Is cloned code really stable?

Clone has emerged as a controversial term in software engineering research and practice. The impact of clones is of great importance from software maintenance perspectives. Stability is a well investigated term in assessing the impacts of clones on software maintenance. If code clones appear to exhi...

Full description

Saved in:
Bibliographic Details
Published in:Empirical software engineering : an international journal Vol. 23; no. 2; pp. 693 - 770
Main Authors: Mondal, Manishankar, Rahman, Md Saidur, Roy, Chanchal K., Schneider, Kevin A.
Format: Journal Article
Language:English
Published: New York Springer US 01.04.2018
Subjects:
ISSN:1382-3256, 1573-7616
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Clone has emerged as a controversial term in software engineering research and practice. The impact of clones is of great importance from software maintenance perspectives. Stability is a well investigated term in assessing the impacts of clones on software maintenance. If code clones appear to exhibit a higher instability (i.e., higher change-proneness) than non-cloned code, then we can expect that code clones require higher maintenance effort and cost than non-cloned code. A number of studies have been done on the comparative stability of cloned and non-cloned code. However, these studies could not come to a consensus. While some studies show that code clones are more stable than non-cloned code, the other studies provide empirical evidence of higher instability of code clones. The possible reasons behind these contradictory findings are that different studies investigated different aspects of stability using different clone detection tools on different subject systems using different experimental setups. Also, the subject systems were not of wide varieties. Emphasizing these issues (with several others mentioned in the motivation) we have conducted a comprehensive empirical study where we have - (i) implemented and investigated seven existing methodologies that explored different aspects of stability, (ii) used two clone detection tools (NiCad and CCFinderX) to implement each of these seven methodologies, and (iii) investigated the stability of three types (Type-1, Type-2, Type-3) of clones. Our investigation on 12 diverse subject systems covering three programming languages (Java, C, C#) with a list of 8 stability assessment metrics suggest that (i) cloned code is often more unstable (change-prone) than non-cloned code in the maintenance phase, (ii) both Type 1 and Type 3 clones appear to exhibit higher instability than Type 2 clones, (iii) clones in Java and C programming languages are more change-prone than the clones in C#, and (iv) changes to the clones in procedural programming languages seem to be more dispersed than the changes to the clones in object oriented languages. We also systematically replicated the original studies with their original settings and found mostly equivalent results as of the original studies. We believe that our findings are important for prioritizing code clones from management perspectives.
AbstractList Clone has emerged as a controversial term in software engineering research and practice. The impact of clones is of great importance from software maintenance perspectives. Stability is a well investigated term in assessing the impacts of clones on software maintenance. If code clones appear to exhibit a higher instability (i.e., higher change-proneness) than non-cloned code, then we can expect that code clones require higher maintenance effort and cost than non-cloned code. A number of studies have been done on the comparative stability of cloned and non-cloned code. However, these studies could not come to a consensus. While some studies show that code clones are more stable than non-cloned code, the other studies provide empirical evidence of higher instability of code clones. The possible reasons behind these contradictory findings are that different studies investigated different aspects of stability using different clone detection tools on different subject systems using different experimental setups. Also, the subject systems were not of wide varieties. Emphasizing these issues (with several others mentioned in the motivation) we have conducted a comprehensive empirical study where we have - (i) implemented and investigated seven existing methodologies that explored different aspects of stability, (ii) used two clone detection tools (NiCad and CCFinderX) to implement each of these seven methodologies, and (iii) investigated the stability of three types (Type-1, Type-2, Type-3) of clones. Our investigation on 12 diverse subject systems covering three programming languages (Java, C, C#) with a list of 8 stability assessment metrics suggest that (i) cloned code is often more unstable (change-prone) than non-cloned code in the maintenance phase, (ii) both Type 1 and Type 3 clones appear to exhibit higher instability than Type 2 clones, (iii) clones in Java and C programming languages are more change-prone than the clones in C#, and (iv) changes to the clones in procedural programming languages seem to be more dispersed than the changes to the clones in object oriented languages. We also systematically replicated the original studies with their original settings and found mostly equivalent results as of the original studies. We believe that our findings are important for prioritizing code clones from management perspectives.
Author Mondal, Manishankar
Roy, Chanchal K.
Schneider, Kevin A.
