메뉴 건너뛰기




Volumn , Issue , 2012, Pages 285-294

Cloning practices: Why developers clone and what can be changed

Author keywords

Clone context; Clone lifecycle; Industrial study; Software clones

Indexed keywords

CLONE CONTEXT; CODE ANALYSIS; CODE CLONE; CODE SEGMENTS; CRITICAL POINTS; EMPIRICAL DATA; INDUSTRIAL DEVELOPMENT; INDUSTRIAL STUDY; MAINTENANCE PROBLEM; QUESTIONNAIRE SURVEYS; SOFTWARE CLONES;

EID: 84873121846     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICSM.2012.6405284     Document Type: Conference Paper
Times cited : (29)

References (26)
  • 2
    • 0032311601 scopus 로고    scopus 로고
    • Clone detection using abstract syntax trees
    • I. Baxter, A. Yahin, L. Moura, and M. S. Anna. Clone detection using abstract syntax trees. ICSM 1998, pp. 368-377.
    • (1998) ICSM , pp. 368-377
    • Baxter, I.1    Yahin, A.2    Moura, L.3    Anna, M.S.4
  • 3
    • 0034770139 scopus 로고    scopus 로고
    • Identifying similar code with program dependence graphs
    • J. Krinke. Identifying similar code with program dependence graphs. WCRE 2001, pp. 301-309.
    • (2001) WCRE , pp. 301-309
    • Krinke, J.1
  • 4
    • 0030407014 scopus 로고    scopus 로고
    • Experiment on the automatic detection of function clones in a software system using metrics
    • J. Mayrand, C. Leblanc, E. Merlo. Experiment on the automatic detection of function clones in a software system using metrics. ICSM 1996, pp. 244-253.
    • (1996) ICSM , pp. 244-253
    • Mayrand, J.1    Leblanc, C.2    Merlo, E.3
  • 5
    • 0036648690 scopus 로고    scopus 로고
    • CCFinder: A multilinguistic token-based code clone detection system for large scale source code
    • T. Kamiya, S. Kusumoto, and K. Inoue. CCFinder: A multilinguistic token-based code clone detection system for large scale source code. IEEE Trans. on Soft. Eng., Vol. 28(7): 654-670, 2002.
    • (2002) IEEE Trans. on Soft. Eng. , vol.28 , Issue.7 , pp. 654-670
    • Kamiya, T.1    Kusumoto, S.2    Inoue, K.3
  • 6
    • 0029222025 scopus 로고
    • On finding duplication and near-duplication in large software systems
    • B. Baker. On finding duplication and near-duplication in large software systems. WCRE 1995, pp. 86-95.
    • (1995) WCRE , pp. 86-95
    • Baker, B.1
  • 7
    • 18144389452 scopus 로고    scopus 로고
    • Insights into system wide code duplication
    • M. Rieger, S. Ducasse, and M. Lanza. Insights into system wide code duplication. WCRE 2004, pp. 100-109.
    • (2004) WCRE , pp. 100-109
    • Rieger, M.1    Ducasse, S.2    Lanza, M.3
  • 8
    • 57849101681 scopus 로고    scopus 로고
    • Query-based filtering and graphical view generation for clone analysis
    • Y. Zhang, H. A. Basit, S. Jarzabek, D. Anh, and M. Low. Query-based filtering and graphical view generation for clone analysis. ICSM 2008, pp. 376-385.
    • (2008) ICSM , pp. 376-385
    • Zhang, Y.1    Basit, H.A.2    Jarzabek, S.3    Anh, D.4    Low, M.5
  • 9
    • 11144222932 scopus 로고    scopus 로고
    • ARIES: Refactoring support environment based on code clone analysis
    • Y. Higo, T. Kamiya, S. Kusumoto, and K. Inoue. ARIES: Refactoring support environment based on code clone analysis. SEA 2004, pp.222-229.
    • (2004) SEA , pp. 222-229
    • Higo, Y.1    Kamiya, T.2    Kusumoto, S.3    Inoue, K.4
  • 10
    • 15844401604 scopus 로고    scopus 로고
    • Evaluating clone detection techniques from a refactoring perspective
    • F. V. Rysselberghe and S. Demeyer. Evaluating clone detection techniques from a refactoring perspective. ASE 2004, pp. 336-339.
