Study of Clone Code Detection Method
- DOI
- 10.2991/iccia-19.2019.64How to use a DOI?
- Keywords
- clone code, clone detection, detection method.
- Abstract
In the process of software development and maintenance, developers often use "copy-paste" or use the development framework, so that a large number of clone codes appear in the software system. In order to eliminate clone code and reduce the negative effects of clone code, researchers have proposed many excellent methods for clone code detection. This paper first introduces the significance of the research on clone code detection, and sorts out the related concepts of clone code detection. Then, according to the clone code detection technology, the existing techniques can be categorized to Text-based, Token-based, Tree-based, Metric-based and Graph-based categories. The five categories, respectively introduce the corresponding existing methods or tools, and summarize their advantages and disadvantages. Finally summarize the key problems in the current clone code detection research.
- Copyright
- © 2019, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Yafang Wang AU - Dongsheng Liu AU - Min Hou PY - 2019/07 DA - 2019/07 TI - Study of Clone Code Detection Method BT - Proceedings of the 3rd International Conference on Computer Engineering, Information Science & Application Technology (ICCIA 2019) PB - Atlantis Press SP - 414 EP - 423 SN - 2352-538X UR - https://doi.org/10.2991/iccia-19.2019.64 DO - 10.2991/iccia-19.2019.64 ID - Wang2019/07 ER -