ABSTRACT
Code clone detection is an enabling technology for plenty of applications, each having different requirements for a code clone detector. In the tool demonstration we present JCCD, a code clone detection API, which is based on a pipeline model. By combining and parameterizing predefined API components as well as by adding new components, the pipeline model does not only facilitate to build new custom code clone detectors, but also to parallelize the detection process.
- }}I. D. Baxter, A. Yahin, L. M. de Moura, M. Sant'Anna, and L. Bier. Clone detection using abstract syntax trees. In International Conference on Software Maintenance (ICSM'98), pages 368--377. IEEE Computer Society, 1998. Google ScholarDigital Library
- }}S. Ducasse, M. Rieger, and S. Demeyer. A language independent approach for detecting duplicated code. In Proceedings of the Frontiers of Software Maintenance, 25th IEEE International Conference in Software Maintenance (ICSM'09), pages 109--118, 1999. Google ScholarDigital Library
- }}M. Gabel, L. Jiang, and Z. Su. Scalable detection of semantic clones. In Proceedings of the 30th International Conference on Software Engineering (ICSE 2008), pages 321--330. ACM, 2008. Google ScholarDigital Library
- }}E. Jürgens, F. Deissenboeck, and B. Hummel. CloneDetective - a workbench for clone detection research. In Proceedings of the 31st International Conference on Software Engineering (ICSE 2009), pages 603--606. IEEE Computer Society, 2009. Google ScholarDigital Library
- }}T. Kamiya, S. Kusumoto, and K. Inoue. CCFinder: A multilinguistic token-based code clone detection system for large scale source code. IEEE Transactions on Software Engineering, 28(7):654--670, 2002. Google ScholarDigital Library
- }}J. Krinke. Identifying similar code with program dependence graphs. In Proceedings of the Eighth Working Conference on Reverse Engineering (WCRE'01), pages 301--309. IEEE Computer Society, 2001. Google ScholarDigital Library
- }}R. C. Martin. The open-closed principle. C++ Report, 1996.Google Scholar
- }}J. Mayrand, C. Leblanc, and E. Merlo. Experiment on the automatic detection of function clones in a software system using metrics. In Proceedings of the 12th International Conference on Software Maintenance (ICSM'96), pages 244--253, 1996. Google ScholarDigital Library
- }}D. Neu. AST-basierte Erkennung von komplexen Refactorings. Diploma thesis (in German), University of Trier, Germany, 2009.Google Scholar
- }}C. K. Roy and J. R. Cordy. Scenario-based comparison of clone detection techniques. In Proceedings of the 16th IEEE International Conference on Program Comprehension (ICPC'2008), pages 153--162. IEEE Computer Society, 2008. Google ScholarDigital Library
- }}C. K. Roy, J. R. Cordy, and R. Koschke. Comparison and evaluation of code clone detection techniques and tools: A qualitative approach. Science of Computer Programming, 74(7):470--495, 2009. Google ScholarDigital Library
- }}P. Weißgerber and S. Diehl. Identifying refactorings from source-code changes. In Proceedings of 21st IEEE/ACM International Conference on Automated Software Engineering (ASE 2006), pages 231--240. IEEE Computer Society, 2006. Google ScholarDigital Library
Index Terms
- JCCD: a flexible and extensible API for implementing custom code clone detectors
Recommendations
Clone-based and interactive recommendation for modifying pasted code
ESEC/FSE 2015: Proceedings of the 2015 10th Joint Meeting on Foundations of Software EngineeringDevelopers often need to modify pasted code when programming with copy-and-paste practice. Some modifications on pasted code could involve lots of editing efforts, and any missing or wrong edit could incur bugs. In this paper, we propose a clone-based ...
Towards exploring the code reuse from stack overflow during software development
ICPC '22: Proceedings of the 30th IEEE/ACM International Conference on Program ComprehensionAs one of the most well-known programmer Q&A websites, Stack Overflow (i.e., SO) is serving tens of thousands of developers every day. Previous work has shown that many developers reuse the code snippets on SO when they find an answer (from SO) that ...
Incremental Code Clone Detection: A PDG-based Approach
WCRE '11: Proceedings of the 2011 18th Working Conference on Reverse EngineeringIt has been noted in recent years that the presence of code clones makes software maintenance more difficult. Unintended code inconsistencies may occur due to the presence of code clones. In order to avoid problems caused by code clones, it is necessary ...
Comments