Academia.eduAcademia.edu

Clone Detection

582 papers
80 followers
AI Powered
Clone detection is the process of identifying duplicate code segments within software systems. It involves analyzing source code to find similar or identical structures, which can indicate code reuse, potential bugs, or maintenance challenges. This technique is essential for improving software quality and reducing redundancy in programming.
Over the last decade many techniques and tools for software clone detection have been proposed. In this paper, we provide a qualitative comparison and evaluation of the current state-of-the-art in clone detection techniques and tools, and... more
Although Streptococcus mutans has been implicated as a major etiological agent of dental caries, our cross-sectional preliminary study indicated that 10% of subjects with rampant caries in permanent teeth do not have detectable levels of... more
Lymphomas express a tumor-specific antigen which can be targeted by cancer vaccination. We evaluated the ability of a new idiotype protein vaccine formulation to eradicate residual t(14;18)+ lymphoma cells in 20 patients in a homogeneous,... more
Molecular approaches aimed at detection of a broadrange of prokaryotes in the environment routinely rely on classifying heterogeneous 16S rRNA genes amplified by polymerase chain reaction (PCR) using primers with broad specificity. The... more
Our understanding of the degradation of organic matter will benefit from a greater appreciation for the genes encoding enzymes involved in the hydrolysis of biopolymers such as chitin, one of the most abundant polymers in nature. To... more
Finding, understanding and managing software clones -passages of duplicated source code -is of large interest in research and practice. There is an abundance of techniques to detect clones. However, all these techniques are limited to a... more
In recent years many methods and tools for software clone detection have been proposed. While some work has been done on assessing and comparing performance of these tools, very little empirical evaluation has been done. In particular,... more
Although numerous different clone detection approaches have been proposed to date, not a single one is both incremental and scalable to very large code bases. They thus cannot provide real-time cloning information for clone management of... more
Model-based development is becoming an increasingly common development methodology. In important domains like embedded systems already major parts of the code are generated from models specified with domain-specific modelling languages.... more
Cloning in software systems is known to create problems during software maintenance. Several techniques have been proposed to detect the same or similar code fragments in software, so-called simple clones. While the knowledge of simple... more
In this study, the composition of the metabolically active fraction of the microbial community occurring in Gulf of Mexico marine sediments (water depth, 550 to 575 m) with overlying filamentous bacterial mats was determined. The mats... more
A relevant consequence of the unceasing expansion of the Web and e-commerce is the growth of the demand of new Web sites and Web applications. As a result, Web sites and applications are usually developed without a formalized process, but... more
Code clones are similar program structures recurring in variant forms in software system(s). Several techniques have been proposed to detect similar code fragments in software, so-called simple clones. Identification and subsequent... more
The area of clone detection has considerably evolved over the last decade, leading to approaches with better results, but at the same time using more elaborate algorithms and tool chains. In our opinion a level has been reached, where the... more
However, there has been little work on clone detection in models with the limitations on detection precision and completeness. This paper presents ModelCD, a novel clone detection tool for Matlab/Simulink models, that is able to... more
Code clones are similar code fragments that occur at multiple locations in a software system. Detection of code clones provides useful information for maintenance, reengineering, program understanding and reuse. Several techniques have... more
by Larry Stetler and 
1 more
Microbial diversity was characterized in miningimpacted soils collected from two abandoned uranium mine sites, the Edgemont and the North Cave Hills, South Dakota, using a high-density 16S microarray (PhyloChip) and clone libraries.... more
Mutations inducing resistance to anti-epidermal growth factor receptor (EGFR) therapy may have a clinical impact even if present in minor cell clones which could expand during treatment. We tested this hypothesis in lung cancer patients... more
In this paper we describe a new approach for the detection of clones in source code, which is inspired by the concept of frequent itemsets from data mining. The source code is represented as an abstract syntax tree in XML; we can use... more
Over the last decade many techniques for software clone detection have been proposed. In this paper, we provide a comprehensive survey of the capabilities of currently available clone detection techniques. We begin with an overall survey... more
by A. Dopheide and 
1 more
Free-living protozoa are thought to be of fundamental importance in aquatic ecosystems, but there is limited understanding of their diversity and ecological role, particularly in surface-associated communities such as biofilms. Existing... more
