Identifying syntactic differences between two programs
Software—Practice & Experience
Parameterized pattern matching: algorithms and applications
Journal of Computer and System Sciences
Sim: a utility for detecting similarity in computer programs
SIGCSE '99 The proceedings of the thirtieth SIGCSE technical symposium on Computer science education
A Space-Economical Suffix Tree Construction Algorithm
Journal of the ACM (JACM)
CCFinder: a multilinguistic token-based code clone detection system for large scale source code
IEEE Transactions on Software Engineering
Experiment on the Automatic Detection of Function Clones in a Software System Using Metrics
ICSM '96 Proceedings of the 1996 International Conference on Software Maintenance
An Approach to Identify Duplicated Web Pages
COMPSAC '02 Proceedings of the 26th International Computer Software and Applications Conference on Prolonging Software Life: Development and Redevelopment
On Software Maintenance Process Improvement Based on Code Clone Analysis
PROFES '02 Proceedings of the 4th International Conference on Product Focused Software Process Improvement
Visualizing textual redundancy in legacy source
CASCON '94 Proceedings of the 1994 conference of the Centre for Advanced Studies on Collaborative research
Evaluating Clone Detection Tools for Use during Preventative Maintenance
SCAM '02 Proceedings of the Second IEEE International Workshop on Source Code Analysis and Manipulation
Pattern matching for design concept localization
WCRE '95 Proceedings of the Second Working Conference on Reverse Engineering
On finding duplication and near-duplication in large software systems
WCRE '95 Proceedings of the Second Working Conference on Reverse Engineering
Identifying Similar Code with Program Dependence Graphs
WCRE '01 Proceedings of the Eighth Working Conference on Reverse Engineering (WCRE'01)
Assessing the Benefits of Incorporating Function Clone Detection in a Development Process
ICSM '97 Proceedings of the International Conference on Software Maintenance
Clone Detection Using Abstract Syntax Trees
ICSM '98 Proceedings of the International Conference on Software Maintenance
A Language Independent Approach for Detecting Duplicated Code
ICSM '99 Proceedings of the IEEE International Conference on Software Maintenance
Identification of High-Level Concept Clones in Source Code
Proceedings of the 16th IEEE international conference on Automated software engineering
Winnowing: local algorithms for document fingerprinting
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
Finding Function Clones in Web Applications
CSMR '03 Proceedings of the Seventh European Conference on Software Maintenance and Reengineering
Problems Creating Task-relevant Clone Detection Reference Data
WCRE '03 Proceedings of the 10th Working Conference on Reverse Engineering
Identifying redundancy in source code using fingerprints
CASCON '93 Proceedings of the 1993 conference of the Centre for Advanced Studies on Collaborative research: software engineering - Volume 1
Efficient randomized pattern-matching algorithms
IBM Journal of Research and Development - Mathematics and computing
Clone Detection in Source Code by Frequent Itemset Techniques
SCAM '04 Proceedings of the Source Code Analysis and Manipulation, Fourth IEEE International Workshop
Evaluating Clone Detection Techniques from a Refactoring Perspective
Proceedings of the 19th IEEE international conference on Automated software engineering
Practical language-independent detection of near-miss clones
CASCON '04 Proceedings of the 2004 conference of the Centre for Advanced Studies on Collaborative research
Improved Tool Support for the Investigation of Duplication in Software
ICSM '05 Proceedings of the 21st IEEE International Conference on Software Maintenance
On the Use of Clone Detection for Identifying Crosscutting Concern Code
IEEE Transactions on Software Engineering
On the effectiveness of clone detection by string matching: Research Articles
Journal of Software Maintenance and Evolution: Research and Practice
Clone Detection Using Abstract Syntax Suffix Trees
WCRE '06 Proceedings of the 13th Working Conference on Reverse Engineering
CP-Miner: a tool for finding copy-paste and related bugs in operating system code
OSDI'04 Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation - Volume 6
Finding Clones with Dup: Analysis of an Experiment
IEEE Transactions on Software Engineering
Scalable detection of semantic clones
Proceedings of the 30th international conference on Software engineering
Towards a mutation-based automatic framework for evaluating code clone detection tools
Proceedings of the 2008 C3S2E conference
Evaluation of source code copy detection methods on freebsd
Proceedings of the 2008 international working conference on Mining software repositories