Rahman, Md Saidur
Author_xml – sequence: 1
  givenname: Manishankar
  surname: Mondal
  fullname: Mondal, Manishankar
  email: mshankar.mondal@usask.ca
  organization: Department of Computer Science, University of Saskatchewan
– sequence: 2
  givenname: Md Saidur
  surname: Rahman
  fullname: Rahman, Md Saidur
  organization: Department of Computer Science, University of Saskatchewan
– sequence: 3
  givenname: Chanchal K.
  surname: Roy
  fullname: Roy, Chanchal K.
  organization: Department of Computer Science, University of Saskatchewan
– sequence: 4
  givenname: Kevin A.
  surname: Schneider
  fullname: Schneider, Kevin A.
  organization: Department of Computer Science, University of Saskatchewan
BookMark eNp9j81KAzEYRYNUsK0-gAthXiD65T9ZiRSthYIbXYdMJpEpcUaScTFvb0pduejq3s25l7NCi2EcAkK3BO4JgHooBKTkGIjCRlCN5wu0JEIxrCSRi9qZpphRIa_QqpQDABjFxRLd7UrjU93qGj92ocnBpTQ3ZXJtCo_X6DK6VMLNX67Rx8vz--YV79-2u83THnuq9YS10hK4l4x3XPDIeAxeUMm8aAWJIQZo2yBaI4iJwI00nhtOgvbMESVBsjUip12fx1JyiPY7918uz5aAPfrZk5-tfvboZ-fKqH-M7yc39eMwZdensyQ9kaW-DJ8h28P4k4cqeAb6BbMEZUg
CitedBy_id crossref_primary_10_1016_j_cose_2024_104205
crossref_primary_10_1109_ACCESS_2020_2990645
crossref_primary_10_1007_s10664_020_09921_9
crossref_primary_10_1016_j_jss_2020_110892
crossref_primary_10_1371_journal_pone_0277216
crossref_primary_10_1109_ACCESS_2019_2913043
crossref_primary_10_1109_TSE_2019_2925616
crossref_primary_10_3390_sym13030447
crossref_primary_10_1007_s00607_022_01133_x
crossref_primary_10_1109_ACCESS_2019_2952191
crossref_primary_10_1007_s10664_021_10099_x
crossref_primary_10_1145_3630008
crossref_primary_10_1016_j_infsof_2024_107443
crossref_primary_10_1007_s10664_024_10567_0
crossref_primary_10_1016_j_jss_2023_111803
crossref_primary_10_1016_j_scico_2024_103259
Cites_doi 10.1109/ICSM.2008.4658071
10.1109/ICSM.2007.4362615
10.1109/CSMR.2009.20
10.1145/1985404.1985410
10.1002/smr.1551
10.1007/s10664-015-9394-4
10.1145/1808901.1808911
10.1109/ICSM.2015.7332455
10.1109/SCAM.2010.32
10.1145/1081706.1081737
10.1145/1808901.1808910
10.1109/ICPC.2008.42
10.1109/ICSM.2011.6080794
10.1145/2245276.2231969
10.1109/IWSC.2012.6227863
10.1007/978-3-642-19811-3_30
10.1109/CSMR.2007.26
10.1007/s11219-016-9305-y
10.1109/ICPC.2008.41
10.1109/SCAM.2008.14
10.1145/2351676.2351701
10.1109/ICSE.2009.5070547
10.1109/ICSE.2013.6606694
10.1145/1862372.1862390
10.1109/MSR.2007.8
10.1145/1985793.1985836
10.1109/ICPC.2011.26
10.1109/SANER.2016.78
10.1109/MSR.2010.5463343
10.1109/WCRE.2010.11
10.1109/WCRE.2007.7
10.1109/ICSM.2011.6080796
10.1145/2491411.2491420
10.1109/WCRE.2008.54
10.1109/ICPC.2011.14
10.14236/ewic/EASE2009.11
10.1109/WCRE.2009.51
10.1002/smr.1597
10.1109/SCAM.2014.13
ContentType Journal Article
Copyright Springer Science+Business Media New York 2017
Copyright_xml – notice: Springer Science+Business Media New York 2017
DBID AAYXX
CITATION
DOI 10.1007/s10664-017-9528-y
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1573-7616
EndPage 770
ExternalDocumentID 10_1007_s10664_017_9528_y
GroupedDBID -4Z
-59
-5G
-BR
-EM
-Y2
-~C
.86
.DC
.VR
06D
0R~
0VY
199
1N0
1SB
2.D
203
28-
29G
2J2
2JN
2JY
2KG
2LR
2P1
2VQ
2~H
30V
4.4
406
408
409
40D
40E
5GY
5QI
5VS
67Z
6NX
78A
8FE
8FG
8TC
8UJ
95-
95.
95~
96X
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AAOBN
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYOK
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDZT
ABECU
ABFTD
ABFTV
ABHLI
ABHQN
ABJCF
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACIWK
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACSNA
ACZOJ
ADHHG
ADHIR
ADIMF
ADINQ
ADKNI
ADKPE
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFEXP
AFGCZ
AFKRA
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARAPS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
B-.
