685 research outputs found
Ranking Significance of Software Components Based on Use Relations
10 Selected PapersPaper in journals: this is the first page of a paper published in IEEE Transactions on Software Engineering.[IEEE Transactions on Software Engineering] 31,213-225 (2005
Software Tag : Empirical Software Engineering Data for Traceability and Transparency of Software Project
Proceedings Workshop on Accountability and Traceability in Global Software Engineering (ATGSE2007)Nagoya, Japan, December 3, 2007Co-located with the 14th Asia-Pacific Software Engineering Conference (APSEC'07
CCFinder : A Multilinguistic Token-Based Code Clone Detection System for Large Scale Source Code
10 Selected PapersPaper in joumals: this is the firsl page of a papar published in IEEE Trallsactions on Software Engineering. [IEEE Trallsactions on Software Engineering] 28, 654-670 (2002
Source File Set Search for Clone-and-Own Reuse Analysis
Clone-and-own approach is a natural way of source code reuse for software
developers. To assess how known bugs and security vulnerabilities of a cloned
component affect an application, developers and security analysts need to
identify an original version of the component and understand how the cloned
component is different from the original one. Although developers may record
the original version information in a version control system and/or directory
names, such information is often either unavailable or incomplete. In this
research, we propose a code search method that takes as input a set of source
files and extracts all the components including similar files from a software
ecosystem (i.e., a collection of existing versions of software packages). Our
method employs an efficient file similarity computation using b-bit minwise
hashing technique. We use an aggregated file similarity for ranking components.
To evaluate the effectiveness of this tool, we analyzed 75 cloned components in
Firefox and Android source code. The tool took about two hours to report the
original components from 10 million files in Debian GNU/Linux packages. Recall
of the top-five components in the extracted lists is 0.907, while recall of a
baseline using SHA-1 file hash is 0.773, according to the ground truth recorded
in the source code repositories.Comment: 14th International Conference on Mining Software Repositorie
Identifying Compiler and Optimization Options from Binary Code using Deep Learning Approaches
D. Pizzolotto and K. Inoue, "Identifying Compiler and Optimization Options from Binary Code using Deep Learning Approaches," 2020 IEEE International Conference on Software Maintenance and Evolution (ICSME), Adelaide, Australia, 2020, pp. 232-242, doi: 10.1109/ICSME46990.2020.00031
Who Made This Copy? An Empirical Analysis of Code Clone Authorship
Code clones are code snippets that are identical or similar to other snippets
within the same or different files. They are often created through
copy-and-paste practices during development and maintenance activities. Since
code clones may require consistent updates and coherent management, they
present a challenging issue in software maintenance. Therefore, many studies
have been conducted to find various types of clones with accuracy, scalability,
or performance. However, the exploration of the nature of code clones has been
limited. Even the fundamental question of whether code snippets in the same
clone set were written by the same author or different authors has not been
thoroughly investigated.
In this paper, we investigate the characteristics of code clones with a focus
on authorship. We analyzed the authorship of code clones at the line-level
granularity for Java files in 153 Apache projects stored on GitHub and
addressed three research questions.
Based on these research questions, we found that there are a substantial
number of clone lines across all projects (an average of 18.5\% for all
projects). Furthermore, authors who contribute to many non-clone lines also
contribute to many clone lines. Additionally, we found that one-third of clone
sets are primarily contributed to by multiple leading authors.
These results confirm our intuitive understanding of clone characteristics,
although no previous publications have provided empirical validation data from
multiple projects. As the results could assist in designing better clone
management techniques, we will explore the implications of developing an
effective clone management tool.Comment: An extended version of the 17th International Workshop on Software
Clones IWSC 2023 in Bogota, Colombi
On a Use Case Points Measurement Tool for Effective Project Management
Proceedings Workshop on Accountability and Traceability in Global Software Engineering (ATGSE2007)Nagoya, Japan, December 3, 2007Co-located with the 14th Asia-Pacific Software Engineering Conference (APSEC'07
Program Slicing Tool for Effective Software Evolution Using Aspect-Oriented Technique
Software Evolution, 2003. Proceedings. Sixth International Workshop on Principles ofDate of Conference:1-2 Sept. 200
A Lightweight Visualization of Interprocedural Data-Flow Paths for Source Code Reading
Program Comprehension (ICPC), 2012 IEEE 20th International Conference onDate of Conference:11-13 June 2012Conference Location :Passa
- …