2001
DOI: 10.1007/3-540-47764-0_3
|View full text |Cite
|
Sign up to set email alerts
|

Using Slicing to Identify Duplication in Source Code

Abstract: Abstract. Programs often have a lot of duplicated code, which makes both understanding and maintenance more difficult. This problem can be alleviated by detecting duplicated code, extracting it into a separate new procedure, and replacing all the clones (the instances of the duplicated code) by calls to the new procedure. This paper describes the design and initial implementation of a tool that finds clones and displays them to the programmer. The novel aspect of our approach is the use of program dependence g… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
256
0

Year Published

2006
2006
2016
2016

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 339 publications
(256 citation statements)
references
References 21 publications
0
256
0
Order By: Relevance
“…Higo et al (2011) extended this to an incremental approach. Komondoor & Horwitz (2001) also used PDGs for clone detection and see the possibility to find non-contiguous clones as a main benefit. Gabel, Jiang & Su (2008) combined the analysis of dependence graphs with abstract syntax trees in the tool Deckard to better scale the approach.…”
Section: Related Workmentioning
confidence: 99%
“…Higo et al (2011) extended this to an incremental approach. Komondoor & Horwitz (2001) also used PDGs for clone detection and see the possibility to find non-contiguous clones as a main benefit. Gabel, Jiang & Su (2008) combined the analysis of dependence graphs with abstract syntax trees in the tool Deckard to better scale the approach.…”
Section: Related Workmentioning
confidence: 99%
“…Many approaches have been developed over the years to detect code clones [20,23,25,26]. A code clone is two or more segments of code that have the same semantics but come from different sources.…”
Section: Code Clones and Reuse Detectionmentioning
confidence: 99%
“…Previous works include a wide range of techniques from code compression [10][11][12][13] to procedure abstraction [14][15][16] and dead code elimination [17].…”
Section: Related Workmentioning
confidence: 99%
“…Komondoor and Horvitz propose procedure extraction at the source code level [14,15]. Zmily and Kozyrakis propose BLISS which successfully targets reducing text space, energy use and execution time [20].…”
Section: Related Workmentioning
confidence: 99%