Is cloned code really stable?
Clone has emerged as a controversial term in software engineering research and practice. The impact of clones is of great importance from software maintenance perspectives. Stability is a well investigated term in assessing the impacts of clones on software maintenance. If code clones appear to exhi...
Gespeichert in:
| Veröffentlicht in: | Empirical software engineering : an international journal Jg. 23; H. 2; S. 693 - 770 |
|---|---|
| Hauptverfasser: | , , , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
New York
Springer US
01.04.2018
|
| Schlagworte: | |
| ISSN: | 1382-3256, 1573-7616 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | Clone has emerged as a controversial term in software engineering research and practice. The impact of clones is of great importance from software maintenance perspectives. Stability is a well investigated term in assessing the impacts of clones on software maintenance. If code clones appear to exhibit a higher instability (i.e., higher change-proneness) than non-cloned code, then we can expect that code clones require higher maintenance effort and cost than non-cloned code. A number of studies have been done on the comparative stability of cloned and non-cloned code. However, these studies could not come to a consensus. While some studies show that code clones are more stable than non-cloned code, the other studies provide empirical evidence of higher instability of code clones. The possible reasons behind these contradictory findings are that different studies investigated different aspects of stability using different clone detection tools on different subject systems using different experimental setups. Also, the subject systems were not of wide varieties. Emphasizing these issues (with several others mentioned in the motivation) we have conducted a comprehensive empirical study where we have - (i) implemented and investigated seven existing methodologies that explored different aspects of stability, (ii) used two clone detection tools (NiCad and CCFinderX) to implement each of these seven methodologies, and (iii) investigated the stability of three types (Type-1, Type-2, Type-3) of clones. Our investigation on 12 diverse subject systems covering three programming languages (Java, C, C#) with a list of 8 stability assessment metrics suggest that (i) cloned code is often more unstable (change-prone) than non-cloned code in the maintenance phase, (ii) both Type 1 and Type 3 clones appear to exhibit higher instability than Type 2 clones, (iii) clones in Java and C programming languages are more change-prone than the clones in C#, and (iv) changes to the clones in procedural programming languages seem to be more dispersed than the changes to the clones in object oriented languages. We also systematically replicated the original studies with their original settings and found mostly equivalent results as of the original studies. We believe that our findings are important for prioritizing code clones from management perspectives. |
|---|---|
| AbstractList | Clone has emerged as a controversial term in software engineering research and practice. The impact of clones is of great importance from software maintenance perspectives. Stability is a well investigated term in assessing the impacts of clones on software maintenance. If code clones appear to exhibit a higher instability (i.e., higher change-proneness) than non-cloned code, then we can expect that code clones require higher maintenance effort and cost than non-cloned code. A number of studies have been done on the comparative stability of cloned and non-cloned code. However, these studies could not come to a consensus. While some studies show that code clones are more stable than non-cloned code, the other studies provide empirical evidence of higher instability of code clones. The possible reasons behind these contradictory findings are that different studies investigated different aspects of stability using different clone detection tools on different subject systems using different experimental setups. Also, the subject systems were not of wide varieties. Emphasizing these issues (with several others mentioned in the motivation) we have conducted a comprehensive empirical study where we have - (i) implemented and investigated seven existing methodologies that explored different aspects of stability, (ii) used two clone detection tools (NiCad and CCFinderX) to implement each of these seven methodologies, and (iii) investigated the stability of three types (Type-1, Type-2, Type-3) of clones. Our investigation on 12 diverse subject systems covering three programming languages (Java, C, C#) with a list of 8 stability assessment metrics suggest that (i) cloned code is often more unstable (change-prone) than non-cloned code in the maintenance phase, (ii) both Type 1 and Type 3 clones appear to exhibit higher instability than Type 2 clones, (iii) clones in Java and C programming languages are more change-prone than the clones in C#, and (iv) changes to the clones in procedural programming languages seem to be more dispersed than the changes to the clones in object oriented languages. We also systematically replicated the original studies with their original settings and found mostly equivalent results as of the original studies. We believe that our findings are important for prioritizing code clones from management perspectives. |
| Author | Mondal, Manishankar Roy, Chanchal K. Schneider, Kevin A. Rahman, Md Saidur |
| Author_xml | – sequence: 1 givenname: Manishankar surname: Mondal fullname: Mondal, Manishankar email: mshankar.mondal@usask.ca organization: Department of Computer Science, University of Saskatchewan – sequence: 2 givenname: Md Saidur surname: Rahman fullname: Rahman, Md Saidur organization: Department of Computer Science, University of Saskatchewan – sequence: 3 givenname: Chanchal K. surname: Roy fullname: Roy, Chanchal K. organization: Department of Computer Science, University of Saskatchewan – sequence: 4 givenname: Kevin A. surname: Schneider fullname: Schneider, Kevin A. organization: Department of Computer Science, University of Saskatchewan |
| BookMark | eNp9j81KAzEYRYNUsK0-gAthXiD65T9ZiRSthYIbXYdMJpEpcUaScTFvb0pduejq3s25l7NCi2EcAkK3BO4JgHooBKTkGIjCRlCN5wu0JEIxrCSRi9qZpphRIa_QqpQDABjFxRLd7UrjU93qGj92ocnBpTQ3ZXJtCo_X6DK6VMLNX67Rx8vz--YV79-2u83THnuq9YS10hK4l4x3XPDIeAxeUMm8aAWJIQZo2yBaI4iJwI00nhtOgvbMESVBsjUip12fx1JyiPY7918uz5aAPfrZk5-tfvboZ-fKqH-M7yc39eMwZdensyQ9kaW-DJ8h28P4k4cqeAb6BbMEZUg |
| CitedBy_id | crossref_primary_10_1016_j_cose_2024_104205 crossref_primary_10_1109_ACCESS_2020_2990645 crossref_primary_10_1007_s10664_020_09921_9 crossref_primary_10_1016_j_jss_2020_110892 crossref_primary_10_1371_journal_pone_0277216 crossref_primary_10_1109_ACCESS_2019_2913043 crossref_primary_10_1109_TSE_2019_2925616 crossref_primary_10_3390_sym13030447 crossref_primary_10_1007_s00607_022_01133_x crossref_primary_10_1109_ACCESS_2019_2952191 crossref_primary_10_1007_s10664_021_10099_x crossref_primary_10_1145_3630008 crossref_primary_10_1016_j_infsof_2024_107443 crossref_primary_10_1007_s10664_024_10567_0 crossref_primary_10_1016_j_jss_2023_111803 crossref_primary_10_1016_j_scico_2024_103259 |
| Cites_doi | 10.1109/ICSM.2008.4658071 10.1109/ICSM.2007.4362615 10.1109/CSMR.2009.20 10.1145/1985404.1985410 10.1002/smr.1551 10.1007/s10664-015-9394-4 10.1145/1808901.1808911 10.1109/ICSM.2015.7332455 10.1109/SCAM.2010.32 10.1145/1081706.1081737 10.1145/1808901.1808910 10.1109/ICPC.2008.42 10.1109/ICSM.2011.6080794 10.1145/2245276.2231969 10.1109/IWSC.2012.6227863 10.1007/978-3-642-19811-3_30 10.1109/CSMR.2007.26 10.1007/s11219-016-9305-y 10.1109/ICPC.2008.41 10.1109/SCAM.2008.14 10.1145/2351676.2351701 10.1109/ICSE.2009.5070547 10.1109/ICSE.2013.6606694 10.1145/1862372.1862390 10.1109/MSR.2007.8 10.1145/1985793.1985836 10.1109/ICPC.2011.26 10.1109/SANER.2016.78 10.1109/MSR.2010.5463343 10.1109/WCRE.2010.11 10.1109/WCRE.2007.7 10.1109/ICSM.2011.6080796 10.1145/2491411.2491420 10.1109/WCRE.2008.54 10.1109/ICPC.2011.14 10.14236/ewic/EASE2009.11 10.1109/WCRE.2009.51 10.1002/smr.1597 10.1109/SCAM.2014.13 |
| ContentType | Journal Article |
| Copyright | Springer Science+Business Media New York 2017 |
| Copyright_xml | – notice: Springer Science+Business Media New York 2017 |
| DBID | AAYXX CITATION |
| DOI | 10.1007/s10664-017-9528-y |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1573-7616 |
| EndPage | 770 |
| ExternalDocumentID | 10_1007_s10664_017_9528_y |
| GroupedDBID | -4Z -59 -5G -BR -EM -Y2 -~C .86 .DC .VR 06D 0R~ 0VY 199 1N0 1SB 2.D 203 28- 29G 2J2 2JN 2JY 2KG 2LR 2P1 2VQ 2~H 30V 4.4 406 408 409 40D 40E 5GY 5QI 5VS 67Z 6NX 78A 8FE 8FG 8TC 8UJ 95- 95. 95~ 96X AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AAOBN AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYOK AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTD ABFTV ABHLI ABHQN ABJCF ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACHSB ACHXU ACIWK ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACSNA ACZOJ ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFEXP AFGCZ AFKRA AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARAPS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN B-. BA0 BBWZM BDATZ BENPR BGLVJ BGNMA BSONS CAG CCPQU COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 EBLON EBS EIOEI EJD ESBYG FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 GQ8 GXS H13 HCIFZ HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I09 IHE IJ- IKXTQ ITM IWAJR IXC IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ KDC KOV KOW L6V LAK LLZTM M4Y M7S MA- N2Q NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM P19 P62 P9O PF0 PT4 PT5 PTHSS Q2X QOK QOS R4E R89 R9I RHV RNI RNS ROL RPX RSV RZC RZE RZK S0W S16 S1Z S26 S27 S28 S3B SAP SCJ SCLPG SCO SDH SDM SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TSG TSK TSV TUC U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 Z7R Z7S Z7V Z7X Z7Z Z81 Z83 Z86 Z88 Z8M Z8N Z8P Z8R Z8T Z8U Z8W Z92 ZMTXR ~EX AAPKM AAYXX ABBRH ABDBE ABFSG ABRTQ ACSTC ADHKG AEZWR AFDZB AFFHD AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION PHGZM PHGZT PQGLB |
| ID | FETCH-LOGICAL-c288t-878604c634d454f34fec5263c5b51fefe0bbe5b9519f04969c4941e8c3a176063 |
| IEDL.DBID | RSV |
| ISICitedReferencesCount | 22 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000429551000003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1382-3256 |
| IngestDate | Sat Nov 29 05:37:43 EST 2025 Tue Nov 18 22:01:39 EST 2025 Fri Feb 21 02:35:46 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 2 |
| Keywords | Code stability Software maintenance and evolution Code clones |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c288t-878604c634d454f34fec5263c5b51fefe0bbe5b9519f04969c4941e8c3a176063 |
| PageCount | 78 |
| ParticipantIDs | crossref_primary_10_1007_s10664_017_9528_y crossref_citationtrail_10_1007_s10664_017_9528_y springer_journals_10_1007_s10664_017_9528_y |
| PublicationCentury | 2000 |
| PublicationDate | 20180400 2018-4-00 |
| PublicationDateYYYYMMDD | 2018-04-01 |
| PublicationDate_xml | – month: 4 year: 2018 text: 20180400 |
| PublicationDecade | 2010 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationSubtitle | An International Journal |
| PublicationTitle | Empirical software engineering : an international journal |
| PublicationTitleAbbrev | Empir Software Eng |
| PublicationYear | 2018 |
| Publisher | Springer US |
| Publisher_xml | – name: Springer US |
| References | Hotta K, Sano Y, Higo Y, Kusumoto S (2010) Is duplicate code more frequently modified than non-duplicate code in software evolution?: an empirical study on open source software. In: Proc EVOL/IWPSE, pp 73–82 MondalMRoyCKSchneiderKAn insight into the dispersion of changes in cloned and non-cloned code: a genealogy based empirical studySCP2014954445468 Lozano A, Wermelinger M (2010) Tracking clones’ imprint. In: Proc IWSC, pp 65–72 Bettenburg N, Shang W, Ibrahim W, Adams B, Zou Y, Hassan A (2009) An empirical study on inconsistent changes to code clones at release level. In: Proc WCRE, pp 85–94 Jarzabek S, Xu Y (2010) Are clones harmful for maintenance? In: Proc IWSC, pp 73–74 Li J, Ernst MD (2011) CBCD: cloned buggy code detector. University of Washington Department of Computer Science and Engineering technical report UW-CSE-11-05-02. Seattle, May 2, 2011. Revised Roy CK, Cordy JR (2008a) An empirical evaluation of function clones in open source software. In: Proc WCRE, pp 81–90 Wang T, Harman M, Jia Y, Krinke J (2013) Searching for better configurations: a rigorous approach to clone evaluation. In: Proc ESEC/SIGSOFT FSE, pp 455–465 Roy CK, Cordy JR (2009) A mutation/injection-based automatic framework for evaluating code clone detection tools. In: Proc mutation, pp 157–166 Roy CK, Zibran MF, Koschke R (2014) The vision of software clone management: past, present and future. In: Proc CSMR-18/WCRE-21 software evolution week, p 16 Islam JF, Mondal M, Roy CK (2016) Bug replication in code clones: an empirical study. In: Proc. SANER, pp 68–78 MondalMRoyCKSchneiderKAAn empirical study on clone stabilityACR20121232036 Selim GMK, Barbour L, Shang W, Adams B, Hassan AE, Zou Y (2010) Studying the impact of clones on software defects. In: Proc WCRE, pp 13–21 Higo Y, Kusumoto S (2009) Significant and scalable code clone detection with program dependency graph. In: Proc WCRE, pp 315–316 Aversano L, Cerulo L, Penta MD (2007) How clones are maintained: an empirical study. In: Proc CSMR, pp 81–90 Lozano A, Wermelinger M (2008) Assessing the effect of clones on changeability. In: Proc ICSM, pp 227–236 Saha RK, Roy CK, Schneider KA (2011) An automatic framework for extracting and classifying near-miss clone genealogies. In: Proc ICSM, pp 293–302 Cai D, Kim M (2011) An empirical study of long-lived code clones. In: Proc FASE/ETAPS, pp 432–446 Roy CK, Cordy JR (2008c) Scenario-based comparison of clone detection techniques. In: Proc ICPC, pp 153–162 Rahman F, Bird C, Devanbu P (2010) Clones: what is that smell? In: Proc MSR, pp 72–81 HarderJGödeNCloned code: stable codeJ Softw Evol Process201325101063108810.1002/smr.1551 Krinke J (2007) A study of consistent and inconsistent changes to code clones. In: Proc WCRE, pp 170–178 Bakota T, Ferenc R, Gyimothy T (2007) Clone smells in software evolution. In: Proc ICSM, pp 24–33 Barbour L, Khomh F, Zou Y (2011) Late propagation in software clones. In: Proc ICSM, pp 273–282 Juergens E, Deissenboeck F, Hummel B, Wagner S (2009) Do code clones matter? In: Proc ICSE, pp 485–495 Hordijk W, Ponisio M, Wieringa R (2009) Harmfulness of code duplication—a structured review of the evidence. In: Proc EASE, pp 88–97 Göde N, Harder J (2011) Clone Stability. In: Proc CSMR, pp 65–74 Roy CK, Cordy JR (2008b) NICAD: accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization. In: Proc ICPC, pp 172–181 BarbourLKhomhFZouYAn empirical study of faults in late propagation clone genealogiesJ Softw Evol Process201325111139116510.1002/smr.1597 MondalMRoyCKSchneiderKALate propagation in near-miss clones: an empirical studyECEASST201463117 Rahman MS, Roy CK (2014) A change-type based empirical study on the stability of cloned code. In: Proc SCAM, pp 31–40 KamiyaTKusumotoSInoueKCCFinder: a multilinguistic token-based code clone detection system for large scale source codeTSE2002287654670 Krinke J (2008) Is cloned code more stable than non-cloned code? In: Proc SCAM, pp 57–66 MondalMRoyCKSchneiderKAA comparative study on the intensity and harmfulness of late propagation in near-miss code cloneSoftw Qual J201624488391510.1007/s11219-016-9305-y Mondal M, Rahman MS, Saha RK, Roy CK, Krinke J, Schneider KA (2011) An empirical study of the impacts of clones in software maintenance. In: Proc ICPC student research symposium track, pp 242–245 Mondal M, Roy CK, Rahman S, Saha RK, Krinke J, Schneider K A (2012a) Comparative stability of cloned and non-cloned code: an empirical study. In: Proc SAC, pp 1227–1234 