14th IEEE International Conference on Program Comprehension (ICPC'06)
DOI: 10.1109/icpc.2006.25
|View full text |Cite
|
Sign up to set email alerts
|

How Developers Copy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(17 citation statements)
references
References 13 publications
0
17
0
Order By: Relevance
“…Our taxonomy is not simply guesswork -it is derived from the large body of published work on existing clone definitions [8,19,24,29,34], clone types [10,31], clone taxonomies [6,26,36], studies of developer copy/paste activities [27] and other empirical studies [3,7,25,28]. We have validated the taxonomy by studying the copy/paste patterns of function clones in an empirical study that analyzed 17 open source C and Java systems including the entire Linux Kernel (6265 KLOC C, 154977 functions), Apache httpd (275 KLOC C, 4301 functions) and j2sdk-swing (204 KLOC Java, 10971 methods) [41].…”
Section: Figure 1 Example Application Of the Editing Taxonomy For CLmentioning
confidence: 99%
“…Our taxonomy is not simply guesswork -it is derived from the large body of published work on existing clone definitions [8,19,24,29,34], clone types [10,31], clone taxonomies [6,26,36], studies of developer copy/paste activities [27] and other empirical studies [3,7,25,28]. We have validated the taxonomy by studying the copy/paste patterns of function clones in an empirical study that analyzed 17 open source C and Java systems including the entire Linux Kernel (6265 KLOC C, 154977 functions), Apache httpd (275 KLOC C, 4301 functions) and j2sdk-swing (204 KLOC Java, 10971 methods) [41].…”
Section: Figure 1 Example Application Of the Editing Taxonomy For CLmentioning
confidence: 99%
“…That enables us to know where arbitrary code fragment were derived from, and to modify all of the code fragments derived from the same source simultaneously. 'Copy and paste' is one reason why there are code clones in the source code; for example, Kim et al reported that developers do block or method level coy-and-paste actions approximately four times per hour [22]; also, Balint et al reported that there often happens inconsistencies between 'copy and pasted' code [7]. Tracking 'copy and paste' should be able to identify many code clones.…”
Section: Related Workmentioning
confidence: 99%
“…. This is the topic of a separate publication 4 [12]. We therefore here only give a summary of the AspectMaps visualization, adapted from [12], before discussing the tool.…”
Section: The Aspectmaps Visualizationmentioning
confidence: 99%
“…Moose offers various facilities for building software engineering tools, ranging from importing data, source-code modeling, querying, to building software visualizations. In the past, Moose has been successfully leveraged for building a wide variety of tools, such as Torch [27] (a tool supporting source-code change integration), SmallDude [4] (a duplication detector), and eDSM [19] (a tool to detect cyclic dependencies). Within the context of this work, we opted to base our tool on Moose for the following reasons:…”
Section: Adding Aspect Support To Moosementioning
confidence: 99%