Open Access   Article Go Back

Metaphorical Analysis of Software Clone Detection Techniques based on Dimensions and Metrics

Sarveshwar Bharti1 , Hardeep Singh2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-12 , Page no. 151-156, Dec-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i12.151156

Online published on Dec 31, 2018

Copyright © Sarveshwar Bharti, Hardeep Singh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Sarveshwar Bharti, Hardeep Singh, “Metaphorical Analysis of Software Clone Detection Techniques based on Dimensions and Metrics,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.151-156, 2018.

MLA Style Citation: Sarveshwar Bharti, Hardeep Singh "Metaphorical Analysis of Software Clone Detection Techniques based on Dimensions and Metrics." International Journal of Computer Sciences and Engineering 6.12 (2018): 151-156.

APA Style Citation: Sarveshwar Bharti, Hardeep Singh, (2018). Metaphorical Analysis of Software Clone Detection Techniques based on Dimensions and Metrics. International Journal of Computer Sciences and Engineering, 6(12), 151-156.

BibTex Style Citation:
@article{Bharti_2018,
author = {Sarveshwar Bharti, Hardeep Singh},
title = {Metaphorical Analysis of Software Clone Detection Techniques based on Dimensions and Metrics},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2018},
volume = {6},
Issue = {12},
month = {12},
year = {2018},
issn = {2347-2693},
pages = {151-156},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3308},
doi = {https://doi.org/10.26438/ijcse/v6i12.151156}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i12.151156}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3308
TI - Metaphorical Analysis of Software Clone Detection Techniques based on Dimensions and Metrics
T2 - International Journal of Computer Sciences and Engineering
AU - Sarveshwar Bharti, Hardeep Singh
PY - 2018
DA - 2018/12/31
PB - IJCSE, Indore, INDIA
SP - 151-156
IS - 12
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
523 402 downloads 242 downloads
  
  
           

Abstract

In spite of having limited benefits, software clones mostly have negative impact on software quality, more specifically on software maintenance and thus diminishing software quality and raising the maintenance cost. Not all the clones are possible to remove, but, if possible clones need to be removed from the software system. To remove clones, we need to first detect this duplication in the code base. Literature lists various clone detection techniques that are used to detect duplication in software system. To have a better clone detection technique in future or to select from the available clone detection technique, these available techniques found in literature need to be analyzed. This paper attempts to comparatively analyze the clone detection techniques available in literature and thus will present a future scope as well as the recourse based on the analysis for selection of any particular technique.

Key-Words / Index Term

Code Clone Detection, Clone Detection Techniques, Comparative Analysis

References

[1] Ira D. Baxter, Andrew Yahin, Leonardo Moura, Marcelo Sant` Anna, and Lorraine Bier, "Clone Detection Using Abstract Syntax Tree," in Proceedings of 14th International Conference on Software Maintenance(ICSM`98), Bethesda, Mayland, 1998, pp. 368 - 377.
[2] Stefan Bellon, Rainer Koschke, Giuliano Antoniol, Jens Krinke, and Ettore Merlo, "Comparision and Evaluation of Clone Detection Tools," IEEE Transaction on Software Engineering, vol. 33, no. 9, pp. 577 - 591, 2007.
[3] Chanchal K. Roy and James R. Cordy, "A Survey on Software Clone Detection Research," Queen`s University, Kingston, Technical Report 2007-541, 2007.
[4] Minhaz F. Zibran, Ripon K. Saha, Muhammad Asaduzzaman, and Chanchal K. Roy, "Analysing and Forecasting Near-miss Clones in Evolving Software: An Empirical Study," in Proceedings of the 16th IEEE International Conference on Engineering of Complex Computer Systems, Las Vegas, USA, 2011, pp. 295-304.
[5] Filip Van Rysselberghe and Serge Demeyer, "Evaluating Clone Detection Techniques from a Refactoring Perspective," in Proceedings of the 19th IEEE international conference on Automated Software Engineering (ASE`04), Linz, Austria, 2004, pp. 336-339.
[6] Chanchal K Roy and JamesR Cordy, "Scenario-Based Comparison of Clone Detection Techniques," in The 16th IEEE International Conference on Program Comprehension, 2008, pp. 153-162.
[7] Chanchal Kumar Roy, James Cordy, and Rainer Koschke, "Comparison and Evaluation of Code Clone Detection Techniques and Tools: A Quantitative Approach," Science of Computer Programming, vol. 74, no. 7, pp. 470 - 495, March 2009.
[8] Dhavleesh Rattan, Rajesh Bhatia, and Maninder Singh, "Software Clone Detection: A Systematic Review," Information and Software Technology, vol. 55, no. 7, pp. 1165-1199, July 2013.
[9] Abdullah Sheheamer and Jugal Kalita, "A Survey of Software Clone Detection Techniques," International Journal of Computer Applications, vol. 137, no. 10, pp. 1 - 21, March 2016.
[10] Brenda Baker, "On Finding Duplication and Near Duplication in Large Software Systems," in Proceedings of the 2nd Working Conference on Reverse Engineering (WCRE`95), 1995, pp. 86-95.
[11] Toshihiro Kamiya, Shinji Kusumoto, and Katsuro Inoue, "CCFinder: A Multilinguistic Token-Based Code Clone Detection System For Large Scale Source Code," IEEE Transactions on Software Engineering, vol. 28, no. 7, pp. 654-670, July 2002.
[12] Jens Krinke, "Identifying Similar Code with Program Dependence Graphs," in Proceedings of the Eighth Working Conference on Reverse Engineering (WCRE`01), Stuttgart, 2001, pp. 301-309.
[13] Jean Mayrand, Clande Leblane, and Ettore Merlo, "Experiment on the Automatic Detection of Function Clones in a Software Systems Using Metrics," in Proceedings of International Conference on Software Maintenance (IWSM`96), Monterey, 1996, pp. 244 -253.
[14] Benjamin Hummel, Elmar Juergens, Lars Heinemann, and Michael Conradt, "Index-Based Code Clone Detection: Incremental, Distributed, Scalable," in IEEE International Conference on Software Maintenance, Timisoara, Romania, 2010.