Proceedings of the 13th International Conference on Software Engineering - ICSE '08 2008
DOI: 10.1145/1368088.1368132
|View full text |Cite
|
Sign up to set email alerts
|

Scalable detection of semantic clones

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
198
0
3

Year Published

2013
2013
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 266 publications
(202 citation statements)
references
References 19 publications
1
198
0
3
Order By: Relevance
“…Finally, it detects apps that are similar, considering both full and partial app similarity (Section 4.4). We base the first two stages of AnDarwin on the approaches of Jiang et al [23] and Gabel et al [20] to find code clones in a scalable manner. AnDarwin uses these results to detect library code and, ultimately, to detect similar apps.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Finally, it detects apps that are similar, considering both full and partial app similarity (Section 4.4). We base the first two stages of AnDarwin on the approaches of Jiang et al [23] and Gabel et al [20] to find code clones in a scalable manner. AnDarwin uses these results to detect library code and, ultimately, to detect similar apps.…”
Section: Methodsmentioning
confidence: 99%
“…Many approaches have been developed over the years to detect code clones [20,23,25,26]. A code clone is two or more segments of code that have the same semantics but come from different sources.…”
Section: Code Clones and Reuse Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Komondoor & Horwitz (2001) also used PDGs for clone detection and see the possibility to find non-contiguous clones as a main benefit. Gabel, Jiang & Su (2008) combined the analysis of dependence graphs with abstract syntax trees in the tool Deckard to better scale the approach.…”
Section: Related Workmentioning
confidence: 99%
“…By a similarity parameter it is possible to control whether only type-1/2 clones or type-3 clones are detected. Deckard is a stable tool used in other studies (Gabel, Jiang & Su, 2008;Jiang, Su & Chiu, 2007b) including the study we build on.…”
Section: Clone Detection Toolsmentioning
confidence: 99%