Cloned and non-cloned Java methods: a comparative study
Reusing code via copy-and-paste, with or without modification is a common behavior observed in software engineering. Traditionally, cloning has been considered as a bad smell suggesting flaws in design decisions. Many studies exist targeting clone discovery, removal, and refactoring. However there a...
Uloženo v:
| Vydáno v: | Empirical software engineering : an international journal Ročník 23; číslo 4; s. 2232 - 2278 |
|---|---|
| Hlavní autoři: | , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
New York
Springer US
01.08.2018
|
| Témata: | |
| ISSN: | 1382-3256, 1573-7616 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Reusing code via copy-and-paste, with or without modification is a common behavior observed in software engineering. Traditionally, cloning has been considered as a bad smell suggesting flaws in design decisions. Many studies exist targeting clone discovery, removal, and refactoring. However there are not many studies which empirically investigate and compare the quality of cloned code to that of the code which has not been cloned. To this end, we present a statistical study that shows whether qualitative differences exist between cloned methods and non-cloned methods in Java projects. The dataset consists of 3562 open source Java projects containing 412,705 cloned and 616,604 non-cloned methods. The study uses 27 software metrics as a proxy for quality, spanning across complexity, modularity, and documentation (code-comments) categories. When controlling for size, no statistically significant differences were found between cloned and non-cloned methods for most of the metrics, except for three of them. The main statistically significant difference found was that cloned methods are on an average 18% smaller than non-cloned methods. After doing a mixed method analysis, we provide some insight for why cloned methods are smaller. |
|---|---|
| AbstractList | Reusing code via copy-and-paste, with or without modification is a common behavior observed in software engineering. Traditionally, cloning has been considered as a bad smell suggesting flaws in design decisions. Many studies exist targeting clone discovery, removal, and refactoring. However there are not many studies which empirically investigate and compare the quality of cloned code to that of the code which has not been cloned. To this end, we present a statistical study that shows whether qualitative differences exist between cloned methods and non-cloned methods in Java projects. The dataset consists of 3562 open source Java projects containing 412,705 cloned and 616,604 non-cloned methods. The study uses 27 software metrics as a proxy for quality, spanning across complexity, modularity, and documentation (code-comments) categories. When controlling for size, no statistically significant differences were found between cloned and non-cloned methods for most of the metrics, except for three of them. The main statistically significant difference found was that cloned methods are on an average 18% smaller than non-cloned methods. After doing a mixed method analysis, we provide some insight for why cloned methods are smaller. |
| Author | Saini, Vaibhav Sajnani, Hitesh Lopes, Cristina |
| Author_xml | – sequence: 1 givenname: Vaibhav orcidid: 0000-0002-6107-9504 surname: Saini fullname: Saini, Vaibhav email: vpsaini@uci.edu organization: University of California Irvine – sequence: 2 givenname: Hitesh surname: Sajnani fullname: Sajnani, Hitesh organization: Microsoft – sequence: 3 givenname: Cristina surname: Lopes fullname: Lopes, Cristina organization: University of California Irvine |
| BookMark | eNp9j8tOwzAQRS1UJNrCB7DLDxjGdp1p2KGKpyqxgbU18QNSpUllp5X697gKKxZdzYx0z9WcGZt0fecZuxVwJwDwPgkoywUHgbzSKDlesKnQqDiWopzkXS0lV1KXV2yW0gYAKlzoKcNVm4tcQZ0rciW34_lOByq2fvjpXXooqLD9dkeRhubgizTs3fGaXQZqk7_5m3P29fz0uXrl64-Xt9XjmlslceCiskKSpEopAkU1OCAkrdCjJ7CEGKwOoaqdrgjqQEqT1S5YqBHEEtSc4dhrY59S9MHYZsh_9N0QqWmNAHPyN6O_yf7m5G8wk-IfuYvNluLxLCNHJuVs9-2j2fT72GXBM9AvhdlvbA |
| CitedBy_id | crossref_primary_10_4018_IJRSDA_2019070104 crossref_primary_10_1007_s10664_021_10099_x |
