    scopus 로고
    • Empirical evaluation of clone detection using syntax suffix trees
    • Falke R, Koschke R, Frenzel P. Empirical evaluation of clone detection using syntax suffix trees. Empirical Software Engineering 2008; 13: 601-643.
    • (2008) Empirical Software Engineering , vol.13 , pp. 601-643
    • Falke, R.1    Koschke, R.2    Frenzel, P.3
  • 15
    • 34548812113 scopus 로고    scopus 로고
    • Evaluating clone detection tools for use during preventative maintenance
    • Burd E, Bailey J. Evaluating clone detection tools for use during preventative maintenance. SCAM, 2002; 36-43.
    • (2002) SCAM , pp. 36-43
    • Burd, E.1    Bailey, J.2
  • 16
    • 27744514010 scopus 로고    scopus 로고
    • Evaluating clone detection techniques
    • Rysselberghe F, Demeyer S. Evaluating clone detection techniques. ELISA, 2003; 12.
    • (2003) ELISA , pp. 12
    • Rysselberghe, F.1    Demeyer, S.2
  • 17
    • 15844401604 scopus 로고    scopus 로고
    • Evaluating clone detection techniques from a refactoring perspective
    • Rysselberghe F, Demeyer S. Evaluating clone detection techniques from a refactoring perspective. ASE, 2004; 336-339.
    • (2004) ASE , pp. 336-339
    • Rysselberghe, F.1    Demeyer, S.2
  • 18
    • 51149095379 scopus 로고    scopus 로고
    • A study of consistent and inconsistent changes to code clones
    • Krinke J. A study of consistent and inconsistent changes to code clones. WCRE, 2007; 170-178.
    • (2007) WCRE , pp. 170-178
    • Krinke, J.1
  • 19
    • 11244324147 scopus 로고    scopus 로고
    • Toward a taxonomy of clones in source code: A case study
    • Kapser C, Godfrey M. Toward a taxonomy of clones in source code: A case study. ELISA, 2003; 67-78.
    • (2003) ELISA , pp. 67-78
    • Kapser, C.1    Godfrey, M.2
  • 20
    • 33646429779 scopus 로고    scopus 로고
    • Supporting the analysis of clones in software systems: A case study
    • Kapser C, Godfrey M. Supporting the analysis of clones in software systems: A case study. JSME: Research and Practice 2006; 18(2): 61-82.
    • (2006) JSME: Research and Practice , vol.18 , Issue.2 , pp. 61-82
    • Kapser, C.1    Godfrey, M.2
  • 22
    • 77950123080 scopus 로고    scopus 로고
    • An investigation of cloning in web applications
    • Rajapakse DC, Jarzabek S. An investigation of cloning in web applications. WWW, 2005; 924-925.
    • (2005) WWW , pp. 924-925
    • Rajapakse, D.C.1    Jarzabek, S.2
  • 23
    • 71149111492 scopus 로고    scopus 로고
    • NICAD: Accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization
    • Roy CK, Cordy JR. NICAD: Accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization. ICPC, 2008; 172-181.
    • (2008) ICPC , pp. 172-181
    • Roy, C.K.1    Cordy, J.R.2
  • 24
    • 57749209364 scopus 로고    scopus 로고
    • An empirical study of function clones in open source software systems
    • Roy CK, Cordy JR. An empirical study of function clones in open source software systems. WCRE, 2008; 81-90.
    • (2008) WCRE , pp. 81-90
    • Roy, C.K.1    Cordy, J.R.2
  • 26
    • 77950138627 scopus 로고    scopus 로고
    • Abyss. Available at: 7 December
    • Abyss. Available at: http://abyss.sourceforge.net/ [7 December 2007].
    • (2007)
  • 27
    • 77950164383 scopus 로고    scopus 로고
    • 3 February
    • Gzip-1.2.4. Available at: http://www.gzip.org/ [3 February 2008].
    • (2008)
  • 28
    • 77950103932 scopus 로고    scopus 로고
    • 2 April
    • Apache-httpd. Available at: http://httpd.apache.org/ [2 April 2008].
    • (2008)
  • 29
    • 77950177638 scopus 로고    scopus 로고
    • 10 March
    • Linux-2.6.24.2. Available at: http://www.linux.org/ [10 March 2008].
    • (2008)
  • 30
    • 77950150720 scopus 로고    scopus 로고
    • 25 January
    • JHotDraw. Available at: http://www.jhotdraw.org/ [25 January 2006].
    • (2006)
  • 31
    • 77950118660 scopus 로고    scopus 로고
    • 5 February
    • The SOURGEFORGE.NET. Available at: http://sourceforge.net/ [5 February 2009].
    • (2009)
  • 32
    • 69949085058 scopus 로고    scopus 로고
    • A mutation/injection-based automatic framework for evaluating clone detection tools
    • Roy CK, Cordy JR. A mutation/injection-based automatic framework for evaluating clone detection tools. Mutation'09, 2009; 157-166.
    • (2009) Mutation'09 , pp. 157-166
    • Roy, C.K.1    Cordy, J.R.2
  • 33
    • 33749047026 scopus 로고    scopus 로고
    • Cloning by accident: An empirical study of source code cloning across software systems
    • Al-Ekram R, Kapser C, Godfrey M. Cloning by accident: An empirical study of source code cloning across software systems. ISESE, 2005; 376-385.
    • (2005) ISESE , pp. 376-385
    • Al-Ekram, R.1    Kapser, C.2    Godfrey, M.3
  • 34
    • 84948459152 scopus 로고    scopus 로고
    • Gemini: Maintenance support environment based on code clone analysis
    • Ueda Y, Kamiya T, Kusumoto S, Inoue K. Gemini: Maintenance support environment based on code clone analysis. METRICS, 2002; 67-76.
    • (2002) METRICS , pp. 67-76
    • Ueda, Y.1    Kamiya, T.2    Kusumoto, S.3    Inoue, K.4
  • 35
    • 18144389452 scopus 로고    scopus 로고
    • Insights into system-wide code duplication
    • Rieger M, Ducasse S, Lanza M. Insights into system-wide code duplication. WCRE, 2004; 100-109.
    • (2004) WCRE , pp. 100-109
    • Rieger, M.1    Ducasse, S.2    Lanza, M.3
  • 37
    • 57849157446 scopus 로고    scopus 로고
    • A methodology to assess the impact of source code flaws in changeability, and its application to clones
    • Lozano A. A methodology to assess the impact of source code flaws in changeability, and its application to clones. ICSM Doctoral Symposium, 2008; 424-427.
    • (2008) ICSM Doctoral Symposium , pp. 424-427
    • Lozano, A.1
  • 38
    • 47749155579 scopus 로고    scopus 로고
    • A framework for studying clones in large software systems
    • Jiang Z, Hassan A. A framework for studying clones in large software systems. SCAM, 2007; 203-212.
    • (2007) SCAM , pp. 203-212
    • Jiang, Z.1    Hassan, A.2
  • 40
    • 77950155071 scopus 로고    scopus 로고
    • KClone: A proposed approach to fast precise code clone detection
    • Jia Y, Binkley D, Harman M, Krinke J, Matsushita M. KClone: A proposed approach to fast precise code clone detection. IWSC, 2009; 5.
    • (2009) IWSC , pp. 5
    • Jia, Y.1    Binkley, D.2    Harman, M.3    Krinke, J.4    Matsushita, M.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.