Filters








6,022 Hits in 3.5 sec

Tuning research tools for scalability and performance: The NiCad experience

James R. Cordy, Chanchal K. Roy
2014 Science of Computer Programming  
The NiCad near-miss clone detection method has been shown to yield highly accurate results in both precision and recall.  ...  The process has increased overall performance by a factor of up to 40 and clone detection speed by a factor of over 400, while reducing memory and processor requirements to fit on a standard laptop.  ...  Acknowledgements This work is supported in part by the Natural Sciences and Engineering Research Council of Canada (NSERC), and by an IBM Center for Advanced Studies faculty award.  ... 
doi:10.1016/j.scico.2011.11.002 fatcat:7qkouhrjafbtjjs4tjkxwx2j6a

SimCad: An extensible and faster clone detection tool for large scale software systems

Md. Sharif Uddin, Chanchal K. Roy, Kevin A. Schneider
2013 2013 21st International Conference on Program Comprehension (ICPC)  
Earlier research shows detection of near-miss clones in large datasets appears to be costly in terms of time and memory.  ...  It is based on a highly scalable and faster clone detection algorithm designed to detect both exact and near-miss clones in largescale software systems.  ...  result for near-miss clones.  ... 
doi:10.1109/icpc.2013.6613857 dblp:conf/iwpc/UddinRS13 fatcat:edezxhb4e5amxfzo2ptljwetgu

Light-weight ontology alignment using best-match clone detection

Paul L. Geesaman, James R. Cordy, Amal Zouaq
2013 2013 7th International Workshop on Software Clones (IWSC)  
Based on our previous work extending clone detection to modelling languages such as WSDL using contextualization, in this work we apply near-miss clone detection to the problem of ontology alignment, and  ...  The problem is in many ways similar to nearmiss clone detection: while much of the description of concepts in two ontologies may be similar, there can be differences in structure or vocabulary that make  ...  AN EXPERIMENT In order to test the efficacy of near-miss clone detection and our new best-match clone definition in practice, we designed an experiment to compare our results against an accepted benchmark  ... 
doi:10.1109/iwsc.2013.6613032 dblp:conf/iwsc/GeesamanCZ13 fatcat:wu5bt7qev5dlxijg4orxcfff5q

Near-miss clone patterns in web applications: An empirical study with industrial systems

Tariq Muhammad, Minhaz F. Zibran, Yosuke Yamamoto, Chanchal K. Roy
2013 2013 26th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)  
., forking and templating) of exact and near-miss code clones in two industrial dynamic web applications having distinct architecture.  ...  Dynamic web pages composed of inter-woven (tangled) source code written in multiple programming languages (e.g., HTML, PHP, JavaScript, CSS) makes it difficult to analyze and manage clones in web applications  ...  However, the NiCad clone detector used in our work is reported to be effective in detecting exact (Type-1) and near-miss (Type-2 and Type-3) clones with high precision and recall [15, 16] .  ... 
doi:10.1109/ccece.2013.6567821 dblp:conf/ccece/MuhammadZYR13 fatcat:th2ji7xe6vdffioyce6zzuxhm4

gCad: A Near-Miss Clone Genealogy Extractor to Support Clone Evolution Analysis

Ripon K. Saha, Chanchal K. Roy, Kevin A. Schneider
2013 2013 IEEE International Conference on Software Maintenance  
In this tool demonstration paper we describe the design and implementation of a near-miss clone genealogy extractor, gCad, that can extract and classify both exact and near-miss clone genealogies.  ...  granularities of clones, and adapts easily to popular clone detection tools.  ...  patterns of near-miss clones.  ... 
doi:10.1109/icsm.2013.79 dblp:conf/icsm/SahaRS13 fatcat:6sfidfhtrbacxfooskodrjofgq

Detection and analysis of near-miss software clones

Chanchal K. Roy
2009 2009 IEEE International Conference on Software Maintenance  
The study has demonstrated that NICAD is capable of accurately finding both exact and near-miss function clones even in large systems and different languages, and that there seem to be a large number of  ...  First, we develop a hybrid clone detection method, called NICAD, that can detect both exact and near-miss clones with high precision and recall and with reasonable performance.  ...  While they provide a threshold-based definition of tree similarity for near-miss clones, there is no specific definition of detection independent clone similarity.  ... 
doi:10.1109/icsm.2009.5306301 dblp:conf/icsm/Roy09 fatcat:l5ou6ot6jnb2ncogmwejmjzxhq

Near-miss function clones in open source software: an empirical study

C. K. Roy, J. R. Cordy
2009 Journal of Software Maintenance and Evolution Research and Practice  
In this paper, we present an in-depth study of near-miss function clones in open source software using NICAD.  ...  , including language, clone size, clone similarity, clone location and clone density both by proportion of cloned functions and lines of cloned code.  ...  This work is supported in part by the Natural Sciences and Engineering Research Council of Canada and by an IBM International Faculty Award.  ... 
doi:10.1002/smr.416 fatcat:ni2q2wxpszbdzcrbmdqga476te

Analyzing and Forecasting Near-Miss Clones in Evolving Software: An Empirical Study

