Filters








4,858 Hits in 18.5 sec

Comparison of similarity metrics for refactoring detection

Benjamin Biegel, Quinten David Soetens, Willi Hornig, Stephan Diehl, Serge Demeyer
2011 Proceeding of the 8th working conference on Mining software repositories - MSR '11  
intent of change, capturing and replaying changes, and relating refactorings and software metrics).  ...  Identifying refactorings in software archives has been an active research topic in the last decade, mainly because it is a prerequisite for various software evolution analyses (e.g., error detection, capturing  ...  Acknowledgments Peter Weißgerber helped us to understand his signaturebased refactoring detection library. He also provided all relevant data to perform the replication experiment.  ... 
doi:10.1145/1985441.1985452 dblp:conf/msr/BiegelSHDD11 fatcat:ua3gr4q3kjfxvdz5ehcul6g5he

Software Clone Detection and Refactoring

Francesca Arcelli Fontana, Marco Zanoni, Andrea Ranchetti, Davide Ranchetti
2013 ISRN Software Engineering  
In this paper, we describe our experience on clone detection through three different tools and investigate the impact of clone refactoring on different software quality metrics.  ...  Several studies have been proposed in the literature on software clones from different points of view and covering many correlated features and areas, which are particularly relevant to software maintenance  ...  For a comparison and evaluation of code clone detection techniques and tools, please refer to the work from Roy et al. [10] .  ... 
doi:10.1155/2013/129437 fatcat:ii7rne3xkfampeuddlexblcjee

AUTOMATIC DETECTING AND REMOVAL DUPLICATE CODES CLONES

Z. Al-Saffar, S. Sarhan, S. Elmougy
2016 International Journal of Intelligent Computing and Information Sciences  
Copying and pasting fragments of codes is a type of code clones that should be handled and has many practical applications such as software and project plagiarism detection clones and copyright infringements  ...  Code clones is considered now an important part of improving the overall design of software structure and software maintenance through making the source code more readable and more capable for maintenance  ...  [9] proposed hybrid technique based on metric-based technique and AST techniques for code clone detection depending on four steps: "code standardization, generation of comparison units, node mapping  ... 
doi:10.21608/ijicis.2016.19841 fatcat:mu4jddmrovguxal3j54hfxipoe

How to extract differences from similar programs? A cohesion metric approach

Akira Goto, Norihiro Yoshida, Masakazu Ioka, Eunjong Choi, Katsuro Inoue
2013 2013 7th International Workshop on Software Clones (IWSC)  
In this paper, we propose a slice-based cohesion metrics approach to suggesting the extractions of differences from similar Java methods.  ...  Merging similar programs is a promising solution to improve the maintainability of source code. Before merging programs, any syntactic difference has to be extracted as a new method.  ...  Detecting code fragments for Extract method refactoring We explain definitions of preconditions of the Extract method refactoring (Definition 3.2) and the Extract method candidates for merging similar  ... 
doi:10.1109/iwsc.2013.6613038 dblp:conf/iwsc/GotoYICI13 fatcat:t7w5i6b5y5cejbxmw5ljbixmv4

Identification of generalization refactoring opportunities

Hui Liu, Zhendong Niu, Zhiyi Ma, Weizhong Shao
2012 Automated Software Engineering : An International Journal  
However, to the best of our knowledge, no existing tools have been specifically designed for this task.  ...  For nontrivial software systems, manual identification of these opportunities is challenging and time-consuming.  ...  It analyzes detection results of CCFinder, and then calculates metrics to support refactoring activities. It also filters clone sets by these metrics.  ... 
doi:10.1007/s10515-012-0100-0 fatcat:mg7jq2lpqvcedizqq7umwroekm

Search-Based Refactoring Detection Using Software Metrics Variation [chapter]

Rim Mahouachi, Marouane Kessentini, Mel Ó Cinnéide
2013 Lecture Notes in Computer Science  
It generates as output a sequence of detected changes expressed as refactorings.  ...  Our approach takes as input a list of possible refactorings, a set of structural metrics and the initial and revised versions of the source code.  ...  Existing model comparison tools are capable of detecting atomic changes only.  ... 
doi:10.1007/978-3-642-39742-4_11 fatcat:b5qoxql3v5gytewhyxa2mqmgbe

Sequence diagram refactoring using single and hybridized algorithms

Abdulrahman Ahmed Bobakr Baqais, Mohammad Alshayeb, Quanquan Gu
2018 PLoS ONE  
There have been several studies on the use of these algorithms for refactoring. In this paper, we show how search based algorithms can be used for sequence diagram refactoring.  ...  In addition, the hybridized algorithm obtains good results using selected quality metrics.  ...  Acknowledgments The authors acknowledge the support of King Fahd University of Petroleum and Minerals in the development of this work.  ... 
doi:10.1371/journal.pone.0202629 pmid:30133518 fatcat:dmj2xatxvbdvngveve65h4cnoy

A Study on the Nature of Code Clone Occurrence Predominantly in Feature Oriented Programming and the Prospects of Refactoring

