2006 13th Working Conference on Reverse Engineering 2006
DOI: 10.1109/wcre.2006.1
|View full text |Cite
|
Sign up to set email alerts
|

"Cloning Considered Harmful" Considered Harmful

Abstract: Current literature on the topic of duplicated (cloned)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
125
0

Year Published

2008
2008
2017
2017

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 185 publications
(126 citation statements)
references
References 29 publications
1
125
0
Order By: Relevance
“…They also proposed a tool support for the comprehension of software clones [28]. Kapser and Godfrey [29] also presented a taxonomy of cloning patterns, describing for each pattern the motivation, the pros and cons, the way clones manifest in the code structure, and clone management issues. Each pattern is described using examples detected in large software systems such as the Linux Kernel or the Apache Web server.…”
Section: Empirical Studies On the Presence And Evolution Of Clonesmentioning
confidence: 99%
“…They also proposed a tool support for the comprehension of software clones [28]. Kapser and Godfrey [29] also presented a taxonomy of cloning patterns, describing for each pattern the motivation, the pros and cons, the way clones manifest in the code structure, and clone management issues. Each pattern is described using examples detected in large software systems such as the Linux Kernel or the Apache Web server.…”
Section: Empirical Studies On the Presence And Evolution Of Clonesmentioning
confidence: 99%
“…Although cloning is beneficial in some cases [13] and often programmers intentionally use it [17], it can be detrimental to software maintenance [8,12]. For example, if a bug is detected in a code fragment, all the fragments similar to it should be investigated to check for the same bug [19], and when enhancing or adapting a piece of code, duplicated fragments can multiply the work to be done [12].…”
Section: Introductionmentioning
confidence: 99%
“…Second, besides source code with pervasive modifications, we compared the similarity analysers on an available data set containing reuse of boiler-plate code, and a data set of boiler-plate code with pervasive modifications. Since boiler-plate code is inherently different from pervasively modified code and normally found in software development (Kapser 2006), the findings give a guideline to choosing the right tools/techniques when measuring code similarity in the presence of boiler-plate code. Third, we investigated the effects of reusing optimal configurations from one data set on another data set.…”
Section: Contributionsmentioning
confidence: 99%
“…1 Boiler-plate code occurs when developers reuse a code template, usually a function or a code block, to achieve a particular task. It has been defined as one of the code cloning patterns by (Kapser 2006;Kapser and Godfrey 2008). Boiler-plate code can be found when building device drivers for operating systems (Baxter et al 1998), developing android applications , and giving programming assignments (Burrows et al 2007;Schleimer et al 2003).…”
Section: Source Code Modificationsmentioning
confidence: 99%