Skip to main content

On the Effectiveness of Vector-Based Approach for Supporting Simultaneous Editing of Software Clones

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 10027))

Abstract

Code clone is one of the factors that makes software maintenance more difficult. Once a developer find a defect in a code fragment, he/she has to inspect the all of the code clones of the code fragment. In this study, we investigated the effectiveness of query-based use of a vector-based clone detection tool for supporting simultaneous fixing of buggy clones in source code and compared it with the query-based use of a token-based clone detection tool CCFinder.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    http://www.mit.edu/~andoni/LSH/.

References

  1. Andoni, A., Indyk, P.: Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions. CACM 51(1), 117–122 (2008)

    Article  Google Scholar 

  2. Baeza-Yates, R., Ribeiro-Neto, B.: Modern Information Retrieval: The Concepts and Technology behind Search, 2nd edn. (ACM Press Books) Addison-Wesley Professional, Harlow (2011)

    Google Scholar 

  3. Balazinska, M., Merlo, E., Dagenais, M., Lague, B., Kontogiannis, K.: Measuring clone based reengineering opportunities. In: Proceedings of METRICS 1999, pp. 292–303 (1999)

    Google Scholar 

  4. Deissenboeck, F., Heinemann, L., Hummel, B., Wagner, S.: Challenges of the dynamic detection of functionally similar code fragments. In: Proceedings of CSMR 2012, pp. 299–308 (2012)

    Google Scholar 

  5. Higo, Y., Kusumoto, S., Inoue, K.: A metric-based approach to identifying refactoring opportunities for merging code clones in a java software system. J. Softw. Maintenance Evol. 20(6), 435–461 (2008)

    Article  Google Scholar 

  6. Indyk, P., Motwani, R.: Approximate nearest neighbors: towards removing the curse of dimensionality. In: Proceedings of STOC 1998, pp. 604–613 (1998)

    Google Scholar 

  7. Jiang, L., Misherghi, G., Su, Z., Glondu, S.: DECKARD: scalable and accurate tree-based detection of code clones. In: Proceedings of ICSE 2007, pp. 96–105 (2007)

    Google Scholar 

  8. Jiang, L., Su, Z.: Automatic mining of functionally equivalent code fragments via random testing. In: Proceedings of ISSTA 2009, pp. 81–92 (2009)

    Google Scholar 

  9. Jiang, L., Su, Z., Chiu, E.: Context-based detection of clone-related bugs. In: Proceedings of ESEC-FSE 2007, pp. 55–64 (2007)

    Google Scholar 

  10. Kamiya, T., Kusumoto, S., Inoue, K.: CCFinder: a multilinguistic token-based code clone detection system for large scale source code. IEEE Trans. Softw. Eng. 28(7), 654–670 (2002)

    Article  Google Scholar 

  11. Kim, H., Jung, Y., Kim, S., Yi, K.: MeCC: memory comparison-based clone detector. In: Proceedings of ICSE 2011, pp. 301–310 (2011)

    Google Scholar 

  12. Komondoor, R., Horwitz, S.: Using slicing to identify duplication in source code. In: Proceedings of SAS 2001, pp. 40–56 (2001)

    Google Scholar 

  13. Krinke, J.: Identifying similar code with program dependence graphs. In: Proceedings of WCRE 2001, pp. 301–307 (2001)

    Google Scholar 

  14. Li, J., Ernst, M.D.: CBCD: Cloned buggy code detector. Technical report UW-CSE-11-05-02, University of Washington Department of Computer Science and Engineering (2011)

    Google Scholar 

  15. Li, J., Ernst, M.D.: CBCD: cloned buggy code detector. In: Proceedings of ICSE 2012, pp. 310–320 (2012)

    Google Scholar 

  16. Marcus, A., Maletic, J.I.: Identification of high-level concept clones in source code. In: Proceedings of ASE 2001, pp. 107–114 (2001)

    Google Scholar 

  17. Uramoto, N., Takeda, K.: A method for relating multiple newspaper articles by using graphs, and its application to webcasting. In: Proceedings of ACL 1998, pp. 1307–1313 (1998)

    Google Scholar 

  18. Yamanaka, Y., Choi, E., Yoshida, N., Inoue, K.: A high speed function clone detection based on information retrieval technique. IPSJ J. 55(10), 2245–2255 (2014). in Japanese

    Google Scholar 

  19. Yoshida, N., Higo, Y., Kamiya, T., Kusumoto, S., Inoue, K.: On refactoring support based on code clone dependency relation. In: Proceedings of METRICS 2005, pp. 16:1–16:10 (2005)

    Google Scholar 

Download references

Acknowledgments

This work was supported by JSPS KAKENHI Grant Numbers 25220003, 26730036, 15H06344 and 16K16034.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Norihiro Yoshida .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Numata, S., Yoshida, N., Choi, E., Inoue, K. (2016). On the Effectiveness of Vector-Based Approach for Supporting Simultaneous Editing of Software Clones. In: Abrahamsson, P., Jedlitschka, A., Nguyen Duc, A., Felderer, M., Amasaki, S., Mikkonen, T. (eds) Product-Focused Software Process Improvement. PROFES 2016. Lecture Notes in Computer Science(), vol 10027. Springer, Cham. https://doi.org/10.1007/978-3-319-49094-6_41

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49094-6_41

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49093-9

  • Online ISBN: 978-3-319-49094-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics