Cloned and non-cloned Java methods: a comparative study

Reusing code via copy-and-paste, with or without modification is a common behavior observed in software engineering. Traditionally, cloning has been considered as a bad smell suggesting flaws in design decisions. Many studies exist targeting clone discovery, removal, and refactoring. However there a...

Full description

Saved in:
Bibliographic Details
Published in:Empirical software engineering : an international journal Vol. 23; no. 4; pp. 2232 - 2278
Main Authors: Saini, Vaibhav, Sajnani, Hitesh, Lopes, Cristina
Format: Journal Article
Language:English
Published: New York Springer US 01.08.2018
Subjects:
ISSN:1382-3256, 1573-7616
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Reusing code via copy-and-paste, with or without modification is a common behavior observed in software engineering. Traditionally, cloning has been considered as a bad smell suggesting flaws in design decisions. Many studies exist targeting clone discovery, removal, and refactoring. However there are not many studies which empirically investigate and compare the quality of cloned code to that of the code which has not been cloned. To this end, we present a statistical study that shows whether qualitative differences exist between cloned methods and non-cloned methods in Java projects. The dataset consists of 3562 open source Java projects containing 412,705 cloned and 616,604 non-cloned methods. The study uses 27 software metrics as a proxy for quality, spanning across complexity, modularity, and documentation (code-comments) categories. When controlling for size, no statistically significant differences were found between cloned and non-cloned methods for most of the metrics, except for three of them. The main statistically significant difference found was that cloned methods are on an average 18% smaller than non-cloned methods. After doing a mixed method analysis, we provide some insight for why cloned methods are smaller.
AbstractList Reusing code via copy-and-paste, with or without modification is a common behavior observed in software engineering. Traditionally, cloning has been considered as a bad smell suggesting flaws in design decisions. Many studies exist targeting clone discovery, removal, and refactoring. However there are not many studies which empirically investigate and compare the quality of cloned code to that of the code which has not been cloned. To this end, we present a statistical study that shows whether qualitative differences exist between cloned methods and non-cloned methods in Java projects. The dataset consists of 3562 open source Java projects containing 412,705 cloned and 616,604 non-cloned methods. The study uses 27 software metrics as a proxy for quality, spanning across complexity, modularity, and documentation (code-comments) categories. When controlling for size, no statistically significant differences were found between cloned and non-cloned methods for most of the metrics, except for three of them. The main statistically significant difference found was that cloned methods are on an average 18% smaller than non-cloned methods. After doing a mixed method analysis, we provide some insight for why cloned methods are smaller.
Author Saini, Vaibhav
Sajnani, Hitesh
Lopes, Cristina
Author_xml – sequence: 1
  givenname: Vaibhav
  orcidid: 0000-0002-6107-9504
  surname: Saini
  fullname: Saini, Vaibhav
  email: vpsaini@uci.edu
  organization: University of California Irvine
– sequence: 2
  givenname: Hitesh
  surname: Sajnani
  fullname: Sajnani, Hitesh
  organization: Microsoft
– sequence: 3
  givenname: Cristina
  surname: Lopes
  fullname: Lopes, Cristina
  organization: University of California Irvine
BookMark eNp9j8tOwzAQRS1UJNrCB7DLDxjGdp1p2KGKpyqxgbU18QNSpUllp5X697gKKxZdzYx0z9WcGZt0fecZuxVwJwDwPgkoywUHgbzSKDlesKnQqDiWopzkXS0lV1KXV2yW0gYAKlzoKcNVm4tcQZ0rciW34_lOByq2fvjpXXooqLD9dkeRhubgizTs3fGaXQZqk7_5m3P29fz0uXrl64-Xt9XjmlslceCiskKSpEopAkU1OCAkrdCjJ7CEGKwOoaqdrgjqQEqT1S5YqBHEEtSc4dhrY59S9MHYZsh_9N0QqWmNAHPyN6O_yf7m5G8wk-IfuYvNluLxLCNHJuVs9-2j2fT72GXBM9AvhdlvbA
CitedBy_id crossref_primary_10_4018_IJRSDA_2019070104
crossref_primary_10_1007_s10664_021_10099_x
Cites_doi 10.1109/32.544352
10.1109/ICSM.1999.792593
10.1109/32.799939
10.1109/MSR.2007.8
10.1109/TSE.1987.233164
10.1016/0164-1212(93)90077-B
10.1145/2884781.2884877
10.1145/1985793.1985836
10.1109/CSMR.2012.37
10.1109/ICSME.2014.45
10.1002/j.2168-9830.2009.tb01005.x
10.1109/ICSM.2011.6080795
10.1109/WPC.2003.1199203
10.3844/jcssp.2005.276.282
10.1016/j.scico.2009.02.007
10.1109/CSMR.2009.20
10.14236/ewic/EASE2009.6
10.1109/CSMR.2005.44
10.1007/3-540-47764-0_3
10.1109/ICSME.2014.77
10.1109/CSMR-WCRE.2014.6747229
10.1109/ICSE.2009.5070547
10.1109/WPC.2003.1199187
10.1007/11767718_11
10.1145/1159733.1159738
10.1109/ICSM.1994.336783
10.1109/ICSME.2016.94
10.1109/ASWEC.2008.4483215
10.1109/ICSM.2009.5306336
10.1145/2491411.2491420
10.1109/32.295895
10.1145/2372225.2372231
10.1007/s10664-008-9076-6
10.1109/TSE.2002.1019480
10.1109/ICSM.2008.4658071
10.1007/978-3-642-39038-8_21
10.1109/WCRE.2001.957835
10.1007/978-3-540-76440-3_2
10.1109/SBCARS.2012.16
10.1109/TSE.2003.1191795
10.1007/s10664-011-9195-3
10.1109/WCRE.2007.7
10.1145/2245276.2231969
10.1109/RCIS.2010.5507329
10.1109/ISSRE.2007.22
10.1109/TSE.2005.114
10.1109/32.935855
10.1016/S0164-1212(99)00102-8
10.1109/TSE.1976.233837
10.1109/CSMR.2011.11
10.1109/SCAM.2008.14
10.1145/361598.361623
10.1109/TSE.2007.70725
10.1109/SCAM.2014.12
10.1145/1081706.1081737
10.1145/1134285.1134349
10.1109/ICSM.1998.738528
10.1109/32.879814
10.1007/978-0-387-09684-1_19
10.1145/1862372.1862390
ContentType Journal Article
Copyright Springer Science+Business Media, LLC 2017
Copyright_xml – notice: Springer Science+Business Media, LLC 2017
DBID AAYXX
CITATION
DOI 10.1007/s10664-017-9572-7
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1573-7616
EndPage 2278
ExternalDocumentID 10_1007_s10664_017_9572_7
GrantInformation_xml – fundername: National Science Foundation
  grantid: 1218228
  funderid: https://doi.org/10.13039/100000001
GroupedDBID -4Z
-59
-5G
-BR
-EM
-Y2
-~C
.86
.DC
.VR
06D
0R~
0VY
199
1N0
1SB
2.D
203
28-
29G
2J2
2JN
2JY
2KG
2LR
2P1
2VQ
2~H
30V
4.4
406
408
409
40D
40E
5GY
5QI
5VS
67Z
6NX
78A
8FE
8FG
8TC
8UJ
95-
95.
95~
96X
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AAOBN
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYOK
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDZT
ABECU
ABFTD
ABFTV
ABHLI
ABHQN
ABJCF
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACIWK
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACSNA
ACZOJ
ADHHG
ADHIR
ADIMF
ADINQ
ADKNI
ADKPE
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFEXP
AFGCZ
AFKRA
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARAPS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
B-.
BA0
BBWZM
BDATZ
BENPR
BGLVJ
BGNMA
BSONS
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
EBLON
EBS
EIOEI
EJD
ESBYG
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
GQ8
GXS
H13
HCIFZ
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I09
IHE
IJ-
IKXTQ
ITM
IWAJR
IXC
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
KDC
KOV
KOW
L6V
LAK
LLZTM
M4Y
M7S
MA-
N2Q
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
P19
P62
P9O
PF0
PT4
PT5
PTHSS
Q2X
QOK
QOS
R4E
R89
R9I
RHV
RNI
RNS
ROL
RPX
RSV
RZC
RZE
RZK
S0W
S16
S1Z
S26
S27
S28
S3B
SAP
SCJ
SCLPG
SCO
SDH
SDM
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TSG
TSK
TSV
TUC
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
Z7R
Z7S
Z7V
Z7X
Z7Z
Z81
Z83
Z86
Z88
Z8M
Z8N
Z8P
Z8R
Z8T
Z8U
Z8W
Z92
ZMTXR
~EX
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ABRTQ
ACSTC
ADHKG
AEZWR
AFDZB
AFFHD
AFHIU
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
PHGZM
PHGZT
PQGLB
ID FETCH-LOGICAL-c327t-19c12a2a933a03ab0d0a7a537e7ea0ca77fc5ff9bd59a0bfa35ac5dfc0b701803
IEDL.DBID RSV
ISICitedReferencesCount 5
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000435804100013&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1382-3256
IngestDate Sat Nov 29 05:37:43 EST 2025
Tue Nov 18 22:37:45 EST 2025
Fri Feb 21 02:35:46 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 4
Keywords Quality metrics
Open source software
Code clones
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c327t-19c12a2a933a03ab0d0a7a537e7ea0ca77fc5ff9bd59a0bfa35ac5dfc0b701803
ORCID 0000-0002-6107-9504
PageCount 47
ParticipantIDs crossref_citationtrail_10_1007_s10664_017_9572_7
crossref_primary_10_1007_s10664_017_9572_7
springer_journals_10_1007_s10664_017_9572_7
PublicationCentury 2000
PublicationDate 2018-08-01
PublicationDateYYYYMMDD 2018-08-01
PublicationDate_xml – month: 08
  year: 2018
  text: 2018-08-01
  day: 01
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationSubtitle An International Journal
PublicationTitle Empirical software engineering : an international journal
PublicationTitleAbbrev Empir Software Eng
PublicationYear 2018
Publisher Springer US
Publisher_xml – name: Springer US
References Mubarak A, Counsell S, Hierons R (2009) Does an 80: 20 rule apply to Java coupling?. In: Proceedings of the international conference on evaluation and assessment in software engineering
Svajlenko J, Islam JF, Keivanloo I, Roy CK, Mia MM (2014) Towards a big data curated benchmark of inter-project code clones. In: IEEE international conference on software maintenance and evolution (ICSME), 2014. IEEE, pp 476–480
Hotta K, Sano Y, Higo Y, Kusumoto S (2010) Is duplicate code more frequently modified than non-duplicate code in software evolution?: an empirical study on open source software. In: Proceedings of the joint ERCIM workshop on software evolution (EVOL) and international workshop on principles of software evolution (IWPSE). ACM, pp 73–82
Baker B (1992) A program for identifying duplicated code. In: Proceedings of 24th Symposium of Computing Science and Statistics, March 1992, pp 49–57
Nagappan N, Ball T, Zeller A (2006) Mining metrics to predict component failures. In: Proceedings of the 28th international conference on software engineering. ACM
Miles MB, Huberman AM (1994) Qualitative data analysis: an expanded sourcebook. Sage
Koschke R (2007) Survey of research on software clones. In: Proceedings of duplication, redundancy, and similarity in software
BorregoMDouglasEPAmelinkCTQuantitative, qualitative, and mixed research methods in engineering educationJ Eng Educ2009981536610.1002/j.2168-9830.2009.tb01005.x
Koschke R (2008) Identifying and removing software clones. In: Software evolution. Springer, pp 15–36
Samoladas I, Gousios G, Spinellis D, Stamelos I (2008) The SQO-OSS quality model: measurement based open source software evaluation. In: Open source development, communities and quality, pp 237–248
HerzigKJustSRauAZellerAClassifying code changes and predicting defects using changegenealogies. Technical Report, Tech. Rep2013GermanySaarland University
KamiyaTKusumotoSInoueKCCFInder: a multilinguistic token-based code clone detection system for large scale source codeIEEE Trans Softw Eng200228765467010.1109/TSE.2002.1019480
Halstead MH (1977) Elements of software science (operating and programming systems series). Elsevier Science Inc.
de Wit M, Zaidman A, van Deursen A (2009) Managing code clones using dynamic change tracking and resolution. In: Proceedings of the 25th international conference on software maintenance (ICSM 2009). IEEE Computer Society
Lucrédio D, de Almeida ES, Fortes RP (2012) An investigation on the impact of mde on software reuse. In: Sixth brazilian symposium on software components architectures and reuse (SBCARS), 2012. IEEE, pp 101–110
BasiliVRShullFLanubileFBuilding knowledge through families of experimentsIEEE Trans Softw Eng199925445647310.1109/32.799939
Lopes C, Bajracharya S, Ossher J, Baldi P (2010) UCI Source code data sets. [Online]. Available: http://www.ics.uci.edu/~lopes/datasets
Wang T, Harman M, Jia Y, Krinke J (2013) Searching for better configurations: a rigorous approach to clone evaluation. In: Proceedings of the 2013 9th joint meeting on foundations of software engineering. ACM, pp 455–465
BruntinkMvan DeursenAvan EngelenRTourwéTOn the use of clone detection for identifying cross cutting concern codeIEEE Trans Softw Eng2005311080481810.1109/TSE.2005.114
Rajapakse DC, Jarzabek S (2007) Using server pages to unify clones in web applications: a trade-off analysis. In: Proceedings of international conference on software engineering, pp 116–126
Koschke R (2012) Large-scale inter-system clone detection using suffix trees. In: Proceedings of CSMR, pp 309–318
Krinke J (2007) A study of consistent and inconsistent changes to code clones. In: Working conference on reverse engineering, pp 170–178
LiWHenrySObject-oriented metrics that predict maintainabilityJ Syst Softw199323211112210.1016/0164-1212(93)90077-B
Shomrat M, Feldman Y (2013) Detecting refactored clones. In: Castagna G (ed) ECOOP 2013 European condeference on object-oriented programming, ser. Lecture notes in computer science, vol 7920. Springer, Berlin, pp 502–526
Kim M, Sazawal V, Notkin D, Murphy G (2005) An empirical study of code clone genealogies. In: Proceedings of FSE
Nasseri E, Counsell S, Shepperd M (2008) An empirical study of evolution of inheritance in Java OSS. In: 19th Australian conference on software engineering, 2008. ASWEC 2008. IEEE, pp 269–278
Arisholm E, Briand LC, Fuglerud M (2007) Data mining techniques for building fault-proneness models in telecom Java software. In: The 18th IEEE international symposium on software reliability, 2007. ISSRE’07. IEEE, pp 215–224
Juergens E, Deissenboeck F, Hummel B, Wagner S (2009) Do code clones matter?. In: Proceedings of ICSE, pp 485–495
Apache Maven, http://maven.apache.org
ParnasDLOn the criteria to be used in decomposing systems into modulesCommun ACM197215121053105810.1145/361598.361623
ChidamberSRKemererCFA metrics suite for object oriented designIEEE Trans Softw Eng199420647649310.1109/32.295895
Baxter ID, Yahin A, Moura L, Sant’Anna M, Bier L (1998) Clone detection using abstract syntax trees. In: Proceedings of the international conference on software maintenance. IEEE Computer Society, p 368
BörstlerJNordströmMPatersonJHOn the quality of examples in introductory Java textbooksACM Transactions on Computing Education (TOCE)20111113
Gode N, Harder J (2011) Clone stability. In: 15th European conference on software maintenance and reengineering (CSMR), 2011. IEEE, pp 65–74
BasiliVRBriandLCMeloWLA validation of object-oriented design metrics as quality indicatorsIEEE Trans Softw Eng1996221075176110.1109/32.544352
Johnson JH (1993) Identifying redundancy in source code using fingerprints. In: Proceedings of the 1993 conference of the centre for advanced studies on collaborative research: software engineering, vol 1. IBM Press, Toronto, pp 171–183
RoyCKCordyJRKoschkeRComparison and evaluation of code clone detection techniques and tools: a qualitative approachSci Comput Program2009747470495267525410.1016/j.scico.2009.02.0071183.68205
Lopes CV, Ossher J (2015) How scale affects structure in Java programs. In: Proceedings of the 2015 ACM SIGPLAN international conference on object-oriented programming, systems, languages, and applications. ACM, pp 675–694
Göde N, Koschke R (2011) Frequency and risks of changes to clones. In: Proceedings of the 33rd international conference on software engineering. ACM, pp 311–320
Krinke J (2008) Is cloned code more stable than non-cloned code?. In: Eighth IEEE international working conference on source code analysis and manipulation, 2008. IEEE, pp 57–66
Lozano A, Wermelinger M (2008) Assessing the effect of clones on changeability. In: IEEE international conference on software maintenance, 2008. ICSM 2008. IEEE, pp 227–236
Andersson M, Vestergren P (2004) Object-oriented design quality metrics. Citeseer. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.1.5047&rep=rep1&type=pdf
Komondoor R, Horwitz S (2003) Effective automatic procedure extraction. In: Proceedings of the international workshop on program comprehension. Springer, pp 40–56
Arisholm E, Briand LC (2006) Predicting fault-prone components in a Java legacy system. In: Proceedings of the 2006 ACM/IEEE international symposium on empirical software engineering. ACM, pp 8– 17
Jhawk, http://mondego.ics.uci.edu/projects/clonedetection
Kutner MH, Nachtsheim C, Neter J, Li W (2005) Applied Linear Statistical Models. McGraw-Hill Irwin
Gode N, Koschke R (2009) Incremental clone detection. In: Proceedings of CSMR
Roy CK, Cordy JR (2007) A survey on software clone detection research. Technical report, Queen’s University at Kingston
Ducasse S, Rieger M, Demeyer S (1999) A language independent approach for detecting duplicated code. In: Proceedings of the IEEE international conference on software maintenance. IEEE Computer Society, p 109
KafuraDReddyGThe use of software complexity metrics in software maintenanceIEEE Trans Softw Eng1987SE-13333534310.1109/TSE.1987.233164
El EmamKBenlarbiSGoelNRaiSNThe confounding effect of class size on the validity of object-oriented metricsIEEE Trans Softw Eng200127763065010.1109/32.935855
Sajnani H, Saini V, Lopes CV (2014a) A comparative study of bug patterns in Java cloned and non-cloned code. In: IEEE 14th international working conference on source code analysis and manipulation (SCAM), 2014. IEEE, pp 21–30
Alghamdi JS, Rufai RA, Khan SM (2005) Oometer: a software quality assurance tool. In: IEEE, pp 190–191
BasiliVRCaldieraGRombachHDThe goal question metric approachEncyclopedia of Software Engineering19941528532
Johnson JH (1994) Substring matching for clone detection and change tracking. In: International conference on software maintanence, pp 120–126
FowlerMBeckKBrantJOpdykeWRobertsDRefactoring: improving the design of existing code1999ReadingAddison-Wesley Professional
GuptaVAggarwalKSinghYA fuzzy approach for integrated measure of object-oriented software testabilityJ Comput Sci20051227628210.3844/jcssp.2005.276.282
Mubarak A, Counsell S, Hierons RM (2010) An evolutionary study of fan-in and fan-out metrics in OSS. In: Fourth international conference on research challenges in information science (RCIS), 2010. IEEE, pp 473–482
Sajnani H, Saini V, Ossher J, Lopes C (2014b) Is popularity a measure of its quality? An analysis of maven components. In: Proceedings of the 30th software maintenance and evolution(to appear in ICSME 2014). IEEE Computer Society
Ossher J, Sajnani H, Lopes CV (2011) File cloning in open source Java projects: the good, the bad, and the ugly. In: ICSM. IEEE
Krinke J (2001) Identifying similar code with program dependence graphs. In: Proceedings of the eighth working conference on reverse engineering (WCRE’01). IEEE Computer Society, p 301
Lozano A, Wermelinger M, Nuseibeh B (2007) Evaluating the harmfulness of cloning: a change based experiment. In: Mining software repositories, pp 18–22
Cordy J (2003) Comprehending reality - practical barriers to industrial adoption of software maintenance automation. In: Proceedings of international conference on program compreh
K El Emam (9572_CR22) 2001; 27
9572_CR47
9572_CR48
9572_CR45
9572_CR46
9572_CR43
9572_CR44
9572_CR41
9572_CR42
9572_CR40
cr-split#-9572_CR75.2
cr-split#-9572_CR75.1
M Cartwright (9572_CR17) 2000; 26
CK Roy (9572_CR68) 2009; 74
V Gupta (9572_CR27) 2005; 1
K Herzig (9572_CR29) 2013
9572_CR39
9572_CR34
9572_CR78
9572_CR35
9572_CR79
9572_CR32
9572_CR33
9572_CR77
9572_CR30
9572_CR74
9572_CR31
R Subramanyam (9572_CR76) 2003; 29
S Bellon (9572_CR11) 2007; 33
9572_CR72
D Kafura (9572_CR36) 1987; SE-13
9572_CR73
M Bruntink (9572_CR16) 2005; 31
9572_CR70
9572_CR71
J Börstler (9572_CR14) 2011; 11
M Borrego (9572_CR13) 2009; 98
F Rahman (9572_CR64) 2012; 17
TJ McCabe (9572_CR55) 1976; 4
9572_CR28
9572_CR25
9572_CR69
9572_CR26
9572_CR67
9572_CR24
9572_CR3
9572_CR21
9572_CR65
9572_CR4
W Li (9572_CR49) 1993; 23
9572_CR66
9572_CR5
9572_CR6
9572_CR20
9572_CR61
9572_CR62
9572_CR1
9572_CR2
9572_CR60
VR Basili (9572_CR8) 1996; 22
M Fowler (9572_CR23) 1999
C Kapser (9572_CR38) 2008; 13
VR Basili (9572_CR7) 1994; 1
9572_CR19
9572_CR58
9572_CR59
VR Basili (9572_CR9) 1999; 25
9572_CR12
9572_CR56
SR Chidamber (9572_CR18) 1994; 20
9572_CR57
9572_CR10
9572_CR54
9572_CR52
9572_CR53
9572_CR50
DL Parnas (9572_CR63) 1972; 15
9572_CR51
T Kamiya (9572_CR37) 2002; 28
LC Briand (9572_CR15) 2000; 51
References_xml – reference: Svajlenko J, Islam JF, Keivanloo I, Roy CK, Mia MM (2014) Towards a big data curated benchmark of inter-project code clones. In: IEEE international conference on software maintenance and evolution (ICSME), 2014. IEEE, pp 476–480
– reference: Lucrédio D, de Almeida ES, Fortes RP (2012) An investigation on the impact of mde on software reuse. In: Sixth brazilian symposium on software components architectures and reuse (SBCARS), 2012. IEEE, pp 101–110
– reference: RoyCKCordyJRKoschkeRComparison and evaluation of code clone detection techniques and tools: a qualitative approachSci Comput Program2009747470495267525410.1016/j.scico.2009.02.0071183.68205
– reference: Wang T, Harman M, Jia Y, Krinke J (2013) Searching for better configurations: a rigorous approach to clone evaluation. In: Proceedings of the 2013 9th joint meeting on foundations of software engineering. ACM, pp 455–465
– reference: Mondal M, Roy CK, Rahman MS, Saha RK, Krinke J, Schneider KA (2012) Comparative stability of cloned and non-cloned code: an empirical study. In: Proceedings of the 27th annual ACM symposium on applied computing. ACM, pp 1227–1234
– reference: KamiyaTKusumotoSInoueKCCFInder: a multilinguistic token-based code clone detection system for large scale source codeIEEE Trans Softw Eng200228765467010.1109/TSE.2002.1019480
– reference: de Wit M, Zaidman A, van Deursen A (2009) Managing code clones using dynamic change tracking and resolution. In: Proceedings of the 25th international conference on software maintenance (ICSM 2009). IEEE Computer Society
– reference: Arisholm E, Briand LC, Fuglerud M (2007) Data mining techniques for building fault-proneness models in telecom Java software. In: The 18th IEEE international symposium on software reliability, 2007. ISSRE’07. IEEE, pp 215–224
– reference: Mubarak A, Counsell S, Hierons RM (2010) An evolutionary study of fan-in and fan-out metrics in OSS. In: Fourth international conference on research challenges in information science (RCIS), 2010. IEEE, pp 473–482
– reference: Krinke J (2008) Is cloned code more stable than non-cloned code?. In: Eighth IEEE international working conference on source code analysis and manipulation, 2008. IEEE, pp 57–66
– reference: Andersson M, Vestergren P (2004) Object-oriented design quality metrics. Citeseer. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.1.5047&rep=rep1&type=pdf
– reference: Koschke R (2008) Identifying and removing software clones. In: Software evolution. Springer, pp 15–36
– reference: Jhawk, http://mondego.ics.uci.edu/projects/clonedetection/
– reference: Krinke J (2007) A study of consistent and inconsistent changes to code clones. In: Working conference on reverse engineering, pp 170–178
– reference: Samoladas I, Gousios G, Spinellis D, Stamelos I (2008) The SQO-OSS quality model: measurement based open source software evaluation. In: Open source development, communities and quality, pp 237–248
– reference: Apache Maven, http://maven.apache.org/
– reference: Lopes C, Bajracharya S, Ossher J, Baldi P (2010) UCI Source code data sets. [Online]. Available: http://www.ics.uci.edu/~lopes/datasets/
– reference: BellonSKoschkeRAntoniolGKrinkeJMerloEComparison and evaluation of clone detection toolsIEEE Trans Softw Eng200733957759110.1109/TSE.2007.70725
– reference: SubramanyamRKrishnanMSEmpirical analysis of ck metrics for object-oriented design complexity: Implications for software defectsIEEE Trans Softw Eng200329429731010.1109/TSE.2003.1191795[Online]. Available: https://doi.org/10.1109/TSE.2003.1191795
– reference: ParnasDLOn the criteria to be used in decomposing systems into modulesCommun ACM197215121053105810.1145/361598.361623
– reference: Islam MR, Zibran MF (2016) A comparative study on vulnerabilities in categories of clones and non-cloned code. In: IEEE 23rd international conference on software analysis, evolution, and reengineering (SANER), vol 3. IEEE, pp 8–14
– reference: Rajapakse DC, Jarzabek S (2007) Using server pages to unify clones in web applications: a trade-off analysis. In: Proceedings of international conference on software engineering, pp 116–126
– reference: Lopes CV, Ossher J (2015) How scale affects structure in Java programs. In: Proceedings of the 2015 ACM SIGPLAN international conference on object-oriented programming, systems, languages, and applications. ACM, pp 675–694
– reference: Miles MB, Huberman AM (1994) Qualitative data analysis: an expanded sourcebook. Sage
– reference: Benestad HC, Anda B, Arisholm E (2006) Assessing software product maintainability based on class-level structural measures. In: Product-focused software process improvement. Springer, pp 94–111
– reference: BorregoMDouglasEPAmelinkCTQuantitative, qualitative, and mixed research methods in engineering educationJ Eng Educ2009981536610.1002/j.2168-9830.2009.tb01005.x
– reference: Koschke R (2012) Large-scale inter-system clone detection using suffix trees. In: Proceedings of CSMR, pp 309–318
– reference: KapserCGodfreyM“Cloning considered harmful” considered harmful: patterns of cloning in softwareEmpir Softw Eng200813664569210.1007/s10664-008-9076-6
– reference: Sajnani H, Saini V, Svajlenko J, Roy CK, Lopes CV (2016) Sourcerercc: scaling code clone detection to big code. In: Proceedings of international conference on software engineering, to appear
– reference: ChidamberSRKemererCFA metrics suite for object oriented designIEEE Trans Softw Eng199420647649310.1109/32.295895
– reference: Ducasse S, Rieger M, Demeyer S (1999) A language independent approach for detecting duplicated code. In: Proceedings of the IEEE international conference on software maintenance. IEEE Computer Society, p 109
– reference: HerzigKJustSRauAZellerAClassifying code changes and predicting defects using changegenealogies. Technical Report, Tech. Rep2013GermanySaarland University
– reference: Johnson JH (1993) Identifying redundancy in source code using fingerprints. In: Proceedings of the 1993 conference of the centre for advanced studies on collaborative research: software engineering, vol 1. IBM Press, Toronto, pp 171–183
– reference: RahmanFBirdCDevanbuPClones: what is that smell?Empir Softw Eng2012174–550353010.1007/s10664-011-9195-3
– reference: Kim M, Sazawal V, Notkin D, Murphy G (2005) An empirical study of code clone genealogies. In: Proceedings of FSE
– reference: Krinke J (2001) Identifying similar code with program dependence graphs. In: Proceedings of the eighth working conference on reverse engineering (WCRE’01). IEEE Computer Society, p 301
– reference: FowlerMBeckKBrantJOpdykeWRobertsDRefactoring: improving the design of existing code1999ReadingAddison-Wesley Professional
– reference: Cordy J (2003) Comprehending reality - practical barriers to industrial adoption of software maintenance automation. In: Proceedings of international conference on program comprehension, pp 196–205
– reference: El EmamKBenlarbiSGoelNRaiSNThe confounding effect of class size on the validity of object-oriented metricsIEEE Trans Softw Eng200127763065010.1109/32.935855
– reference: BasiliVRBriandLCMeloWLA validation of object-oriented design metrics as quality indicatorsIEEE Trans Softw Eng1996221075176110.1109/32.544352
– reference: Alghamdi JS, Rufai RA, Khan SM (2005) Oometer: a software quality assurance tool. In: IEEE, pp 190–191
– reference: Koschke R (2007) Survey of research on software clones. In: Proceedings of duplication, redundancy, and similarity in software
– reference: Hotta K, Sano Y, Higo Y, Kusumoto S (2010) Is duplicate code more frequently modified than non-duplicate code in software evolution?: an empirical study on open source software. In: Proceedings of the joint ERCIM workshop on software evolution (EVOL) and international workshop on principles of software evolution (IWPSE). ACM, pp 73–82
– reference: Arisholm E, Briand LC (2006) Predicting fault-prone components in a Java legacy system. In: Proceedings of the 2006 ACM/IEEE international symposium on empirical software engineering. ACM, pp 8– 17
– reference: Saini V, Sajnani H, Lopes C (2016) Comparing quality metrics for cloned and non cloned java methods: a large scale empirical study. In: IEEE international conference on software maintenance and evolution (ICSME), 2016. IEEE, pp 256–266
– reference: Shomrat M, Feldman Y (2013) Detecting refactored clones. In: Castagna G (ed) ECOOP 2013 European condeference on object-oriented programming, ser. Lecture notes in computer science, vol 7920. Springer, Berlin, pp 502–526
– reference: Gode N, Koschke R (2009) Incremental clone detection. In: Proceedings of CSMR
– reference: CartwrightMShepperdMAn empirical investigation of an object-oriented software systemIEEE Trans Softw Eng200026878679610.1109/32.879814
– reference: Baxter ID, Yahin A, Moura L, Sant’Anna M, Bier L (1998) Clone detection using abstract syntax trees. In: Proceedings of the international conference on software maintenance. IEEE Computer Society, p 368
– reference: Roy CK, Cordy JR (2009) A mutation/injection-based automatic framework for evaluating code clone detection tools. In: International conference on software testing, verification and validation workshops, 2009. ICSTW’09. IEEE, pp 157–166
– reference: KafuraDReddyGThe use of software complexity metrics in software maintenanceIEEE Trans Softw Eng1987SE-13333534310.1109/TSE.1987.233164
– reference: Roy CK, Cordy JR (2007) A survey on software clone detection research. Technical report, Queen’s University at Kingston
– reference: Juergens E, Deissenboeck F, Hummel B, Wagner S (2009) Do code clones matter?. In: Proceedings of ICSE, pp 485–495
– reference: Johnson JH (1994) Substring matching for clone detection and change tracking. In: International conference on software maintanence, pp 120–126
– reference: Kutner MH, Nachtsheim C, Neter J, Li W (2005) Applied Linear Statistical Models. McGraw-Hill Irwin
– reference: Sajnani H, Saini V, Ossher J, Lopes C (2014b) Is popularity a measure of its quality? An analysis of maven components. In: Proceedings of the 30th software maintenance and evolution(to appear in ICSME 2014). IEEE Computer Society
– reference: BörstlerJNordströmMPatersonJHOn the quality of examples in introductory Java textbooksACM Transactions on Computing Education (TOCE)20111113
– reference: BriandLCWüstJDalyJWPorterDVExploring the relationships between design measures and software quality in object-oriented systemsJ Syst Softw200051324527310.1016/S0164-1212(99)00102-8
– reference: Xie S, Khomh F, Zou Y, Keivanloo I (2014) An empirical study on the fault-proneness of clone migration in clone genealogies. In: Proceedings of CSMR-WCRE. IEEE, pp 94–103
– reference: BasiliVRShullFLanubileFBuilding knowledge through families of experimentsIEEE Trans Softw Eng199925445647310.1109/32.799939
– reference: Halstead MH (1977) Elements of software science (operating and programming systems series). Elsevier Science Inc.
– reference: LiWHenrySObject-oriented metrics that predict maintainabilityJ Syst Softw199323211112210.1016/0164-1212(93)90077-B
– reference: Ossher J, Sajnani H, Lopes CV (2011) File cloning in open source Java projects: the good, the bad, and the ugly. In: ICSM. IEEE
– reference: Komondoor R, Horwitz S (2003) Effective automatic procedure extraction. In: Proceedings of the international workshop on program comprehension. Springer, pp 40–56
– reference: Mubarak A, Counsell S, Hierons R (2009) Does an 80: 20 rule apply to Java coupling?. In: Proceedings of the international conference on evaluation and assessment in software engineering
– reference: Nagappan N, Ball T, Zeller A (2006) Mining metrics to predict component failures. In: Proceedings of the 28th international conference on software engineering. ACM
– reference: Göde N, Koschke R (2011) Frequency and risks of changes to clones. In: Proceedings of the 33rd international conference on software engineering. ACM, pp 311–320
– reference: Gode N, Harder J (2011) Clone stability. In: 15th European conference on software maintenance and reengineering (CSMR), 2011. IEEE, pp 65–74
– reference: Nasseri E, Counsell S, Shepperd M (2008) An empirical study of evolution of inheritance in Java OSS. In: 19th Australian conference on software engineering, 2008. ASWEC 2008. IEEE, pp 269–278
– reference: BasiliVRCaldieraGRombachHDThe goal question metric approachEncyclopedia of Software Engineering19941528532
– reference: BruntinkMvan DeursenAvan EngelenRTourwéTOn the use of clone detection for identifying cross cutting concern codeIEEE Trans Softw Eng2005311080481810.1109/TSE.2005.114
– reference: GuptaVAggarwalKSinghYA fuzzy approach for integrated measure of object-oriented software testabilityJ Comput Sci20051227628210.3844/jcssp.2005.276.282
– reference: Scandariato R, Walden J (2012) Predicting vulnerable classes in an android application. In: Proceedings of the 4th international workshop on security measurements and metrics. ACM, pp 11–16
– reference: Baker B (1992) A program for identifying duplicated code. In: Proceedings of 24th Symposium of Computing Science and Statistics, March 1992, pp 49–57
– reference: Lozano A, Wermelinger M, Nuseibeh B (2007) Evaluating the harmfulness of cloning: a change based experiment. In: Mining software repositories, pp 18–22
– reference: Komondoor R, Horwitz S (2001) Using slicing to identify duplication in source code. In: Proceedings of the 8th international symposium on static analysis. Springer, pp 40–56
– reference: Sajnani H, Saini V, Lopes CV (2014a) A comparative study of bug patterns in Java cloned and non-cloned code. In: IEEE 14th international working conference on source code analysis and manipulation (SCAM), 2014. IEEE, pp 21–30
– reference: Lozano A, Wermelinger M (2008) Assessing the effect of clones on changeability. In: IEEE international conference on software maintenance, 2008. ICSM 2008. IEEE, pp 227–236
– reference: McCabeTJA complexity measureIEEE Trans Softw Eng1976430832044590410.1109/TSE.1976.2338370352.68066
– volume: 22
