Code Clone Detection with Refactoring support Through Textual analysis

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - Issue 2011 by IJCTT Journal
Volume-2 Issue-2                           
Year of Publication : 2011
Authors :G. Anil kumar, Dr. C.R.K.Reddy, Dr. A. Govardhan, Gousiya Begum.

MLA

G. Anil kumar, Dr. C.R.K.Reddy, Dr. A. Govardhan, Gousiya Begum."Code Clone Detection with Refactoring support Through Textual analysis"International Journal of Computer Trends and Technology (IJCTT),V2(2):629-633 Issue 2011 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract: - Copying code fragments and then reuse by pasting with or without minor modifications or adaptations are common activities in software development. This type of reuse approach of existing code is called code cloning and the pasted code fragment without is called a clone of the original. One of the major shortcomings of such duplicated fragments is that if a bug is detected in a code fragment; all the other fragments similar to it should be investigated to check the possible existence of the same bug in the similar fragments. In this paper, we compare different clone detection techniques and tools. First part of this paper explains the classification of clone detection techniques and the later work done in this area and proposed method.

References-

[1] Chanchal Kumar Roy and James R Cordy, “A Survey on Software Clone Detection Research”, Computer and Information Science, Vol. 115, No. 541, pp. 115, 2007
[2] Robert Tairas, “Clone detection and refactoring”, Proceeding of OOPSLA `06 Companion to the 21st ACM SIGPLAN symposium on Object-oriented programming systems, languages, and applications, pp. 780-781, New York, USA, 2006
[3] Chanchal K. Roy, James R. Cordya and Rainer Koschkeb, “Comparison and Evaluation of Code Clone Detection Techniques and Tools: A Qualitative Approach”, Journal Science of Computer Programming, Vol. 74, No.7, pp. 470-495, May 2009
[4] Ira D. Baxter, Andrew Yahin, Leonardo Moura, Marcelo Sant Anna and Lorraine Bier, “Clone Detection Using Abstract Syntax Trees”, Proceedings of the International Conference on Software Maintenance, pp. 368, Washington DC, USA 1998
[5] Kodhai.E, Perumal.A, and Kanmani.S, "Clone Detection using Textual and Metric Analysis to figure out all Types of Clones", Proceedings of the International Joint Journal Conference on Engineering and Technology, pp. 99-103, 2010
[6] Magiel Bruntink, Arie van Deursen,Tom Tourwe and Remco van Engele, "An Evaluation of Clone Detection Techniques for Identifying Crosscutting Concerns", Proceedings of the 20th IEEE International Conference on Software Maintenance, pp. 200- 209,Washington DC, USA 2004
[7] Ira D. Baxter and Dale Churchett, "Using Clone Detection to Manage a Product Line", Clone detection using abstract syntax trees, pp. 1-3,1998
[8] Heejung Kimy, Yungbum Jungy, Sunghun Kimx and Kwangkeun Yi, "MeCC: Memory Comparison-based Clone Detector", 33rd international conference on software engineering, Waikiki,Honolulu, Hawaii, May 21-28,2011
[9] Florian Deissenboeck, Benjamin Hummel, Elmar Jurgens, Bernhard Schatz, Stefan Wagner, Jean-François Girard and Stefan Teucher, "Clone detection in automotive model-based development", Proceedings of the 30th international conference on Software engineering, pp. 613- 622,New York, NY, USA,2008
[10] Robert Tairas, Jeff Gray and Ira Baxter, "Visualization of clone detection results",Proceedings of the 2006 OOPSLA workshop on eclipse technology exchange ACM, pp 50-54, New York,USA,2006
[11] Yue Jia, David Binkley, Mark Harman, Jens Krinke and Makoto Matsushita, "KClone: A Proposed Approach to Fast Precise Code Clone Detection", Computer and Information Science, pp. 12-16, 2009

Keywords— Software clone, Clone Detection, clone cluster, clone pair.