| Cites_doi | 10.1109/32.544352 10.1109/ICSM.1999.792593 10.1109/32.799939 10.1109/MSR.2007.8 10.1109/TSE.1987.233164 10.1016/0164-1212(93)90077-B 10.1145/2884781.2884877 10.1145/1985793.1985836 10.1109/CSMR.2012.37 10.1109/ICSME.2014.45 10.1002/j.2168-9830.2009.tb01005.x 10.1109/ICSM.2011.6080795 10.1109/WPC.2003.1199203 10.3844/jcssp.2005.276.282 10.1016/j.scico.2009.02.007 10.1109/CSMR.2009.20 10.14236/ewic/EASE2009.6 10.1109/CSMR.2005.44 10.1007/3-540-47764-0_3 10.1109/ICSME.2014.77 10.1109/CSMR-WCRE.2014.6747229 10.1109/ICSE.2009.5070547 10.1109/WPC.2003.1199187 10.1007/11767718_11 10.1145/1159733.1159738 10.1109/ICSM.1994.336783 10.1109/ICSME.2016.94 10.1109/ASWEC.2008.4483215 10.1109/ICSM.2009.5306336 10.1145/2491411.2491420 10.1109/32.295895 10.1145/2372225.2372231 10.1007/s10664-008-9076-6 10.1109/TSE.2002.1019480 10.1109/ICSM.2008.4658071 10.1007/978-3-642-39038-8_21 10.1109/WCRE.2001.957835 10.1007/978-3-540-76440-3_2 10.1109/SBCARS.2012.16 10.1109/TSE.2003.1191795 10.1007/s10664-011-9195-3 10.1109/WCRE.2007.7 10.1145/2245276.2231969 10.1109/RCIS.2010.5507329 10.1109/ISSRE.2007.22 10.1109/TSE.2005.114 10.1109/32.935855 10.1016/S0164-1212(99)00102-8 10.1109/TSE.1976.233837 10.1109/CSMR.2011.11 10.1109/SCAM.2008.14 10.1145/361598.361623 10.1109/TSE.2007.70725 10.1109/SCAM.2014.12 10.1145/1081706.1081737 10.1145/1134285.1134349 10.1109/ICSM.1998.738528 10.1109/32.879814 10.1007/978-0-387-09684-1_19 10.1145/1862372.1862390 |
| ContentType | Journal Article |
| Copyright | Springer Science+Business Media, LLC 2017 |
| Copyright_xml | – notice: Springer Science+Business Media, LLC 2017 |
| DBID | AAYXX CITATION |
| DOI | 10.1007/s10664-017-9572-7 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1573-7616 |
| EndPage | 2278 |
| ExternalDocumentID | 10_1007_s10664_017_9572_7 |
| GrantInformation_xml | – fundername: National Science Foundation grantid: 1218228 funderid: https://doi.org/10.13039/100000001 |
| GroupedDBID | -4Z -59 -5G -BR -EM -Y2 -~C .86 .DC .VR 06D 0R~ 0VY 199 1N0 1SB 2.D 203 28- 29G 2J2 2JN 2JY 2KG 2LR 2P1 2VQ 2~H 30V 4.4 406 408 409 40D 40E 5GY 5QI 5VS 67Z 6NX 78A 8FE 8FG 8TC 8UJ 95- 95. 95~ 96X AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AAOBN AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYOK AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTD ABFTV ABHLI ABHQN ABJCF ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACHSB ACHXU ACIWK ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACSNA ACZOJ ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFEXP AFGCZ AFKRA AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARAPS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN B-. BA0 BBWZM BDATZ BENPR BGLVJ BGNMA BSONS CAG CCPQU COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 EBLON EBS EIOEI EJD ESBYG FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 GQ8 GXS H13 HCIFZ HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I09 IHE IJ- IKXTQ ITM IWAJR IXC IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ KDC KOV KOW L6V LAK LLZTM M4Y M7S MA- N2Q NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM P19 P62 P9O PF0 PT4 PT5 PTHSS Q2X QOK QOS R4E R89 R9I RHV RNI RNS ROL RPX RSV RZC RZE RZK S0W S16 S1Z S26 S27 S28 S3B SAP SCJ SCLPG SCO SDH SDM SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TSG TSK TSV TUC U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 Z7R Z7S Z7V Z7X Z7Z Z81 Z83 Z86 Z88 Z8M Z8N Z8P Z8R Z8T Z8U Z8W Z92 ZMTXR ~EX AAPKM AAYXX ABBRH ABDBE ABFSG ABRTQ ACSTC ADHKG AEZWR AFDZB AFFHD AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION PHGZM PHGZT PQGLB |
| ID | FETCH-LOGICAL-c327t-19c12a2a933a03ab0d0a7a537e7ea0ca77fc5ff9bd59a0bfa35ac5dfc0b701803 |
| IEDL.DBID | RSV |
| ISICitedReferencesCount | 5 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000435804100013&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1382-3256 |
| IngestDate | Sat Nov 29 05:37:43 EST 2025 Tue Nov 18 22:37:45 EST 2025 Fri Feb 21 02:35:46 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 4 |
| Keywords | Quality metrics Open source software Code clones |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c327t-19c12a2a933a03ab0d0a7a537e7ea0ca77fc5ff9bd59a0bfa35ac5dfc0b701803 |
| ORCID | 0000-0002-6107-9504 |
| PageCount | 47 |
| ParticipantIDs | crossref_citationtrail_10_1007_s10664_017_9572_7 crossref_primary_10_1007_s10664_017_9572_7 springer_journals_10_1007_s10664_017_9572_7 |
| PublicationCentury | 2000 |
| PublicationDate | 2018-08-01 |
| PublicationDateYYYYMMDD | 2018-08-01 |
| PublicationDate_xml | – month: 08 year: 2018 text: 2018-08-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationSubtitle | An International Journal |
| PublicationTitle | Empirical software engineering : an international journal |
| PublicationTitleAbbrev | Empir Software Eng |
| PublicationYear | 2018 |
| Publisher | Springer US |
| Publisher_xml | – name: Springer US |
