CCFinder: a multilinguistic token-based code clone detection system for large scale source code
IEEE Transactions on Software Engineering
An empirical study of code clone genealogies
Proceedings of the 10th European software engineering conference held jointly with 13th ACM SIGSOFT international symposium on Foundations of software engineering
On the Use of Clone Detection for Identifying Crosscutting Concern Code
IEEE Transactions on Software Engineering
CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code
IEEE Transactions on Software Engineering
DECKARD: Scalable and Accurate Tree-Based Detection of Code Clones
ICSE '07 Proceedings of the 29th international conference on Software Engineering
The Current State and Future of Search Based Software Engineering
FOSE '07 2007 Future of Software Engineering
Comparison and Evaluation of Clone Detection Tools
IEEE Transactions on Software Engineering
A Study of Consistent and Inconsistent Changes to Code Clones
WCRE '07 Proceedings of the 14th Working Conference on Reverse Engineering
Scalable detection of semantic clones
Proceedings of the 30th international conference on Software engineering
ICPC '08 Proceedings of the 2008 The 16th IEEE International Conference on Program Comprehension
An Empirical Study of Function Clones in Open Source Software
WCRE '08 Proceedings of the 2008 15th Working Conference on Reverse Engineering
Comparison and evaluation of code clone detection techniques and tools: A qualitative approach
Science of Computer Programming
CSMR '09 Proceedings of the 2009 European Conference on Software Maintenance and Reengineering
CloneDetective - A workbench for clone detection research
ICSE '09 Proceedings of the 31st International Conference on Software Engineering
An empirical study on the maintenance of source code clones
Empirical Software Engineering
Clone region descriptors: Representing and tracking duplication in source code
ACM Transactions on Software Engineering and Methodology (TOSEM)
A hybrid approach (syntactic and textual) to clone detection
Proceedings of the 4th International Workshop on Software Clones
Proceedings of the Joint ERCIM Workshop on Software Evolution (EVOL) and International Workshop on Principles of Software Evolution (IWPSE)
Efficiently handling clone data: RCF and cyclone
Proceedings of the 5th International Workshop on Software Clones
Proceedings of the 33rd International Conference on Software Engineering
MeCC: memory comparison-based clone detector
Proceedings of the 33rd International Conference on Software Engineering
An Empirical Study of the Impacts of Clones in Software Maintenance
ICPC '11 Proceedings of the 2011 IEEE 19th International Conference on Program Comprehension
An empirical study on inconsistent changes to code clones at the release level
Science of Computer Programming
Search based software engineering: techniques, taxonomy, tutorial
Empirical Software Engineering and Verification
Comparative stability of cloned and non-cloned code: an empirical study
Proceedings of the 27th Annual ACM Symposium on Applied Computing
Empirical Software Engineering
CBCD: cloned buggy code detector
Proceedings of the 34th International Conference on Software Engineering
Clone Management for Evolving Software
IEEE Transactions on Software Engineering
Proceedings of the 2013 International Conference on Software Engineering
Improving trace accuracy through data-driven configuration and composition of tracing features
Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering
Improving trace accuracy through data-driven configuration and composition of tracing features
Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering
Empirical answers to fundamental software engineering problems (panel)
Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering
Hi-index | 0.00 |
Clone detection finds application in many software engineering activities such as comprehension and refactoring. However, the confounding configuration choice problem poses a widely-acknowledged threat to the validity of previous empirical analyses. We introduce desktop and parallelised cloud-deployed versions of a search based solution that finds suitable configurations for empirical studies. We evaluate our approach on 6 widely used clone detection tools applied to the Bellon suite of 8 subject systems. Our evaluation reports the results of 9.3 million total executions of a clone tool; the largest study yet reported. Our approach finds significantly better configurations (p