Analysis of Software Clones
DOI:
https://doi.org/10.32628/CSEIT217290Keywords:
Software Cloning, Clone Analysis, Clone Management, Clone DetectionsAbstract
Copied code or code clones are a sort of code that contrarily affect the improvement and support of software frameworks. Software clone research in the past generally cantered around the discovery. what's more, examination of code clones, while research lately reaches out to the entire range of clone the board. In the last decade, three reviews showed up in the writing, which cover the recognition, examination and transformative attributes of code clones. This paper presents a complete overview on the state of the workmanship in clone the board, with top to bottom examination of clone the executives exercise (e.g., following, refactoring, cost benefit investigation) past the recognition and examination. This is the main overview on clone the board, where we highlight the accomplishments up until now, and uncover roads for additional exploration essential towards an incorporated clone the board framework. We accept that we have worked really hard in studying the territory of clone the board and that this work may fill in as a guide for future research in the area.
References
- D. Baxter, M. Conradt, J. R. Cordy, and R. Koschke. Software clone management towards industrial application (dagstuhl seminar 12071). Dagstuhl Reports, 2(2):21–57, 2012.
- D. Rattan, R. Bhatia, and M. Singh. Software clone detection: A systematic review. Infor. and Soft. Tech., 55(7):1165 – 1199, 2013.
- E. Juergens and F. Deissenboeck. How much is a clone? In SQM, 2010
- R. D. Venkatasubramanyam, S. Gupta, and H. K. Singh. Prioritizing code clone detection results for clone management. In IWSC, pages 30–36, 2013
- B. Baker. On finding duplication and near-duplication in large software systems. In WCRE, pages 86 –95, 1995
- S. Bouktif, G. Antoniol, M. Neteler, and E. Merlo. A novel approach to optimize clone refactoring activity. In GECCO, pages 1885–1892, 2006.
- J. Harder. The limits of clone model standardization. In IWSC, pages 10–11, 2013.
- C. Kapser, J. Harder, and I. Baxter. A common conceptual model for clone detection results. In IWSC, pages 72–73, 2012
- Y. Yamanaka, E. Choi, N. Yoshida, K. Inoue, and T.i Sano. Apply- ing clone change notification system into an industrial development process. In ICPC, pages 199–206, 2013.
- Y. Dang, D. Zhang, S. Ge, C. Chu, Y. Qiu, and T. Xie. XIAO: tuning code clones at hands of engineers in practice. In ACSAC, pages 369– 378, 2012.
- M. F. Zibran and C. K. Roy. A constraint programming approach to conflict-aware optimal scheduling of prioritized code clone refactoring. In SCAM, pages 105–114, 2011.
- I. Baxter, A. Yahin, L. Moura, M. Sant’Anna, and L. Bier. Clone detection using abstract syntax trees. In ICSM, pages 368–377, 1998.
- M. F. Zibran and C. K. Roy. Conflict-aware optimal scheduling of code clone refactoring: A constraint programming approach. In ICPC, pages 266 – 269, 2011
- M. F. Zibran and C. K. Roy. Conflict-aware optimal scheduling of prioritized code clone refactoring. IET Software, 7(3), 2013.
- S. Bellon, R. Koschke, G. Antoniol, J. Krinke, and E. Merlo. Com- parison and evaluation of clone detection tools. IEEE Trans. on Softw. Engg., 33(9):577–591, 2007
- J. Harder and N. Göde. Efficiently handling clone data: RCF and cyclone. In IWSC, pages 81–82. ACM, 2011
- C. K. Roy and J. R. Cordy. NICAD: Accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization. In ICPC, pages 172–181, 2008
- C. K. Roy and J. R. Cordy. A mutation/injection-based automatic framework for evaluating code clone detection tools. In ICSTW, pages 157–166, 2009.
- T. Wang, M. Harman, Y. Jia, and J. Krinke. Searching for better config- urations: a rigorous approach to clone evaluation. In ESEC/SIGSOFT FSE, pages 455–465, 2013.
- J. Svajlenko, I. Keivanloo, and C. K. Roy. Scaling classical clone detection tools for ultra-large datasets: An exploratory study. In IWSC, pages 16–22, 2013
- R. Tairas and J. Gray. Phoenix-based clone detection using suffix trees. In ACM-SE, pages 679–684, 2006.
- J. R. Cordy. Comprehending reality: Practical barriers to industrial adoption of software maintenance automation. In IWPC, pages 196– 206, 2003.
- R. K. Saha, C. K. Roy, and K. A. Schneider. An automatic framework for extracting and classifying near-miss clone genealogies. In ICSM, pages 293 –302, 2011.
