메뉴 건너뛰기




Volumn , Issue , 2011, Pages 311-320

Frequency and risks of changes to clones

Author keywords

clone detection; clone evolution; software maintenance

Indexed keywords

CLONE DETECTION; CLONE EVOLUTION; CODE CLONE; RISK POTENTIALS; SOFTWARE PROJECT; SYSTEM'S QUALITY;

EID: 79959897807     PISSN: 02705257     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1985793.1985836     Document Type: Conference Paper
Times cited : (125)

References (34)
  • 1
    • 34547677997 scopus 로고    scopus 로고
    • How clones are maintained: An empirical study
    • IEEE
    • L. Aversano, L. Cerulo, and M. Di Penta. How clones are maintained: An empirical study. In CSMR. IEEE, 2007.
    • (2007) CSMR
    • Aversano, L.1    Cerulo, L.2    Di Penta, M.3
  • 2
    • 0013238532 scopus 로고    scopus 로고
    • Parameterized duplication in strings: Algorithms and an application to software maintenance
    • B. S. Baker. Parameterized duplication in strings: Algorithms and an application to software maintenance. Journal on Computing, 26(5), 1997.
    • (1997) Journal on Computing , vol.26 , Issue.5
    • Baker, B.S.1
  • 3
    • 47349095405 scopus 로고    scopus 로고
    • Clone smells in software evolution
    • IEEE
    • T. Bakota, R. Ferenc, and T. Gyimóthy. Clone smells in software evolution. In ICSM. IEEE, 2007.
    • (2007) ICSM
    • Bakota, T.1    Ferenc, R.2    Gyimóthy, T.3
  • 4
  • 6
    • 70849100995 scopus 로고    scopus 로고
    • Managing code clones using dynamic change tracking and resolution
    • IEEE
    • M. de Wit, A. Zaidman, and A. van Deursen. Managing code clones using dynamic change tracking and resolution. In ICSM. IEEE, 2009.
    • (2009) ICSM
    • De Wit, M.1    Zaidman, A.2    Van Deursen, A.3
  • 7
    • 0033308732 scopus 로고    scopus 로고
    • A language independent approach for detecting duplicated code
    • IEEE
    • S. Ducasse, M. Rieger, and S. Demeyer. A language independent approach for detecting duplicated code. In ICSM. IEEE, 1999.
    • (1999) ICSM
    • Ducasse, S.1    Rieger, M.2    Demeyer, S.3
  • 8
    • 72349095898 scopus 로고    scopus 로고
    • Evolution of type-1 clones
    • IEEE
    • N. Göde. Evolution of type-1 clones. In SCAM. IEEE, 2009.
    • (2009) SCAM
    • Göde, N.1
  • 9
    • 67649971019 scopus 로고    scopus 로고
    • Incremental clone detection
    • IEEE
    • N. Göde and R. Koschke. Incremental clone detection. In CSMR. IEEE, 2009.
    • (2009) CSMR
    • Göde, N.1    Koschke, R.2
  • 10
    • 79959864670 scopus 로고    scopus 로고
    • Studying clone evolution using incremental clone detection
    • N. Göde and R. Koschke. Studying clone evolution using incremental clone detection. JSME, 2010.
    • (2010) JSME
    • Göde, N.1    Koschke, R.2
  • 11
    • 79959883618 scopus 로고    scopus 로고
    • Quo vadis, clone management?
    • ACM
    • J. Harder and N. Göde. Quo vadis, clone management? In IWSC. ACM, 2010.
    • (2010) IWSC
    • Harder, J.1    Göde, N.2
  • 12
    • 35048850423 scopus 로고    scopus 로고
    • Refactoring support based on code clone analysis
    • Y. Higo, T. Kamiya, S. Kusumoto, and K. Inoue. Refactoring support based on code clone analysis. LNCS, 3009, 2004.
    • (2004) LNCS , pp. 3009
    • Higo, Y.1    Kamiya, T.2    Kusumoto, S.3    Inoue, K.4
  • 13
    • 34548767669 scopus 로고    scopus 로고
    • DECKARD: Scalable and accurate tree-based detection of code clones
    • IEEE
    • L. Jiang, G. Misherghi, Z. Su, and S. Glondu. DECKARD: Scalable and accurate tree-based detection of code clones. In ICSE. IEEE, 2007.
    • (2007) ICSE
    • Jiang, L.1    Misherghi, G.2    Su, Z.3    Glondu, S.4
  • 14
    • 37849051720 scopus 로고    scopus 로고
    • Context-based detection of clone-related bugs
    • ACM
    • L. Jiang, Z. Su, and E. Chiu. Context-based detection of clone-related bugs. In ESEC/FSE. ACM, 2007.
    • (2007) ESEC/FSE
    • Jiang, L.1    Su, Z.2    Chiu, E.3
  • 15
    • 0001358667 scopus 로고
    • Identifying redundancy in source code using fingerprints
    • IBM Press
    • J. H. Johnson. Identifying redundancy in source code using fingerprints. In CASCON. IBM Press, 1993.
    • (1993) CASCON
    • Johnson, J.H.1
  • 18
    • 0036648690 scopus 로고    scopus 로고
    • CCFinder: A multilinguistic token-based code clone detection system for large scale source code
