[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1808901.1808915acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

Hot clones, maintaining a link between software clones across repositories

Published: 08 May 2010 Publication History

Abstract

Code duplication is common in current programming-practice: programmers search for snippets of code, incorporate them into their projects and then modify them to their needs. In today's practice, no automated scheme is in place to inform both parties of any distant changes of the code. As code snippets continues to evolve both on the side of the user and on the side of the author, both may wish to benefit from remote bug fixes or refinements---authors may be interested in the actual usage of their code snippets, and researchers could gather information on clone usage. We propose maintaining a link between software clones across repositories and outline how the links can be created and maintained.

References

[1]
A. Begel and R. DeLine. Codebook: Social networking over code. In ICSE Companion, pages 263--266, 2009.
[2]
M. Denker, T. Gîrba, A. Lienhard, O. Nierstrasz, L. Renggli, and P. Zumkehr. Encapsulating and exploiting change with changeboxes. In ICDL '07, pages 25--49, New York, NY, USA, 2007. ACM.
[3]
E. D. Ekoko and M. P. Robillard. Clonetracker: tool support for code clone management. In ICSE '08, pages 843--846, New York, NY, USA, 2008. ACM.
[4]
R. Hoffmann, J. Fogarty, and D. S. Weld. Assieme: finding and leveraging implicit references in a web search interface for programmers. In UIST '07, pages 13--22, New York, NY, USA, 2007. ACM.
[5]
D. Hou, P. Jablonski, and F. Jacob. Cnp: Towards an environment for the proactive management of copy-and-paste programming. In 2009 IEEE 17th ICPC, pages 238--242. IEEE, May 2009.
[6]
C. Kapser and M. W. Godfrey. "cloning considered harmful" considered harmful. WCRE '06, 0:19--28, 2006.
[7]
M. Kim, V. Sazawal, D. Notkin, and G. Murphy. An empirical study of code clone genealogies. SIGSOFT Softw. Eng. Notes, 30(5):187--196, September 2005.
[8]
R. Koschke. Identifying and removing software clones. In Software Evolution, chapter 2, pages 15--36. Springer Berlin Heidelberg, Berlin, Heidelberg, 2008.
[9]
G. Muller, Y. Padioleau, J. L. Lawall, and R. R. Hansen. Semantic patches considered helpful. SIGOPS Oper. Syst. Rev., 40(3):90--92, 2006.
[10]
S. P. Reiss. Semantics-based code search. In ICSE Companion, volume 0, pages 243--253, Los Alamitos, CA, USA, 2009. IEEE Computer Society.
[11]
M. Toomim, A. Begel, and S. L. Graham. Managing duplicated code with linked editing. In VLHCC '04, pages 173--180, Washington, DC, USA, 2004. IEEE.

Cited By

View all
  • (2012)Where does this code come from and where does it go? - integrated code history tracker for open source systems -Proceedings of the 34th International Conference on Software Engineering10.5555/2337223.2337263(331-341)Online publication date: 2-Jun-2012
  • (2012)Where does this code come from and where does it go? — Integrated code history tracker for open source systems2012 34th International Conference on Software Engineering (ICSE)10.1109/ICSE.2012.6227181(331-341)Online publication date: Jun-2012
  • (2012)Hot ClonesProceedings of the 2012 16th European Conference on Software Maintenance and Reengineering10.1109/CSMR.2012.67(513-515)Online publication date: 27-Mar-2012

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
IWSC '10: Proceedings of the 4th International Workshop on Software Clones
May 2010
105 pages
ISBN:9781605589800
DOI:10.1145/1808901
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 May 2010

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Funding Sources

Conference

ICSE '10
Sponsor:

Upcoming Conference

ICSE 2025

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2012)Where does this code come from and where does it go? - integrated code history tracker for open source systems -Proceedings of the 34th International Conference on Software Engineering10.5555/2337223.2337263(331-341)Online publication date: 2-Jun-2012
  • (2012)Where does this code come from and where does it go? — Integrated code history tracker for open source systems2012 34th International Conference on Software Engineering (ICSE)10.1109/ICSE.2012.6227181(331-341)Online publication date: Jun-2012
  • (2012)Hot ClonesProceedings of the 2012 16th European Conference on Software Maintenance and Reengineering10.1109/CSMR.2012.67(513-515)Online publication date: 27-Mar-2012

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media