- M. F. Zibran and C. K. Roy. IDE-based real-time focused search for near-miss clones. In ACM-SAC, pages 1235–1242, 2012.
- A. Santone. Clone detection through process algebras and Java bytecode. In IWSC, pages 73–74. ACM, 2011.
- R. Komondoor and S. Horwitz. Using slicing to identify duplication in source code. In SAS, pages 40–56, 2001.
- J. Pate, R. Tairas, and N. Kraft. Clone evolution: a systematic review. Journal of Soft.: Evol. and Proc., pages 1–23, 2011
- J. Mayrand, C. Leblanc, and E. Merlo. Experiment on the automatic detection of function clones in a software system using metrics. In ICSM, pages 244 –253, 1996.
- M. Rieger, S. Ducasse, and M. Lanza. Insights into system-wide code duplication. In WCRE, pages 100–109, 2004.
- E. Duala-Ekoko and M. Robillard. Clone region descriptors: Repre- senting and tracking duplication in source code. ACM Trans. Softw. Eng. Methodol., 20:3:1–3:31, 2010.
- Y. Higo, U. Yasushi, M. Nishino, and S. Kusumoto. Incremental code clone detection: A PDG-based approach. In WCRE, pages 3 –12, 2011.
- Y. Higo and S. Kusumoto. Enhancing quality of code clone detection with program dependency graph. In WCRE, pages 315 –316, 2009.
- R. Falke, P. Frenzel, and R. Koschke. Empirical evaluation of clone detection using syntax suffix trees. Empirical Software Engineering, 13:601–643, 2008.
- S. Lee, G. Bae, H. Chae, D. Bae, and Y. Kwon. Automated scheduling for clone-based refactoring using a competent ga. Softw. Pract. Exper., 41(5):521–550, 2010
- M. Fowler, K. Beck, J.Brant, W. Opdyke, and D. Roberts. Refactoring: Improving the Design of Existing Code. Addison Wesley, 1999.
- C. K. Roy, J. R. Cordy, and R. Koschke. Comparison and evaluation of code clone detection techniques and tools: A qualitative approach. Sci. Comput. Program., 74:470–495, 2009.
- S. Giesecke. Generic modelling of code clones. In DRSS, pages 1–23, 2007.
- B. Lague, D. Proulx, J. Mayrand, E. Merlo, and J. Hudepohl. Assessing the benefits of incorporating function clone detection in a development process. In ICSM, pages 314–321, 1997.
- X. Wang, Y. Dang, L. Zhang, D. Zhang, E. Lan, and H. Mei. Can I clone this piece of code here? In ASE, pages 170–179, 2012.
- C. K. Roy and J. R. Cordy. A survey on software clone detection research. Tech Report TR 2007-541, Queens University, 2007.
- H. Nguyen, T. Nguyen, N. Pham, J. Al-Kofahi, and T. Nguyen. Clone management for evolving software. IEEE Trans. on Softw. Engg., 1(1): 1–19, 2011.
- M. F. Zibran, R. K. Saha, M. Asaduzzaman, and C. K. Roy. Analyzing and forecasting near-miss clones in evolving software: An empirical study. In ICECCS, pages 295–304, 2011.
- R. Koschke. Survey of research on software clones. In DRSS, pages 1–24, 2006.
- L. Jiang, G. Misherghi, Z. Su, and S. Glondu. DECKARD: Scalable and accurate tree-based detection of code clones. In ICSE, pages 96– 105, 2007
- Bellon, Stefan, Rainer Koschke, Giulio Antoniol, Jens Krinke, and Ettore Merlo (2007), "Comparison and evaluation of clone detection tools." IEEE Transactions on software engineering 33 (9).
- Wagner, Stefan (2013), ”Software product quality control. Berlin ”Springer.
- M. Mondal, C. K. Roy, and K. A. Schneider (2015), “A comparative study on the bug-proneness of different types of code clones,” in Proc. International Conference on Software Maintenance and Evolution (ICSME)IEEE: 91–100.
- Monden, Akito, Daikai Nakae, Toshihiro Kamiya, Shin-ichi Sato, and Ken-ichi Matsumoto (2002), "Software quality analysis by code clones in industrial legacy software." In Software Metrics, 2002. Proceedings. IEEE Symposium (8):87-94.
- Komondoor, Raghavan, and Susan Horwitz(2001), "Using slicing to identify duplication in source code." International Static Analysis Symposium. Springer, Berlin, Heidelberg: 40-56.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.