Skip to main content

Method-Level Code Clone Modification Environment Using CloneManager

  • Conference paper
  • First Online:
Book cover Modern Trends and Techniques in Computer Science

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 285))

Abstract

The primary objective of code clone research is to provide techniques and tools through which the topics such as clone detection and clone management. A number of techniques have been proposed for clone detections and sure to have even more detectors in future. Some limited methods have been proposed for clone modifications. A technique that helps for clone modification is refactoring. But this is not possible for all the clones, as there are clones which cannot be modified. Moreover, some of the clones have to exist to maintain the consistency of the problem. Most of the programmers modify the clone and need to make the modification throughout all the identical clones. We propose a method, which provide a modification environment of the clones for the programmer. We use the clone detection tool CloneManager. We embedded this feature as an enhancement of the clone detection tool, CloneManager.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Roy, C.K., Cordy, J.R., Koschke, R.: Comparison and evaluation of clone detection techniques and tools: a qualitative approach. Sci. Comput. Program. 74, 470–495 (2009)

    Article  MATH  MathSciNet  Google Scholar 

  2. Kapser, C., Godfrey, M.: Supporting the analysis of clones in software systems: a case study. J. Softw. Maintenance Evol.: Res. Pract. 18, 61–82 (2006)

    Article  Google Scholar 

  3. Bellon, S., Koschke, R., Antoniol, G., Krinke, J., Merlo, E.: Comparison and evaluation of clone detection tools. IEEE Trans. Softw. Eng. 33, 577–591 (2007)

    Article  Google Scholar 

  4. Rysselberghe, F.V., Demeyer, S.: Evaluating clone detection techniques. In: Mens T., Ramil, J.F., Godfrey, M.W., Down B (eds.) International Workshop on Evolution of Large-scale Industrial Software Applications, Vrije Universiteit Brussel, Brussel, 25–36 (2003)

    Google Scholar 

  5. Fowler, M.: Refactoring: Improving the Design of Existing Code. Addison-Wesley, Boston (2000)

    Google Scholar 

  6. Higo, Y., Kamiya, T., Kusumoto, S., Inoue, K.: Method and implementation for investigating code clones in a software system. Inf. Softw. Technol. 49, 985–998 (2007)

    Article  Google Scholar 

  7. Kamiya, T., Kusumoto, S., Inoue, K.: Ccfinder: a multilinguistic token-based code clone detection system for large scale source code. IEEE Trans. Softw. Eng. 28, 654–670 (2002)

    Article  Google Scholar 

  8. Jiang, L., Misherghi, G., Su, Z., Glondu, S.: Deckard: scalable and accurate tree-based detection of code clones. In: International Conference on Software Engineering ’07. (2007)

    Google Scholar 

  9. Li, Z., Lu, S., Myagmar, S., Zhou, Y.: CP-Miner: finding copy- paste and related bugs in large-scale software code. IEEE Trans. Softw. Eng. 32, 176–192 (2006)

    Article  Google Scholar 

  10. Higo, Y., Ueda, Y., Kusumoto, S., Inoue, K.: Simultaneous modification support based on code clone analysis. In: 14th Asia-Pacific Software Engineering Conference, pp. 262–269

    Google Scholar 

  11. Kanmani, S., Kamatchi, A., Radhika, R., Saranya, B.V.: CloneManager: a tool for detection of type1 and type2 code clones. In: International Conference on Recent Trends in Business Administration and Information Processing, Springer digital library, Trivandrum, Kerala, India, March 26 & 27 (2010)

    Google Scholar 

  12. Yoshida, N., Hattori, T., Inoue, K.: Finding similar defects using synonymous identifier retrieval. In: International Workshop on Software Clones ’10, Cape Town, South Africa (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to E. Kodhai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Kodhai, E., Kanmani, S. (2014). Method-Level Code Clone Modification Environment Using CloneManager. In: Silhavy, R., Senkerik, R., Oplatkova, Z., Silhavy, P., Prokopova, Z. (eds) Modern Trends and Techniques in Computer Science. Advances in Intelligent Systems and Computing, vol 285. Springer, Cham. https://doi.org/10.1007/978-3-319-06740-7_45

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-06740-7_45

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-06739-1

  • Online ISBN: 978-3-319-06740-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics