메뉴 건너뛰기




Volumn 25, Issue 3, 2013, Pages 261-283

Clone evolution: A systematic review

Author keywords

Clone evolution; Code clones; Systematic literature review

Indexed keywords

CODE CLONE; EMPIRICAL STUDIES; EVOLUTION PATTERNS; RESEARCH QUESTIONS; SOFTWARE EVOLUTION; SYSTEMATIC LITERATURE REVIEW; SYSTEMATIC REVIEW; TEMPORAL DIMENSIONS;

EID: 84879652109     PISSN: None     EISSN: 20477481     Source Type: Journal    
DOI: 10.1002/smr.579     Document Type: Review
Times cited : (46)

References (45)
  • 3
    • 76749101150 scopus 로고    scopus 로고
    • An empirical study on the maintenance of source code clones
    • doi:10.1007/s10664-009-9108-x
    • Thummalapenta S, Cerulo L, Aversano L, Penta MD. An empirical study on the maintenance of source code clones. Empirical Software Engineering 2009; 15(1):1-34, doi:10.1007/s10664-009-9108-x.
    • (2009) Empirical Software Engineering , vol.15 , Issue.1 , pp. 1-34
    • Thummalapenta, S.1    Cerulo, L.2    Aversano, L.3    Penta, M.D.4
  • 4
    • 56749132226 scopus 로고    scopus 로고
    • Cloning considered harmful" considered harmful: Patterns of cloning in software
    • doi:10.1007/s10664-008-9076-6
    • Kapser C, Godfrey M. "Cloning considered harmful" considered harmful: patterns of cloning in software. Empirical Software Engineering 2008; 13(6):645-692, doi:10.1007/s10664-008-9076-6.
    • (2008) Empirical Software Engineering , vol.13 , Issue.6 , pp. 645-692
    • Kapser, C.1    Godfrey, M.2
  • 7
    • 64549100783 scopus 로고    scopus 로고
    • Survey of research on software clones. Duplication, Redundancy, and Similarity in Software no. 06301
    • Koschke R. Survey of research on software clones. Duplication, Redundancy, and Similarity in Software, no. 06301 in Dagstuhl Seminar Proceedings, 2007. http://drops.dagstuhl.de/opus/volltexte/2007/962.
    • (2007) Dagstuhl Seminar Proceedings
    • Koschke, R.1
  • 13
    • 44649122227 scopus 로고    scopus 로고
    • EBSE Technical Report EBSE-2007-01, School of Computer Science andMathematics, Keele University and Department of Computer Science, University of Durham Jul 2007
    • Kitchenham B, Charters S. Guidelines for performing systematic literature reviews in software engineering. EBSE Technical Report EBSE-2007-01, School of Computer Science andMathematics, Keele University and Department of Computer Science, University of Durham Jul 2007. http://www.elsevier.com/framework products / promismisc / inf-systrev.pdf.
    • Guidelines for Performing Systematic Literature Reviews in Software Engineering
    • Kitchenham, B.1    Charters, S.2
  • 14
    • 77954339263 scopus 로고    scopus 로고
    • Clone region descriptors: Representing and tracking duplication in source code
    • doi:10.1145/1767751.1767754
    • Duala-Ekoko E, Robillard M. Clone region descriptors: representing and tracking duplication in source code. ACM Transactions on Software Engineering and Methodology 2010; 20(1):3:1-3:31, doi:10.1145/1767751.1767754.
    • (2010) ACM Transactions on Software Engineering and Methodology , vol.20 , Issue.1 , pp. 31-331
    • Duala-Ekoko, E.1    Robillard, M.2
  • 17
    • 64549135034 scopus 로고    scopus 로고
    • Comparison and evaluation of code clone detection techniques and tools: A qualitative approach
    • doi:10.1016/j.scico.2009.02.007
    • Roy CK, Cordy JR, Koschke R. Comparison and evaluation of code clone detection techniques and tools: a qualitative approach. Science of Computer Programming 2009; 74(7):470-495, doi:10.1016/j.scico.2009.02.007.