BA0
BBWZM
BDATZ
BENPR
BGLVJ
BGNMA
BSONS
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
EBLON
EBS
EIOEI
EJD
ESBYG
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
GQ8
GXS
H13
HCIFZ
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I09
IHE
IJ-
IKXTQ
ITM
IWAJR
IXC
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
KDC
KOV
KOW
L6V
LAK
LLZTM
M4Y
M7S
MA-
N2Q
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
P19
P62
P9O
PF0
PT4
PT5
PTHSS
Q2X
QOK
QOS
R4E
R89
R9I
RHV
RNI
RNS
ROL
RPX
RSV
RZC
RZE
RZK
S0W
S16
S1Z
S26
S27
S28
S3B
SAP
SCJ
SCLPG
SCO
SDH
SDM
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TSG
TSK
TSV
TUC
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
Z7R
Z7S
Z7V
Z7X
Z7Z
Z81
Z83
Z86
Z88
Z8M
Z8N
Z8P
Z8R
Z8T
Z8U
Z8W
Z92
ZMTXR
~EX
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ABRTQ
ACSTC
ADHKG
AEZWR
AFDZB
AFFHD
AFHIU
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
PHGZM
PHGZT
PQGLB
ID FETCH-LOGICAL-c288t-878604c634d454f34fec5263c5b51fefe0bbe5b9519f04969c4941e8c3a176063
IEDL.DBID RSV
ISICitedReferencesCount 22
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000429551000003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1382-3256
IngestDate Sat Nov 29 05:37:43 EST 2025
Tue Nov 18 22:01:39 EST 2025
Fri Feb 21 02:35:46 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 2
Keywords Code stability
Software maintenance and evolution
Code clones
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c288t-878604c634d454f34fec5263c5b51fefe0bbe5b9519f04969c4941e8c3a176063
PageCount 78
ParticipantIDs crossref_primary_10_1007_s10664_017_9528_y
crossref_citationtrail_10_1007_s10664_017_9528_y
springer_journals_10_1007_s10664_017_9528_y
PublicationCentury 2000
PublicationDate 20180400
2018-4-00
PublicationDateYYYYMMDD 2018-04-01
PublicationDate_xml – month: 4
  year: 2018
  text: 20180400
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationSubtitle An International Journal
PublicationTitle Empirical software engineering : an international journal
PublicationTitleAbbrev Empir Software Eng
PublicationYear 2018
Publisher Springer US
Publisher_xml – name: Springer US
References Hotta K, Sano Y, Higo Y, Kusumoto S (2010) Is duplicate code more frequently modified than non-duplicate code in software evolution?: an empirical study on open source software. In: Proc EVOL/IWPSE, pp 73–82
MondalMRoyCKSchneiderKAn insight into the dispersion of changes in cloned and non-cloned code: a genealogy based empirical studySCP2014954445468
Lozano A, Wermelinger M (2010) Tracking clones’ imprint. In: Proc IWSC, pp 65–72
Bettenburg N, Shang W, Ibrahim W, Adams B, Zou Y, Hassan A (2009) An empirical study on inconsistent changes to code clones at release level. In: Proc WCRE, pp 85–94
Jarzabek S, Xu Y (2010) Are clones harmful for maintenance? In: Proc IWSC, pp 73–74
Li J, Ernst MD (2011) CBCD: cloned buggy code detector. University of Washington Department of Computer Science and Engineering technical report UW-CSE-11-05-02. Seattle, May 2, 2011. Revised
Roy CK, Cordy JR (2008a) An empirical evaluation of function clones in open source software. In: Proc WCRE, pp 81–90
Wang T, Harman M, Jia Y, Krinke J (2013) Searching for better configurations: a rigorous approach to clone evaluation. In: Proc ESEC/SIGSOFT FSE, pp 455–465
Roy CK, Cordy JR (2009) A mutation/injection-based automatic framework for evaluating code clone detection tools. In: Proc mutation, pp 157–166
Roy CK, Zibran MF, Koschke R (2014) The vision of software clone management: past, present and future. In: Proc CSMR-18/WCRE-21 software evolution week, p 16
Islam JF, Mondal M, Roy CK (2016) Bug replication in code clones: an empirical study. In: Proc. SANER, pp 68–78
MondalMRoyCKSchneiderKAAn empirical study on clone stabilityACR20121232036
Selim GMK, Barbour L, Shang W, Adams B, Hassan AE, Zou Y (2010) Studying the impact of clones on software defects. In: Proc WCRE, pp 13–21
Higo Y, Kusumoto S (2009) Significant and scalable code clone detection with program dependency graph. In: Proc WCRE, pp 315–316
