2017 IEEE 11th International Workshop on Software Clones (IWSC) 2017
DOI: 10.1109/iwsc.2017.7880508
|View full text |Cite
|
Sign up to set email alerts
|

Refactoring patterns study in code clones during software evolution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…Category C represents quality attributes related to software changeability [22][23] [24]. It represents that software should be responsive to change (should be easy to upgrade and its functionalities should be easily extended without taking too much down or losing data), maintainable (should be updateable easily) [25][26] [29]. Category D represents quality attributes related to the reliability of a software system.…”
Section: Resultsmentioning
confidence: 99%
“…Category C represents quality attributes related to software changeability [22][23] [24]. It represents that software should be responsive to change (should be easy to upgrade and its functionalities should be easily extended without taking too much down or losing data), maintainable (should be updateable easily) [25][26] [29]. Category D represents quality attributes related to the reliability of a software system.…”
Section: Resultsmentioning
confidence: 99%
“…In our previous work [13], we investigated how frequently code clones are refactored between releases. In this paper, we extend our study by performing a longitudinal study on five Java systems to investigate code clone refactoring performed on them between the releases.…”
Section: Introductionmentioning
confidence: 99%
“…As a fundamental task in the software engineering area, code clone can be involved in a series of downstream applications including code searching, 4,5 code reusing, code refactoring, [6][7][8] plagiarism detection, 9,10 copyright infringement investigation, 11 and code compaction. 12 In a general routine, code clone detection starts with learning the low-dimensional vector representations of code fragments, which subsequently can be used for similarity calculation and code clone identification between code fragments.…”
mentioning
confidence: 99%