Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/SCAM.2009.16guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

An Assessment of Type-3 Clones as Detected by State-of-the-Art Tools

Published: 20 September 2009 Publication History

Abstract

Code reuse through copying and pasting leads to so-called software clones. These clones can be roughly categorized into identical fragments (type-1 clones), fragments with parameter substitution (type-2 clones), and similar fragments that differ through modified,deleted, or added statements (type-3 clones). Although there has been extensive research on detecting clones, detection of type-3 clones is still an open research issue due to the inherent vaguenessin their definition. In this paper, we analyze type-3 clones detected by state-of-the-art tools and investigate type-3 clones in terms of their syntactic differences. Then, we derive their underlying semantic abstractions from their syntactic differences. Finally, we investigate whether there are any additional code characteristics that indicate that a tool-suggested clone candidate is a real type-3 clone from a human's perspective. Our findings can help developers of clone detectors to improve their tools.

Cited By

View all
  • (2016)Co-changing code volume prediction through association rule mining and linear regression modelExpert Systems with Applications: An International Journal10.1016/j.eswa.2015.09.02345:C(185-194)Online publication date: 1-Mar-2016
  • (2012)An accurate estimation of the Levenshtein distance using metric trees and Manhattan distanceProceedings of the 6th International Workshop on Software Clones10.5555/2664398.2664399(1-7)Online publication date: 4-Jun-2012
  • (2012)XIAOProceedings of the 28th Annual Computer Security Applications Conference10.1145/2420950.2421004(369-378)Online publication date: 3-Dec-2012
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
SCAM '09: Proceedings of the 2009 Ninth IEEE International Working Conference on Source Code Analysis and Manipulation
September 2009
172 pages
ISBN:9780769537931

Publisher

IEEE Computer Society

United States

Publication History

Published: 20 September 2009

Author Tags

  1. clone categorization
  2. software clones
  3. type-3 clones

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 08 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2016)Co-changing code volume prediction through association rule mining and linear regression modelExpert Systems with Applications: An International Journal10.1016/j.eswa.2015.09.02345:C(185-194)Online publication date: 1-Mar-2016
  • (2012)An accurate estimation of the Levenshtein distance using metric trees and Manhattan distanceProceedings of the 6th International Workshop on Software Clones10.5555/2664398.2664399(1-7)Online publication date: 4-Jun-2012
  • (2012)XIAOProceedings of the 28th Annual Computer Security Applications Conference10.1145/2420950.2421004(369-378)Online publication date: 3-Dec-2012
  • (2011)Incremental clone detection and elimination for erlang programsProceedings of the 14th international conference on Fundamental approaches to software engineering: part of the joint European conferences on theory and practice of software10.5555/1987434.1987468(356-370)Online publication date: 26-Mar-2011
  • (2011)Mining student capstone projects with FRASR and ProMProceedings of the ACM international conference companion on Object oriented programming systems languages and applications companion10.1145/2048147.2048181(87-96)Online publication date: 22-Oct-2011
  • (2011)Automated type-3 clone oracle using Levenshtein metricProceedings of the 5th International Workshop on Software Clones10.1145/1985404.1985411(34-40)Online publication date: 23-May-2011
  • (2010)Towards clone detection in UML domain modelsProceedings of the Fourth European Conference on Software Architecture: Companion Volume10.1145/1842752.1842805(285-293)Online publication date: 23-Aug-2010
  • (2010)Achieving accurate clone detection resultsProceedings of the 4th International Workshop on Software Clones10.1145/1808901.1808902(1-8)Online publication date: 8-May-2010

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media