Towards a mutation-based automatic framework for evaluating code clone detection tools
Proceedings of the 2008 C3S2E conference
Comparison and evaluation of code clone detection techniques and tools: A qualitative approach
Science of Computer Programming
Near-miss function clones in open source software: an empirical study
Journal of Software Maintenance and Evolution: Research and Practice - Working Conference on Reverse Engineering (WCRE 2008)
Towards a multi-scale approach for source code approximate match report
Proceedings of the 4th International Workshop on Software Clones
JCCD: a flexible and extensible API for implementing custom code clone detectors
Proceedings of the IEEE/ACM international conference on Automated software engineering
Proceedings of the 5th international symposium on Software visualization
An evaluation framework for plagiarism detection
COLING '10 Proceedings of the 23rd International Conference on Computational Linguistics: Posters
Extracting code clones for refactoring using combinations of clone metrics
Proceedings of the 5th International Workshop on Software Clones
An empirical study on inconsistent changes to code clones at the release level
Science of Computer Programming
CloneDifferentiator: Analyzing clones by differentiation
ASE '11 Proceedings of the 2011 26th IEEE/ACM International Conference on Automated Software Engineering
System-specific static code analyses: a case study in the complex embedded systems domain
Software Quality Control
An empirical study on clone stability
ACM SIGAPP Applied Computing Review
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Viewing functions as token sequences to highlight similarities in source code
Science of Computer Programming
Tuning research tools for scalability and performance: The NiCad experience
Science of Computer Programming
Hi-index | 0.00 |
Over the last decade many techniques for software clone detection have been proposed. In this paper, we provide a comprehensive survey of the capabilities of currently available clone detection techniques. We begin with an overall survey based on criteria that capture the main features of detection techniques. We then propose a set of hypothetical editing scenarios for different clone types, and evaluate the techniques based on their estimated potential to accurately detect clones that may be created by those scenarios.