Bailey, J. O. and Burd, E. L. (2002) 'Evaluating clone detection tools for use during preventative maintenance.', in 2nd IEEE International Workshop on Source Code Analysis and Manipulation, SCAM’02, 1 October 2002, Montreal, Canada ; proceedings. Los Alamitos, CA: IEEE, pp. 36-43.
This paper describes the results of a process whereby the detection capability of 5 code replication detection tools for large software application are evaluated. Specifically this work focuses on the benefits of identification for preventative maintenance that is with the aim to remove some of the identified clones from the source code. A number of requirements are therefore identified upon which the tools are evaluated. The results of the analysis processes show that each tool has its own strengths and weaknesses and no single tool is able to identify all clones within the code. The paper proposes that it may be possible to use a combination of tools to perform the analysis process providing that adequate means of efficiently identifying false matches is found.
|Item Type:||Book chapter|
|Keywords:||Software application, Source code.|
|Full text:||PDF - Published Version (345Kb)|
|Publisher Web site:||http://dx.doi.org/10.1109/SCAM.2002.1134103|
|Publisher statement:||© 2002 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.|
|Record Created:||06 Sep 2006|
|Last Modified:||08 Nov 2010 14:14|
|Social bookmarking:||Export: EndNote, Zotero | BibTex|
|Usage statistics||Look up in GoogleScholar | Find in a UK Library|