메뉴 건너뛰기




Volumn , Issue , 2013, Pages 50-59

An empirical study of clone removals

Author keywords

Clone evolution; Clone removal; Software maintenance

Indexed keywords

CLONE REMOVALS; CODE CLONE; CODE DUPLICATION; EMPIRICAL STUDIES; SOFTWARE SYSTEMS; SOURCE CODES;

EID: 84891701161     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICSM.2013.16     Document Type: Conference Paper
Times cited : (14)

References (35)
  • 5
    • 83455201007 scopus 로고    scopus 로고
    • Late propagation in software clones
    • IEEE
    • L. Barbour, F. Khomh, and Y. Zou. Late propagation in software clones. In Proc. of the 27th ICSM, pages 273-282. IEEE, 2011.
    • (2011) Proc. of the 27th ICSM , pp. 273-282
    • Barbour, L.1    Khomh, F.2    Zou, Y.3
  • 6
    • 84872320186 scopus 로고    scopus 로고
    • Evolution of near-miss clones
    • IEEE
    • S. Bazrafshan. Evolution of near-miss clones. In Proc. of the 12th SCAM, pages 74-83. IEEE, 2012.
    • (2012) Proc. of the 12th SCAM , pp. 74-83
    • Bazrafshan, S.1
  • 9
    • 70849100995 scopus 로고    scopus 로고
    • Managing code clones using dynamic change tracking and resolution
    • IEEE
    • M. de Wit, A. Zaidman, and A. van Deursen. Managing code clones using dynamic change tracking and resolution. In Proc. of the 25th ICSM, pages 169-178. IEEE, 2009.
    • (2009) Proc. of the 25th ICSM , pp. 169-178
    • De Wit, M.1    Zaidman, A.2    Van Deursen, A.3
  • 10
    • 72349095898 scopus 로고    scopus 로고
    • Evolution of type-1 clones
    • IEEE
    • N. Göde. Evolution of type-1 clones. In Proc. of the 9th SCAM, pages 77-86. IEEE, 2009.
    • (2009) Proc. of the 9th SCAM , pp. 77-86
    • Göde, N.1
  • 11
    • 77954707649 scopus 로고    scopus 로고
    • Clone removal: Fact or fiction?
    • ACM
    • N. Göde. Clone removal: fact or fiction? In Proc. of the 4th IWSC, pages 33-40. ACM, 2010.
    • (2010) Proc. of the 4th IWSC , pp. 33-40
    • Göde, N.1
  • 13
    • 79959548460 scopus 로고    scopus 로고
    • Oops!... I changed it again
    • ACM
    • N. Göde and J. Harder. Oops!... I changed it again. In Proc. of the 5th IWSC, pages 14-20. ACM, 2011.
    • (2011) Proc. of the 5th IWSC , pp. 14-20
    • Göde, N.1    Harder, J.2
  • 14
    • 79959897807 scopus 로고    scopus 로고
    • Frequency and risks of changes to clones
    • ACM
    • N. Göde and R. Koschke. Frequency and risks of changes to clones. In Proc. of the 33rd ICSE, pages 311-320. ACM, 2011.
    • (2011) Proc. of the 33rd ICSE , pp. 311-320
    • Göde, N.1    Koschke, R.2
  • 15
    • 84875386059 scopus 로고    scopus 로고
    • Studying clone evolution using incremental clone detection
    • N. Göde and R. Koschke. Studying clone evolution using incremental clone detection. Journal of Software: Evolution and Process, 25(2):165-192, 2013.
    • (2013) Journal of Software: Evolution and Process , vol.25 , Issue.2 , pp. 165-192
    • Göde, N.1    Koschke, R.2
  • 16
    • 35048850423 scopus 로고    scopus 로고
    • Refactoring support based on code clone analysis
    • Y. Higo, T. Kamiya, S. Kusumoto, and K. Inoue. Refactoring support based on code clone analysis. In PROFES, pages 220-233, 2004.
    • (2004) PROFES , pp. 220-233
    • Higo, Y.1    Kamiya, T.2    Kusumoto, S.3    Inoue, K.4
  • 18
    • 33747790264 scopus 로고    scopus 로고
    • Unifying clones with a generative programming technique: A case study
    • S. Jarzabek and S. Li. Unifying clones with a generative programming technique: a case study. J. Softw. Maint. Evol., 18(4):267-292, 2006.
    • (2006) J. Softw. Maint. Evol , vol.18 , Issue.4 , pp. 267-292
    • Jarzabek, S.1    Li, S.2
  • 19
    • 34548718935 scopus 로고    scopus 로고
    • Cloning considered harmful
    • considered harmful. IEEE
    • C. Kapser and M. W. Godfrey. "cloning considered harmful" considered harmful. In Proc. of the 13th WCRE, pages 19-28. IEEE, 2006.
    • (2006) Proc. of the 13th WCRE , pp. 19-28
    • Kapser, C.1    Godfrey, M.W.2
  • 20
    • 11244317212 scopus 로고    scopus 로고