    • (2009) Science of Computer Programming , vol.74 , Issue.7 , pp. 470-495
    • Roy, C.K.1    Cordy, J.R.2    Koschke, R.3
  • 19
    • 33846859803 scopus 로고    scopus 로고
    • A systematic review of theory use in software engineering experiments
    • DOI 10.1109/TSE.2007.12
    • Hannay J, Sjoberg D, Dyba T. A systematic review of theory use in software engineering experiments. IEEE Transactions on Software Engineering 2007; 33(2):87-107. (Pubitemid 46223696)
    • (2007) IEEE Transactions on Software Engineering , vol.33 , Issue.2 , pp. 87-107
    • Hannay, J.E.1    Sjoberg, D.I.K.2    Dyba, T.3
  • 20
    • 33845788381 scopus 로고    scopus 로고
    • A systematic review of software development cost estimation studies
    • DOI 10.1109/TSE.2007.256943
    • Jorgensen M, Shepperd M. A systematic review of software development cost estimation studies. IEEE Transactions on Software Engineering 2007; 33(1):33-53. (Pubitemid 46002167)
    • (2007) IEEE Transactions on Software Engineering , vol.33 , Issue.1 , pp. 33-53
    • Jorgensen, M.1    Shepperd, M.2
  • 21
    • 67349095299 scopus 로고    scopus 로고
    • A systematic literature review to identify and classify software requirement errors
    • Walia G, Carver J. A systematic literature review to identify and classify software requirement errors. Information and Software Technology 2009; 51(7):1087-1109.
    • (2009) Information and Software Technology , vol.51 , Issue.7 , pp. 1087-1109
    • Walia, G.1    Carver, J.2
  • 22
    • 70449084875 scopus 로고    scopus 로고
    • Characterizing software architecture changes: A systematic review
    • Williams B, Carver J. Characterizing software architecture changes: a systematic review. Information and Software Technology 2010; 52(1):31-51.
    • (2010) Information and Software Technology , vol.52 , Issue.1 , pp. 31-51
    • Williams, B.1    Carver, J.2
  • 23
    • 33746353080 scopus 로고    scopus 로고
    • Three public enemies: Cut, copy, and paste
    • DOI 10.1109/MC.2006.246
    • Mann Z. Three public enemies: cut, copy, and paste. Computer 2006; 39(7):31-35. (Pubitemid 44111402)
    • (2006) Computer , vol.39 , Issue.7 , pp. 31-35
    • Mann, Z.A.1
  • 27
    • 0001116877 scopus 로고
    • Binary codes capable of correcting deletions, insertions, and reversals
    • Levenshtein V. Binary codes capable of correcting deletions, insertions, and reversals. Soviet Physics - Doklady 1966; 10(8):707-710.
    • (1966) Soviet Physics - Doklady , vol.10 , Issue.8 , pp. 707-710
    • Levenshtein, V.1
  • 28
    • 84979020988 scopus 로고    scopus 로고
    • Comprehending reality - Practical barriers to industrial adoption of software maintenance automation
    • IEEE Computer Society: Washington DC, USA
    • Cordy J. Comprehending reality - practical barriers to industrial adoption of software maintenance automation. Proceedings of the 11th IEEE International Workshop on Program Comprehension, IEEE Computer Society: Washington, DC, USA, 2003; 196.
    • (2003) Proceedings of the 11th IEEE International Workshop on Program Comprehension , vol.196
    • Cordy, J.1
  • 30
    • 58049198405 scopus 로고    scopus 로고
    • The impact of educational background on the effectiveness of requirements inspections: An empirical study
    • Carver J, Nagappan N, Page A. The impact of educational background on the effectiveness of requirements inspections: an empirical study. IEEE Transactions on Software Engineering 2008; 34(6):800-812.
