Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Look up keyword or section
Like this

Table Of Contents

1 Introduction
2 Reasons for Code Duplication
2.1 Development Strategy
2.1.1 Reuse Approach
2.1.2 Programming Approach
2.2 Maintenance Benefits
2.3 Overcoming Underlying Limitations
2.3.1 Language Limitations
2.3.2 Programmer’s Limitations
2.4 Cloning By Accident
3 Drawbacks of Code Duplication
4 Advantages and Applications of Detecting Code Clones
5 Harmfulness of Cloning: A justification
6 Clone Relation Terminologies
7 Clone Definitions in the Literature
7.1 Code Clone and Its Definitional Vagueness
7.2 Code Clone Types
7.2.1 Type I Clones
7.2.2 Type II Clones
7.3.2 Renamed Clones
7.3.3 Parameterized Clones
7.3.4 Near-Miss Clones
7.3.5 Gapped Clones
7.3.6 Structural Clones
7.3.7 Function Clones
7.3.8 Non-contiguous Clones
7.3.9 Reordered Clones
7.3.10 Intertwined Clones
7.3.11 Design Level Structural Clones
7.3.12 Ubiquitous clones
7.4 Evolving Clones
7.4.1 Volatile Clones
7.4.2 Long-lived Clones
7.5 Problematic Clones
7.5.1 Spurious Clones
7.5.2 Frequently false positive clones
8.1.2 Balazinska et al. Taxonomy
8.1.3 Bellon and Koschke Taxonomy
8.1.4 Davey et al. Taxonomy
8.1.5 Kontogiannis Taxonomy
8.2 Taxonomies Based on Location and Similarity of Clones
8.2.1 Kapser and Godfrey Taxonomy
8.2.2 Moden et al. Taxonomy
8.3 Taxonomies Based on Refactoring Opportunities
8.3.1 Balazinska et al. Taxonomy
8.3.2 Fanta and Rajlich’s Taxonomy
8.3.3 Golomingi’s Taxonomy
9 Clone Detection Process
10 Detection Techniques and Tools
10.1 Taxonomy of Detection Techniques
10.1.1 Text-based Techniques
10.1.2 Token-based Techniques
10.1.3 Tree-based Techniques
10.1.4 PDG-based Techniques
10.1.5 Metrics-based Techniques
10.1.6 Hybrid Approaches
10.2 Overall Taxonomy of the Detection Approaches
10.3 Overall Comparison of the Detection Approaches
10.4 Clone Detection Tools
10.5 Frequently Used Software Systems
11 Evaluation of Clone Detection Techniques
11.1 Higher Level Evaluation of the Detection Approaches
11.2 Higher Level Robustness of the Detection Approaches
11.3 Tool Evaluation Experiments from the Literature
12 Visualization of Clones
13 Removal, Avoidance and Management of Code Clones
13.1 Removal of Code Clones
13.2 Avoidance of Code Clones
13.3 Management of Code Clones
0 of .
Results for:
No results containing your search query
P. 1
Roy Technical Report Clone

Roy Technical Report Clone

Ratings: (0)|Views: 1|Likes:
Published by Chanchal Roy

More info:

Published by: Chanchal Roy on Nov 28, 2010
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 4 to 21 are not shown in this preview.
You're Reading a Free Preview
Pages 25 to 35 are not shown in this preview.
You're Reading a Free Preview
Pages 39 to 115 are not shown in this preview.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->