skip to main content
10.1145/1176617.1176722acmconferencesArticle/Chapter ViewAbstractPublication PagessplashConference Proceedingsconference-collections
Article

Clone detection and refactoring

Published: 22 October 2006 Publication History

Abstract

The area of clone detection (i.e., searching for duplicate fragments of source code) has received wide interest recently as indicated by numerous efforts in clone detection tool development. Additionally, some work has been done in the area of selecting and refactoring the detected clones. However, the actual refactoring of clones is typically separated from the initial clone detection and subsequent selection of clones, because the task is delegated to a refactoring tool. This research abstract describes an investigation that will bridge the gap between clone detection and refactoring by researching and developing a comprehensive clone detection and refactoring process that begins with the detection of clones and ends with their refactoring.

References

[1]
Balazinska, M., Merlo, E., Dagenais, M., Lague, B., and Kontogiannis, K. Advanced Clone-analysis to Support Object-oriented System Refactoring. In Proceedings of the Working Conference on Reverse Engineering, Brisbane, Australia, November 2000, pp. 98--107.
[2]
Baxter, I., Yahin, A., Moura, L., Sant'Anna, M., and Bier, L. Clone Detection using Abstract Syntax Trees. In Proceedings of the International Conference on Software Maintenance, Bethesda, MD, November 1998, pp. 368--377.
[3]
Bruntink, M., van Deursen, A., van Engelen, R., and Tourwé, T. On the Use of Clone Detection for Identifying Crosscutting Concern Code, IEEE Transactions on Software Engineering, vol. 31, no. 10, October 2005, pp. 804--818.
[4]
CloneDR™, http://www.semdesigns.com/Products/Clone
[5]
Higo, Y., Kamiya, T., Kusumoto, S., and Inoue, K. ARIES: Refactoring Support Environment Based on Code Clone Analysis. In Proceedings of the 8th IASTED International Conference on Software Engineering and Applications, Cambridge, MA, November 2004, pp. 222--229.
[6]
Komondoor, R. V. Automated Duplicated-Code Detection and Procedure Extraction. Ph.D. Thesis, University of Wisconsin-Madison, Madison, WI, 2003.
[7]
Microsoft Phoenix, http://research.microsoft.com/phoenix
[8]
NASA Ames Research Center Open Source Software, http://opensource.arc.nasa.gov
[9]
Tairas, R. and Gray, J. Phoenix-Based Clone Detection Using Suffix Trees. In Proceedings of the 44th ACM-SE Conference, Melbourne, FL, March 2006, pp. 679--684.

Cited By

View all
  • (2020)Software smell detection techniques: A systematic literature reviewJournal of Software: Evolution and Process10.1002/smr.2320Online publication date: 15-Oct-2020
  • (2014)Vector abstraction and concretization for scalable detection of refactoringsProceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering10.1145/2635868.2635926(86-97)Online publication date: 11-Nov-2014
  • (2014)Scalable detection of missed cross-function refactoringsProceedings of the 2014 International Symposium on Software Testing and Analysis10.1145/2610384.2610394(138-148)Online publication date: 21-Jul-2014
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
OOPSLA '06: Companion to the 21st ACM SIGPLAN symposium on Object-oriented programming systems, languages, and applications
October 2006
530 pages
ISBN:159593491X
DOI:10.1145/1176617
  • General Chair:
  • Peri Tarr,
  • Program Chair:
  • William R. Cook
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 October 2006

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. clone detection
  2. duplicate code
  3. refactoring

Qualifiers

  • Article

Conference

OOPSLA06
Sponsor:

Upcoming Conference

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)2
Reflects downloads up to 28 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2020)Software smell detection techniques: A systematic literature reviewJournal of Software: Evolution and Process10.1002/smr.2320Online publication date: 15-Oct-2020
  • (2014)Vector abstraction and concretization for scalable detection of refactoringsProceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering10.1145/2635868.2635926(86-97)Online publication date: 11-Nov-2014
  • (2014)Scalable detection of missed cross-function refactoringsProceedings of the 2014 International Symposium on Software Testing and Analysis10.1145/2610384.2610394(138-148)Online publication date: 21-Jul-2014
  • (2014)A Case Study of Refactoring Large-Scale Industrial Systems to Efficiently Improve Source Code QualityComputational Science and Its Applications – ICCSA 201410.1007/978-3-319-09156-3_37(524-540)Online publication date: 2014
  • (2013)Software clone detection: A systematic reviewInformation and Software Technology10.1016/j.infsof.2013.01.00855:7(1165-1199)Online publication date: Jul-2013

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media