A systematic literature review on bad smells–5 w's: which, when, what, who, where

EV de Paulo Sobrinho, A De Lucia… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
Bad smells are sub-optimal code structures that may represent problems needing attention.
We conduct an extensive literature review on bad smells relying on a large body of …

Deep learning code fragments for code clone detection

M White, M Tufano, C Vendome… - Proceedings of the 31st …, 2016 - dl.acm.org
Code clone detection is an important problem for software maintenance and evolution. Many
approaches consider either structure or identifiers, but none of the existing detection …

Fine-grained and accurate source code differencing

JR Falleri, F Morandat, X Blanc, M Martinez… - Proceedings of the 29th …, 2014 - dl.acm.org
At the heart of software evolution is a sequence of edit actions, called an edit script, made to
a source code file. Since software systems are stored version by version, the edit script has …

CCAligner: a token based large-gap clone detector

P Wang, J Svajlenko, Y Wu, Y Xu, CK Roy - Proceedings of the 40th …, 2018 - dl.acm.org
Copying code and then pasting with large number of edits is a common activity in software
development, and the pasted code is a kind of complicated Type-3 clone. Due to large …

Enhancing clone-and-own with systematic reuse for developing software variants

S Fischer, L Linsbauer… - 2014 IEEE …, 2014 - ieeexplore.ieee.org
To keep pace with the increasing demand for custom-tailored software systems, companies
often apply a practice called clone-and-own, whereby a new variant of a software system is …

The vision of software clone management: Past, present, and future (keynote paper)

CK Roy, MF Zibran, R Koschke - 2014 Software Evolution …, 2014 - ieeexplore.ieee.org
Duplicated code or code clones are a kind of code smell that have both positive and
negative impacts on the development and maintenance of software systems. Software clone …

Searching for better configurations: a rigorous approach to clone evaluation

T Wang, M Harman, Y Jia, J Krinke - Proceedings of the 2013 9th Joint …, 2013 - dl.acm.org
Clone detection finds application in many software engineering activities such as
comprehension and refactoring. However, the confounding configuration choice problem …

A study of repetitiveness of code changes in software evolution

HA Nguyen, AT Nguyen, TT Nguyen… - 2013 28th IEEE/ACM …, 2013 - ieeexplore.ieee.org
In this paper, we present a large-scale study of repetitiveness of code changes in software
evolution. We collected a large data set of 2,841 Java projects, with 1.7 billion source lines …

Variability extraction and modeling for product variants

L Linsbauer, RE Lopez-Herrejon, A Egyed - Proceedings of the 22nd …, 2018 - dl.acm.org
Fast changing hardware and software technologies in addition to larger and more
specialized customer bases demand software tailored to meet very diverse requirements …

Assessing the refactorability of software clones

N Tsantalis, D Mazinanian… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
The presence of duplicated code in software systems is significant and several studies have
shown that clones can be potentially harmful with respect to the maintainability and …