An evaluation of clone detection techniques for identifying crosscutting concerns

69Citations
Citations of this article
43Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Code implementing a crosscutting concern is often spread over many different parts of an application. Identifying such code automatically greatly improves both the maintainability and the evolvability of the application. First of all, it allows a developer to more easily find the places in the code that must be changed when the concern changes, and thus makes such changes less time consuming and less prone to errors. Second, it allows a developer to refactor the code, so that it uses modern and more advanced abstraction mechanisms, thereby restoring its modularity. In this paper, we evaluate the suitability of clone detection as a technique for the identification of crosscutting concerns. To that end, we manually identify four specific concerns in an industrial C application, and analyze to what extent clone detection is capable of finding these concerns. We consider our results as a stepping stone toward an automated "concern miner" based on clone detection. © 2004 IEEE.

Cite

CITATION STYLE

APA

Bruntink, M., Van Deursen, A., Tourwé, T., & Van Engelen, R. (2004). An evaluation of clone detection techniques for identifying crosscutting concerns. In IEEE International Conference on Software Maintenance, ICSM (pp. 200–209). https://doi.org/10.1109/ICSM.2004.1357804

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free