[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/2662708.2662723acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

Large scale multi-language clone analysis in a telecommunication industrial setting

Published: 19 May 2013 Publication History

Abstract

This paper presents results from an experience of transferring the CLAN clone detection technology into a telecommunication industrial setting. Eleven proprietary systems have been analyzed for a total of about 94 MLOC of C/C++ and Java source code. The characteristics of the analyzed systems together with a description of the Web portal that is used as an interface to the clone analysis environment is described. Reported results include figures and diagrams about clone frequencies, types, and similarity distributions. Processing times including parsing, clone clustering, and Dynamic Programming visualisation are presented. A discussion about lesson learned and future research work is also presented from an industrial point of view for real life practical applications of clone detection.

References

[1]
J. Mayrand, C. Leblanc, and E. Merlo, "Experiment on the automatic detection of function clones in a software system using metrics," in Proceedings of the International Conference on Software Maintenance - IEEE Computer Society Press, Monterey, CA, Nov 1996, pp. 244--253.
[2]
E. Merlo, G. Antoniol, M. D. Penta, and F. Rollo, "Linear complexity object-oriented similarity for clone detection and software evolution analysis," in Proceedings of the International Conference on Software Maintenance - IEEE Computer Society Press. IEEE Computer Society Press, 2004, pp. 412--416.
[3]
S. Bellon, R. Koschke, G. Antoniol, J. Krinke, and E. Merlo, "Comparison and evaluation of clone detection tools," IEEE Transactions on Software Engineering - IEEE Computer Society Press, vol. 33, no. 9, pp. 577--591, 2007.
[4]
S. Bouktif, G. Antoniol, M. Neteler, and E. Merlo, "A novel approach to optimize clone refactoring activity," in Genetic and Evolutionary Computation Conference (GECCO). ACM Press, 2006, pp. 1037--1043.
[5]
K. Kontogiannis, R. De Mori, R. Bernstein, M. Galler, and E. Merlo, "Pattern matching for clone and concept detection," Journal of Automated Software Engineering, vol. 3, pp. 77--108, March 1996.
[6]
Z. Li, S. Lu, S. Myagmar, and Y. Zhou, "Cp-miner: Finding copy-paste and related bugs in large-scale software code," IEEE Transactions on Software Engineering - IEEE Computer Society Press, pp. 1--17, 2006.
[7]
M. Balazinska, E. Merlo, M. Dagenais, B. Lagu, and K. Kontogiannis, "Advanced clone-analysis as a basis for object-oriented system refactoring," in Proc. Working Conference on Reverse Engineering (WCRE). IEEE Computer Society Press, 2000, pp. 98--107.
[8]
B. Baker, "Finding clones with dup: Analysis of an experiment," IEEE Transactions on Software Engineering - IEEE Computer Society Press, 2007.
[9]
I. Baxter, A. Yahin, l. Moura, M. Sant' Anna, and L. Bier, "Clone detection using abstract syntax trees." in Proceedings of the International Conference on Software Maintenance - IEEE Computer Society Press, 1998, pp. 368--377.
[10]
S. Ducasse, O. Nierstrasz, and M. Rieger, "On the effectiveness of clone detection by string matching," International Journal on Software Maintenance and Evolution: Research and Practice - Wiley InterScience, no. 18, pp. 37--58, 2006.
[11]
N. Göde and R. Koschke, "Incremental clone detection," in Proceedings of the 2009 European Conference on Software Maintenance and Reengineering. IEEE Computer Society, 2009, pp. 219--228.
[12]
T. Kamiya, "Variation analysis of context-sharing identifiers with code clone," in Proceedings of the International Conference on Software Maintenance - IEEE Computer Society Press. IEEE Computer Society Press, 2008.
[13]
T. Kamiya, S. Kusumoto, and K. Inoue, "CCFinder: A multi-linguistic token-based code clone detection system for large scale source code," IEEE Transactions on Software Engineering, vol. 28, no. 7, pp. 654--670, 2002.
[14]
A. Marcus and J. I. Maletic, "Identification of high-level concept clones in source code," in ASE '01: Proceedings of the 16th IEEE International Conference on Automated Software Engineering. Washington, DC, USA: IEEE Computer Society, 2001, p. 107.
[15]
R. Al-Ekram, C. Kapser, R. Holt, and M. Godfrey, "Cloning by accident: An empirical study of source code cloning across software systems," in International Symposium on Empirical Software Engineering, 2005.
[16]
R. Falke, P. Frenzel, and R. Koschke, "Empirical evaluation of clone detection using syntax suffix trees," Empirical Software Engineering Journal, vol. 13, no. 6, pp. 601--643, 2008.
[17]
M. Kim, V. Sazawal, D. Notkin, and G. Murphy, "An empirical study of code clone genealogies," in European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2005.
[18]
C. Roy and J. Cordy, "Scenario-based comparison of clone detection techniques," in International Conference on Program Comprehension. IEEE Computer Society Press, 2008, pp. 153--162.
[19]
C. K. Roy and J. R. Cordy, "An empirical study of function clones in open source software," in Proceedings of the Working Conference on Reverse Engineering, 2008.
[20]
H. Basit, S. Pugliesi, W. Smyth, A. Turpin, and S. Jarzabek, "Efficient token based clone detection with flexible tokenization," in European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2007.
[21]
Z. Jiang and A. Hassan, "A framework for studying clones in large software systems," in Workshop on Source Code Analysis and Manipulation, 2007.
[22]
G. Antoniol, U. Villano, E. Merlo, and M. D. Penta, "Analyzing clone evolution in the linux kernel," Information and Software Technology, pp. 755--765, 2002.
[23]
E. Duala-Ekoko and M. Robillard, "Tracking code clones in evolving software," in Proceedings of the International Conference on Software Engineering. IEEE Computer Society Press, 2007.
[24]
U. of Alabama at Birmingham, "Clone literature," "http://students.cis.uab.edu/tairasr/clones/literature".
[25]
C. Roy and J. Cordy, "A survey on software clone detection research," School of Computing, Queen's University, Tech. Rep. Technical Report 2007--541, November 2007.
[26]
A. Hemel and R. Koschke, "Reverse engineering variability in source code using clone detection: A case study for linux variants of consumer electronic devices." in WCRE, 2012, pp. 357--366.
[27]
R. Koschke, "Large-scale inter-system clone detection using suffix trees," in CSMR, 2012, pp. 309--318.
[28]
J. R. Cordy and C. K. Roy, "Debcheck: Efficient checking for open source code clones in software systems," in ICPC, 2011, pp. 217--218.
[29]
Y. Dang, S. Ge, R. Huang, and D. Zhang, "Code clone detection experience at microsoft," in Proceedings of the 5th International Workshop on Software Clones, ser. IWSC '11. New York, NY, USA: ACM, 2011, pp. 63--64. {Online}. Available: http://doi.acm.org/10.1145/1985404.1985417
[30]
Y. Yamanaka, E. Choi, N. Yoshida, K. Inoue, and T. Sano, "Industrial application of clone change management system," in Software Clones (IWSC), 2012 6th International Workshop on, june 2012, pp. 67--71.
[31]
E. Tuzun and E. Er, "A case study on applying clone technology to an industrial application framework," in Software Clones (IWSC), 2012 6th International Workshop on, june 2012, pp. 57--61.
[32]
B. Hauptmann, V. Bauer, and M. Junker, "Using edge bundle views for clone visualization," in Software Clones (IWSC), 2012 6th International Workshop on, june 2012, pp. 86--87.
[33]
T. Lavoie and E. Merlo, "Automated type-3 clone oracle using levenshtein metric," in Proceedings of the 5th International Workshop on Software Clones, ser. IWSC '11. New York, NY, USA: ACM, 2011, pp. 34--40. {Online}. Available: http://doi.acm.org/10.1145/1985404.1985411
[34]
T. Lavoie and E. Merlo, "An accurate estimation of the levenshtein distance using metric trees and manhattan distance," in Proceedings of the 6th International Workshop on Software Clones, ser. IWSC '12. New York, NY, USA: ACM, 2012, pp. 1--7. {Online}. Available: http://doi.acm.org/10.1145/1985404.1985411

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
IWSC '13: Proceedings of the 7th International Workshop on Software Clones
May 2013
96 pages
ISBN:9781467364454

Sponsors

Publisher

IEEE Press

Publication History

Published: 19 May 2013

Check for updates

Author Tags

  1. clone detection
  2. experience report
  3. telecommunication software

Qualifiers

  • Research-article

Conference

ICSE '13
Sponsor:

Upcoming Conference

ICSE 2025

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 39
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Dec 2024

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media