[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

The Second International Workshop on Detection of Software Clones: workshop report

Published: 01 March 2004 Publication History

Abstract

This report is intended to summarize the proceedings of the Second International Workshop on Detection of Software Clones (IWDSC'2003). The aim of the workshop was to bring together researchers within the field of clone detection to critically assess the current state of research, and to establish new directions and partnerships for research. There were at least 30 people in attendance. Five position papers were presented and discussed. In addition, an index card-based brainstorming technique was used to focus discussion on assessing the current state of clone analysis and detection. A report and analysis of the results of this brainstorming session is the main content of this report. We recommend another international workshop on clones and clone detection be set to be held alongside another conference sometime in 2004.

References

[1]
{Bak92} Brenda S. Baker. A program for identifying duplicated code. Computing Science and Statistics, 24:49--57, 1992.
[2]
{BYM+98} Ira D. Baxter, Andrew Yahin, Leonardo M. De Moura, Marcelo Sant'Anna, and Lorraine Bier. Clone detection using abstract syntax trees. In Proceedings of the 1998 International Conference on Software Maintenance (CSM '98), pages 368--377, 1998.
[3]
{Cor03} James R. Cordy. Comprehending reality---practical barriers to industrial adoption of software maintenance automation. In Proceedings of the 11th IEEE International Workshop on Program Comprehension (IWPC'2003), pages 196--205. IEEE Computer Society Press, 2003.
[4]
{Gri81} Sam Grier. A tool that detects plagiarism in Pascal programs. SIGCSE Bulletin, 13(1): 15--20, 1981.
[5]
{Joh93} J. Howard Johnson. Identifying redundancy in source code using fingerprints. In Proceedings of CASCON '93, pages 171--183, 1993.
[6]
{LLWY03} Arun Lakhotia, Junwei Li, Andrew Walenstein, and Yun Yang. Towards a clone detection benchmark suite and results archive. In Proceedings of the 11th IEEE International Workshop on Program Comprehension (IWPC'03), pages 285--286. IEEE Computer Society Press, 2003.
[7]
{MLM96} Jean Mayrand, Claude Leblanc, and Ettore M. Merlo. Experiment on the automatic detection of function clones in a software system using metrics. In Proceedings of the IEEE Conference on Software Maintenance --- 1996, pages 244--254, 1996.
[8]
{SEH03} Susan Elliott Sim, Steve Easterbrook, and Richard C. Holt. Using benchmarking to advance research: a challenge to software engineering. In Proceedings of the 25th international conference on Software engineering, pages 74--83. IEEE Computer Society, 2003.

Cited By

View all

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM SIGSOFT Software Engineering Notes
ACM SIGSOFT Software Engineering Notes  Volume 29, Issue 2
March 2004
162 pages
ISSN:0163-5948
DOI:10.1145/979743
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 March 2004
Published in SIGSOFT Volume 29, Issue 2

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 02 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2021)IWSC(D): From Research to Practice: A Personal Historical RetellingCode Clone Analysis10.1007/978-981-16-1927-4_16(225-236)Online publication date: 4-Aug-2021
  • (2021)From Simple to Structural Clones: Tapping the Benefits of Non-redundancyEnterprise Information Systems10.1007/978-3-030-75418-1_26(563-590)Online publication date: 1-May-2021
  • (2014)DroidLegacyProceedings of ACM SIGPLAN on Program Protection and Reverse Engineering Workshop 201410.1145/2556464.2556467(1-12)Online publication date: 22-Jan-2014
  • (2009)A Data Mining Approach for Detecting Higher-Level Clones in SoftwareIEEE Transactions on Software Engineering10.1109/TSE.2009.1635:4(497-514)Online publication date: 1-Jul-2009
  • (2009)Third International Workshop on Software Clones (IWSC)Proceedings of the 2009 European Conference on Software Maintenance and Reengineering10.1109/CSMR.2009.45(269-270)Online publication date: 24-Mar-2009
  • (2007)Evaluating the Harmfulness of CloningProceedings of the Fourth International Workshop on Mining Software Repositories10.1109/MSR.2007.8Online publication date: 20-May-2007

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media