International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 2 | Issue 2 | Year 2011 | Article Id. IJCTT-V2I2P128 | DOI : https://doi.org/10.14445/22312803/IJCTT-V2I2P128

Code Clone Detection with Refactoring support Through Textual analysis


G. Anil kumar, Dr. C.R.K.Reddy, Dr. A. Govardhan, Gousiya Begum

Citation :

G. Anil kumar, Dr. C.R.K.Reddy, Dr. A. Govardhan, Gousiya Begum, "Code Clone Detection with Refactoring support Through Textual analysis," International Journal of Computer Trends and Technology (IJCTT), vol. 2, no. 2, pp. 629-633, 2011. Crossref, https://doi.org/10.14445/22312803/IJCTT-V2I2P128

Abstract

Copying code fragments and then reuse by pasting with or without minor modifications or adaptations are common activities in software development. This type of reuse approach of existing code is called code cloning and the pasted code fragment without is called a clone of the original. One of the major shortcomings of such duplicated fragments is that if a bug is detected in a code fragment; all the other fragments similar to it should be investigated to check the possible existence of the same bug in the similar fragments. In this paper, we compare different clone detection techniques and tools. First part of this paper explains the classification of clone detection techniques and the later work done in this area and proposed method.

Keywords

Software clone, Clone Detection, clone cluster, clone pair.

References

[1] Chanchal Kumar Roy and James R Cordy, “A Survey on Software Clone Detection Research”, Computer and Information Science, Vol. 115, No. 541, pp. 115, 2007
[2] Robert Tairas, “Clone detection and refactoring”, Proceeding of OOPSLA '06 Companion to the 21st ACM SIGPLAN symposium on Object-oriented programming systems, languages, and applications, pp. 780-781, New York, USA, 2006 [3] Chanchal K. Roy, James R. Cordya and Rainer Koschkeb, “Comparison and Evaluation of Code Clone Detection Techniques and Tools: A Qualitative Approach”, Journal Science of Computer Programming, Vol. 74, No.7, pp. 470-495, May 2009
[4] Ira D. Baxter, Andrew Yahin, Leonardo Moura, Marcelo Sant Anna and Lorraine Bier, “Clone Detection Using Abstract Syntax Trees”, Proceedings of the International Conference on Software Maintenance, pp. 368, Washington DC, USA 1998
[5] Kodhai.E, Perumal.A, and Kanmani.S, "Clone Detection using Textual and Metric Analysis to figure out all Types of Clones", Proceedings of the International Joint Journal Conference on Engineering and Technology, pp. 99-103, 2010 [6] Magiel Bruntink, Arie van Deursen,Tom Tourwe and Remco van Engele, "An Evaluation of Clone Detection Techniques for Identifying Crosscutting Concerns", Proceedings of the 20th IEEE International Conference on Software Maintenance, pp. 200- 209,Washington DC, USA 2004
[7] Ira D. Baxter and Dale Churchett, "Using Clone Detection to Manage a Product Line", Clone detection using abstract syntax trees, pp. 1-3,1998
[8] Heejung Kimy, Yungbum Jungy, Sunghun Kimx and Kwangkeun Yi, "MeCC: Memory Comparison-based Clone Detector", 33rd international conference on software engineering, Waikiki,Honolulu, Hawaii, May 21-28,2011
[9] Florian Deissenboeck, Benjamin Hummel, Elmar Jurgens, Bernhard Schatz, Stefan Wagner, Jean-François Girard and Stefan Teucher, "Clone detection in automotive model-based development", Proceedings of the 30th international conference on Software engineering, pp. 613622,New York, NY, USA,2008
[10] Robert Tairas, Jeff Gray and Ira Baxter, "Visualization of clone detection results",Proceedings of the 2006 OOPSLA workshop on eclipse technology exchange ACM, pp 50-54, New York,USA,2006
[11] Yue Jia, David Binkley, Mark Harman, Jens Krinke and Makoto Matsushita, "KClone: A Proposed Approach to Fast Precise Code Clone Detection", Computer and Information Science, pp. 12-16, 2009
[12] Minhaz F. Zibran and Chanchal K. Roy, "Towards Flexible Code Clone Detection, Management, and Refactoring in IDE", Fifth International Workshop on Software Clones,Waikiki, Hawaii, USA,May 23,2011
[13] M. Kim, L. Bergman, T.A. Lau, and D. Notkin, “An Ethnographic Study of Copy and Paste Programming Practices in OOPL,” Proc. Int’l Symp. Empirical Software Eng. (ISESE ’04), pp. 83-92, Aug. 2004
[14] M. Rieger, S. Ducasse, and G. Golomingi, “Tool Support for Refactoring Duplicated OO Code,” Proc. European Conf. Object- Oriented Programming (ECOOP ’99), pp. 177-178, June 1999.
[15]  Magiel Bruntink, Arie van Deursen,Remco van Engelen, and Tom Tourwe, "On the Use of Clone Detection for Identifying Crosscutting Concern Code", Ieee Transactions On Software Engineering, Vol. 31, No. 10,pp. 804-818, October 2005
[16] Abouelhoda M.I., Kurtz S.and Ohlebusch E, "The enhanced suffix array and its applications to genome analysis", In Proc. Workshop on Algorithms in Bioinformatics, vol. 2452,pp. 449–463, Berlin, 2002
[17] Hamid Abdul Basit and Stan Jarzabek, "Detecting Higher-level Similarity Patterns in Programs", European Software Engineering Conference and ACM SIGSOFT Symposium on the Foundations of Software Engineering, pp 1-10 Lisbon, Sept. 2005
[18] Lingxiao Jiang, Zhendong Su and Edwin Chiu, “Context-based detection of clone-related bugs”, Proceedings of the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering, pp. 55 – 64, New York, USA, 2007.
[19] Fabio Calefato, Filippo Lanubile, Teresa Mallardo, "Function Clone Detection in Web Applications: A Semiautomated Approach", Journal of Web Engineering, Vol. 3, No.1, pp.003-021, 2004.
[20] Stephane Ducasse, Oscar Nierstrasz and Matthias Rieger, "On the effectiveness of clone detection by string matching", Journal of Software Maintenance and Evolution, Vol.18, pp.37–58, 2006.
[21] C. Kapser and M. W. Godfrey. Supporting the Analysis of Clones in Software Systems: A Case Study. J. Softw. Maint. Evol., Vol.18, No.2, pp.61–82, 2006.
[22] Chanchal K. Roy, James R. Cordya and Rainer Koschkeb, “Comparison and Evaluation of Code Clone Detection Techniques and Tools: A Qualitative Approach”, Journal Science of Computer Programming, Vol. 74, No.7, May 2009.
[23] Robert Tibshirani, Pei Wang, "Spatial smoothing and hot spot detection for CGH data using the fused lasso", Biostatistics, pp.1-7, 2007.
[24] Mohammed Abdul Bari, Dr. Shahanawaj Ahamad, "Code Cloning: The Analysis, Detection and Removal", International Journal of Computer Applications (0975 – 8887) Vol. 20, No.7, April 2011.