Results 51 to 60 of about 597,262 (308)

Tree Slicing in Clone Detection: Syntactic Analysis Made (Semi)-Semantic

open access: yesМоделирование и анализ информационных систем, 2012
Nowadays most of software contains code duplication that leads to serious problems in software maintenance. A lot of different clone detection approaches have been proposed over the years to deal with this problem, but almost all of them do not consider ...
Marat Akhin, Vladimir Itsykson
doaj   +3 more sources

A Large-Gap Clone Detection Approach Using Sequence Alignment via Dynamic Parameter Optimization

open access: yesIEEE Access, 2019
Large-gap clones, a kind of clones that reuses code with many edits, are very common in software development practice and widespread in software systems. The detection of such clones is very crucial.
Jinze Liu   +4 more
doaj   +1 more source

The Development and Prospect of Code Clone [PDF]

open access: yesarXiv, 2022
The application of code clone technology accelerates code search, improves code reuse efficiency, and assists in software quality assessment and code vulnerability detection. However, the application of code clones also introduces software quality issues and increases the cost of software maintenance.
arxiv  

On the Relationship of Inconsistent Software Clones and Faults: An Empirical Study [PDF]

open access: yesProc. 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER). IEEE, 2016, 2016
Background: Code cloning - copying and reusing pieces of source code - is a common phenomenon in software development in practice. There have been several empirical studies on the effects of cloning, but there are contradictory results regarding the connection of cloning and faults.
arxiv   +1 more source

What is Your Code Clone Detection and Evolution Research Made Of? [PDF]

open access: yes, 2021
Over the past few decades, clone detection and evolution have become a major area of study in software engineering. Clone detection experiments present several challenges to researchers such as accurate data collection, selecting proper code detection ...
Wijesiriwardana, Chaman   +1 more
core   +1 more source

How are functionally similar code clones syntactically different? An empirical study and a benchmark [PDF]

open access: yesPeerJ Computer Science, 2016
Background. Today, redundancy in source code, so-called “clones” caused by copy&paste can be found reliably using clone detection tools. Redundancy can arise also independently, however, not caused by copy&paste.
Stefan Wagner   +4 more
doaj   +2 more sources

Searching for configurations in clone evaluation - A replication study [PDF]

open access: yes, 2016
Clone detection is the process of finding duplicated code within a software code base in an automated manner. It is useful in several areas of software development such as code quality analysis, bug detection, and program understanding.We replicate a ...
Adham, M   +5 more
core   +1 more source

Fast Code Clone Detection Based on Weighted Recursive Autoencoders

open access: yesIEEE Access, 2019
Code cloning considerably facilitates software development but also leads to recurring bugs and other software quality problems. In this paper, we propose a fast code clone detection method based on weighted recursive autoencoders (RAE) to measure code ...
Jie Zeng   +3 more
doaj   +1 more source

Using Compilation/Decompilation to Enhance Clone Detection [PDF]

open access: yes, 2017
We study effects of compilation and decompilation to code clone detection in Java. Compilation/decompilation canonicalise syntactic changes made to source code and can be used as source code normalisation.
Krinke, J, Ragkhitwetsagul, C
core   +1 more source

A Deep Learning Approach for a Source Code Detection Model Using Self-Attention

open access: yesComplexity, 2020
With the development of deep learning, many approaches based on neural networks are proposed for code clone. In this paper, we propose a novel source code detection model At-biLSTM based on a bidirectional LSTM network with a self-attention layer.
Yao Meng, Long Liu
doaj   +1 more source

Home - About - Disclaimer - Privacy