skip to main content
10.1145/1774088.1774580acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
poster

Sub-clone refactoring in open source software artifacts

Published: 22 March 2010 Publication History

Abstract

We present a study of revisions made to open source projects that documents the actual refactoring of code associated with code clones (i.e., sections of duplicated code). The study identifies a characteristic in which some clone refactorings were performed on only part of the clone (i.e., a sub-clone). We conclude that sub-clones should be considered during the clone maintenance activity.

References

[1]
Counsell, S., Hassoun, Y., Loizou, G., and Najjar, R. Common Refactorings, a Dependency Graph and Some Code Smells: an Empirical Study of Java OSS. In Proc. of the Int. Symp. on Empirical Software Engineering, Rio de Janeiro, Brazil, Sep. 2006, 288--296.
[2]
Jiang, L., Misherghi, G., Su, Z., and Glondu, S. DECKARD: Scalable and Accurate Tree-based Detection of Code Clones. In Proc. of the Int. Conf. on Software Engineering, Minneapolis, MN, May 2007, 96--105.
[3]
Kim, M., Sazawal, V., Notkin, D., and Murphy, G. An Empirical Study of Code Clone Genealogies. In Proc. of the European Software Engineering Conf. and the Symp. on the Foundations of Software Engineering, Lisbon, Portugal, Sep. 2005, 187--196.
[4]
Tairas, R. and Gray, J. Get to Know Your Clones with CeDAR. In Companion Proc. of the Int. Conf. on Object-Oriented Programming, Systems, Languages, and Applications, Orlando, FL, Oct. 2009, 817--818.

Cited By

View all
  • (2025)Accurate code fragment clone detection and its application in identifying known CVE clonesInternational Journal of Information Security10.1007/s10207-024-00968-z24:1Online publication date: 5-Jan-2025
  • (2013)Software clone detection: A systematic reviewInformation and Software Technology10.1016/j.infsof.2013.01.00855:7(1165-1199)Online publication date: Jul-2013
  • (2012)Increasing clone maintenance support by unifying clone detection and refactoring activitiesInformation and Software Technology10.1016/j.infsof.2012.06.01154:12(1297-1307)Online publication date: 1-Dec-2012

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '10: Proceedings of the 2010 ACM Symposium on Applied Computing
March 2010
2712 pages
ISBN:9781605586397
DOI:10.1145/1774088
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 March 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. analysis
  2. code clones
  3. maintenance
  4. refactoring

Qualifiers

  • Poster

Funding Sources

Conference

SAC'10
Sponsor:
SAC'10: The 2010 ACM Symposium on Applied Computing
March 22 - 26, 2010
Sierre, Switzerland

Acceptance Rates

SAC '10 Paper Acceptance Rate 364 of 1,353 submissions, 27%;
Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Upcoming Conference

SAC '25
The 40th ACM/SIGAPP Symposium on Applied Computing
March 31 - April 4, 2025
Catania , Italy

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 28 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Accurate code fragment clone detection and its application in identifying known CVE clonesInternational Journal of Information Security10.1007/s10207-024-00968-z24:1Online publication date: 5-Jan-2025
  • (2013)Software clone detection: A systematic reviewInformation and Software Technology10.1016/j.infsof.2013.01.00855:7(1165-1199)Online publication date: Jul-2013
  • (2012)Increasing clone maintenance support by unifying clone detection and refactoring activitiesInformation and Software Technology10.1016/j.infsof.2012.06.01154:12(1297-1307)Online publication date: 1-Dec-2012

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media