2010 IEEE 18th International Conference on Program Comprehension 2010
DOI: 10.1109/icpc.2010.13
|View full text |Cite
|
Sign up to set email alerts
|

A Technique for Just-in-Time Clone Detection in Large Scale Systems

Abstract: Existing clone tracking tools have limited support for sharing clone information between developers in a large scale system. Developers are not notified when new clones are introduced by other developers or when existing clones are modified. We propose a client-server architecture that centrally detects and maintains clone information for an entire software system stored in a version control system. Clients retrieve a list of clones relevant to the code they are working on from the server. Whenever an update i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…A multidimensional token-level indexing approach has been introduced by Lee et al [5] using an ‫כ‬ on DECKARD's [10] approximate vector matching. Optimization on the repository size using sampling techniques is another approach to achieve scalable real-time clone search (e.g., Barbour et al [2]). A more diverse approach to tree-based real-time clone search is hash table-based indexing.…”
Section: Definitions and Basic Termsmentioning
confidence: 99%
See 1 more Smart Citation
“…A multidimensional token-level indexing approach has been introduced by Lee et al [5] using an ‫כ‬ on DECKARD's [10] approximate vector matching. Optimization on the repository size using sampling techniques is another approach to achieve scalable real-time clone search (e.g., Barbour et al [2]). A more diverse approach to tree-based real-time clone search is hash table-based indexing.…”
Section: Definitions and Basic Termsmentioning
confidence: 99%
“…Although there exists a large body of research on code clone detection [1], the one on real-time clone search is limited. It is still a rather new research area, also known as just-in-time [2], real-time [3,4], instant [5], or online clone search. It aims at finding all the fragments matching the input code fragment.…”
Section: Introductionmentioning
confidence: 99%
“…Text-based approaches: Text based approaches compare two code fragments based on the input text or string. The tools like Duploc [4], simian [18], EqMiner [19], NICAD [20], DuDe [21]. Except for NICAD none of the tools address detecting even small instances of Type 3.…”
Section: Software Clone Detectionmentioning
confidence: 99%
“…Tree based approaches work by parsing the source code to parse tree. tools like Deckard [35], CloneDR [36], simScan [37] , Asta [38], CloneDigger [39], sim [40], ClemanX [41], JCCD API [42], CloneDetection [43], cpdetector [34]. These techniques did not detect type 4 clones.…”
Section: Token-based Techniquesmentioning
confidence: 99%
“…Fragment search aims at finding clones of one particular code fragment . This type of code search is used, for instance, to localize code fragments where similar defects must be corrected, to find similar reusable code or examples for working solutions for a given problem, or to avoid cloning or update anomalies within an integrated development environment while a programmer is working on a particular piece of code .…”
Section: Introductionmentioning
confidence: 99%