On the Relationship of Inconsistent Software Clones and Faults — Stefan Wagner

Of course, we should refactor if code clones emerge, but that does not always happen. No empirical result, but Stefan estimates that clones make up about 20 to 30% of most systems. Sometimes, the clones are not exactly the same. And research so far has not really agreed on whether or not that is harmful, Read more about On the Relationship of Inconsistent Software Clones and Faults — Stefan Wagner[…]

Does Automated Refactoring Obviate Systematic Editing? – Miryung Kim

Sometimes you need to make similar, but not identical edits to source code. A lot of work has already been done on this, for example example-based program transformations. But is this a good idea? By automating systematic editing, you are increasing code duplication, because you make it easier to maintain code clones. An alternative would Read more about Does Automated Refactoring Obviate Systematic Editing? – Miryung Kim[…]

An Empirical Study of the Factors Affecting Co-change Frequency of Cloned Code

The main goal of this work by Iman Keivanloo is to identify buggy clones. For this, the authors have investigated 6 different applications. Firstly, they investigated whether cloned code was buggy than non-cloned, and this was the case in 5 out of 6 systems. Then they looked at how co-change of clones changed over the life Read more about An Empirical Study of the Factors Affecting Co-change Frequency of Cloned Code[…]

Evolution of Near-Miss Clones

Final talk of the first day of #scam2012 by Saman Bazrafshan, who will talk about near-miss clones. He studied the evolution of near-miss clones to investigate how they change. This is useful, since irregularities in clone evolution can help to distinguish between potentially harmful clones and the less interesting ones. Saman builds upon the work of Nils Read more about Evolution of Near-Miss Clones[…]

Folding Repeated Instructions for Improving Token-Based Code Clone Detection

More SCAM talks! This session block (before the secret social event) is about cloning. Hiroaki Murakami starts with explaining the problems with clone detection. One of them is overlapped code clones, as shown in this example. This leads to false positive, since in this case 5 clone pairs are found, instead of 1. Hiroaki’s aim is Read more about Folding Repeated Instructions for Improving Token-Based Code Clone Detection[…]