2006
DOI: 10.1002/smr.327
|View full text |Cite
|
Sign up to set email alerts
|

Supporting the analysis of clones in software systems

Abstract: Code duplication is a well-documented problem in industrial software systems. There has been considerable research into techniques for detecting duplication in software, and there are several effective tools to perform this task. However, there have been few detailed qualitative studies into how cloning actually manifests itself within software systems. This is primarily due to the large result sets that many clonedetection tools return; these result sets are very difficult to manage without complementary tool… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
42
0

Year Published

2006
2006
2014
2014

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 67 publications
(42 citation statements)
references
References 20 publications
0
42
0
Order By: Relevance
“…A code fragment can form a clone pair with another fragment within the same file, or it can form a clone pair with another fragment of a different file located in the same directory or with a code fragment that is located in a different file in a different directory. Kapser and Godfrey [15,14] provide a categorization of function clones based on such location differences and analyze the causes, usefulness, harmfulness and possible solutions for each kind of cloning. For example, clone pairs that appear in the same file may not be harmful as they are not physically apart and might be easily maintainable.…”
Section: Profiles Of Cloning Localizationmentioning
confidence: 99%
See 1 more Smart Citation
“…A code fragment can form a clone pair with another fragment within the same file, or it can form a clone pair with another fragment of a different file located in the same directory or with a code fragment that is located in a different file in a different directory. Kapser and Godfrey [15,14] provide a categorization of function clones based on such location differences and analyze the causes, usefulness, harmfulness and possible solutions for each kind of cloning. For example, clone pairs that appear in the same file may not be harmful as they are not physically apart and might be easily maintainable.…”
Section: Profiles Of Cloning Localizationmentioning
confidence: 99%
“…They provide a detailed categorization of code clones in the form of a taxonomy [15], propose a new analysis framework [14] and give an in-depth study on the harmfulness / usefulness of cloning [13]. Our study differs in that we focus on the comprehensive cloning status of a wide variety of different systems in different languages, whereas they focus on the maintenance implications of cloning.…”
Section: Related Workmentioning
confidence: 99%
“…It is suspected that approximately 10%-15% of many large systems is part of duplicated code [2,12,24,25], and it has been documented to exist at rates of over 50% of the effective lines of code (ELOC) in a particular COBOL system [12]. The literature on the topic has described many situations that can lead to the duplication of code within a software system [2,7,21,22,27,28].…”
Section: Code Cloningmentioning
confidence: 99%
“…Often referred to as code clones, these segments of code typically involve 10-15% of the source code [24,25]. Code clones can arise through a number of different activities.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation