Analysis of a Hybrid Clone Detection Technique

  IJPTT-book-cover
 
International Journal of P2P Network Trends and Technology (IJPTT)          
 
© 2016 by IJPTT Journal
Volume - 6 Issue - 1
Year of Publication : 2016
Authors : Dr.G.Anil Kumar

Citation

Dr.G.Anil Kumar "Analysis of a Hybrid Clone Detection Technique". International Journal of P2P Network Trends and Technology (IJPTT), V6(1):31-46 Jan - Feb 2016, ISSN:2249-2615, www.ijpttjournal.org, Published by Seventh Sense Research Group.

Abstract

Any software code clone detection technique should prove itself efficient in terms of some quality parameters. In this paper we discuss about two quality parameters, that is precision and recall. This method proved efficient in terms of these two parameters over the suffix tree method.

References

[1] M. Fowlor. Refactoring: improving the design of existing code. Addison Wesley, 1999.
[2] R. H. Page. http://www.refactoring.com/.
[3] MagielBruntink, Arie van Deursen,Remco van Engelen, and Tom Tourwe, "On the Use of Clone Detection for Identifying Crosscutting Concern Code", Ieee Transactions On Software Engineering, Vol. 31, No. 10,pp. 804-818, October 2005
[4] Abouelhoda M.I., Kurtz S. and Ohlebusch E, "The enhanced suffix array and its applications to genome analysis", In Proc. Workshop on Algorithms in Bioinformatics, vol. 2452,pp. 449– 463, Berlin, 2002
[5] Hamid Abdul Basit and Stan Jarzabek, "Detecting Higher-level Similarity Patterns in Programs", European Software Engineering Conference and ACM SIGSOFT Symposium on the Foundations of Software Engineering, pp 1-10 Lisbon, Sept. 2005
[6] Lingxiao Jiang, Zhendong Su and Edwin Chiu, “Context-based detection of clone-related bugs”, Proceedings of the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering, pp. 55 – 64, New York, USA, 2007.
[7] Chanchal Kumar Roy and James R Cordy, “A Survey on Software Clone Detection Research”, Computer and Information Science, Vol. 115, No. 541, pp. 115, 2007
[8] J Howard Johnson. Identifying Redundancy in Source Code Using Fingerprints. In Proceeding of the 1993 Conference of the Centre for Advanced Studies Conference (CASCON`93), pp. 171- 183, Toronto, Canada, October 1993.
[9] Zhenmin Li, Shan Lu, SuvdaMyagmar, and Yuanyuan Zhou. CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code. In IEEE Transactions on Software Engineering, Vol. 32(3): 176-192, March 2006.

Keywords
This method proved efficient in terms of these two parameters over the suffix tree method.