A criterion for filtering code clone related bugs
DEFECTS '08 Proceedings of the 2008 workshop on Defects in large software systems
Empirical evaluation of clone detection using syntax suffix trees
Empirical Software Engineering
An information retrieval process to aid in the analysis of code clones
Empirical Software Engineering
An evaluation of code similarity identification for the grow-and-prune model
Journal of Software Maintenance and Evolution: Research and Practice - Special Issue on the 12th Conference on Software Maintenance and Reengineering (CSMR 2008)
Comparison and evaluation of code clone detection techniques and tools: A qualitative approach
Science of Computer Programming
Accurate and Efficient Structural Characteristic Feature Extraction for Clone Detection
FASE '09 Proceedings of the 12th International Conference on Fundamental Approaches to Software Engineering: Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2009
Complete and accurate clone detection in graph-based models
ICSE '09 Proceedings of the 31st International Conference on Software Engineering
Clone detection via structural abstraction
Software Quality Control
Introduction to the WCRE 2007 special issue
Software Quality Control
Centralizing clone group representation and maintenance
Proceedings of the 24th ACM SIGPLAN conference companion on Object oriented programming systems languages and applications
The curse of copy&paste Cloning in requirements specifications
ESEM '09 Proceedings of the 2009 3rd International Symposium on Empirical Software Engineering and Measurement
An empirical study on the maintenance of source code clones
Empirical Software Engineering
Exploring the design space of proactive tool support for copy-and-paste programming
CASCON '09 Proceedings of the 2009 Conference of the Center for Advanced Studies on Collaborative Research
Near-miss function clones in open source software: an empirical study
Journal of Software Maintenance and Evolution: Research and Practice - Working Conference on Reverse Engineering (WCRE 2008)
An analysis of the variability in forty preprocessor-based software product lines
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 1
Achieving accurate clone detection results
Proceedings of the 4th International Workshop on Software Clones
Are scripting languages really different?
Proceedings of the 4th International Workshop on Software Clones
Challenging cloning related problems with GPU-based algorithms
Proceedings of the 4th International Workshop on Software Clones
Distinguishing copies from originals in software clones
Proceedings of the 4th International Workshop on Software Clones
A hybrid approach (syntactic and textual) to clone detection
Proceedings of the 4th International Workshop on Software Clones
Issues in clone classification for dataflow languages
Proceedings of the 4th International Workshop on Software Clones
Towards a multi-scale approach for source code approximate match report
Proceedings of the 4th International Workshop on Software Clones
Can clone detection support quality assessments of requirements specifications?
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 2
Proceedings of the Joint ERCIM Workshop on Software Evolution (EVOL) and International Workshop on Principles of Software Evolution (IWPSE)
Code clones in feature-oriented software product lines
GPCE '10 Proceedings of the ninth international conference on Generative programming and component engineering
The state of the art in end-user software engineering
ACM Computing Surveys (CSUR)
An extended assessment of type-3 clones as detected by state-of-the-art tools
Software Quality Control
Automated type-3 clone oracle using Levenshtein metric
Proceedings of the 5th International Workshop on Software Clones
Representing clones in a localized manner
Proceedings of the 5th International Workshop on Software Clones
On the need for human-based empirical validation of techniques and tools for code clone analysis
Proceedings of the 5th International Workshop on Software Clones
Efficiently handling clone data: RCF and cyclone
Proceedings of the 5th International Workshop on Software Clones
MeCC: memory comparison-based clone detector
Proceedings of the 33rd International Conference on Software Engineering
Non-essential changes in version histories
Proceedings of the 33rd International Conference on Software Engineering
Incremental clone detection and elimination for erlang programs
FASE'11/ETAPS'11 Proceedings of the 14th international conference on Fundamental approaches to software engineering: part of the joint European conferences on theory and practice of software
An empirical study of long-lived code clones