Lozano A, Wermelinger M, Nuseibeh B (2007) Evaluating the harmfulness of cloning: a change based experiment. In: Proc MSR, p 18 Göde N, Koschke R (2009) Incremental clone detection. In: Proc CSMR, pp 219–228 Cordy JR, Roy CK (2011) The NiCad Clone Detector. In: Proc ICPC (Tool Demo Track), pp 219–220 Saha RK, Asaduzzaman M, Zibran MF, Roy CK, Schneider KA (2010) Evaluating code clone genealogies at release level: an empirical study. In: Proc SCAM, pp 87–96 Kim M, Sazawal V, Notkin D, Murphy GC (2005) An empirical study of code clone genealogies. In: Proc ESEC-FSE, pp 187–196 Krinke J (2011) Is cloned code older than non-cloned code? In: Proc IWSC, pp 28–33 Wang X, Dang Y, Zhang L, Zhang D, Lan E, Mei H (2012) Can I clone this piece of code here? In: Proc ASE, pp 170–179 ThummalapentaSCeruloLAversanoLPentaMDAn empirical study on the maintenance of source code clonesESE2009151134 GödeNKoschkeRStudying clone evolution using incremental clone detectionJSME2010252165192 Mondal M, Roy CK, Schneider K A (2015) A comparative study on the bug-proneness of different types of code clones. In: Proc ICSME, pp 91–100 Rahman MS, Aryani A, Roy CK, Perin F (2013) On the relationships between domain-based coupling and code clones: an exploratory study. In: Proc ICSE NIER track, pp 1265–1268 ChatterjiDCarverJCKraftNACode clones and developer behavior: results of two surveys of the clone research communityEmpir Softw Eng20162141476150810.1007/s10664-015-9394-4 Göde N, Koschke R (2011) Frequency and risks of changes to clones. In: Proc ICSE, pp 311–320 Mondal M, Roy CK, Schneider KA (2012c) Dispersion of changes in cloned and non-cloned code. In: Proc IWSC, pp 29–35 KapserCGodfreyMW“Cloning considered harmful” considered harmful: patterns of cloning in softwareESE2008136645692 RoyCKCordyJRKoschkeRComparison and evaluation of code clone detection techniques and tools: a qualitative approachSCP200920097447049526752541183.68205 L Barbour (9528_CR4) 2013; 25 9528_CR26 9528_CR27 9528_CR28 N Göde (9528_CR11) 2010; 25 9528_CR29 9528_CR22 9528_CR23 9528_CR24 9528_CR25 CK Roy (9528_CR45) 2009; 2009 9528_CR1 9528_CR2 9528_CR3 9528_CR19 9528_CR5 9528_CR6 9528_CR8 9528_CR15 9528_CR9 9528_CR16 9528_CR17 9528_CR18 9528_CR12 9528_CR14 9528_CR51 9528_CR52 9528_CR10 T Kamiya (9528_CR20) 2002; 28 M Mondal (9528_CR34) 2014; 95 C Kapser (9528_CR21) 2008; 13 J Harder (9528_CR13) 2013; 25 9528_CR48 9528_CR49 9528_CR44 9528_CR46 9528_CR47 9528_CR40 9528_CR41 9528_CR42 9528_CR43 M Mondal (9528_CR35) 2014; 63 M Mondal (9528_CR32) 2012; 12 M Mondal (9528_CR37) 2016; 24 9528_CR38 S Thummalapenta (9528_CR50) 2009; 15 9528_CR39 9528_CR33 9528_CR36 D Chatterji (9528_CR7) 2016; 21 9528_CR30 9528_CR31 |
| References_xml | – reference: MondalMRoyCKSchneiderKAn insight into the dispersion of changes in cloned and non-cloned code: a genealogy based empirical studySCP2014954445468 – reference: Göde N, Koschke R (2011) Frequency and risks of changes to clones. In: Proc ICSE, pp 311–320 – reference: Jarzabek S, Xu Y (2010) Are clones harmful for maintenance? In: Proc IWSC, pp 73–74 – reference: Rahman F, Bird C, Devanbu P (2010) Clones: what is that smell? In: Proc MSR, pp 72–81 – reference: Saha RK, Asaduzzaman M, Zibran MF, Roy CK, Schneider KA (2010) Evaluating code clone genealogies at release level: an empirical study. In: Proc SCAM, pp 87–96 – reference: Barbour L, Khomh F, Zou Y (2011) Late propagation in software clones. In: Proc ICSM, pp 273–282 – reference: Mondal M, Rahman MS, Saha RK, Roy CK, Krinke J, Schneider KA (2011) An empirical study of the impacts of clones in software maintenance. In: Proc ICPC student research symposium track, pp 242–245 – reference: Bettenburg N, Shang W, Ibrahim W, Adams B, Zou Y, Hassan A (2009) An empirical study on inconsistent changes to code clones at release level. In: Proc WCRE, pp 85–94 – reference: MondalMRoyCKSchneiderKAAn empirical study on clone stabilityACR20121232036 – reference: Roy CK, Cordy JR (2008b) NICAD: accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization. In: Proc ICPC, pp 172–181 – reference: Rahman MS, Roy CK (2014) A change-type based empirical study on the stability of cloned code. In: Proc SCAM, pp 31–40 – reference: ChatterjiDCarverJCKraftNACode clones and developer behavior: results of two surveys of the clone research communityEmpir Softw Eng20162141476150810.1007/s10664-015-9394-4 – reference: Hotta K, Sano Y, Higo Y, Kusumoto S (2010) Is duplicate code more frequently modified than non-duplicate code in software evolution?: an empirical study on open source software. In: Proc EVOL/IWPSE, pp 73–82 – reference: Göde N, Koschke R (2009) Incremental clone detection. In: Proc CSMR, pp 219–228 – reference: Roy CK, Cordy JR (2008a) An empirical evaluation of function clones in open source software. In: Proc WCRE, pp 81–90 – reference: Juergens E, Deissenboeck F, Hummel B, Wagner S (2009) Do code clones matter? In: Proc ICSE, pp 485–495 – reference: Krinke J (2008) Is cloned code more stable than non-cloned code? In: Proc SCAM, pp 57–66 – reference: Saha RK, Roy CK, Schneider KA (2011) An automatic framework for extracting and classifying near-miss clone genealogies. In: Proc ICSM, pp 293–302 – reference: Roy CK, Cordy JR (2009) A mutation/injection-based automatic framework for evaluating code clone detection tools. In: Proc mutation, pp 157–166 – reference: RoyCKCordyJRKoschkeRComparison and evaluation of code clone detection techniques and tools: a qualitative approachSCP200920097447049526752541183.68205 – reference: Mondal M, Roy CK, Rahman S, Saha RK, Krinke J, Schneider K A (2012a) Comparative stability of cloned and non-cloned code: an empirical study. In: Proc SAC, pp 1227–1234 – reference: Lozano A, Wermelinger M (2008) Assessing the effect of clones on changeability. In: Proc ICSM, pp 227–236 – reference: Mondal M, Roy CK, Schneider K A (2015) A comparative study on the bug-proneness of different types of code clones. In: Proc ICSME, pp 91–100 – reference: GödeNKoschkeRStudying clone evolution using incremental clone detectionJSME2010252165192 – reference: MondalMRoyCKSchneiderKAA comparative study on the intensity and harmfulness of late propagation in near-miss code cloneSoftw Qual J201624488391510.1007/s11219-016-9305-y – reference: Wang T, Harman M, Jia Y, Krinke J (2013) Searching for better configurations: a rigorous approach to clone evaluation. In: Proc ESEC/SIGSOFT FSE, pp 455–465 – reference: Hordijk W, Ponisio M, Wieringa R (2009) Harmfulness of code duplication—a structured review of the evidence. In: Proc EASE, pp 88–97 – reference: Wang X, Dang Y, Zhang L, Zhang D, Lan E, Mei H (2012) Can I clone this piece of code here? In: Proc ASE, pp 170–179 – reference: Lozano A, Wermelinger M (2010) Tracking clones’ imprint. In: Proc IWSC, pp 65–72 – reference: Cordy JR, Roy CK (2011) The NiCad Clone Detector. In: Proc ICPC (Tool Demo Track), pp 219–220 – reference: KapserCGodfreyMW“Cloning considered harmful” considered harmful: patterns of cloning in softwareESE2008136645692 – reference: Lozano A, Wermelinger M, Nuseibeh B (2007) Evaluating the harmfulness of cloning: a change based experiment. In: Proc MSR, p 18 – reference: Selim GMK, Barbour L, Shang W, Adams B, Hassan AE, Zou Y (2010) Studying the impact of clones on software defects. In: Proc WCRE, pp 13–21 – reference: Göde N, Harder J (2011) Clone Stability. In: Proc CSMR, pp 65–74 – reference: Higo Y, Kusumoto S (2009) Significant and scalable code clone detection with program dependency graph. In: Proc WCRE, pp 315–316 – reference: Cai D, Kim M (2011) An empirical study of long-lived code clones. In: Proc FASE/ETAPS, pp 432–446 – reference: Rahman MS, Aryani A, Roy CK, Perin F (2013) On the relationships between domain-based coupling and code clones: an exploratory study. In: Proc ICSE NIER track, pp 1265–1268 – reference: ThummalapentaSCeruloLAversanoLPentaMDAn empirical study on the maintenance of source code clonesESE2009151134 – reference: Krinke J (2007) A study of consistent and inconsistent changes to code clones. In: Proc WCRE, pp 170–178 – reference: Krinke J (2011) Is cloned code older than non-cloned code? In: Proc IWSC, pp 28–33 – reference: HarderJGödeNCloned code: stable codeJ Softw Evol Process201325101063108810.1002/smr.1551 – reference: Islam JF, Mondal M, Roy CK (2016) Bug replication in code clones: an empirical study. In: Proc. SANER, pp 68–78 – reference: Li J, Ernst MD (2011) CBCD: cloned buggy code detector. University of Washington Department of Computer Science and Engineering technical report UW-CSE-11-05-02. Seattle, May 2, 2011. Revised – reference: Roy CK, Cordy JR (2008c) Scenario-based comparison of clone detection techniques. In: Proc ICPC, pp 153–162 – reference: Kim M, Sazawal V, Notkin D, Murphy GC (2005) An empirical study of code clone genealogies. In: Proc ESEC-FSE, pp 187–196 – reference: Aversano L, Cerulo L, Penta MD (2007) How clones are maintained: an empirical study. In: Proc CSMR, pp 81–90 – reference: BarbourLKhomhFZouYAn empirical study of faults in late propagation clone genealogiesJ Softw Evol Process201325111139116510.1002/smr.1597 – reference: Bakota T, Ferenc R, Gyimothy T (2007) Clone smells in software evolution. In: Proc ICSM, pp 24–33 – reference: MondalMRoyCKSchneiderKALate propagation in near-miss clones: an empirical studyECEASST201463117 – reference: Mondal M, Roy CK, Schneider KA (2012c) Dispersion of changes in cloned and non-cloned code. In: Proc IWSC, pp 29–35 – reference: Roy CK, Zibran MF, Koschke R (2014) The vision of software clone management: past, present and future. In: Proc CSMR-18/WCRE-21 software evolution week, p 16 – reference: KamiyaTKusumotoSInoueKCCFinder: a multilinguistic token-based code clone detection system for large scale source codeTSE2002287654670 – ident: 9528_CR27 doi: 10.1109/ICSM.2008.4658071 – ident: 9528_CR2 doi: 10.1109/ICSM.2007.4362615 – ident: 9528_CR10 doi: 10.1109/CSMR.2009.20 – ident: 9528_CR25 doi: 10.1145/1985404.1985410 – volume: 25 start-page: 1063 issue: 10 year: 2013 ident: 9528_CR13 publication-title: J Softw Evol Process doi: 10.1002/smr.1551 – volume: 13 start-page: 645 issue: 6 year: 2008 ident: 9528_CR21 publication-title: ESE – volume: 21 start-page: 1476 issue: 4 year: 2016 ident: 9528_CR7 publication-title: Empir Softw Eng doi: 10.1007/s10664-015-9394-4 – ident: 9528_CR26 – ident: 9528_CR18 doi: 10.1145/1808901.1808911 – volume: 15 start-page: 1 issue: 1 year: 2009 ident: 9528_CR50 publication-title: ESE – volume: 28 start-page: 654 issue: 7 year: 2002 ident: 9528_CR20 publication-title: TSE – volume: 63 start-page: 1 year: 2014 ident: 9528_CR35 publication-title: ECEASST – ident: 9528_CR36 doi: 10.1109/ICSM.2015.7332455 – ident: 9528_CR47 doi: 10.1109/SCAM.2010.32 – ident: 9528_CR22 doi: 10.1145/1081706.1081737 – ident: 9528_CR28 doi: 10.1145/1808901.1808910 – volume: 12 start-page: 20 issue: 3 year: 2012 ident: 9528_CR32 publication-title: ACR – ident: 9528_CR9 – ident: 9528_CR43 doi: 10.1109/ICPC.2008.42 – ident: 9528_CR3 doi: 10.1109/ICSM.2011.6080794 – volume: 2009 start-page: 470 issue: 74 year: 2009 ident: 9528_CR45 publication-title: SCP – ident: 9528_CR46 – ident: 9528_CR31 doi: 10.1145/2245276.2231969 – ident: 9528_CR33 doi: 10.1109/IWSC.2012.6227863 – ident: 9528_CR6 doi: 10.1007/978-3-642-19811-3_30 – ident: 9528_CR14 – volume: 95 start-page: 445 issue: 4 year: 2014 ident: 9528_CR34 publication-title: SCP – ident: 9528_CR1 doi: 10.1109/CSMR.2007.26 – volume: 24 start-page: 883 issue: 4 year: 2016 ident: 9528_CR37 publication-title: Softw Qual J doi: 10.1007/s11219-016-9305-y – ident: 9528_CR42 doi: 10.1109/ICPC.2008.41 – ident: 9528_CR24 doi: 10.1109/SCAM.2008.14 – ident: 9528_CR52 doi: 10.1145/2351676.2351701 – ident: 9528_CR19 doi: 10.1109/ICSE.2009.5070547 – ident: 9528_CR40 doi: 10.1109/ICSE.2013.6606694 – ident: 9528_CR16 doi: 10.1145/1862372.1862390 – ident: 9528_CR29 doi: 10.1109/MSR.2007.8 – ident: 9528_CR12 doi: 10.1145/1985793.1985836 – ident: 9528_CR8 doi: 10.1109/ICPC.2011.26 – ident: 9528_CR17 doi: 10.1109/SANER.2016.78 – ident: 9528_CR38 doi: 10.1109/MSR.2010.5463343 – ident: 9528_CR49 doi: 10.1109/WCRE.2010.11 – ident: 9528_CR44 – ident: 9528_CR23 doi: 10.1109/WCRE.2007.7 – ident: 9528_CR48 doi: 10.1109/ICSM.2011.6080796 – ident: 9528_CR51 doi: 10.1145/2491411.2491420 – ident: 9528_CR41 doi: 10.1109/WCRE.2008.54 – ident: 9528_CR30 doi: 10.1109/ICPC.2011.14 – ident: 9528_CR15 doi: 10.14236/ewic/EASE2009.11 – ident: 9528_CR5 doi: 10.1109/WCRE.2009.51 – volume: 25 start-page: 165 issue: 2 year: 2010 ident: 9528_CR11 publication-title: JSME – volume: 25 start-page: 1139 issue: 11 year: 2013 ident: 9528_CR4 publication-title: J Softw Evol Process doi: 10.1002/smr.1597 – ident: 9528_CR39 doi: 10.1109/SCAM.2014.13 |
| SSID | ssj0009745 |
| Score | 2.2737112 |
| Snippet | Clone has emerged as a controversial term in software engineering research and practice. The impact of clones is of great importance from software maintenance... |
| SourceID | crossref springer |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 693 |
| SubjectTerms | Compilers Computer Science Interpreters Programming Languages Software Engineering/Programming and Operating Systems |
| Title | Is cloned code really stable? |
| URI | https://link.springer.com/article/10.1007/s10664-017-9528-y |
| Volume | 23 |
| WOSCitedRecordID | wos000429551000003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAVX databaseName: SpringerLINK Contemporary 1997-Present customDbUrl: eissn: 1573-7616 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0009745 issn: 1382-3256 databaseCode: RSV dateStart: 19970101 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEB60evBifWLVSg6elMBuN0mTk4hYFKSIL3pbkjQBYanSrcL-eyf7sBZU0PvsYybz-MK8AI6Vjh1GDkOVUJ4y7hRVynoaRWMeECyqQTld_6Y_HMrRSN3Wfdx5U-3epCRLT_2l2U2IUDERUo49SYtlWMFoJ4M13t0_zSft9svNxGG2Hk0woDepzO9esRiMFjOhZYAZtP_1axuwXuNJcl4pwCYsuckWtJtdDaQ23W3oXufEZi_oVEnoYieIFbOsIIgNTebOduBxcPlwcUXr1QjU9qScoQ-TImJWJGzMOPMJ887ynkgsNzz2zrvIGMcNilp5vAMIZZlisZM20XEf7yzJLrQm-M09IIohyNE6lo5ZNpaIGL0VWivPNZ6aMR2IGhmltp4bHtZXZOl84nFgP0X208B-WnTg5POR12poxm_Ep41Q09p-8p-p9_9EfQBrCHBkVWlzCK3Z9M11YdW-z57z6VGpNx8twLrz |
| linkProvider | Springer Nature |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEB60CnqxPrFqNQdPSmC3m6TJSUQsLdYiWqW3ZZMmICxVulXov3ey3bUWVNB79jGTycwXZuYbgFOVhBYjh6ZKKEcZt4oqZRwNgiH3CBbNIGfX7zZ7PTkYqLuijzsrq93LlGTuqb80uwnhKyZ8yrEh6XQZVhgGLF_Hd__wNGfabeaTiT23Ho0woJepzO9esRiMFjOheYBpVf_1a5uwUeBJcjkzgC1YsqNtqJazGkhxdHeg3smISV_QqRLfxU4QK6bplCA21Km92IXH1nX_qk2L0QjUNKScoA-TImBGRGzIOHMRc9bwhogM1zx01tlAa8s1qlo5vAMIZZhioZUmSsIm3lmiPaiM8Jv7QBRDkJMkobTMsKFExOiMSBLleIK7pnUNglJHsSl4w_34ijSeMx578WMUP_bix9ManH0-8jojzfht8Xmp1Lg4P9nPqw_-tPoE1tr9227c7fRuDmEdwY6cVd0cQWUyfrN1WDXvk-dsfJzb0Af8Ab3X |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LSwMxEB60inixPrFqdQ-elOBuN0mTk4haLJZS8EFvyyZNQFhq6a5C_72TfVgLKoj32cckk8w3zMw3AKcyDgx6DkUkl5ZQZiSRUlvi-yPmECyaQc6u32v3-2I4lINyzmlaVbtXKcmip8GxNI2zi8nIXnxpfOPcVU-49GNLkNkyrFA3M8iF6w_Pc9bddj6l2PHskRCde5XW_O4Vi45pMSuaO5tO_d-_uQkbJc70rgrD2IIlM96GejXDwSuP9A40u6mnk1e8bD3X3e4hhkySmYeYUSXmcheeOreP13ekHJlAdEuIDO82wX2qeUhHlFEbUms0a_FQM8UCa6zxlTJM4RZIi7EBl5pKGhihwzhoYywT7kFtjN_cB09SBD9xHAhDNR0JRJJW8ziWlsW4m0o1wK_WK9Iln7gba5FEcyZkp36E6kdO_WjWgLPPRyYFmcZvwufVAkfluUp_lj74k_QJrA1uOlGv278_hHXEQKIoxjmCWjZ9M01Y1e_ZSzo9zs3pA-9txrs |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Is+cloned+code+really+stable%3F&rft.jtitle=Empirical+software+engineering+%3A+an+international+journal&rft.au=Mondal%2C+Manishankar&rft.au=Rahman%2C+Md+Saidur&rft.au=Roy%2C+Chanchal+K.&rft.au=Schneider%2C+Kevin+A.&rft.date=2018-04-01&rft.pub=Springer+US&rft.issn=1382-3256&rft.eissn=1573-7616&rft.volume=23&rft.issue=2&rft.spage=693&rft.epage=770&rft_id=info:doi/10.1007%2Fs10664-017-9528-y&rft.externalDocID=10_1007_s10664_017_9528_y |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1382-3256&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1382-3256&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1382-3256&client=summon |