    • (2004) ASE , pp. 336-339
    • Rysselberghe, F.V.1    Demeyer, S.2
  • 11
    • 34548718935 scopus 로고    scopus 로고
    • "Clones considered harmful" considered harmful
    • C. Kapser and M. W. Godfrey. "Clones considered harmful" considered harmful. WCRE 2006, pp. 19-28.
    • (2006) WCRE , pp. 19-28
    • Kapser, C.1    Godfrey, M.W.2
  • 12
    • 11244317212 scopus 로고    scopus 로고
    • An ethnographic study of copy and paste programming practices in OOPL
    • M. Kim, L. Bergman, T. Lau, and D. Notkin. An ethnographic study of copy and paste programming practices in OOPL. ISESE 2004, pp. 83-92.
    • (2004) ISESE , pp. 83-92
    • Kim, M.1    Bergman, L.2    Lau, T.3    Notkin, D.4
  • 15
    • 34548812113 scopus 로고    scopus 로고
    • Evaluating clone detection tools for use during preventative maintenance
    • E. Burd, J. Bailey. Evaluating clone detection tools for use during preventative maintenance. SCAM 2002, pp. 36-43.
    • (2002) SCAM , pp. 36-43
    • Burd, E.1    Bailey, J.2
  • 16
    • 82055200263 scopus 로고    scopus 로고
    • A study of cloning in the linux scsi drivers
    • W. Wang and M. Godfrey. A study of cloning in the linux scsi drivers. SCAM 2011, pp. 95-104.
    • (2011) SCAM , pp. 95-104
    • Wang, W.1    Godfrey, M.2
  • 17
    • 77950141808 scopus 로고    scopus 로고
    • Near-miss function clones in open source software: An empirical study
    • C. K. Roy and J. R. Cordy. Near-miss function clones in open source software: An empirical study. J. Softw. Maint. Evol.: Res. Pract., Vol. 22(3): 165-189, 2010.
    • (2010) J. Softw. Maint. Evol.: Res. Pract. , vol.22 , Issue.3 , pp. 165-189
    • Roy, C.K.1    Cordy, J.R.2
  • 19
    • 73449140451 scopus 로고    scopus 로고
    • An empirical study on inconsistent changes to code clones at release level
    • N. Bettenburg, W. Shang, W. Ibrahim, B. Adams, Y. Zou, and A. Hassan. An empirical study on inconsistent changes to code clones at release level. WCRE 2009, pp. 85-94.
    • (2009) WCRE , pp. 85-94
    • Bettenburg, N.1    Shang, W.2    Ibrahim, W.3    Adams, B.4    Zou, Y.5    Hassan, A.6
  • 21
    • 32344450436 scopus 로고    scopus 로고
    • An empirical study of code clone genealogies
    • M. Kim and G. Murphy. An empirical study of code clone genealogies. ESEC/SIGSOFT FSE 2005, pp. 187-196.
    • (2005) ESEC/SIGSOFT FSE , pp. 187-196
    • Kim, M.1    Murphy, G.2
  • 22
    • 79953174967 scopus 로고    scopus 로고
    • An empirical study of long-lived code clones
    • D. Cai and M. Kim. An empirical study of long-lived code clones. FASE 2011, pp. 432-446.
    • (2011) FASE , pp. 432-446
    • Cai, D.1    Kim, M.2
  • 23
    • 33749047026 scopus 로고    scopus 로고
    • Cloning by accident: An empirical study of source code cloning across software systems
    • R. Al-Ekram, C. Kapser, and M. Godfrey. Cloning by accident: an empirical study of source code cloning across software systems. ISESE 2005, pp. 376-385.
    • (2005) ISESE , pp. 376-385
    • Al-Ekram, R.1    Kapser, C.2    Godfrey, M.3
  • 24
    • 69049086133 scopus 로고    scopus 로고
    • A data mining approach for detecting higher-level clones in software
    • H. A. Basit, S. Jarzabek: A data mining approach for detecting higher-level clones in software. IEEE Trans. Soft. Eng., Vol. 35(4): 497-514, 2009.
    • (2009) IEEE Trans. Soft. Eng. , vol.35 , Issue.4 , pp. 497-514
    • Basit, H.A.1    Jarzabek, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.