Research Article | Open Access | Download PDF
Volume 6 | Issue 1 | Year 2016 | Article Id. IJPTT-V23P403 | DOI : https://doi.org/10.14445/22492615/IJPTT-V23P403Analysis of a Hybrid Clone Detection Technique
Dr.G.Anil Kumar
Citation :
Dr.G.Anil Kumar, "Analysis of a Hybrid Clone Detection Technique," International Journal of Computer Trends and Technology (IJCTT), vol. 6, no. 1, pp. 31-46, 2016. Crossref, https://doi.org/10.14445/22492615/IJPTT-V23P403
Abstract
Any software code clone detection technique should prove itself efficient in terms of some quality parameters. In this paper we discuss about two quality parameters, that is precision and recall. This method proved efficient in terms of these two parameters over the suffix tree method.
Keywords
This method proved efficient in terms of these two parameters over the suffix tree method.
References
[1] M. Fowlor. Refactoring: improving the design of existing code. Addison Wesley, 1999.
[2] R. H. Page. http://www.refactoring.com/.
[3] MagielBruntink, Arie van Deursen,Remco van Engelen, and Tom Tourwe, "On the Use of Clone Detection for Identifying Crosscutting Concern Code", Ieee Transactions On Software Engineering, Vol. 31, No. 10,pp. 804-818, October 2005
[4] Abouelhoda M.I., Kurtz S. and Ohlebusch E, "The enhanced suffix array and its applications to genome analysis", In Proc. Workshop on Algorithms in Bioinformatics, vol. 2452,pp. 449– 463, Berlin, 2002
[5] Hamid Abdul Basit and Stan Jarzabek, "Detecting Higher-level Similarity Patterns in Programs", European Software Engineering Conference and ACM SIGSOFT Symposium on the Foundations of Software Engineering, pp 1-10 Lisbon, Sept. 2005
[6] Lingxiao Jiang, Zhendong Su and Edwin Chiu, “Context-based detection of clone-related bugs”, Proceedings of the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering, pp. 55 – 64, New York, USA, 2007.
[7] Chanchal Kumar Roy and James R Cordy, “A Survey on Software Clone Detection Research”, Computer and Information Science, Vol. 115, No. 541, pp. 115, 2007
[8] J Howard Johnson. Identifying Redundancy in Source Code Using Fingerprints. In Proceeding of the 1993 Conference of the Centre for Advanced Studies Conference (CASCON`93), pp. 171- 183, Toronto, Canada, October 1993.
[9] Zhenmin Li, Shan Lu, SuvdaMyagmar, and Yuanyuan Zhou. CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code. In IEEE Transactions on Software Engineering, Vol. 32(3): 176-192, March 2006.