Evaluating clone detection tools for use during preventative maintenance

被引:46
作者
Burd, E [1 ]
Bailey, J [1 ]
机构
[1] Univ Durham, Res Inst Software Evolut, Durham DH1 3LE, England
来源
SCAM 2002: SECOND IEEE INTERNATIONAL WORKSHOP ON SOURCE CODE ANALYSIS MANIPULATION, PROCEEDINGS | 2002年
关键词
D O I
10.1109/SCAM.2002.1134103
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes the results of a process whereby the detection capability of 5 code replication detection tools for large software application are evaluated. Specifically this work focuses on the benefits of identification for preventative maintenance that is with the aim to remove some of the identified clones from the source code. A number of requirements are therefore identified upon which the tools are evaluated. The results of the analysis processes show that each tool has its own strengths and weaknesses and no single tool is able to identify all clones within the code. The paper proposes that it may be possible to use a combination of tools to perform the analysis process providing that adequate means of efficiently identifying false matches is found.
引用
收藏
页码:36 / 43
页数:8
相关论文
共 13 条
  • [1] AIKEN A, 2002, SYSTEM DETECTING SOF
  • [2] Baker B, 1995, 2 WORK C REV ENG
  • [3] Baxter I. D., 1998, INT C SOFTW MAINT
  • [4] BURD EL, 1997, INT C SOFTW MAINT
  • [5] DUCASSE S, 1999, INT C SOFTW MAINT
  • [6] JOHNSON JH, 1994, INT C SOFTW MAINT
  • [7] KAMIYA T, 2001, INT C SOFTW ENG
  • [8] KOMONDOOR R, 2001, S STAT AN
  • [9] LAGUE B, 1997, INT C SOFTW MAINT
  • [10] MAYRAND J, 1996, INT C SOFTW MAIN