2015 IEEE 3rd Working Conference on Software Visualization (VISSOFT) 2015
DOI: 10.1109/vissoft.2015.7332414
|View full text |Cite
|
Sign up to set email alerts
|

A survey on goal-oriented visualization of clone data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 28 publications
0
3
0
Order By: Relevance
“… Abid (2019) have previously used clone methods for code recommendation, however, the approach used a different similarity measure based on API calls for recommending relevant clone methods. Clones are generally considered to be harmful for a software system, and mainly researchers work on techniques for avoiding and eliminating clones ( Yoshida et al, 2019 ; Wang & Godfrey, 2014 ; Basit et al, 2015 ; Basit, Hammad & Koschke, 2015 ; Hammad et al, 2020b ). Clone refactoring recommendation systems have been developed for this purpose.…”
Section: Related Workmentioning
confidence: 99%
“… Abid (2019) have previously used clone methods for code recommendation, however, the approach used a different similarity measure based on API calls for recommending relevant clone methods. Clones are generally considered to be harmful for a software system, and mainly researchers work on techniques for avoiding and eliminating clones ( Yoshida et al, 2019 ; Wang & Godfrey, 2014 ; Basit et al, 2015 ; Basit, Hammad & Koschke, 2015 ; Hammad et al, 2020b ). Clone refactoring recommendation systems have been developed for this purpose.…”
Section: Related Workmentioning
confidence: 99%
“…According to Roy and Cordy [68], around 5 to 50% of the code in so ware applications can be enclosed in clones, which can be of several granularity levels such as line, method, le, and directory. Most of the time clones are considered to be harmful for a so ware system, and mainly researchers work on techniques for avoiding and eliminating clones [10,11,88,93]. However, Kapser and Godfrey [40] observe that code clones are not always bad, as they can also have positive e ects on the so ware development in certain circumstances.…”
Section: Introductionmentioning
confidence: 99%
“…In order to distinguish the visualization types under investigation look at the following tables and figures. While Figure 1 represents visualizations encountered in everyday life (which are also the main types used by accounting professionals in the past and in the further course of this paper defined as type I visualizations), Figure 2 represents new and more complex visualization types to be used in an interactive manner especially designed to handle large structured and unstructured data sets which are henceforth called type II visualizations (Basit et al, 2015;Borkin et al, 2013;Grammel et al, 2010).…”
Section: Introductionmentioning
confidence: 99%