Filters








1,719 Hits in 4.4 sec

FaCoY

Kisub Kim, Dongsun Kim, Tegawendé F. Bissyandé, Eunjong Choi, Li Li, Jacques Klein, Yves Le Traon
2018 Proceedings of the 40th International Conference on Software Engineering - ICSE '18  
For example, research directions in code transplantation, code diversity, patch recommendation can leverage a code-to-code search engine to find essential ingredients for their techniques.  ...  With various experiments, we show that (1) FaCoY is more effective than online code-to-code search engines; (2) FaCoY can detect more semantic code clones (i.e., Type-4) in BigCloneBench than the state-of-theart  ...  ACKNOWLEDGEMENTS We extend our thanks to Seungdeok Han, Minsuk Kim, Jaekwon Lee, and Woosung Jung from Chungbuk National University for their insightful comments on earlier versions of this manuscript.  ... 
doi:10.1145/3180155.3180187 dblp:conf/icse/KimKBC0KT18 fatcat:4lxb4k5hkvaz7c4ydo2mpbse3i

Opportunities and Challenges in Code Search Tools [article]

Chao Liu and Xin Xia and David Lo and Cuiyun Gao and Xiaohu Yang and John Grundy
2020 arXiv   pre-print
In recent years, many code search studies have leveraged different techniques, such as deep learning and information retrieval approaches, to retrieve expected code from a large-scale codebase.  ...  Based on our findings, we identified a set of outstanding challenges in existing studies and a research roadmap for future code search research.  ...  For example, GitHub search 1 is one type of tool widely used for searching for source code snippets from a large-scale codebase with millions of open source repositories.  ... 
arXiv:2011.02297v1 fatcat:pklxhrm4g5buror5abukwlb5h4

COMPASS: A Community-driven Parallelization Advisor for Sequential Software

Simha Sethumadhavan, Nipun Arora, Ravindra Babu Ganapathi, John Demme, Gail E. Kaiser
2009 2009 ICSE Workshop on Multicore Software Engineering  
By leveraging the "wisdom of crowds" model [28] , which has been conjectured to scale exponentially and which has successfully worked for wikis, COMPASS aims to enable rapid propagation of knowledge about  ...  for parallelism.  ...  detecting code clones. § Related Work Analysis Textual [2] , Abstract Syntax Tree (AST) [3, 14] and token-based [17] representation methods for detecting code clones have been proposed.  ... 
doi:10.1109/iwmse.2009.5071382 fatcat:5kw5etpdcfdphcjnfyvg2ztdfq

SeByte: Scalable clone and similarity search for bytecode

Iman Keivanloo, Chanchal K. Roy, Juergen Rilling
2014 Science of Computer Programming  
While source code clone detection is a well-established research area, finding similar code fragments in binary and other intermediate code representations has been not yet that widely studied.  ...  In this paper, we introduce SeByte, a bytecode clone detection and search model that applies semantic-enabled token matching. It is developed based on the idea of relaxation on the code fingerprints.  ...  Acknowledgment The authors would like to thank the anonymous reviewers and editors for their valuable comments that helped improve the original manuscript.  ... 
doi:10.1016/j.scico.2013.10.006 fatcat:y5wincfsxnbyrkey44jnzl2nti

Integrating code search into the development session

Mu-Woong Lee, Seung-won Hwang, Sunghun Kim
2011 2011 IEEE 27th International Conference on Data Engineering  
Meanwhile, existing tools, searching for syntactic clones, do not focus on efficiency, focusing on "post-mortem" usage scenario of detecting clones "after" the code development is completed.  ...  In clear contrast, we focus on optimizing efficiency for syntactic code search and making this search "interactive" for large-scale corpus, to complement the existing two lines of research.  ...  These techniques has enabled us to build a tool that can return the clones in sub-second, for a large-scale code corpus archiving 492 open source projects (54 million LOC, 1.7 million code pieces), achieving  ... 
doi:10.1109/icde.2011.5767948 dblp:conf/icde/LeeHK11 fatcat:hq43sqxy3bck5iwdnvbyq4jlg4

Mega Software Engineering [chapter]

Katsuro Inoue, Pankaj K. Garg, Hajimu Iida, Kenichi Matsumoto, Koji Torii
2005 Lecture Notes in Computer Science  
We describe a framework for enabling Mega Software Engineering.  ...  We call such an approach for software engineering Mega Software Engineering.  ...  We described a framework that allows for pluggable technologies for mega software engineering.  ... 
doi:10.1007/11497455_32 fatcat:uejwxigntfckpdnf66qmqlxn5u

A measurement study of google play

Nicolas Viennot, Edward Garcia, Jason Nieh
2014 The 2014 ACM international conference on Measurement and modeling of computer systems - SIGMETRICS '14  
PlayDrone leverages various hacking techniques to circumvent Google's roadblocks for indexing Google Play store content, and makes proprietary application sources available, including source code for over  ...  demonstrate the usefulness of PlayDrone in decompiling and analyzing application content by exploring four previously unaddressed issues: the characterization of Google Play application content at large scale  ...  SIMILAR APPLICATIONS Leveraging PlayDrone, we introduce a simple approach to identify similar applications in Google Play for the purposes of detecting duplicative content and application clones.  ... 
doi:10.1145/2591971.2592003 dblp:conf/sigmetrics/ViennotGN14 fatcat:u3fql3p6ubbexnxske7g3p3oku

A measurement study of google play

Nicolas Viennot, Edward Garcia, Jason Nieh
2014 Performance Evaluation Review  
PlayDrone leverages various hacking techniques to circumvent Google's roadblocks for indexing Google Play store content, and makes proprietary application sources available, including source code for over  ...  demonstrate the usefulness of PlayDrone in decompiling and analyzing application content by exploring four previously unaddressed issues: the characterization of Google Play application content at large scale  ...  SIMILAR APPLICATIONS Leveraging PlayDrone, we introduce a simple approach to identify similar applications in Google Play for the purposes of detecting duplicative content and application clones.  ... 
doi:10.1145/2637364.2592003 fatcat:cmsd6ioo2zfpfpvwe6hpf45wbm

A Survey of Software Clone Detection from Security Perspective

Haibo Zhang, Kouichi Sakurai
2021 IEEE Access  
Yujie Gu and all the reviewers for their helpful advice on this manuscript. We thank Dr.  ...  Maxine Garcia from Edanz Group (https://en-author-services.edanz.com/ac) for editing a draft of this manuscript.  ...  ScalClone: applying 1) Support large-scale Type-1 Identifying code clones of a two assemble code assemble code search.  ... 
doi:10.1109/access.2021.3065872 fatcat:fh6ysdrcqvawpay6s767i3na2u

Sourcerer: mining and searching internet-scale software repositories

Erik Linstead, Sushil Bajracharya, Trung Ngo, Paul Rigor, Cristina Lopes, Pierre Baldi
2008 Data mining and knowledge discovery  
Here we first develop Sourcerer, an infrastructure for the automated crawling, parsing, fingerprinting, and database storage of open source software on an Internet-scale.  ...  Large repositories of source code available over the Internet, or within large organizations, create new challenges and opportunities for data mining and statistical machine learning.  ...  We thank Ian Harris and Padhraic Smyth (UCI) for useful discussions.  ... 
doi:10.1007/s10618-008-0118-x fatcat:a35reqvchraejas2oyiit447eu

Detection of Malware of Code Clone using String Pattern Back Propagation Neural Network Algorithm

Simarleen Kaur, Arvinder Kaur
2016 Indian Journal of Science and Technology  
This paper emphasizes on enhancement of performance parameters for malware detection of source code clones using proposed clone detection algorithm.  ...  code clones as compared to existing research malware binaries for achieving better performance.  ...  Code Clone in Software Code clones or simply clones are usually referred terms for sequences of duplicate code, and the process of automation for determining the redundancy or duplication in source code  ... 
doi:10.17485/ijst/2016/v9i33/95880 fatcat:3v2lkyyh5vfonniyzpdak43bti

Retrieve and Refine: Exemplar-based Neural Comment Generation [article]

Bolin Wei, Yongmin Li, Ge Li, Xin Xia, Zhi Jin
2020 arXiv   pre-print
Code comment generation which aims to automatically generate natural language descriptions for source code, is a crucial task in the field of automatic software development.  ...  Traditional comment generation methods use manually-crafted templates or information retrieval (IR) techniques to generate summaries for source code.  ...  Based on the idea that software reuse is common [20, 21] , other researchers leveraged code clone detection techniques to detect similar code snippets and used their corresponding comments for comment  ... 
arXiv:2010.04459v1 fatcat:qbon7xhmozevdjq7vrvhgjxhue

Toxic Code Snippets on Stack Overflow

Chaiyong Ragkhitwetsagul, Jens Krinke, Matheus Paixao, Giuseppe Bianco, Rocco Oliveto
2019 IEEE Transactions on Software Engineering  
We present a study of online code clones on Stack Overflow and their toxicity by incorporating two developer surveys and a large-scale code clone detection.  ...  Our clone detection found online clone pairs between 72,365 Java code snippets on Stack Overflow and 111 open source projects in the curated Qualitas corpus.  ...  Cristina Lopes and Di Yang from University of California, Irvine for their help in running SourcererCC clone detector and implementing a custom tokeniser for Stack Overflow snippets.  ... 
doi:10.1109/tse.2019.2900307 fatcat:wjnlucsfwvevpazvghafosiy6m

Robust App Clone Detection Based on Similarity of UI Structure

Yangyu Hu, Guosheng Xu, Bowen Zhang, Kun Lai, Guoai Xu, Miao Zhang
2020 IEEE Access  
App clone detection has received extensive attentions from our research community, and a number of approaches were proposed, which mainly rely on code or visual similarity of the apps.  ...  In this paper, we propose a robust app clone detection method based on the similarity of UI structure.  ...  SOFTWARE PLAGIARISM DETECTION Hyun-il et al. [67] leveraged stack pattern based birthmarks which requires the source code.  ... 
doi:10.1109/access.2020.2988400 fatcat:mio6koia2jcfzmn4jbxqppwthe

A novel approach based on formal methods for clone detection

Antonio Cuomo, Antonella Santone, Umberto Villano
2012 2012 6th International Workshop on Software Clones (IWSC)  
This paper presents an approach based on formal methods for detecting code clones.  ...  A prototype tool targeted at the detection of Type 2 clones is presented.  ...  ACKNOWLEDGEMENTS The Authors thank Domenico Martino for helping in the experimentation and the anonymous reviewers for their valuable comments and suggestions.  ... 
doi:10.1109/iwsc.2012.6227879 dblp:conf/iwsc/CuomoSV12 fatcat:yyectcsbt5g2nakj46zller2bm
« Previous Showing results 1 — 15 out of 1,719 results