scholarly journals Leveraging Compiler Optimization for Code Clone Detection

2021 ◽  
Author(s):  
Shirish Singh
2020 ◽  
Vol 9 (6) ◽  
pp. 3925-3931
Author(s):  
S. Sharma ◽  
D. Rattan ◽  
K. Singh

2020 ◽  
Vol 19 (4) ◽  
pp. 28-39 ◽  
Author(s):  
Andrew Walker ◽  
Tomas Cerny ◽  
Eungee Song

2018 ◽  
Vol 7 (2.27) ◽  
pp. 144
Author(s):  
Gundeep Kaur ◽  
Sumit Sharma

Object-oriented programming today, is the main prototype in typical software development. Code Cloning defines generally, all through the designing and development of software systems. Detection can be based on Textual analysis, Lexical analysis, Syntax analysis, Semantic analysis, Hybrid analysis and Metric analysis. The major drawback of the present research is that it focuses more on fragments of copied code and does not focus on the aspect that the fragments of duplicated code are may be part of a larger replicated program structure. In this process, techniques take a lot of time and it creates complexity. In our research, a source code is then scanned for detecting various methods by adopting a “OPTIMIZED SVM ALGORITHM” and the method definitions are extracted and collected by means of a CLONE CODE and saved for further reference. To evaluate the performance parameters we calculate the LOC, the number of repetitions, and maximum and minimum LOC. To enhance the performance metrics precision recall, accuracy and reduce the error rate and time complexity  


2021 ◽  
Vol 40 (3) ◽  
pp. 690-728
Author(s):  
Chaman Wijesiriwardana ◽  
Prasad Wimalaratne
Keyword(s):  

2014 ◽  
Vol 3 (2) ◽  
pp. 143-152 ◽  
Author(s):  
Naresh Babu Bynagari

This article seeks to foray into the nitty-gritty of integrated reasoning for code clone detection and how it is effectively carried out, given the amount of analytics usually associated with such activities. Detection of codes requires high-pitch familiarity with cloning systems and their workings. Hence, discovering similar code segments that are often regarded and seen as code imitations (clone) is not an easy responsibility. More especially, this very detection process might possess key purposes in the context of susceptibility findings, refactoring, and imitation detecting. Through the voyage of discovery this article intends to expose you to, you will realize that identical code segments, more often than not described as code clones, appear to be a serious duty, especially for large code bases <1; 2; 3; 4>. There are certain approaches and deep technicalities that this sort of detection is known for. Still, from the avalanche of resources that formed the bedrock of this article, one would discover the easiest formula to adopt in maneuvering such strenuous issues.


Sign in / Sign up

Export Citation Format

Share Document