    • T. Kamiya, S. Kusumoto, and K. Inoue. CCFinder: A multilinguistic token-based code clone detection system for large scale source code. TSE, 28(7), 2002.
    • (2002) TSE , vol.28 , Issue.7
    • Kamiya, T.1    Kusumoto, S.2    Inoue, K.3
  • 19
    • 56749132226 scopus 로고    scopus 로고
    • "Cloning considered harmful" considered harmful: Patterns of cloning in software
    • C. J. Kapser and M. W. Godfrey. "Cloning considered harmful" considered harmful: patterns of cloning in software. ESE, 13(6), 2008.
    • (2008) ESE , vol.13 , Issue.6
    • Kapser, C.J.1    Godfrey, M.W.2
  • 21
    • 2942747748 scopus 로고    scopus 로고
    • Using slicing to identify duplication in source code
    • Springer-Verlag
    • R. V. Komondoor and S. Horwitz. Using slicing to identify duplication in source code. In SAS. Springer-Verlag, 2001.
    • (2001) SAS
    • Komondoor, R.V.1    Horwitz, S.2
  • 22
    • 67649933675 scopus 로고    scopus 로고
    • Survey of research on software clones
    • R. Koschke, E. Merlo, and A. Walenstein, editors, number 06301 in Dagstuhl Seminar Proceedings
    • R. Koschke. Survey of research on software clones. In R. Koschke, E. Merlo, and A. Walenstein, editors, Duplication, Redundancy, and Similarity in Software, number 06301 in Dagstuhl Seminar Proceedings, 2007.
    • (2007) Duplication, Redundancy, and Similarity in Software
    • Koschke, R.1
  • 23
    • 0242612453 scopus 로고    scopus 로고
    • Identifying similar code with program dependence graphs
    • IEEE
    • J. Krinke. Identifying similar code with program dependence graphs. In WCRE. IEEE, 2001.
    • (2001) WCRE
    • Krinke, J.1
  • 24
    • 51149095379 scopus 로고    scopus 로고
    • A study of consistent and inconsistent changes to code clones
    • IEEE
    • J. Krinke. A study of consistent and inconsistent changes to code clones. In WCRE. IEEE, 2007.
    • (2007) WCRE
    • Krinke, J.1
  • 25
    • 33645819206 scopus 로고    scopus 로고
    • CP-Miner: Finding copy-paste and related bugs in large-scale software code
    • Z. Li, S. Lu, S. Myagmar, and Y. Zhou. CP-Miner: Finding copy-paste and related bugs in large-scale software code. TSE, 32(3), 2006.
    • (2006) TSE , vol.32 , Issue.3
    • Li, Z.1    Lu, S.2    Myagmar, S.3    Zhou, Y.4
  • 26
    • 57849136978 scopus 로고    scopus 로고
    • Assessing the effect of clones on changeability
    • IEEE
    • A. Lozano and M. Wermelinger. Assessing the effect of clones on changeability. In ICSM. IEEE, 2008.
    • (2008) ICSM
    • Lozano, A.1    Wermelinger, M.2
  • 27
    • 34548735994 scopus 로고    scopus 로고
    • Evaluating the harmfulness of cloning: A change based experiment
    • IEEE
    • A. Lozano, M. Wermelinger, and B. Nuseibeh. Evaluating the harmfulness of cloning: A change based experiment. In MSR. IEEE, 2007.
    • (2007) MSR
    • Lozano, A.1    Wermelinger, M.2    Nuseibeh, B.3
  • 28
    • 0030407014 scopus 로고    scopus 로고
    • Experiment on the automatic detection of function clones in a software system using metrics
    • IEEE
    • J. Mayrand, C. Leblanc, and E. Merlo. Experiment on the automatic detection of function clones in a software system using metrics. In ICSM. IEEE, 1996.
    • (1996) ICSM
    • Mayrand, J.1    Leblanc, C.2    Merlo, E.3
  • 29
    • 0023012946 scopus 로고
    • An O(ND) difference algorithm and its variations
    • E. W. Myers. An O(ND) difference algorithm and its variations. Algorithmica, 1(2), 1986.
    • (1986) Algorithmica , vol.1 , Issue.2
    • Myers, E.W.1
  • 32
    • 76749101150 scopus 로고    scopus 로고
    • An empirical study on the maintenance of source code clones
    • S. Thummalapenta, L. Cerulo, L. Aversano, and M. Di Penta. An empirical study on the maintenance of source code clones. ESE, 15(1), 2010.
    • (2010) ESE , vol.15 , Issue.1
    • Thummalapenta, S.1    Cerulo, L.2    Aversano, L.3    Di Penta, M.4
  • 34
    • 84948985305 scopus 로고    scopus 로고
    • On detection of gapped code clones using gap locations
    • IEEEy
    • Y. Ueda, T. Kamiya, S. Kusumoto, and K. Inoue. On detection of gapped code clones using gap locations. In APSEC. IEEEy, 2002.
    • (2002) APSEC
    • Ueda, Y.1    Kamiya, T.2    Kusumoto, S.3    Inoue, K.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.