A Survey of Software Clone Detection Techniques

  • Sheneamer A
  • Kalita J
N/ACitations
Citations of this article
96Readers
Mendeley users who have this article in their library.

Abstract

If two fragments of source code are identical or similar to each other, they are called code clones. Code clones introduce difficulties in software maintenance and cause bug propagation. Software clones occur due to several reasons such as code reuse by copying pre-existing fragments, coding style, and repeated computation using duplicated functions with slight changes in variables or data structures used. If a code fragment is edited, it will have to be checked against all related code clones to see if they need to be modified as well. Removal, avoidance or refactoring of cloned code are other important issues in software maintenance. However, several research studies have demonstrated that removal or refactoring of cloned code is sometimes harmful. In this study, code clones, common types of clones, phases of clone detection, the state-of-the-art in code clone detection techniques and tools, and challenges faced by clone detection techniques are discussed.

Cite

CITATION STYLE

APA

Sheneamer, A., & Kalita, J. (2016). A Survey of Software Clone Detection Techniques. International Journal of Computer Applications, 137(10), 1–21. https://doi.org/10.5120/ijca2016908896

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free