    • An ethnographic study of copy and paste programming practices in OOPL
    • IEEE
    • M. Kim, L. Bergman, T. Lau, and D. Notkin. An ethnographic study of copy and paste programming practices in OOPL. In ISESE. IEEE, 2004.
    • (2004) ISESE
    • Kim, M.1    Bergman, L.2    Lau, T.3    Notkin, D.4
  • 21
    • 32344450436 scopus 로고    scopus 로고
    • An empirical study of code clone genealogies
    • ACM
    • M. Kim, V. Sazawal, D. Notkin, and G. Murphy. An empirical study of code clone genealogies. In ESEC/FSE, pages 187-196. ACM, 2005.
    • (2005) ESEC/FSE , pp. 187-196
    • Kim, M.1    Sazawal, V.2    Notkin, D.3    Murphy, G.4
  • 23
    • 51149095379 scopus 로고    scopus 로고
    • A study of consistent and inconsistent changes to code clones
    • IEEE
    • J. Krinke. A study of consistent and inconsistent changes to code clones. In Proc. of the 14th WCRE, pages 170-178. IEEE, 2007.
    • (2007) Proc. of the 14th WCRE , pp. 170-178
    • Krinke, J.1
  • 24
    • 56349141528 scopus 로고    scopus 로고
    • Is cloned code more stable than non-cloned code?
    • IEEE
    • J. Krinke. Is cloned code more stable than non-cloned code? In Proc. of the 8th SCAM, pages 57-66. IEEE, 2008.
    • (2008) Proc. of the 8th SCAM , pp. 57-66
    • Krinke, J.1
  • 25
    • 33947315724 scopus 로고    scopus 로고
    • Maintaining mental models: A study of developer work habits
    • ACM
    • T. D. LaToza, G. Venolia, and R. DeLine. Maintaining mental models: a study of developer work habits. In Proc. of the 28th ICSE. ACM, 2006.
    • (2006) Proc. of the 28th ICSE
    • Latoza, T.D.1    Venolia, G.2    Deline, R.3
  • 26
    • 34548718215 scopus 로고    scopus 로고
    • Analysis of the Linux kernel evolution using code clone coverage
    • IEEE
    • S. Livieri, Y. Higo, M. Matsushita, and K. Inoue. Analysis of the Linux kernel evolution using code clone coverage. In Proc. of the 4th MSR, pages 22-25. IEEE, 2007.
    • (2007) Proc. of the 4th MSR , pp. 22-25
    • Livieri, S.1    Higo, Y.2    Matsushita, M.3    Inoue, K.4
  • 27
    • 34548735994 scopus 로고    scopus 로고
    • Evaluating the harmfulness of cloning: A change based experiment
    • IEEE
    • A. Lozano, M. Wermelinger, and B. Nuseibeh. Evaluating the harmfulness of cloning: A change based experiment. In Proc. of the 4th MSR, pages 18-21. IEEE, 2007.
    • (2007) Proc. of the 4th MSR , pp. 18-21
    • Lozano, A.1    Wermelinger, M.2    Nuseibeh, B.3
  • 32
    • 83455169586 scopus 로고    scopus 로고
    • An automatic framework for extracting and classifying near-miss clone genealogies
    • ACM
    • R. K. Saha, C. K. Roy, and K. A. Schneider. An automatic framework for extracting and classifying near-miss clone genealogies. In Proc. of the 27th ICSM, pages 293-302. ACM, 2011.
    • (2011) Proc. of the 27th ICSM , pp. 293-302
    • Saha, R.K.1    Roy, C.K.2    Schneider, K.A.3
  • 33
    • 76749101150 scopus 로고    scopus 로고
    • An empirical study on the maintenance of source code clones
    • S. Thummalapenta, L. Cerulo, L. Aversano, and M. Di Penta. An empirical study on the maintenance of source code clones. ESE, 15(1):1-34, 2009.
    • (2009) ESE , vol.15 , Issue.1 , pp. 1-34
    • Thummalapenta, S.1    Cerulo, L.2    Aversano, L.3    Di Penta, M.4
  • 34
    • 16244384526 scopus 로고    scopus 로고
    • Managing duplicated code with linked editing
    • IEEE
    • M. Toomim, A. Begel, and S. L. Graham. Managing duplicated code with linked editing. In Proc. of the 2004 VL/HCC, pages 173-180. IEEE, 2004.
    • (2004) Proc. of the 2004 VL/HCC , pp. 173-180
    • Toomim, M.1    Begel, A.2    Graham, S.L.3
  • 35
    • 84864227695 scopus 로고    scopus 로고
    • Safe clone-based refactoring through stereotype identification and iso-generation
    • IEEE
    • N. Volanschi. Safe clone-based refactoring through stereotype identification and iso-generation. In Proc. of the 6th IWSC, pages 50-56. IEEE, 2012.
    • (2012) Proc. of the 6th IWSC , pp. 50-56
    • Volanschi, N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.