Procedural x OO A Corporative Experiment on Source Code Clone Mining

被引:1
作者
Barreto Torres, Jose Jorge [1 ]
Methanias, C. R. Junior [1 ]
de Freitas Farias, Mario Andre [2 ]
机构
[1] Fed Univ Sergipe UFS, Sao Cristovao, Sergipe, Brazil
[2] Fed Inst Sergipe IFS, Aracaju, Sergipe, Brazil
来源
ICEIS: PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS - VOL 2 | 2017年
关键词
Software; Mining Software Repositories; Clones; Experimental Software Engineering; Closed-source Projects;
D O I
10.5220/0006325003950402
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Open Source Software (OSS) repositories are widely used to execute studies around code clone detection, mostly inside the public scenario. However, corporative code Repositories have their content restricted and protected from access by developers who are not part of the company. Besides, there are a lot of questions regarding paradigm efficiency and its relation to clone manifestation. This article presents an experiment performed on systems developed in a large private education company, to observe and compare the incidence of cloned code between Object Oriented and Procedural proprietary software, using an exact similarity threshold. The results indicate that Object Oriented Software wondrously showed higher cloned lines of code incidence and a similar use of abstraction (clone sets) for functions or methods.
引用
收藏
页码:395 / 402
页数:8
相关论文
共 18 条
  • [1] [Anonymous], 2012, CONTEXT
  • [2] Clone detection using abstract syntax trees
    Baxter, ID
    Yahin, A
    Moura, L
    Sant'Anna, M
    Bier, L
    [J]. INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS, 1998, : 368 - 377
  • [3] Claes Wohlin Per, 2000, EXPT SOFTWARE ENG IN
  • [4] The NiCad Clone Detector
    Cordy, James R.
    Roy, Chanchal K.
    [J]. 2011 IEEE 19TH INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION (ICPC), 2011, : 219 - +
  • [5] Cloning considered harmful considered harmful: patterns of cloning in software
    Kapser, Cory J.
    Godfrey, Michael W.
    [J]. EMPIRICAL SOFTWARE ENGINEERING, 2008, 13 (06) : 645 - 692
  • [6] Khatoon S., 2011, 2011 Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2011), P1929, DOI 10.1109/FSKD.2011.6019877
  • [7] Kim M., 2005, P 10 EUR SOFTW ENG C, V30, P187, DOI DOI 10.1145/1081706.1081737
  • [8] Applying a code clone detection method to domain analysis of device drivers
    Ma, Yu-Seung
    Woo, Duk-Kuyn
    [J]. 14TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2007, : 254 - +
  • [9] Marcus A, 2001, 16TH ANNUAL INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2001), PROCEEDINGS, P107, DOI 10.1109/ASE.2001.989796
  • [10] OpenSource.com, WHAT IS OP SOURC