[PDF][PDF] Survey of research on software clones

R Koschke - Dagstuhl Seminar Proceedings, 2007 - drops.dagstuhl.de
This report summarizes my overview talk on software clone detection research. It first
discusses the notion of software redundancy, cloning, duplication, and similarity. Then, it …

[HTML][HTML] Comparison and evaluation of code clone detection techniques and tools: A qualitative approach

CK Roy, JR Cordy, R Koschke - Science of computer programming, 2009 - Elsevier
Over the last decade many techniques and tools for software clone detection have been
proposed. In this paper, we provide a qualitative comparison and evaluation of the current …

[PDF][PDF] A survey on software clone detection research

CK Roy, JR Cordy - Queen's School of computing TR, 2007 - research.cs.queensu.ca
Code duplication or copying a code fragment and then reuse by pasting with or without any
modifications is a well known code smell in software maintenance. Several studies show …

Comparison and evaluation of clone detection tools

S Bellon, R Koschke, G Antoniol… - IEEE Transactions on …, 2007 - ieeexplore.ieee.org
Many techniques for detecting duplicated source code (software clones) have been
proposed in the past. However, it is not yet clear how these techniques compare in terms of …

[图书][B] Introduction and roadmap: History and challenges of software evolution

T Mens, S Demeyer, T Mens - 2008 - Springer
The ability to evolve software rapidly and reliably is a major challenge for software
engineering. In this introductory chapter we start with a historic overview of the research …

Clone detection using abstract syntax suffix trees

R Koschke, R Falke, P Frenzel - 2006 13th Working Conference …, 2006 - ieeexplore.ieee.org
Reusing software through copying and pasting is a continuous plague in software
development despite the fact that it creates serious maintenance problems. Various …

Making the leap to a software platform strategy: Issues and challenges

Y Ghanam, F Maurer, P Abrahamsson - Information and Software …, 2012 - Elsevier
CONTEXT: While there are many success stories of achieving high reuse and improved
quality using software platforms, there is a need to investigate the issues and challenges …

Vuldetector: Detecting vulnerabilities using weighted feature graph comparison

L Cui, Z Hao, Y Jiao, H Fei, X Yun - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Code similarity is one promising approach to detect vulnerabilities hidden in software
programs. However, due to the complexity and diversity of source code, current methods …

Detection and analysis of near-miss software clones

CK Roy - 2009 IEEE International Conference on Software …, 2009 - ieeexplore.ieee.org
Software clones are considered harmful in software maintenance and evolution. However,
despite a decade of active research, there is a marked lack of work in the detection and …

Why developers refactor source code: A mining-based study

J Pantiuchina, F Zampetti, S Scalabrino… - ACM Transactions on …, 2020 - dl.acm.org
Refactoring aims at improving code non-functional attributes without modifying its external
behavior. Previous studies investigated the motivations behind refactoring by surveying …