Systematic Mapping Study of Metrics based Clone Detection Techniques

被引:7
作者
Rattan, Dhavleesh [1 ]
Kaur, Jagdeep [1 ]
机构
[1] Punjabi Univ, Dept Comp Engn, Patiala, Punjab, India
来源
INTERNATIONAL CONFERENCE ON ADVANCES IN INFORMATION COMMUNICATION TECHNOLOGY & COMPUTING, 2016 | 2016年
关键词
Code clone; systematic mapping; software metrics; systematic review; EVOLUTION;
D O I
10.1145/2979779.2979855
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A code clone is a code fragment that is similar or identical to other code fragments in the source code. Code clones generally occurs in large systems and affects the system maintenance and quality. Removing clones is one way to avoid problems that occur due to the presence of code clones. Clone detection techniques using software metrics provides less complexity in finding the clones. This systematic mapping study focuses on metric based clone detection techniques and various tools used in previous studies. The existing work is classified into different categories and presented in systematic maps. This paper also indicates some problems related to clone detection research.
引用
收藏
页数:7
相关论文
共 30 条
[1]   A Metrics-Based Data Mining Approach for Software Clone Detection [J].
Abd-El-Hafiz, Salwa K. .
2012 IEEE 36TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2012, :35-41
[2]   Modeling clones evolution through time series [J].
Antoniol, G ;
Casazza, G ;
Di Penta, M ;
Merlo, E .
IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS: SYSTEMS AND SOFTWARE EVOLUTION IN THE ERA OF THE INTERNET, 2001, :273-280
[3]   Analyzing cloning evolution in the Linux kernel [J].
Antoniol, G ;
Villano, U ;
Merlo, E ;
Di Penta, M .
INFORMATION AND SOFTWARE TECHNOLOGY, 2002, 44 (13) :755-765
[4]  
Bansal G, 2014, INT CONF CONTEMP, P484, DOI 10.1109/IC3.2014.6897221
[5]   Comparison and evaluation of clone detection tools [J].
Bellon, Stefan ;
Koschke, Rainer ;
Antoniol, Giuliano ;
Krinke, Jens ;
Merlo, Ettore .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2007, 33 (09) :577-591
[6]  
Choi E., 2011, PROC 5 INT WORKSHOP, P7
[7]   An approach to identify duplicated Web pages [J].
Di Lucca, GA ;
Di Penta, M ;
Fasolino, AR .
26TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, :481-486
[8]   Code Clone Graph Metrics for Detecting Diffused Code Clones [J].
Fukushima, Yoshihiko ;
Kula, Raula ;
Kawaguchi, Shinji ;
Fushida, Kyohei ;
Nagura, Masataka ;
Iida, Hajimu .
APSEC 09: SIXTEENTH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2009, :373-380
[9]  
Goda G. R., 2014, INT J COMPUTER APPL, V86, P41
[10]  
Higo Y., 2005, ACM SIGSOFT Softw. Eng. Notes, V30, P1