Aversano L, Cerulo L, Penta MD (2007) How clones are maintained: an empirical study. In: Proc CSMR, pp 81–90
Lozano A, Wermelinger M (2008) Assessing the effect of clones on changeability. In: Proc ICSM, pp 227–236
Saha RK, Roy CK, Schneider KA (2011) An automatic framework for extracting and classifying near-miss clone genealogies. In: Proc ICSM, pp 293–302
Cai D, Kim M (2011) An empirical study of long-lived code clones. In: Proc FASE/ETAPS, pp 432–446
Roy CK, Cordy JR (2008c) Scenario-based comparison of clone detection techniques. In: Proc ICPC, pp 153–162
Rahman F, Bird C, Devanbu P (2010) Clones: what is that smell? In: Proc MSR, pp 72–81
HarderJGödeNCloned code: stable codeJ Softw Evol Process201325101063108810.1002/smr.1551
Krinke J (2007) A study of consistent and inconsistent changes to code clones. In: Proc WCRE, pp 170–178
Bakota T, Ferenc R, Gyimothy T (2007) Clone smells in software evolution. In: Proc ICSM, pp 24–33
Barbour L, Khomh F, Zou Y (2011) Late propagation in software clones. In: Proc ICSM, pp 273–282
Juergens E, Deissenboeck F, Hummel B, Wagner S (2009) Do code clones matter? In: Proc ICSE, pp 485–495
Hordijk W, Ponisio M, Wieringa R (2009) Harmfulness of code duplication—a structured review of the evidence. In: Proc EASE, pp 88–97
Göde N, Harder J (2011) Clone Stability. In: Proc CSMR, pp 65–74
Roy CK, Cordy JR (2008b) NICAD: accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization. In: Proc ICPC, pp 172–181
BarbourLKhomhFZouYAn empirical study of faults in late propagation clone genealogiesJ Softw Evol Process201325111139116510.1002/smr.1597
MondalMRoyCKSchneiderKALate propagation in near-miss clones: an empirical studyECEASST201463117
Rahman MS, Roy CK (2014) A change-type based empirical study on the stability of cloned code. In: Proc SCAM, pp 31–40
KamiyaTKusumotoSInoueKCCFinder: a multilinguistic token-based code clone detection system for large scale source codeTSE2002287654670
Krinke J (2008) Is cloned code more stable than non-cloned code? In: Proc SCAM, pp 57–66
MondalMRoyCKSchneiderKAA comparative study on the intensity and harmfulness of late propagation in near-miss code cloneSoftw Qual J201624488391510.1007/s11219-016-9305-y
Mondal M, Rahman MS, Saha RK, Roy CK, Krinke J, Schneider KA (2011) An empirical study of the impacts of clones in software maintenance. In: Proc ICPC student research symposium track, pp 242–245
Mondal M, Roy CK, Rahman S, Saha RK, Krinke J, Schneider K A (2012a) Comparative stability of cloned and non-cloned code: an empirical study. In: Proc SAC, pp 1227–1234
Lozano A, Wermelinger M, Nuseibeh B (2007) Evaluating the harmfulness of cloning: a change based experiment. In: Proc MSR, p 18
Göde N, Koschke R (2009) Incremental clone detection. In: Proc CSMR, pp 219–228
Cordy JR, Roy CK (2011) The NiCad Clone Detector. In: Proc ICPC (Tool Demo Track), pp 219–220
Saha RK, Asaduzzaman M, Zibran MF, Roy CK, Schneider KA (2010) Evaluating code clone genealogies at release level: an empirical study. In: Proc SCAM, pp 87–96
Kim M, Sazawal V, Notkin D, Murphy GC (2005) An empirical study of code clone genealogies. In: Proc ESEC-FSE, pp 187–196
Krinke J (2011) Is cloned code older than non-cloned code? In: Proc IWSC, pp 28–33
Wang X, Dang Y, Zhang L, Zhang D, Lan E, Mei H (2012) Can I clone this piece of code here? In: Proc ASE, pp 170–179
ThummalapentaSCeruloLAversanoLPentaMDAn empirical study on the maintenance of source code clonesESE2009151134
GödeNKoschkeRStudying clone evolution using incremental clone detectionJSME2010252165192
Mondal M, Roy CK, Schneider K A (2015) A comparative study on the bug-proneness of different types of code clones. In: Proc ICSME, pp 91–100
Rahman MS, Aryani A, Roy CK, Perin F (2013) On the relationships between domain-based coupling and code clones: an exploratory study. In: Proc ICSE NIER track, pp 1265–1268
ChatterjiDCarverJCKraftNACode clones and developer behavior: results of two surveys of the clone research communityEmpir Softw Eng20162141476150810.1007/s10664-015-9394-4