  start-page: 751
  issue: 10
  year: 1996
  ident: 9572_CR8
  publication-title: IEEE Trans Softw Eng
  doi: 10.1109/32.544352
– ident: 9572_CR21
  doi: 10.1109/ICSM.1999.792593
– volume: 25
  start-page: 456
  issue: 4
  year: 1999
  ident: 9572_CR9
  publication-title: IEEE Trans Softw Eng
  doi: 10.1109/32.799939
– ident: 9572_CR53
  doi: 10.1109/MSR.2007.8
– volume: SE-13
  start-page: 335
  issue: 3
  year: 1987
  ident: 9572_CR36
  publication-title: IEEE Trans Softw Eng
  doi: 10.1109/TSE.1987.233164
– volume: 23
  start-page: 111
  issue: 2
  year: 1993
  ident: 9572_CR49
  publication-title: J Syst Softw
  doi: 10.1016/0164-1212(93)90077-B
– ident: 9572_CR2
– ident: 9572_CR72
  doi: 10.1145/2884781.2884877
– ident: 9572_CR26
  doi: 10.1145/1985793.1985836
– ident: 9572_CR33
– ident: 9572_CR56
– ident: 9572_CR44
  doi: 10.1109/CSMR.2012.37
– ident: 9572_CR71
  doi: 10.1109/ICSME.2014.45
– ident: 9572_CR6
– volume: 1
  start-page: 528
  year: 1994
  ident: 9572_CR7
  publication-title: Encyclopedia of Software Engineering
– volume: 98
  start-page: 53
  issue: 1
  year: 2009
  ident: 9572_CR13
  publication-title: J Eng Educ
  doi: 10.1002/j.2168-9830.2009.tb01005.x
– volume: 11
  start-page: 3
  issue: 1
  year: 2011
  ident: 9572_CR14
  publication-title: ACM Transactions on Computing Education (TOCE)
– ident: 9572_CR62
  doi: 10.1109/ICSM.2011.6080795
– ident: 9572_CR19
  doi: 10.1109/WPC.2003.1199203
– volume: 1
  start-page: 276
  issue: 2
  year: 2005
  ident: 9572_CR27
  publication-title: J Comput Sci
  doi: 10.3844/jcssp.2005.276.282
– ident: 9572_CR65
– volume: 74
  start-page: 470
  issue: 7
  year: 2009
  ident: 9572_CR68
  publication-title: Sci Comput Program
  doi: 10.1016/j.scico.2009.02.007
– ident: 9572_CR25
  doi: 10.1109/CSMR.2009.20
– ident: 9572_CR58
  doi: 10.14236/ewic/EASE2009.6
– ident: 9572_CR42
– ident: 9572_CR1
  doi: 10.1109/CSMR.2005.44
– ident: 9572_CR40
  doi: 10.1007/3-540-47764-0_3
– ident: 9572_CR77
  doi: 10.1109/ICSME.2014.77
– ident: 9572_CR79
  doi: 10.1109/CSMR-WCRE.2014.6747229
– ident: 9572_CR3
– volume-title: Classifying code changes and predicting defects using changegenealogies. Technical Report, Tech. Rep
  year: 2013
  ident: 9572_CR29
– ident: 9572_CR35
  doi: 10.1109/ICSE.2009.5070547
– ident: 9572_CR41
  doi: 10.1109/WPC.2003.1199187
– ident: 9572_CR12
  doi: 10.1007/11767718_11
– ident: 9572_CR4
  doi: 10.1145/1159733.1159738
– ident: 9572_CR34
  doi: 10.1109/ICSM.1994.336783
– ident: 9572_CR28
– ident: 9572_CR69
  doi: 10.1109/ICSME.2016.94
– ident: 9572_CR31
– ident: 9572_CR61
  doi: 10.1109/ASWEC.2008.4483215
– ident: 9572_CR20
  doi: 10.1109/ICSM.2009.5306336
– ident: 9572_CR78
  doi: 10.1145/2491411.2491420
– volume: 20
  start-page: 476
  issue: 6
  year: 1994
  ident: 9572_CR18
  publication-title: IEEE Trans Softw Eng
  doi: 10.1109/32.295895
– ident: 9572_CR66
– ident: 9572_CR74
  doi: 10.1145/2372225.2372231
– volume: 13
  start-page: 645
  issue: 6
  year: 2008
  ident: 9572_CR38
  publication-title: Empir Softw Eng
  doi: 10.1007/s10664-008-9076-6
– volume: 28
  start-page: 654
  issue: 7
  year: 2002
  ident: 9572_CR37
  publication-title: IEEE Trans Softw Eng
  doi: 10.1109/TSE.2002.1019480
– ident: 9572_CR52
  doi: 10.1109/ICSM.2008.4658071
– ident: #cr-split#-9572_CR75.1
  doi: 10.1007/978-3-642-39038-8_21
– ident: 9572_CR45
  doi: 10.1109/WCRE.2001.957835
– ident: 9572_CR43
  doi: 10.1007/978-3-540-76440-3_2
– ident: 9572_CR51
– ident: 9572_CR54
  doi: 10.1109/SBCARS.2012.16
– volume: 29
  start-page: 297
  issue: 4
  year: 2003
  ident: 9572_CR76
  publication-title: IEEE Trans Softw Eng
  doi: 10.1109/TSE.2003.1191795
– volume: 17
  start-page: 503
  issue: 4–5
  year: 2012
  ident: 9572_CR64
  publication-title: Empir Softw Eng
  doi: 10.1007/s10664-011-9195-3
– ident: 9572_CR46
  doi: 10.1109/WCRE.2007.7
– ident: 9572_CR57
  doi: 10.1145/2245276.2231969
– ident: 9572_CR48
– ident: 9572_CR59
  doi: 10.1109/RCIS.2010.5507329
– ident: 9572_CR67
– ident: 9572_CR5
  doi: 10.1109/ISSRE.2007.22
– volume: 31
  start-page: 804
  issue: 10
  year: 2005
  ident: 9572_CR16
  publication-title: IEEE Trans Softw Eng
  doi: 10.1109/TSE.2005.114
– ident: #cr-split#-9572_CR75.2
– volume: 27
  start-page: 630
  issue: 7
  year: 2001
  ident: 9572_CR22
  publication-title: IEEE Trans Softw Eng
  doi: 10.1109/32.935855
– volume: 51
  start-page: 245
  issue: 3
  year: 2000
  ident: 9572_CR15
  publication-title: J Syst Softw
  doi: 10.1016/S0164-1212(99)00102-8
– volume-title: Refactoring: improving the design of existing code
  year: 1999
  ident: 9572_CR23
– volume: 4
  start-page: 308
  year: 1976
  ident: 9572_CR55
  publication-title: IEEE Trans Softw Eng
  doi: 10.1109/TSE.1976.233837
– ident: 9572_CR32
– ident: 9572_CR24
  doi: 10.1109/CSMR.2011.11
– ident: 9572_CR47
  doi: 10.1109/SCAM.2008.14
– volume: 15
  start-page: 1053
  issue: 12
  year: 1972
  ident: 9572_CR63
  publication-title: Commun ACM
  doi: 10.1145/361598.361623
– volume: 33
  start-page: 577
  issue: 9
  year: 2007
  ident: 9572_CR11
  publication-title: IEEE Trans Softw Eng
  doi: 10.1109/TSE.2007.70725
– ident: 9572_CR70
  doi: 10.1109/SCAM.2014.12
– ident: 9572_CR50
– ident: 9572_CR39
  doi: 10.1145/1081706.1081737
– ident: 9572_CR60
  doi: 10.1145/1134285.1134349
– ident: 9572_CR10
  doi: 10.1109/ICSM.1998.738528
– volume: 26
  start-page: 786
  issue: 8
  year: 2000
  ident: 9572_CR17
  publication-title: IEEE Trans Softw Eng
  doi: 10.1109/32.879814
– ident: 9572_CR73
  doi: 10.1007/978-0-387-09684-1_19
– ident: 9572_CR30
  doi: 10.1145/1862372.1862390
SSID ssj0009745
Score 2.2144766
Snippet Reusing code via copy-and-paste, with or without modification is a common behavior observed in software engineering. Traditionally, cloning has been considered...
SourceID crossref
springer
SourceType Enrichment Source
Index Database
Publisher
StartPage 2232
SubjectTerms Compilers
Computer Science
Interpreters
Programming Languages
Software Engineering/Programming and Operating Systems
Title Cloned and non-cloned Java methods: a comparative study
URI https://link.springer.com/article/10.1007/s10664-017-9572-7
Volume 23
WOSCitedRecordID wos000435804100013&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAVX
  databaseName: SpringerLINK Contemporary 1997-Present
  customDbUrl:
  eissn: 1573-7616
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0009745
  issn: 1382-3256
  databaseCode: RSV
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEB60evBifWJ9kYMnJZBuupmNNykW8VDEF70ts9kEhFKlW_v7TfZhLaigx8AkhCGT-cJMvg_gzGNk658NhpMUlvdQKa5dIHLNlMwzH10YuVJsAofDZDTSd_U_7qLpdm9KkuVN_eWzm1KhYyKUHNHDwlVY89kuCXoN9w_PC6ZdLJWJA7celz6hN6XM75ZYTkbLldAywQza_9raFmzWeJJdVQdgG1bsZAfajVYDq0N3F7A_fvU3KqNJzvyLn5tqeEtzYpWKdHHJiJkFGTgrmWf34Glw_di_4bVoAjcywhnvatONKCItJQlJmcgFIcUSLVoShhCdiZ3TWR5rEpkjGZOJc2dEhoHMS-5Dy2_DHgDTUkml0CiPKXqUUKJyF1Hoa9PG-cTWAdF4LzU1o3gQthinCy7k4JjUOyYNjkmxA-efU94qOo3fjC8ad6d1ZBU_Wx_-yfoINjz0SapWvmNozabv9gTWzXz2UkxPyxP1AcPOw1Q
linkProvider Springer Nature
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEB60CnqxPrE-c_CkBOKmm2y8SbFUrUW0Sm_LbDYBoVTp1v5-k31YCyroMTAJYchkvjCT7wM4cRjZuGeDpsiZoU0pBFXWE7kmgqeJiy4Z2FxsQvZ60WCg7st_3FnV7V6VJPOb-stnNyF8x4QvOUoHCxdhqekSlifMf3h8njHtylyZ2HPrUe4SelXK_G6J-WQ0XwnNE0y7_q-trcNaiSfJZXEANmDBjDahXmk1kDJ0t0C2hq_uRiU4Sol78VNdDG9wiqRQkc4uCBI9IwMnOfPsNjy1r_qtDi1FE6jmgZzQc6XPAwxQcY6MY8JShhJDLo00yDRKaXVorUrSUCFLLPIQdZhazRLpybz4DtTcNswuEMUFF0Jq4TBFEyOMRGoD9H1tSluX2BrAKu_FumQU98IWw3jGhewdEzvHxN4xsWzA6eeUt4JO4zfjs8rdcRlZ2c_We3-yPoaVTv-uG3eve7f7sOpgUFS09R1AbTJ-N4ewrKeTl2x8lJ-uD_Xexjg
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1bS8MwFD7oFPHFecV5zYNPSljWrEnjm0yHN8bAC3srp2kDwujGVvf7TXpxDlQQHwunJXzk9HzhnHwfwJnlyIk9NmiKnCW0LYWgyjgh10jwOLLZJT2Tm03IXi8YDFS_9DmdVtPuVUuyuNPgVJrSrDmOTfPLxTch3PSEaz9KSxGXYaXt5ujdcf3pda66K3OXYqezR7kt7lVb87tPLBamxa5oXmy69X8vcxM2Sp5JroqNsQVLSboN9crDgZQpvQOyMxzZPy3BNCbpKKW6eLzHGZLCXXp6SZDouUg4yRVpd-Gle_PcuaWlmQLV3JMZbSnd8tBDxTkyjhGLGUr0uUxkgkyjlEb7xqgo9hWyyCD3Ufux0SySTuSL70HNLiPZB6K44EJILSzXaGOAgYiNh27eTWljC14DWIVkqEulcWd4MQznGskOmNACEzpgQtmA889XxoXMxm_BFxX0YZlx05-jD_4UfQpr_etu-HjXeziEdcuOgmLa7whq2eQ9OYZVPcveppOTfKN9AM5Yzxw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cloned+and+non-cloned+Java+methods%3A+a+comparative+study&rft.jtitle=Empirical+software+engineering+%3A+an+international+journal&rft.au=Saini%2C+Vaibhav&rft.au=Sajnani%2C+Hitesh&rft.au=Lopes%2C+Cristina&rft.date=2018-08-01&rft.issn=1382-3256&rft.eissn=1573-7616&rft.volume=23&rft.issue=4&rft.spage=2232&rft.epage=2278&rft_id=info:doi/10.1007%2Fs10664-017-9572-7&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s10664_017_9572_7
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1382-3256&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1382-3256&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1382-3256&client=summon