Table of Contents
ISRN Software Engineering
Volume 2013, Article ID 129437, 8 pages
Research Article

Software Clone Detection and Refactoring

University of Milano-Bicocca, Viale Sarca 336, 20126 Milano, Italy

Received 21 December 2012; Accepted 24 January 2013

Academic Editors: C. Calero, X. He, and H. Okamura

Copyright © 2013 Francesca Arcelli Fontana et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. R. Koschke, “Survey of research on software clones,” in Duplication, Redundancy, and Similarity in Software, number 06301 in Dagstuhl Seminar Proceedings, Dagstuhl, Germany, 2007. View at Google Scholar
  2. C. K. Roy and J. R. Cordy, “A survey on software clone detection research,” Tech. Rep. 2007-541, School of Computing, Queen's University, Kingston, Ontario, Canada, 2007. View at Google Scholar
  3. M. Fowler, Refactoring: Improving the Design of Existing Code, Addison-Wesley Longman, Boston, Ma, USA, 1999.
  4. F. Arcelli Fontana, P. Braione, and M. Zanoni, “Automatic detection of bad smells in code: an experimental assessment,” Journal of Object Technology, vol. 11, no. 2, pp. 1–38, 2012. View at Google Scholar
  5. C. Kapser and M. W. Godfrey, “‘Cloning considered harmful’ considered harmful,” in Proceedings of the 13th Working Conference on Reverse Engineering (WCRE '06), pp. 19–28, October 2006. View at Publisher · View at Google Scholar · View at Scopus
  6. F. Arcelli Fontana and S. Spinelli, “Impact of refactoring on quality code evaluation,” in Proceedings of the 4th Workshop on Refactoring Tools (WRT '11), pp. 37–40, ACM, New York, NY, USA, 2011.
  7. C. K. Roy, J. R. Cordy, and R. Koschke, “Comparison and evaluation of code clone detection techniques and tools: a qualitative approach,” Science of Computer Programming, vol. 74, no. 7, pp. 470–495, 2009, Special Issue on Program Comprehension (ICPC 2008). View at Google Scholar
  8. R. M. Karp and M. O. Rabin, “Efficient randomized pattern-matching algorithms,” IBM Journal of Research and Development, vol. 31, no. 2, pp. 249–260, 1985. View at Google Scholar · View at Scopus
  9. I. D. Baxter, A. Yahin, L. Moura, M. Sant'Anna, and L. Bier, “Clone detection using abstract syntax trees,” in Proceedings of the IEEE International Conference on Software Maintenance (ICSM '98), pp. 368–377, IEEE Computer Society, November 1998. View at Scopus
  10. B. D. Bois, S. Demeyer, and J. Verelst, “Refactoring—improving coupling and cohesion of existing code,” in Proceedings of the 11th Working Conference on Reverse Engineering (WCRE '04), pp. 144–151, IEEE Computer Society, November 2004. View at Scopus