Göde N, Koschke R (2011) Frequency and risks of changes to clones. In: Proc ICSE, pp 311–320
Mondal M, Roy CK, Schneider KA (2012c) Dispersion of changes in cloned and non-cloned code. In: Proc IWSC, pp 29–35
KapserCGodfreyMW“Cloning considered harmful” considered harmful: patterns of cloning in softwareESE2008136645692
RoyCKCordyJRKoschkeRComparison and evaluation of code clone detection techniques and tools: a qualitative approachSCP200920097447049526752541183.68205
L Barbour (9528_CR4) 2013; 25
9528_CR26
9528_CR27
9528_CR28
N Göde (9528_CR11) 2010; 25
9528_CR29
9528_CR22
9528_CR23
9528_CR24
9528_CR25
CK Roy (9528_CR45) 2009; 2009
9528_CR1
9528_CR2
9528_CR3
9528_CR19
9528_CR5
9528_CR6
9528_CR8
9528_CR15
9528_CR9
9528_CR16
9528_CR17
9528_CR18
9528_CR12
9528_CR14
9528_CR51
9528_CR52
9528_CR10
T Kamiya (9528_CR20) 2002; 28
M Mondal (9528_CR34) 2014; 95
C Kapser (9528_CR21) 2008; 13
J Harder (9528_CR13) 2013; 25
9528_CR48
9528_CR49
9528_CR44
9528_CR46
9528_CR47
9528_CR40
9528_CR41
9528_CR42
9528_CR43
M Mondal (9528_CR35) 2014; 63
M Mondal (9528_CR32) 2012; 12
M Mondal (9528_CR37) 2016; 24
9528_CR38
S Thummalapenta (9528_CR50) 2009; 15
9528_CR39
9528_CR33
9528_CR36
D Chatterji (9528_CR7) 2016; 21
9528_CR30
9528_CR31
References_xml – reference: MondalMRoyCKSchneiderKAn insight into the dispersion of changes in cloned and non-cloned code: a genealogy based empirical studySCP2014954445468
– reference: Göde N, Koschke R (2011) Frequency and risks of changes to clones. In: Proc ICSE, pp 311–320
– reference: Jarzabek S, Xu Y (2010) Are clones harmful for maintenance? In: Proc IWSC, pp 73–74
– reference: Rahman F, Bird C, Devanbu P (2010) Clones: what is that smell? In: Proc MSR, pp 72–81
– reference: Saha RK, Asaduzzaman M, Zibran MF, Roy CK, Schneider KA (2010) Evaluating code clone genealogies at release level: an empirical study. In: Proc SCAM, pp 87–96
– reference: Barbour L, Khomh F, Zou Y (2011) Late propagation in software clones. In: Proc ICSM, pp 273–282
– reference: Mondal M, Rahman MS, Saha RK, Roy CK, Krinke J, Schneider KA (2011) An empirical study of the impacts of clones in software maintenance. In: Proc ICPC student research symposium track, pp 242–245
– reference: Bettenburg N, Shang W, Ibrahim W, Adams B, Zou Y, Hassan A (2009) An empirical study on inconsistent changes to code clones at release level. In: Proc WCRE, pp 85–94
– reference: MondalMRoyCKSchneiderKAAn empirical study on clone stabilityACR20121232036
– reference: Roy CK, Cordy JR (2008b) NICAD: accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization. In: Proc ICPC, pp 172–181
– reference: Rahman MS, Roy CK (2014) A change-type based empirical study on the stability of cloned code. In: Proc SCAM, pp 31–40
– reference: ChatterjiDCarverJCKraftNACode clones and developer behavior: results of two surveys of the clone research communityEmpir Softw Eng20162141476150810.1007/s10664-015-9394-4
– reference: Hotta K, Sano Y, Higo Y, Kusumoto S (2010) Is duplicate code more frequently modified than non-duplicate code in software evolution?: an empirical study on open source software. In: Proc EVOL/IWPSE, pp 73–82
– reference: Göde N, Koschke R (2009) Incremental clone detection. In: Proc CSMR, pp 219–228
– reference: Roy CK, Cordy JR (2008a) An empirical evaluation of function clones in open source software. In: Proc WCRE, pp 81–90
– reference: Juergens E, Deissenboeck F, Hummel B, Wagner S (2009) Do code clones matter? In: Proc ICSE, pp 485–495
– reference: Krinke J (2008) Is cloned code more stable than non-cloned code? In: Proc SCAM, pp 57–66
– reference: Saha RK, Roy CK, Schneider KA (2011) An automatic framework for extracting and classifying near-miss clone genealogies. In: Proc ICSM, pp 293–302
– reference: Roy CK, Cordy JR (2009) A mutation/injection-based automatic framework for evaluating code clone detection tools. In: Proc mutation, pp 157–166