    • (2008) IEEE Transactions on Software Engineering , vol.34 , Issue.6 , pp. 800-812
    • Carver, J.1    Nagappan, N.2    Page, A.3
  • 36
    • 33846409962 scopus 로고    scopus 로고
    • Semantic clustering: Identifying topics in source code
    • DOI 10.1016/j.infsof.2006.10.017, PII S0950584906001820
    • Kuhn A, Ducasse S, Girba T. Semantic clustering: identifying topics in source code. Information and Software Technology 2007; 49:230-243. (Pubitemid 46149290)
    • (2007) Information and Software Technology , vol.49 , Issue.3 , pp. 230-243
    • Kuhn, A.1    Ducasse, S.2    Girba, T.3
  • 37
    • 58149489336 scopus 로고    scopus 로고
    • An information retrieval process to aid in the analysis of code clones
    • doi: 10.1007/s10664-008-9089-1
    • Tairas R, Gray J. An information retrieval process to aid in the analysis of code clones. Empirical Software Engineering 2009; 14(1), doi: 10.1007/s10664-008-9089-1.
    • (2009) Empirical Software Engineering , vol.14 , pp. 1
    • Tairas, R.1    Gray, J.2
  • 40
    • 84870276621 scopus 로고    scopus 로고
    • Hierarchical relational models for document networks
    • Chang J, Blei D. Hierarchical relational models for document networks. Annals of Applied Statistics 2010; 4(1):124-150.
    • (2010) Annals of Applied Statistics , vol.4 , Issue.1 , pp. 124-150
    • Chang, J.1    Blei, D.2
  • 41
    • 0036648690 scopus 로고    scopus 로고
    • CCFinder: A multilinguistic token-based code clone detection system for large scale source code
    • Kamiya T, Kusumoto S, Inoue K. CCFinder: a multilinguistic token-based code clone detection system for large scale source code. IEEE Transactions on Software Engineering 2002; 28(7):654-670.
    • (2002) IEEE Transactions on Software Engineering , vol.28 , Issue.7 , pp. 654-670
    • Kamiya, T.1    Kusumoto, S.2    Inoue, K.3
  • 43
    • 34548767669 scopus 로고    scopus 로고
    • DECKARD: Scalable and accurate tree-based detection of code clones
    • DOI 10.1109/ICSE.2007.30, 4222572, Proceedings - 29th International Conference on Software Engineering, ICSE 2007
    • Jiang L, Misherghi G, Su Z, Glondu S. DECKARD: scalable and accurate tree-based detection of code clones. Proceedings of the 29th International Conference on Software Engineering, 2007; 96-105. (Pubitemid 47430645)
    • (2007) Proceedings - International Conference on Software Engineering , pp. 96-105
    • Jiang, L.1    Misherghi, G.2    Su, Z.3    Glondu, S.4
  • 44
    • 0030407014 scopus 로고    scopus 로고
    • Experiment on the automatic detection of function clones in a software system using metrics. Proceedings of the 12th International Conference on Software Maintenance, Monterey, CA, USA
    • Mayrand J, Leblanc C, Merlo E. Experiment on the automatic detection of function clones in a software system using metrics. Proceedings of the 12th International Conference on Software Maintenance, Monterey, CA, USA, IEEE Computer Society, 1996; 244-253.
    • (1996) IEEE Computer Society , pp. 244-253
    • Mayrand, J.1    Leblanc, C.2    Merlo, E.3
  • 45
    • 67649971019 scopus 로고    scopus 로고
    • Incremental clone detection. Proceedings of the 13th European Conference on Software Maintenance and Reengineering
    • Göde N, Koschke R. Incremental clone detection. Proceedings of the 13th European Conference on Software Maintenance and Reengineering, IEEE Computer Society, 2009; 219-228.
    • (2009) IEEE Computer Society , pp. 219-228
    • Göde, N.1    Koschke, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.