C³: Code clone-based identification of duplicated components
Reinventing the wheel is a detrimental programming practice in software development that frequently results in the introduction of duplicated components. This practice not only leads to increased maintenance and labor costs but also poses a higher risk of propagating bugs throughout the system. Desp...
Saved in:
Main Authors: | YANG, Yanming, ZOU, Ying, HU, Xing, LO, David, NI, Chao, GRUNDY, John C., XIA, Xin: |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2023
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/8575 https://ink.library.smu.edu.sg/context/sis_research/article/9578/viewcontent/C3__Code_Clone_based_Identification_of_Duplicated_Components.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Fourth International Workshop on Software Clones (IWSC)
by: Inoue, K., et al.
Published: (2013) -
Things structural clones tell that simple clones don't
by: Basit, H.A., et al.
Published: (2013) -
SCALABLE DETECTION OF SOFTWARE REFACTORING
by: MILEA NARCISA ANDREEA
Published: (2015) -
Efficient token based clone detection with flexible tokenization
by: Basit, H.A., et al.
Published: (2013) -
Efficient token based clone detection with flexible tokenization
by: Basit, H.A., et al.
Published: (2013)