– reference: RoyCKCordyJRKoschkeRComparison and evaluation of code clone detection techniques and tools: a qualitative approachSCP200920097447049526752541183.68205
– reference: Mondal M, Roy CK, Rahman S, Saha RK, Krinke J, Schneider K A (2012a) Comparative stability of cloned and non-cloned code: an empirical study. In: Proc SAC, pp 1227–1234
– reference: Lozano A, Wermelinger M (2008) Assessing the effect of clones on changeability. In: Proc ICSM, pp 227–236
– reference: Mondal M, Roy CK, Schneider K A (2015) A comparative study on the bug-proneness of different types of code clones. In: Proc ICSME, pp 91–100
– reference: GödeNKoschkeRStudying clone evolution using incremental clone detectionJSME2010252165192
– reference: MondalMRoyCKSchneiderKAA comparative study on the intensity and harmfulness of late propagation in near-miss code cloneSoftw Qual J201624488391510.1007/s11219-016-9305-y
– reference: Wang T, Harman M, Jia Y, Krinke J (2013) Searching for better configurations: a rigorous approach to clone evaluation. In: Proc ESEC/SIGSOFT FSE, pp 455–465
– reference: Hordijk W, Ponisio M, Wieringa R (2009) Harmfulness of code duplication—a structured review of the evidence. In: Proc EASE, pp 88–97
– reference: Wang X, Dang Y, Zhang L, Zhang D, Lan E, Mei H (2012) Can I clone this piece of code here? In: Proc ASE, pp 170–179
– reference: Lozano A, Wermelinger M (2010) Tracking clones’ imprint. In: Proc IWSC, pp 65–72
– reference: Cordy JR, Roy CK (2011) The NiCad Clone Detector. In: Proc ICPC (Tool Demo Track), pp 219–220
– reference: KapserCGodfreyMW“Cloning considered harmful” considered harmful: patterns of cloning in softwareESE2008136645692
– reference: Lozano A, Wermelinger M, Nuseibeh B (2007) Evaluating the harmfulness of cloning: a change based experiment. In: Proc MSR, p 18
– reference: Selim GMK, Barbour L, Shang W, Adams B, Hassan AE, Zou Y (2010) Studying the impact of clones on software defects. In: Proc WCRE, pp 13–21
– reference: Göde N, Harder J (2011) Clone Stability. In: Proc CSMR, pp 65–74
– reference: Higo Y, Kusumoto S (2009) Significant and scalable code clone detection with program dependency graph. In: Proc WCRE, pp 315–316
– reference: Cai D, Kim M (2011) An empirical study of long-lived code clones. In: Proc FASE/ETAPS, pp 432–446
– reference: Rahman MS, Aryani A, Roy CK, Perin F (2013) On the relationships between domain-based coupling and code clones: an exploratory study. In: Proc ICSE NIER track, pp 1265–1268
– reference: ThummalapentaSCeruloLAversanoLPentaMDAn empirical study on the maintenance of source code clonesESE2009151134
– reference: Krinke J (2007) A study of consistent and inconsistent changes to code clones. In: Proc WCRE, pp 170–178
– reference: Krinke J (2011) Is cloned code older than non-cloned code? In: Proc IWSC, pp 28–33
– reference: HarderJGödeNCloned code: stable codeJ Softw Evol Process201325101063108810.1002/smr.1551
– reference: Islam JF, Mondal M, Roy CK (2016) Bug replication in code clones: an empirical study. In: Proc. SANER, pp 68–78
– reference: Li J, Ernst MD (2011) CBCD: cloned buggy code detector. University of Washington Department of Computer Science and Engineering technical report UW-CSE-11-05-02. Seattle, May 2, 2011. Revised
– reference: Roy CK, Cordy JR (2008c) Scenario-based comparison of clone detection techniques. In: Proc ICPC, pp 153–162
– reference: Kim M, Sazawal V, Notkin D, Murphy GC (2005) An empirical study of code clone genealogies. In: Proc ESEC-FSE, pp 187–196
– reference: Aversano L, Cerulo L, Penta MD (2007) How clones are maintained: an empirical study. In: Proc CSMR, pp 81–90
– reference: BarbourLKhomhFZouYAn empirical study of faults in late propagation clone genealogiesJ Softw Evol Process201325111139116510.1002/smr.1597
– reference: Bakota T, Ferenc R, Gyimothy T (2007) Clone smells in software evolution. In: Proc ICSM, pp 24–33
– reference: MondalMRoyCKSchneiderKALate propagation in near-miss clones: an empirical studyECEASST201463117
