2010 17th Working Conference on Reverse Engineering 2010
DOI: 10.1109/wcre.2010.11
|View full text |Cite
|
Sign up to set email alerts
|

Studying the Impact of Clones on Software Defects

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
5
3
1

Relationship

4
5

Authors

Journals

citations
Cited by 54 publications
(20 citation statements)
references
References 14 publications
0
20
0
Order By: Relevance
“…The analyzed two open source systems and observed that only 1% to 3% of inconsistent changes introduce software defects. Selim et al [22] also analyzed the impact of cloned code on software defects. They found that the defect-proneness of cloned methods is specific to the system under study.…”
Section: Related Workmentioning
confidence: 99%
“…The analyzed two open source systems and observed that only 1% to 3% of inconsistent changes introduce software defects. Selim et al [22] also analyzed the impact of cloned code on software defects. They found that the defect-proneness of cloned methods is specific to the system under study.…”
Section: Related Workmentioning
confidence: 99%
“…We process the results of the clone detection to identify clones that co-exist within the same revision. A similar processing step is done in the work by Barbour et al [4], [16]. 3) Building Clone Genealogies: We build clone genealogies following the same method as our previous work [2].…”
Section: B Processing Datamentioning
confidence: 99%
“…However, instead of finding the origination of a buggy code, we map the buggy code to some intermediate snapshot and analyze its properties at that point in time. Selim et al (2010) study the impact of clones on software defects. They find that the relative defect proneness of clones vary across different systems.…”
Section: Clones and Bugsmentioning
confidence: 99%