U. Devi, A. Sharma, N. Kesswani
2016 International Journal of Computer Applications  
Along with that, a brief summary of the type of code clones and the use of Refactoring methodologies and tools which is effectively known to remove the problem of code clones is also discussed.  ...  The main observation that is made in this paper is the various type of code clones which are present in FOP.  ...  to find clones. d) Semantic Approach : It uses static program approaches than simply using syntactic similarity for finding clones. e) Metric Based Approach : It collects a number of metrics for code  ... 
doi:10.5120/ijca2016909724 fatcat:pdf2xyimvjgqtb646pni236qtu

AntiCopyPaster: Extracting Code Duplicates As Soon As They Are Introduced in the IDE [article]

Eman Abdullah AlOmar, Anton Ivanov, Zarina Kurbatova, Yaroslav Golubev, Mohamed Wiem Mkaouer, Ali Ouni, Timofey Bryksin, Le Nguyen, Amit Kini, Aditya Thakur
2022 arXiv   pre-print
We developed a plugin for IntelliJ IDEA called AntiCopyPaster, which tracks the pasting of code fragments inside the IDE and suggests the appropriate Extract Method refactoring to combat the propagation  ...  inferences the refactoring decision based on a number of features.  ...  Refactoring Detection. To extract the entire refactoring history of each project, we used RefactoringMiner v2.0, 4 a widely-used refactoring detection tool introduced by Tsantalis et al. [21] .  ... 
arXiv:2112.15230v2 fatcat:wrdt5cnivbaejgh5sj5esb2tta

An Automatic Advisor for Refactoring Software Clones Based on Machine Learning

Abdullah M. Sheneamer
2020 IEEE Access  
Our approach differs from others, which specifies types of refactored clones as classes and creates a model for detecting the types of refactored clones and the clones which are anonymous.  ...  to refactor and what type of refactoring is needed.  ...  FIGURE 11 . 11 Performance comparison of different refactoring methods with respect to different assessment metrics on six publicly available datasets.  ... 
doi:10.1109/access.2020.3006178 fatcat:57pdtqnsljelfaqv5iupawpqnu

A New Design Defects Classification: Marrying Detection and Correction [chapter]

Rim Mahouachi, Marouane Kessentini, Khaled Ghedira
2012 Lecture Notes in Computer Science  
To this end, we use genetic programming to generate new form of classification rules combining detection and correction steps.  ...  .), and treat separately detection and correction steps. This paper introduces a new classification of defects using correction possibilities.  ...  This similarity score represents the number of common detected classes between a defect type i and our defect category j. In Table 3 we take the most similar category for each defect type.  ... 
doi:10.1007/978-3-642-28872-2_31 fatcat:kchcew3hybgmvdrykraevkjjny

Improving multi-objective code-smells correction using development history

Ali Ouni, Marouane Kessentini, Houari Sahraoui, Katsuro Inoue, Mohamed Salah Hamdi
2015 Journal of Systems and Software  
In this paper, we use the development history collected from existing software projects to propose new refactoring solutions taking into account context similarity with situations seen in the past.  ...  One of the widely used techniques to improve the quality of software systems is refactoring. Software refactoring improves the internal structure of the system while preserving its external behavior.  ...  Acknowledgements This work is partially supported by Japan Society for the Promotion of Science, Grant-in-Aid for Scientific Research (S) (No. 25220003), and also by Osaka University Program for Promoting  ... 
doi:10.1016/j.jss.2015.03.040 fatcat:itujkbxyb5dmdop7efnxt7bove

Search-based refactoring: Towards semantics preservation

Ali Ouni, Marouane Kessentini, Houari Sahraoui, Mohamed Salah Hamdi
2012 2012 28th IEEE International Conference on Software Maintenance (ICSM)  
We calculated the structural similarity based on a set of metrics.  ...  Most of existing refactoring tools offer a semi-automatic support 8 because part of the necessary knowledge for performing the refactoring remains implicit in designers' expertise and programming behavior  ...  It is equal to the ratio of the "Number of correct refactorings detected" to the "Total number of refactorings detected". A recall is given by Equation 6 .  ... 
doi:10.1109/icsm.2012.6405292 dblp:conf/icsm/OuniKSH12 fatcat:mddhj77slfbu3gwisghaofs7ae

A Survey of Software Clone Detection Techniques

Abdullah Sheneamer, Jugal Kalita
2016 International Journal of Computer Applications  
In this study, code clones, common types of clones, phases of clone detection, the state-ofthe-art in code clone detection techniques and tools, and challenges faced by clone detection techniques are discussed  ...  Removal, avoidance or refactoring of cloned code are other important issues in software maintenance.  ...  Pairs of similar methods are also detected by comparison of the metric values, which are stored in the same database. Mayrand et al.  ... 
doi:10.5120/ijca2016908896 fatcat:ogat75cqv5hzvofrctwxws53ki

Function Clone Detection in Web Applications: A Semiautomated Approach

Fabio Calefato, Filippo Lanubile, Teresa Mallardo
2004 Journal of Web Engineering  
This ad-hoc but pathological form of reuse consists in copying, and eventually modifying, a block of existing code that implements a piece of required functionality.  ...  The approach is based on the automatic selection of potential function clones and the visual inspection of selected script functions.  ...  Acknowledgements We would like to thank Vincenzo Fiorentino and Biagio Taccogna for having helped to implement a preliminary version of the eMetrics tool.  ... 
dblp:journals/jwe/CalefatoLM04 fatcat:ypvvj6svq5f6jdcuf4s6pqqhii
« Previous Showing results 1 — 15 out of 4,858 results