Metaphorical Analysis of Software Clone Detection Techniques based on Dimensions and Metrics

2018 ◽  
Vol 6 (12) ◽  
pp. 151-156
Author(s):  
Sarveshwar Bharti ◽  
Hardeep Singh
2016 ◽  
Vol 18 (04) ◽  
pp. 15-19
Author(s):  
Sunayna Sunayna ◽  
Kamna Solanki ◽  
Sandeep Dalal ◽  
Sudhir Sudhir

2016 ◽  
Vol 137 (10) ◽  
pp. 1-21 ◽  
Author(s):  
Abdullah Sheneamer ◽  
Jugal Kalita

2019 ◽  
Vol 13 (1) ◽  
pp. 30-45
Author(s):  
Pratiksha Gautam ◽  
Hemraj Saini

Over the past few years, several software clone detection tools and techniques have been introduced by numerous researchers. The software clone detection techniques and tools are based on their numerous attributes and sub-attributes which make them difficult to complete a comparative study. Therefore, the authors propose a mutation operator-based editing taxonomy for generating different software clone types. In addition, a hypothetical scenario is developed using mutation operator-based editing taxonomy and this hypothetical scenario is used to evaluate various software clone detection techniques and tools. Further, the existing evaluation criterion is extended by the hypothetical scenario which is clearly represented by the analysis of results.


2021 ◽  
Vol 9 (1) ◽  
pp. 20-36
Author(s):  
Mostefai Abdelkader

Software clone detection is a widely researched area over the last two decades. Code clones are fragments of code judged similar by some metric of similarity. This paper proposes an approach for code clone detection using dynamic time warping technique (i.e., DTW). DTW is a well-known algorithm for aligning and measuring similarity of time series and it has been found effective in many domains where similarity plays an important role such as speech and gesture recognition. The proposed approach finds clones in three steps. First software modules are extracted. Then, the extracted modules are turned to time series. Finally, the time series are compared using the DTW algorithm to find clones. The results of the experiment conducted on a well-known Benchmark show that the approach can detect clones effectively in software systems.


Sign in / Sign up

Export Citation Format

Share Document