Document Open Access Logo

Clone Detector Use Questions: A List of Desirable Empirical Studies

Authors Thomas R. Dean, Massamiliano Di Penta, Kostas Kontogiannis, Andrew Walenstein



PDF
Thumbnail PDF

File

DagSemProc.06301.5.pdf
  • Filesize: 119 kB
  • 5 pages

Document Identifiers

Author Details

Thomas R. Dean
Massamiliano Di Penta
Kostas Kontogiannis
Andrew Walenstein

Cite AsGet BibTex

Thomas R. Dean, Massamiliano Di Penta, Kostas Kontogiannis, and Andrew Walenstein. Clone Detector Use Questions: A List of Desirable Empirical Studies. In Duplication, Redundancy, and Similarity in Software. Dagstuhl Seminar Proceedings, Volume 6301, pp. 1-5, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2007)
https://doi.org/10.4230/DagSemProc.06301.5

Abstract

Code "clones" are similar segments of code that are frequently introduced by "scavenging" existing code, that is, reusing code by copying it and adapting it for a new use. In order to scavenge the code, the developer must be aware of it already, or must find it. Little is known about how tools - particularly search tools - impact the clone construction process, nor how developers use them for this purpose. This paper lists five outstanding research questions in this area and proposes sketches of designs for five empirical studies that might be conducted to help shed light on those questions.
Keywords
  • Code clone
  • clone detector
  • code search
  • reuse
  • code scavenging
  • empirical study

Metrics

  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    0
    PDF Downloads
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail