Metaphorical Analysis of Software Clone Detection Techniques based on Dimensions and Metrics
DOI:
https://doi.org/10.26438/ijcse/v6i12.151156Keywords:
Code Clone Detection, Clone Detection Techniques,, Comparative AnalysisAbstract
In spite of having limited benefits, software clones mostly have negative impact on software quality, more specifically on software maintenance and thus diminishing software quality and raising the maintenance cost. Not all the clones are possible to remove, but, if possible clones need to be removed from the software system. To remove clones, we need to first detect this duplication in the code base. Literature lists various clone detection techniques that are used to detect duplication in software system. To have a better clone detection technique in future or to select from the available clone detection technique, these available techniques found in literature need to be analyzed. This paper attempts to comparatively analyze the clone detection techniques available in literature and thus will present a future scope as well as the recourse based on the analysis for selection of any particular technique.
References
[1] Ira D. Baxter, Andrew Yahin, Leonardo Moura, Marcelo Sant` Anna, and Lorraine Bier, "Clone Detection Using Abstract Syntax Tree," in Proceedings of 14th International Conference on Software Maintenance(ICSM`98), Bethesda, Mayland, 1998, pp. 368 - 377.
[2] Stefan Bellon, Rainer Koschke, Giuliano Antoniol, Jens Krinke, and Ettore Merlo, "Comparision and Evaluation of Clone Detection Tools," IEEE Transaction on Software Engineering, vol. 33, no. 9, pp. 577 - 591, 2007.
[3] Chanchal K. Roy and James R. Cordy, "A Survey on Software Clone Detection Research," Queen`s University, Kingston, Technical Report 2007-541, 2007.
[4] Minhaz F. Zibran, Ripon K. Saha, Muhammad Asaduzzaman, and Chanchal K. Roy, "Analysing and Forecasting Near-miss Clones in Evolving Software: An Empirical Study," in Proceedings of the 16th IEEE International Conference on Engineering of Complex Computer Systems, Las Vegas, USA, 2011, pp. 295-304.
[5] Filip Van Rysselberghe and Serge Demeyer, "Evaluating Clone Detection Techniques from a Refactoring Perspective," in Proceedings of the 19th IEEE international conference on Automated Software Engineering (ASE`04), Linz, Austria, 2004, pp. 336-339.
[6] Chanchal K Roy and JamesR Cordy, "Scenario-Based Comparison of Clone Detection Techniques," in The 16th IEEE International Conference on Program Comprehension, 2008, pp. 153-162.
[7] Chanchal Kumar Roy, James Cordy, and Rainer Koschke, "Comparison and Evaluation of Code Clone Detection Techniques and Tools: A Quantitative Approach," Science of Computer Programming, vol. 74, no. 7, pp. 470 - 495, March 2009.
[8] Dhavleesh Rattan, Rajesh Bhatia, and Maninder Singh, "Software Clone Detection: A Systematic Review," Information and Software Technology, vol. 55, no. 7, pp. 1165-1199, July 2013.
[9] Abdullah Sheheamer and Jugal Kalita, "A Survey of Software Clone Detection Techniques," International Journal of Computer Applications, vol. 137, no. 10, pp. 1 - 21, March 2016.
[10] Brenda Baker, "On Finding Duplication and Near Duplication in Large Software Systems," in Proceedings of the 2nd Working Conference on Reverse Engineering (WCRE`95), 1995, pp. 86-95.
[11] Toshihiro Kamiya, Shinji Kusumoto, and Katsuro Inoue, "CCFinder: A Multilinguistic Token-Based Code Clone Detection System For Large Scale Source Code," IEEE Transactions on Software Engineering, vol. 28, no. 7, pp. 654-670, July 2002.
[12] Jens Krinke, "Identifying Similar Code with Program Dependence Graphs," in Proceedings of the Eighth Working Conference on Reverse Engineering (WCRE`01), Stuttgart, 2001, pp. 301-309.
[13] Jean Mayrand, Clande Leblane, and Ettore Merlo, "Experiment on the Automatic Detection of Function Clones in a Software Systems Using Metrics," in Proceedings of International Conference on Software Maintenance (IWSM`96), Monterey, 1996, pp. 244 -253.
[14] Benjamin Hummel, Elmar Juergens, Lars Heinemann, and Michael Conradt, "Index-Based Code Clone Detection: Incremental, Distributed, Scalable," in IEEE International Conference on Software Maintenance, Timisoara, Romania, 2010.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