FASE'11/ETAPS'11 Proceedings of the 14th international conference on Fundamental approaches to software engineering: part of the joint European conferences on theory and practice of software
Proceedings of the 2011 ACM SIGMOD International Conference on Management of data
Have your spaghetti and eat it too: evolutionary algorithmics and post-evolutionary analysis
Genetic Programming and Evolvable Machines
Studying software evolution using artefacts' shared information content
Science of Computer Programming
Clone detection in repositories of business process models
BPM'11 Proceedings of the 9th international conference on Business process management
Bauhaus: a tool suite for program analysis and reverse engineering
Ada-Europe'06 Proceedings of the 11th Ada-Europe international conference on Reliable Software Technologies
AuDeNTES: Automatic Detection of teNtative plagiarism according to a rEference Solution
ACM Transactions on Computing Education (TOCE)
An empirical study on inconsistent changes to code clones at the release level
Science of Computer Programming
CloneDifferentiator: Analyzing clones by differentiation
ASE '11 Proceedings of the 2011 26th IEEE/ACM International Conference on Automated Software Engineering
IDE-based real-time focused search for near-miss clones
Proceedings of the 27th Annual ACM Symposium on Applied Computing
What kind of and how clones are refactored?: a case study of three OSS projects
Proceedings of the Fifth Workshop on Refactoring Tools
An empirical study on the impact of duplicate code
Advances in Software Engineering - Special issue on Software Quality Assurance Methodologies and Techniques
CBCD: cloned buggy code detector
Proceedings of the 34th International Conference on Software Engineering
Proceedings of the 34th International Conference on Software Engineering
On how often code is cloned across repositories
Proceedings of the 34th International Conference on Software Engineering
Cloning in DSLs: experiments with OCL
SLE'11 Proceedings of the 4th international conference on Software Language Engineering
History-sensitive heuristics for recovery of features in code of evolving program families
Proceedings of the 16th International Software Product Line Conference - Volume 1
Increasing clone maintenance support by unifying clone detection and refactoring activities
Information and Software Technology
Proceedings of the 12th Koli Calling International Conference on Computing Education Research
Generalized vulnerability extrapolation using abstract syntax trees
Proceedings of the 28th Annual Computer Security Applications Conference
XIAO: tuning code clones at hands of engineers in practice
Proceedings of the 28th Annual Computer Security Applications Conference
An Information Foraging Theory Perspective on Tools for Debugging, Refactoring, and Reuse Tasks
ACM Transactions on Software Engineering and Methodology (TOSEM)
Fast detection of exact clones in business process model repositories
Information Systems
An empirical study of the fault-proneness of clone mutation and clone migration
Proceedings of the 10th Working Conference on Mining Software Repositories
Searching for better configurations: a rigorous approach to clone evaluation
Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering
Managing cloned variants: a framework and experience
Proceedings of the 17th International Software Product Line Conference
Viewing functions as token sequences to highlight similarities in source code
Science of Computer Programming
Tuning research tools for scalability and performance: The NiCad experience
Science of Computer Programming
Beyond plagiarism: An active learning method to analyze causes behind code-similarity
Computers & Education
Using clone detection to find malware in acrobat files
CASCON '13 Proceedings of the 2013 Conference of the Center for Advanced Studies on Collaborative Research
An empirical study of the factors affecting co-change frequency of cloned code
CASCON '13 Proceedings of the 2013 Conference of the Center for Advanced Studies on Collaborative Research
Coherent clusters in source code
Journal of Systems and Software
Hi-index | 0.01 |
Many techniques for detecting duplicated source code (software clones) have been proposed in the past. However, it is not yet clear how these techniques compare in terms of recall and precision as well as space and time requirements. This paper presents an experiment that evaluates six clone detectors based on eight large C and Java programs (altogether almost 850 KLOC). Their clone candidates were evaluated by one of the authors as independent third party. The selected techniques cover the whole spectrum of the state-of-the-art in clone detection. The techniques work on text, lexical and syntactic information, software metrics, and program dependency graphs.