skip to main content
10.1145/1985404.1985414acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

Representing clones in a localized manner

Published: 23 May 2011 Publication History

Abstract

Code clones (i.e., duplicate sections of code) can be scattered throughout the source files of a program. Manually evaluating group of such clones requires observing each clone in its origina location (i.e., opening each file and finding the source location o each clone), which can be a time-consuming process. As a alternative, this paper introduces a technique that localizes th representation of code clones to provide a summary of th properties of two or more clones in one location. In our approach the results of a clone detection tool are analyzed in an automate manner to determine the properties (i.e., similarities an differences) of the clones. These properties are visualized directl within the source editor. The localized representation is realize as part of the features of an Eclipse plug-in called CeDAR.

References

[1]
Atkins, D. L. 1998. Version Sensitive Editing: Change History as a Programming Tool. In Proceedings of the Scm-8 Symposium on System Configuration Management (Brussels, Belgium, Jul. 1998), pp. 146--157.
[2]
Baxter, I. D., Yahin, A., Moura, L., Sant'Anna, M., and Bier, L. 1998. Clone Detection Using Abstract Syntax Trees. In Proceedings of the International Conference on Software Maintenance (Bethesda, MD, Mar. 1998), pp. 368--377.
[3]
Bellon, S., Koschke, R., Antoniol, G., Krinke, J., and Merlo, E. 2007. Comparison and Evaluation of Clone Detection Tools. IEEE Transactions on Software Engineering. 33, 9 (Sep. 2007), pp. 577--591. 5 SolidSDD, http://www.solidsourceit.com/products/SolidSDD-codeduplication-cloning-analysis.html
[4]
Campbell, D. and Miller, M. 2008. Designing Refactoring Tools for Developers. In Workshop on Refactoring Tools (Nashville, TN, Oct. 2008), Article 9, 2 pages.
[5]
Cottrell, R., Chang, J. J., Walker, R. J., and Denzinger, J. 2007. Determining Detailed Structural Correspondence for generalization tasks. In Proceedings of the Joint Meeting of the European Software Engineering Conference and the Symposium on the Foundations of Software Engineering (Dubrovnik, Croatia, Sep. 2007), pp. 165--174.
[6]
Falke, R., Frenzel, P., and Koschke, R. 2008. Empirical Evaluation of Clone Detection using Syntax Suffix Trees. Empirical Software Engineering. 13, 6 (Dec. 2008), pp. 601-643.
[7]
Fluri, B., Wuersch, M., PInzger, M., and Gall, H. 2007. Change Distilling: Tree Differencing for Fine-Grained Source Code Change Extraction. IEEE Transactions on Software Engineering. 33, 11 (Nov. 2007), pp. 725--743.
[8]
Gusfield, D. 1997 Algorithms on Strings, Trees, and Sequences: Computer Science and Computational Biology. Cambridge University Press, Cambridge, United Kingdom.
[9]
Jacob, F., Hou, D., and Jablonski, P. Actively Comparing Clones Inside The Code Editor. In Proceedings of the International Workshop on Software Clones (Cape Town, South Africa, May 2010), pp. 9--16.
[10]
Jiang, L., Misherghi, G., Su, Z., and Glondu, S. 2007. DECKARD: Scalable and Accurate Tree-Based Detection of Code Clones. In Proceedings of the International Conference on Software Engineering (Minneapolis, MN, May 2007), pp. 96--105.
[11]
Jiang, Z. M. and Hassan, A. E. 2007. A Framework for Studying Clones In Large Software Systems. In Proceedings of the International Working Conference on Source Code Analysis and Manipulation (Paris, France, Sep. 2007), pp. 203--212.
[12]
Kamiya, T., Kusumoto, S., and Inoue, K. 2002. CCFinder: a Multilinguistic Token-based Code Clone Detection System for Large Scale Source Code. IEEE Transactions on Software Engineering. 28, 7 (Jul. 2002), pp. 654--670.
[13]
Kapser, C. and Godfrey, M. W. 2005. Improved Tool Support for the Investigation of Duplication in Software. In Proceedings of the International Conference on Software Maintenance (Budapest, Hungary, Sep. 2005), pp. 305--314.
[14]
Murphy-Hill, E. and Black, A. P. 2008. Refactoring Tools: Fitness for Purpose. IEEE Software. 25, 5 (Sep. 2008), pp. 38--44.
[15]
Rieger, M., Ducasse, S., and Lanza, M. 2004. Insights into System-Wide Code Duplication. In Proceedings of the Working Conference on Reverse Engineering (Delft, The Netherlands, Nov. 2004), pp. 100--109.
[16]
Tairas, R. and Gray, J. 2006. Phoenix-based Clone Detection Using Suffix Trees. In Proceedings of the ACM Southeast Conference (Melbourne, FL, Mar. 2006), pp. 679--684.
[17]
Tairas, R. and Gray, J. 2009. Get to Know Your Clones with CeDAR. In Companion to the International Conference on Object-Oriented Programming Systems Languages and Applications (Orlando, FL, Oct. 2009), pp. 817--818.

Cited By

View all
  • (2017)A Survey on Code Clone, Its Behavior and ApplicationsNetworking Communication and Data Knowledge Engineering10.1007/978-981-10-4600-1_3(27-39)Online publication date: 3-Nov-2017
  • (2013)Software clone detection: A systematic reviewInformation and Software Technology10.1016/j.infsof.2013.01.00855:7(1165-1199)Online publication date: Jul-2013
  • (2012)Increasing clone maintenance support by unifying clone detection and refactoring activitiesInformation and Software Technology10.1016/j.infsof.2012.06.01154:12(1297-1307)Online publication date: 1-Dec-2012

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
IWSC '11: Proceedings of the 5th International Workshop on Software Clones
May 2011
92 pages
ISBN:9781450305884
DOI:10.1145/1985404
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 May 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. code clones
  2. representation
  3. visualization

Qualifiers

  • Research-article

Conference

ICSE11
Sponsor:
ICSE11: International Conference on Software Engineering
May 23, 2011
HI, Waikiki, Honolulu, USA

Upcoming Conference

ICSE 2025

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 28 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2017)A Survey on Code Clone, Its Behavior and ApplicationsNetworking Communication and Data Knowledge Engineering10.1007/978-981-10-4600-1_3(27-39)Online publication date: 3-Nov-2017
  • (2013)Software clone detection: A systematic reviewInformation and Software Technology10.1016/j.infsof.2013.01.00855:7(1165-1199)Online publication date: Jul-2013
  • (2012)Increasing clone maintenance support by unifying clone detection and refactoring activitiesInformation and Software Technology10.1016/j.infsof.2012.06.01154:12(1297-1307)Online publication date: 1-Dec-2012

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media