– reference: Mondal M, Roy CK, Schneider KA (2012c) Dispersion of changes in cloned and non-cloned code. In: Proc IWSC, pp 29–35
– reference: Roy CK, Zibran MF, Koschke R (2014) The vision of software clone management: past, present and future. In: Proc CSMR-18/WCRE-21 software evolution week, p 16
– reference: KamiyaTKusumotoSInoueKCCFinder: a multilinguistic token-based code clone detection system for large scale source codeTSE2002287654670
– ident: 9528_CR27
  doi: 10.1109/ICSM.2008.4658071
– ident: 9528_CR2
  doi: 10.1109/ICSM.2007.4362615
– ident: 9528_CR10
  doi: 10.1109/CSMR.2009.20
– ident: 9528_CR25
  doi: 10.1145/1985404.1985410
– volume: 25
  start-page: 1063
  issue: 10
  year: 2013
  ident: 9528_CR13
  publication-title: J Softw Evol Process
  doi: 10.1002/smr.1551
– volume: 13
  start-page: 645
  issue: 6
  year: 2008
  ident: 9528_CR21
  publication-title: ESE
– volume: 21
  start-page: 1476
  issue: 4
  year: 2016
  ident: 9528_CR7
  publication-title: Empir Softw Eng
  doi: 10.1007/s10664-015-9394-4
– ident: 9528_CR26
– ident: 9528_CR18
  doi: 10.1145/1808901.1808911
– volume: 15
  start-page: 1
  issue: 1
  year: 2009
  ident: 9528_CR50
  publication-title: ESE
– volume: 28
  start-page: 654
  issue: 7
  year: 2002
  ident: 9528_CR20
  publication-title: TSE
– volume: 63
  start-page: 1
  year: 2014
  ident: 9528_CR35
  publication-title: ECEASST
– ident: 9528_CR36
  doi: 10.1109/ICSM.2015.7332455
– ident: 9528_CR47
  doi: 10.1109/SCAM.2010.32
– ident: 9528_CR22
  doi: 10.1145/1081706.1081737
– ident: 9528_CR28
  doi: 10.1145/1808901.1808910
– volume: 12
  start-page: 20
  issue: 3
  year: 2012
  ident: 9528_CR32
  publication-title: ACR
– ident: 9528_CR9
– ident: 9528_CR43
  doi: 10.1109/ICPC.2008.42
– ident: 9528_CR3
  doi: 10.1109/ICSM.2011.6080794
– volume: 2009
  start-page: 470
  issue: 74
  year: 2009
  ident: 9528_CR45
  publication-title: SCP
– ident: 9528_CR46
– ident: 9528_CR31
  doi: 10.1145/2245276.2231969
– ident: 9528_CR33
  doi: 10.1109/IWSC.2012.6227863
– ident: 9528_CR6
  doi: 10.1007/978-3-642-19811-3_30
– ident: 9528_CR14
– volume: 95
  start-page: 445
  issue: 4
  year: 2014
  ident: 9528_CR34
  publication-title: SCP
– ident: 9528_CR1
  doi: 10.1109/CSMR.2007.26
– volume: 24
  start-page: 883
  issue: 4
  year: 2016
  ident: 9528_CR37
  publication-title: Softw Qual J
  doi: 10.1007/s11219-016-9305-y
– ident: 9528_CR42
  doi: 10.1109/ICPC.2008.41
– ident: 9528_CR24
  doi: 10.1109/SCAM.2008.14
– ident: 9528_CR52
  doi: 10.1145/2351676.2351701
– ident: 9528_CR19
  doi: 10.1109/ICSE.2009.5070547
– ident: 9528_CR40
  doi: 10.1109/ICSE.2013.6606694
– ident: 9528_CR16
  doi: 10.1145/1862372.1862390
– ident: 9528_CR29
  doi: 10.1109/MSR.2007.8
– ident: 9528_CR12
  doi: 10.1145/1985793.1985836
– ident: 9528_CR8
  doi: 10.1109/ICPC.2011.26
– ident: 9528_CR17
  doi: 10.1109/SANER.2016.78
– ident: 9528_CR38
  doi: 10.1109/MSR.2010.5463343
– ident: 9528_CR49
  doi: 10.1109/WCRE.2010.11
– ident: 9528_CR44
– ident: 9528_CR23
  doi: 10.1109/WCRE.2007.7
– ident: 9528_CR48
  doi: 10.1109/ICSM.2011.6080796
– ident: 9528_CR51
  doi: 10.1145/2491411.2491420
– ident: 9528_CR41
  doi: 10.1109/WCRE.2008.54
– ident: 9528_CR30
  doi: 10.1109/ICPC.2011.14
– ident: 9528_CR15
  doi: 10.14236/ewic/EASE2009.11
– ident: 9528_CR5
  doi: 10.1109/WCRE.2009.51
– volume: 25
  start-page: 165
  issue: 2
  year: 2010
  ident: 9528_CR11
  publication-title: JSME
– volume: 25
  start-page: 1139
  issue: 11
  year: 2013
  ident: 9528_CR4
  publication-title: J Softw Evol Process
  doi: 10.1002/smr.1597
– ident: 9528_CR39
  doi: 10.1109/SCAM.2014.13
SSID ssj0009745
Score 2.2737112
Snippet Clone has emerged as a controversial term in software engineering research and practice. The impact of clones is of great importance from software maintenance...
SourceID crossref
springer
SourceType Enrichment Source
Index Database
Publisher
StartPage 693
SubjectTerms Compilers
Computer Science
Interpreters
Programming Languages
Software Engineering/Programming and Operating Systems
Title Is cloned code really stable?
