2013 21st International Conference on Program Comprehension (ICPC) 2013
DOI: 10.1109/icpc.2013.6613857
|View full text |Cite
|
Sign up to set email alerts
|

SimCad: An extensible and faster clone detection tool for large scale software systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 26 publications
(16 citation statements)
references
References 7 publications
0
16
0
Order By: Relevance
“…Hanni uses the clone detection library SimLib which is part of SimCad [21], an implementation of the textual clone detection approach Simhash [22]. We use SimLib because it allows the detection of clone types 1-3 and its Java implementation is portable and easily extensible.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Hanni uses the clone detection library SimLib which is part of SimCad [21], an implementation of the textual clone detection approach Simhash [22]. We use SimLib because it allows the detection of clone types 1-3 and its Java implementation is portable and easily extensible.…”
Section: Methodsmentioning
confidence: 99%
“…Most clone detection tools use parser generators to support different programming languages. For example, Deckard uses YACC [10], NiCad [5] and SimCad [21] use TXL [4], CCFinder uses custom Python-based lexers [12].…”
Section: Methodsmentioning
confidence: 99%
“…Once the function pairs are established, we ran a set of publicly available clone detection tools, including Simcad [12], Nicad [9], MeCC [3] and CCCD [5]. We found that these tools are inconsistent for many of the clones detected.…”
Section: Determining Clonesmentioning
confidence: 99%
“…The core of the algorithm uses a hash function to generate simhash values. Among various non-cryptographic hash functions we use Jenkin hash function since it shows better similarity preserving behaviour compared to other functions and also found effective in detecting nearmiss code fragments in other studies [1], [29], [30]. We generate a 64 bit simhash value for both context and content using the simhash algorithm [25].…”
Section: Generate Candidate Listmentioning
confidence: 99%