2017 IEEE 11th International Workshop on Software Clones (IWSC) 2017
DOI: 10.1109/iwsc.2017.7880510
|View full text |Cite
|
Sign up to set email alerts
|

A technique to detect multi-grained code clones

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…Code Clone Detection. Tools and techniques of code clone detection can be classified as six categories [8]: textual approaches [10,23,27,34,37,51,56,58], lexical approaches [35,44,45,50,55,59], tree-based approaches [16,36,57], metric-based approaches [38,48,49], semantic approaches [18,19,22,24,43,54] and hybrid approaches [9,20,21,31,32,41,46,53]. In particular, we introduce several works closely related to our work.…”
Section: Related Workmentioning
confidence: 99%
“…Code Clone Detection. Tools and techniques of code clone detection can be classified as six categories [8]: textual approaches [10,23,27,34,37,51,56,58], lexical approaches [35,44,45,50,55,59], tree-based approaches [16,36,57], metric-based approaches [38,48,49], semantic approaches [18,19,22,24,43,54] and hybrid approaches [9,20,21,31,32,41,46,53]. In particular, we introduce several works closely related to our work.…”
Section: Related Workmentioning
confidence: 99%
“…Yuki et al [40] present a technique to detect multi-grained code clones. In the presented technique, Java files utilized as a dataset and Smith-Waterman algorithm utilized to identify the identical hash sequence.…”
Section: B Lexical Approachesmentioning
confidence: 99%
“…It supports source code written in Java and executed on a workstation with 2.40 GHz Intel Xeon CPU (8 logic processors), and 32.0 GB of memory. Output databases and experimental targets located on SSD [40]. VUDDY is implemented as a technique for the discovery of vulnerable clones but compared with clone detection tools to determine accuracy.…”
Section: G Clone Detection Toolsmentioning
confidence: 99%
See 1 more Smart Citation
“…It is a very adaptive process in software development activities. Recently, many clone detection approaches have been developed, which detect code clones in different software systems. However, during the detection of clones, it is difficult to say which code fragment is original and which code fragment is copied.…”
Section: Introductionmentioning
confidence: 99%