URI https://link.springer.com/article/10.1007/s10664-017-9528-y
Volume 23
WOSCitedRecordID wos000429551000003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAVX
  databaseName: SpringerLINK Contemporary 1997-Present
  customDbUrl:
  eissn: 1573-7616
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0009745
  issn: 1382-3256
  databaseCode: RSV
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEB60evBifWLVSg6elMA-kt3JSUQsClLEF70tmzQBYanSrUL_vZPtrrWggt4n2Z0wj2-YF8DxMFfKhUJyq6XlQjrFNXkpLtGRCNkoN2nVKHyT9vs4GKjbuo-7bKrdm5RkZam_NLslia-Y8CnHCPl0GVbI26HXxrv7p_mk3bTaTOxn6_GYHHqTyvzuikVntJgJrRxMr_2vX9uA9RpPsvOZAGzCkh1tQbvZ1cBq1d2G7nXJTPFCRpX5LnZGWLEopoywoS7s2Q489i4fLq54vRqBmwhxQjYMk0CYJBZDIYWLhbNGRklspJahs84GWlupCT4pRzFAooxQIrRo4jxMKWaJd6E1om_uASP8ZlNJ8WhKoVhuEXNl3RDRoZJGy6ADQfNGmannhvv1FUU2n3js2c-I_cyzn007cPJ55HU2NOM34tPmUbNaf8qfqff_RH0AawRwcFZpcwityfjNdmHVvE-ey_FRJTcf2RC7KQ
linkProvider Springer Nature
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEB60CnqxPrFqNQdPSmAfyW5yEhFLi7WIVult2aQJCEuVbhX6751sd60FFfQ--5gwmfmGmfkG4HSYSml9xqlR3FDGraQKoxTlwqIJmSDVcTEo3I17PTEYyLtyjjuvut2rkmThqb8Mu0WR65hwJcdA0OkyrDAMWK6P7_7hac60GxebiR23Hg0xoFelzO9esRiMFiuhRYBp1f_1a5uwUeJJcjkzgC1YMqNtqFe7Gkh5dXeg2cmJzl7QqRI3xU4QK2bZlCA2VJm52IXH1nX_qk3L1QhUB0JM0IeJyGM6CtmQcWZDZo3mQRRqrrhvjTWeUoYrhE_SYg4QSc0k843QYerHmLOEe1Ab4Tf3gSB-MzHHfDTGVCw1QqTS2KEQVkiuFfca4FVnlOiSN9ytr8iSOeOxUz9B9ROnfjJtwNnnI68z0ozfhM-rQ03K-5P_LH3wJ-kTWGv3b7tJt9O7OYR1BDti1nVzBLXJ-M00YVW_T57z8XFhQx-p6L4N
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LSwMxEB60inixPrFqdQ-elGB3N9lNTiJqsVhKwQe9LZtsAsJSS3cV-u-d7MNaUEG8zz4mTDLfMJnvAzhNYiGMSxnRkmlCmRFEYpYijBsMIe3FKiwGhfvhYMBHIzGsdE6z-rZ73ZIsZxosS9M4v5gk5uLL4FsQ2NsTtv3ocTJbhhVqNYNsuf7wPGfdDQuVYsuzR3xM7nVb87tXLCamxa5okWy6zX__5iZsVDjTuSoDYwuW9HgbmrWGg1Nt6R1o9zJHpa942Dp2ut1BDJmmMwcxo0z15S48dW8fr-9IJZlAlMd5jmcbDzpUBT5NKKPGp0Yr5gW-YpK5RhvdkVIzibBKGKwNAqGooK7myo_dEGsZfw8aY_zmPjiI63TIsE4NsUSLNeex0Cbh3HDBlGSdFnTq9YpUxSduZS3SaM6EbN2P0P3Iuh_NWnD2-cikJNP4zfi8XuCo2lfZz9YHf7I-gbXhTTfq9wb3h7COGIiXl3GOoJFP33QbVtV7_pJNj4tw-gCyZsbx
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Is+cloned+code+really+stable%3F&rft.jtitle=Empirical+software+engineering+%3A+an+international+journal&rft.au=Mondal%2C+Manishankar&rft.au=Rahman%2C+Md+Saidur&rft.au=Roy%2C+Chanchal+K.&rft.au=Schneider%2C+Kevin+A.&rft.date=2018-04-01&rft.pub=Springer+US&rft.issn=1382-3256&rft.eissn=1573-7616&rft.volume=23&rft.issue=2&rft.spage=693&rft.epage=770&rft_id=info:doi/10.1007%2Fs10664-017-9528-y&rft.externalDocID=10_1007_s10664_017_9528_y
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1382-3256&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1382-3256&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1382-3256&client=summon