Minhaz F. Zibran, Ripon K. Saha, Muhammad Asaduzzaman, Chanchal K. Roy
2011 2011 16th IEEE International Conference on Engineering of Complex Computer Systems  
Using a hybrid clone detector, NiCad, we detected both exact and near-miss clones at different levels of similarity.  ...  This paper presents a study on the evolution of near-miss clones at release level in medium to large open source software systems of different types (operating systems, database systems, editors, etc.)  ...  In Figure 1 , we present the density of exact and near-miss clones averaged over all systems categorized by programming languages.  ... 
doi:10.1109/iceccs.2011.36 dblp:conf/iceccs/ZibranSAR11 fatcat:2i7sseiz3rh3tbewkuabh4js64

Clone Detection Techniques for JavaScript and Language Independence: Review

Danyah Alfageh, Hosam Alhakami, Abdullah Baz, Eisa Alanazi, Tahani Alsubait
2020 International Journal of Advanced Computer Science and Applications  
Code clone detection is an active field of study in computer science. Despite its rich history, it lacks focus on web scripting languages.  ...  Also, we will summarize language independent research done and possibility of its application on JavaScript and web applications.  ...  Additionally, TXL allows for partial normalization of code which coupled with pretty printing allows NiCad to detect up to 100% of near-miss code clones.  ... 
doi:10.14569/ijacsa.2020.01104102 fatcat:soyrfg4qavfhxgda76ks5dkc2q

Scenario-Based Comparison of Clone Detection Techniques

C.K. Roy, J.R. Cordy
2008 2008 16th IEEE International Conference on Program Comprehension  
In this paper, we provide a comprehensive survey of the capabilities of currently available clone detection techniques.  ...  We then propose a set of hypothetical editing scenarios for different clone types, and evaluate the techniques based on their estimated potential to accurately detect clones that may be created by those  ...  This work is supported by the Natural Sciences and Engineering Research Council of Canada.  ... 
doi:10.1109/icpc.2008.42 dblp:conf/iwpc/RoyC08 fatcat:leyaqq5xc5asjp2arew2spwgu4

NICAD: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization

C.K. Roy, J.R. Cordy
2008 2008 16th IEEE International Conference on Program Comprehension  
Early experiments indicate that the method is capable of finding near-miss clones with high precision and recall, and with reasonable performance.  ...  Exploiting a novel application of a source transformation system, the method accurately finds near-miss clones using an efficient text line comparison technique.  ...  Dean for providing us with resources from their earlier work on clones. This work is supported by the Natural Sciences and Engineering Research Council of Canada.  ... 
doi:10.1109/icpc.2008.41 dblp:conf/iwpc/RoyC08a fatcat:eqqzrazscbg3dngfspbjuorpsy

XIAO

Yingnong Dang, Dongmei Zhang, Song Ge, Chengyun Chu, Yingjun Qiu, Tao Xie
2012 Proceedings of the 28th Annual Computer Security Applications Conference on - ACSAC '12  
Detecting code clones has been shown to be useful towards security such as detection of similar security bugs and, more generally, quality improvement such as refactoring of code clones.  ...  In this paper, we report our experiences of carrying out successful technology transfer of our new approach of code-clone detection, called XIAO.  ...  We also thank Simone Livieri for his help on evaluations of XIAO.  ... 
doi:10.1145/2420950.2421004 dblp:conf/acsac/DangZGCQX12 fatcat:pzdqwz5vybbfbn7vr3mothnqcm

Exploring Large-Scale System Similarity Using Incremental Clone Detection and Live Scatterplots

James R. Cordy
2011 2011 IEEE 19th International Conference on Program Comprehension  
Incremental clone detection is designed to efficiently find only those clones that cross between a previous version of a system and a new version in order to update a previous clone analysis.  ...  Using the NiCad incremental clone detector, we find function clones between two recent versions of Linux and FreeBSD, analyze the nature and causes of some of these similarities in detail, and compare  ...  ACKNOWLEDGEMENTS This work is supported by the Natural Sciences and Engineering Research Council of Canada (NSERC), and by an IBM Centre for Advanced Studies faculty award.  ... 
doi:10.1109/icpc.2011.25 dblp:conf/iwpc/Cordy11 fatcat:sflvym4pfrarvmulyk2li2wuf4

Comparison and evaluation of code clone detection techniques and tools: A qualitative approach

Chanchal K. Roy, James R. Cordy, Rainer Koschke
2009 Science of Computer Programming  
The primary contributions of this paper are: (1) a schema for classifying clone detection techniques and tools and a classification of current clone detectors based on this schema, and (2) a taxonomy of  ...  We begin with background concepts, a generic clone detection process and an overall taxonomy of current techniques and tools.  ...  This work is supported by the Natural Sciences and Engineering Research Council of Canada and by an IBM international faculty award.  ... 
doi:10.1016/j.scico.2009.02.007 fatcat:wsjwomcyn5ahri3sbcxegg3d5e

Are scripting languages really different?

Chanchal K. Roy, James R. Cordy
2010 Proceedings of the 4th International Workshop on Software Clones - IWSC '10  
In this paper we present a first experiment in measuring the cloning properties of open source software systems written in the Python scripting language using the NiCad clone detector.  ...  These languages are often spoken of as having different properties, in particular with respect to cloning, and the question arises whether the observations made based on traditional languages also apply  ...  Acknowledgements This work is supported in part by the Natural Sciences and Engineering Research Council of Canada (NSERC) and by IBM Canada through a CAS Faculty Award.  ... 
doi:10.1145/1808901.1808904 dblp:conf/iwsc/RoyC10 fatcat:hzl22lrb7zbivoawgtpqmiw55u
« Previous Showing results 1 — 15 out of 6,022 results