Proceedings of the Fourth Working Conference on Reverse Engineering
DOI: 10.1109/wcre.1997.624575
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation experiments on the detection of programming patterns using software metrics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
59
0
1

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 84 publications
(60 citation statements)
references
References 14 publications
0
59
0
1
Order By: Relevance
“…However, this practice can complicate software maintenance and it has been suggested that too much cloned code is a risk, albeit the practice itself is not generally harmful [13]. Because of these problems, many approaches to detect cloned code have been developed [5,6,9,12,[16][17][18]21]. Empirical studies of cloned code have focused mainly on examining whether code clones are changed consistently [4,10,15,19].…”
Section: Introductionmentioning
confidence: 99%
“…However, this practice can complicate software maintenance and it has been suggested that too much cloned code is a risk, albeit the practice itself is not generally harmful [13]. Because of these problems, many approaches to detect cloned code have been developed [5,6,9,12,[16][17][18]21]. Empirical studies of cloned code have focused mainly on examining whether code clones are changed consistently [4,10,15,19].…”
Section: Introductionmentioning
confidence: 99%
“…Such clone classes are useful for further steps such as analysis or removal since they allow to treat the contained clones as a unit. Several approaches for the detection of clones exist, which are text-based [6,17], tokenbased [24,32], tree-based [10,31] and metric-based [30,35] clone detection. For detailed information on clone detection techniques and tools we refer to Roy et al [44].…”
Section: Background 21 Code Clonesmentioning
confidence: 99%
“…There are a lot of researches on clone detection and many tools have been developed [21][22][23][24][25][26][27].We could have used those tools instead of CCFinder.…”
Section: Smatmentioning
confidence: 99%
“…There are many literatures for detection of code clones and patterns [17,[21][22][23][24][25][26][27]. Some of those proposed metrics for the clones; however they have not been extended to the similarity of two large software systems.…”
Section: Related Workmentioning
confidence: 99%