by fei ma
This paper describes the design, implementation, and application of a new algorithm to detect cloned code. It operates on the abstract syntax trees formed by many compilers as an intermediate representation. It extends prior work by... more
Due to their pivotal role in software engineering, considerable effort is spent on the quality assurance of software requirements specifications. As they are mainly described in natural language, relatively few means of automated quality... more
biologic features of 9 cases Spontaneous regression of chronic lymphocytic leukemia: clinical and http://bloodjournal.hematologylibrary.org/content/114/3/638.full.html Updated information and services can be found at: (896 articles)... more
Redundant source code hinders software maintenance, since updates have to be performed in multiple places. This holds independent of whether redundancy was created by copy&paste or by independent development of behaviorally similar code.... more
Genetic diversity at variable-number-tandem-repeat (VNTR) loci was examined in the common cattail, Typha latifolia (Typhaceae), using three synthetic DNA probes composed of tandemly repeated ''core'' sequences (GACA, GATA, and GCAC). The... more
Recent research results show several benefits of the management of code clones. In this paper, we introduce Clever, a novel clone-aware software configuration management (SCM) system. In addition to traditional SCM functionality, Clever... more
Restriction fragment length polymorphism (RFLP) markers linked to genes controlling Hessian fly resistance from Triticum tauschii (Coss.) Schmal. were identified for two wheat (Triticum aestivum L.) germ plasm lines KS89WGRC3 (C3) and... more
To facilitate biochemical studies of protective filarial antigens, a Agtl1 cDNA library was constructed from Brugia malayi adult mRNA and screened with rabbit sera that recognizes a limited set of filarial antigens of approximately 25,... more
We present the R 2 D 2 redundancy detector. R 2 D 2 identifies redundant code fragments in large software systems written in Lisp. For each pair of code fragments, R 2 D 2 uses a combination of techniques ranging from syntaxbased analysis... more
It has long been recognized that spinal meningiomas show particular clinical and histological features. Here, we compare the clinico-biological characteristics as well as the genetic abnormalities and patterns of gene expression of spinal... more
Programmers copy and paste code for many reasons. Regardless of the specific reasons, similar code fragments (clones) are introduced into software systems. Like other software artifacts, clones may require attention and effort from... more
In-network data aggregation is favorable for wireless sensor networks (WSNs): It allows in-network data processing while reducing the network traffic and hence saving the sensors energy. However, due to the distributed and unattended... more
Large multi-platform software systems are likely to encompass hardware-dependent code or sub-systems. However, analyzing multi-platform source code poses several challenges, intrinsically due to the variety of supported configurations.... more
Clones are code segments that have been created by copying-and-pasting from other code segments. Clones occur often in large software systems. It is reported that 5 to 50% of the source code of a large software system is cloned. A major... more
Code clone management has been shown to have several benefits for software developers. When source code evolves, clone management requires a mechanism to efficiently and incrementally detect code clones in the new revision. This paper... more
The chromosomal region 3p21.2-p22 has been shown to be involved in the development of several forms of solid tumors. Such deletions, translocations, and rearrangements presumably result in the disturbance or loss of a critical gene... more
a b s t r a c t PCR and Southern blot hybridization were used to determine the distribution of Trypanosoma cruzi clones in 37 chronic chagasic cardiopathic and non-cardiopathic patients. Parasite DNA amplified from peripheral blood or... more
A combinatorial phage display library expressing human immunoglobulin heavy and light chain variable regions was used to identify phage clones capable of binding to the surface of Candida albicans blastoconidia. Single chain antibody Ž .... more
Background: Individuals living in areas of high malaria transmission often have different Plasmodium falciparum clones detected in the peripheral blood over time. The aim of this study was to assess the dynamics of asymptomatic P.... more
Technical documentation is now fully taking the step from stale printed booklets (or electronic versions of these) to interactive and online versions. This provides opportunities to reconsider how we define and assess the quality of... more
The successful generation of human antibodies from large naïve antibody libraries requires iterative selection steps. Here, we describe a new and fast method for the isolation of high affinity antibodies directly from human single chain... more
In order to find new antigens from Plasmodium falciparum, a complementary DNA (cDNA) library was constructed and screened. The study of expression library of P. falciparum was performed in an attempt to identify new antigens that could... more