2009
DOI: 10.1016/j.scico.2009.02.007
|View full text |Cite
|
Sign up to set email alerts
|

Comparison and evaluation of code clone detection techniques and tools: A qualitative approach

Abstract: Over the last decade many techniques and tools for software clone detection have been proposed. In this paper, we provide a qualitative comparison and evaluation of the current state-of-the-art in clone detection techniques and tools, and organize the large amount of information into a coherent conceptual framework. We begin with background concepts, a generic clone detection process and an overall taxonomy of current techniques and tools. We then classify, compare and evaluate the techniques and tools in two … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

3
507
0
11

Year Published

2013
2013
2022
2022

Publication Types

Select...
6
1

Relationship

3
4

Authors

Journals

citations
Cited by 809 publications
(521 citation statements)
references
References 82 publications
3
507
0
11
Order By: Relevance
“…SourcererCC has perfect recall for first three clone types, including the most difficult Type-3 clones, for Java, C and C#. This tells us that it's clone detection algorithm is capable of handling all the types of edits developers make on copy and pasted code for these languages, as outlined in the editing taxonomy for cloning [27].…”
Section: Recall Measured By the Mutation Frameworkmentioning
confidence: 95%
See 1 more Smart Citation
“…SourcererCC has perfect recall for first three clone types, including the most difficult Type-3 clones, for Java, C and C#. This tells us that it's clone detection algorithm is capable of handling all the types of edits developers make on copy and pasted code for these languages, as outlined in the editing taxonomy for cloning [27].…”
Section: Recall Measured By the Mutation Frameworkmentioning
confidence: 95%
“…As per mutation-analysis, this is repeated thousands of times. Further details, including a list of the mutation operators, is available in our earlier studies [23,27,35]. Procedure.…”
Section: Recall Measured By the Mutation Frameworkmentioning
confidence: 99%
“…The most established term is type-4 clone. Yet, the definition in Roy, Cordy & Koschke (2009) emphasises that the code fragments have to perform the same computation. We want to emphasise the similarity, however.…”
Section: Terminologymentioning
confidence: 99%
“…(Roy, Cordy & Koschke, 2009) Functionally similar clone (FSC) Code fragments that provide a similar functionality w.r.t a given definition of similarity but can be implemented quite differently…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation