메뉴 건너뛰기




Volumn , Issue , 2012, Pages 1227-1234

Comparative stability of cloned and non-cloned code: An empirical study

Author keywords

average age; average last change date; clone types; code stability; modification frequency

Indexed keywords

AVERAGE AGE; AVERAGE LAST CHANGE DATE; C-SYSTEMS; CHANGE PATTERNS; CLONE DETECTION; CLONE TYPES; CODE CLONING; DEVELOPMENT STRATEGIES; EMPIRICAL STUDIES; LINES OF CODE; MEASUREMENT TECHNIQUES; MEASURING METHOD; MODIFICATION FREQUENCY; SOFTWARE ENGINEERING PRACTICES; STABILITY ANALYSIS; STABILITY MEASUREMENTS; SYSTEM SIZE; THREE CLONES;

EID: 84863588657     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2245276.2231969     Document Type: Conference Paper
Times cited : (63)

References (19)
  • 1
    • 34547677997 scopus 로고    scopus 로고
    • How clones are maintained: An empirical study
    • L. Aversano, L. Cerulo, and M. D. Penta. How clones are maintained: An empirical study. In Proc. CSMR, pp. 81-90, 2007.
    • (2007) Proc. CSMR , pp. 81-90
    • Aversano, L.1    Cerulo, L.2    Penta, M.D.3
  • 2
    • 84863578899 scopus 로고    scopus 로고
    • CCFinderX. http://www.ccfinder.net/ccfinderxos.html
    • CCFinderX
  • 4
    • 84871639406 scopus 로고    scopus 로고
    • Fisher's Exact Test. http://in-silico.net/ statistics/fisher-exact-test/ 2x3
    • Fisher's Exact Test
  • 5
  • 6
    • 78649993696 scopus 로고    scopus 로고
    • Is Duplicate Code More Frequently Modified than Non-duplicate Code in Software Evolution?: An Empirical Study on Open Source Software
    • K. Hotta, Y. Sano, Y. Higo, S. Kusumoto. Is Duplicate Code More Frequently Modified than Non-duplicate Code in Software Evolution?: An Empirical Study on Open Source Software. In Proc. EVOL/IWPSE, pp. 73-82, 2010.
    • (2010) Proc. EVOL/IWPSE , pp. 73-82
    • Hotta, K.1    Sano, Y.2    Higo, Y.3    Kusumoto, S.4
  • 8
    • 56749132226 scopus 로고    scopus 로고
    • "Cloning considered harmful" considered harmful: Patterns of cloning in software
    • C. Kapser and M. W. Godfrey. "Cloning considered harmful" considered harmful: patterns of cloning in software. Emp. Soft. Eng. 13(6), pp. 645-692, 2008.
    • (2008) Emp. Soft. Eng. , vol.13 , Issue.6 , pp. 645-692
    • Kapser, C.1    Godfrey, M.W.2
  • 10
    • 51149095379 scopus 로고    scopus 로고
    • A study of consistent and inconsistent changes to code clones
    • J. Krinke. A study of consistent and inconsistent changes to code clones. In Proc. WCRE, pp. 170-178, 2007.
    • (2007) Proc. WCRE , pp. 170-178
    • Krinke, J.1
  • 11
    • 56349141528 scopus 로고    scopus 로고
    • Is cloned code more stable than non-cloned code?
    • J. Krinke. Is cloned code more stable than non-cloned code? In Proc. SCAM, pp. 57-66, 2008.
    • (2008) Proc. SCAM , pp. 57-66
    • Krinke, J.1
  • 12
    • 79959540797 scopus 로고    scopus 로고
    • Is Cloned Code older than Non-Cloned Code?
    • J. Krinke. Is Cloned Code older than Non-Cloned Code? In Proc. IWSC, pp.28-33, 2011.
    • (2011) Proc. IWSC , pp. 28-33
    • Krinke, J.1
  • 13
    • 34548735994 scopus 로고    scopus 로고
    • Evaluating the Harmfulness of Cloning: A Change Based Experiment
    • A. Lozano, M. Wermelinger, and B. Nuseibeh. Evaluating the Harmfulness of Cloning: A Change Based Experiment. In Proc. MSR, pp. 18-21, 2007.
    • (2007) Proc. MSR , pp. 18-21
    • Lozano, A.1    Wermelinger, M.2    Nuseibeh, B.3
  • 14
    • 77954743484 scopus 로고    scopus 로고
    • Tracking clones' imprint
    • A. Lozano and M. Wermelinger. Tracking clones' imprint. In Proc. IWSC, pp. 65-72, 2010.
    • (2010) Proc. IWSC , pp. 65-72
    • Lozano, A.1    Wermelinger, M.2
  • 15
    • 57849136978 scopus 로고    scopus 로고
    • Assessing the effect of clones on changeability
    • A. Lozano, and M. Wermelinger. Assessing the effect of clones on changeability. In Proc. ICSM, pp. 227-236, 2008.
    • (2008) Proc. ICSM , pp. 227-236
    • Lozano, A.1    Wermelinger, M.2
  • 16
    • 69949085058 scopus 로고    scopus 로고
    • A mutation / injection-based automatic framework for evaluating code clone detection tools
    • C. K. Roy and J. R. Cordy. A mutation / injection-based automatic framework for evaluating code clone detection tools. In Proc. Mutation, pp. 157-166, 2009.
    • (2009) Proc. Mutation , pp. 157-166
    • Roy, C.K.1    Cordy, J.R.2
  • 17
    • 71149111492 scopus 로고    scopus 로고
    • NICAD: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization
    • C. K. Roy and J. R. Cordy. NICAD: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization. In Proc ICPC, pp. 172-181, 2008.
    • (2008) Proc ICPC , pp. 172-181
    • Roy, C.K.1    Cordy, J.R.2
  • 18
  • 19
    • 76749101150 scopus 로고    scopus 로고
    • An empirical study on the maintenance of source code clones
    • S. Thummalapenta, L. Cerulo, L. Aversano, and M. D. Penta. An empirical study on the maintenance of source code clones. In ESE, 15(1), pp. 1-34, 2009.
    • (2009) ESE , vol.15 , Issue.1 , pp. 1-34
    • Thummalapenta, S.1    Cerulo, L.2    Aversano, L.3    Penta, M.D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.