| References | Mubarak A, Counsell S, Hierons R (2009) Does an 80: 20 rule apply to Java coupling?. In: Proceedings of the international conference on evaluation and assessment in software engineering Svajlenko J, Islam JF, Keivanloo I, Roy CK, Mia MM (2014) Towards a big data curated benchmark of inter-project code clones. In: IEEE international conference on software maintenance and evolution (ICSME), 2014. IEEE, pp 476–480 Hotta K, Sano Y, Higo Y, Kusumoto S (2010) Is duplicate code more frequently modified than non-duplicate code in software evolution?: an empirical study on open source software. In: Proceedings of the joint ERCIM workshop on software evolution (EVOL) and international workshop on principles of software evolution (IWPSE). ACM, pp 73–82 Baker B (1992) A program for identifying duplicated code. In: Proceedings of 24th Symposium of Computing Science and Statistics, March 1992, pp 49–57 Nagappan N, Ball T, Zeller A (2006) Mining metrics to predict component failures. In: Proceedings of the 28th international conference on software engineering. ACM Miles MB, Huberman AM (1994) Qualitative data analysis: an expanded sourcebook. Sage Koschke R (2007) Survey of research on software clones. In: Proceedings of duplication, redundancy, and similarity in software BorregoMDouglasEPAmelinkCTQuantitative, qualitative, and mixed research methods in engineering educationJ Eng Educ2009981536610.1002/j.2168-9830.2009.tb01005.x Koschke R (2008) Identifying and removing software clones. In: Software evolution. Springer, pp 15–36 Samoladas I, Gousios G, Spinellis D, Stamelos I (2008) The SQO-OSS quality model: measurement based open source software evaluation. In: Open source development, communities and quality, pp 237–248 HerzigKJustSRauAZellerAClassifying code changes and predicting defects using changegenealogies. Technical Report, Tech. Rep2013GermanySaarland University KamiyaTKusumotoSInoueKCCFInder: a multilinguistic token-based code clone detection system for large scale source codeIEEE Trans Softw Eng200228765467010.1109/TSE.2002.1019480 Halstead MH (1977) Elements of software science (operating and programming systems series). Elsevier Science Inc. de Wit M, Zaidman A, van Deursen A (2009) Managing code clones using dynamic change tracking and resolution. In: Proceedings of the 25th international conference on software maintenance (ICSM 2009). IEEE Computer Society Lucrédio D, de Almeida ES, Fortes RP (2012) An investigation on the impact of mde on software reuse. In: Sixth brazilian symposium on software components architectures and reuse (SBCARS), 2012. IEEE, pp 101–110 BasiliVRShullFLanubileFBuilding knowledge through families of experimentsIEEE Trans Softw Eng199925445647310.1109/32.799939 Lopes C, Bajracharya S, Ossher J, Baldi P (2010) UCI Source code data sets. [Online]. Available: http://www.ics.uci.edu/~lopes/datasets Wang T, Harman M, Jia Y, Krinke J (2013) Searching for better configurations: a rigorous approach to clone evaluation. In: Proceedings of the 2013 9th joint meeting on foundations of software engineering. ACM, pp 455–465 BruntinkMvan DeursenAvan EngelenRTourwéTOn the use of clone detection for identifying cross cutting concern codeIEEE Trans Softw Eng2005311080481810.1109/TSE.2005.114 Rajapakse DC, Jarzabek S (2007) Using server pages to unify clones in web applications: a trade-off analysis. In: Proceedings of international conference on software engineering, pp 116–126 Koschke R (2012) Large-scale inter-system clone detection using suffix trees. In: Proceedings of CSMR, pp 309–318 Krinke J (2007) A study of consistent and inconsistent changes to code clones. In: Working conference on reverse engineering, pp 170–178 LiWHenrySObject-oriented metrics that predict maintainabilityJ Syst Softw199323211112210.1016/0164-1212(93)90077-B Shomrat M, Feldman Y (2013) Detecting refactored clones. In: Castagna G (ed) ECOOP 2013 European condeference on object-oriented programming, ser. Lecture notes in computer science, vol 7920. Springer, Berlin, pp 502–526 Kim M, Sazawal V, Notkin D, Murphy G (2005) An empirical study of code clone genealogies. In: Proceedings of FSE Nasseri E, Counsell S, Shepperd M (2008) An empirical study of evolution of inheritance in Java OSS. In: 19th Australian conference on software engineering, 2008. ASWEC 2008. IEEE, pp 269–278 Arisholm E, Briand LC, Fuglerud M (2007) Data mining techniques for building fault-proneness models in telecom Java software. In: The 18th IEEE international symposium on software reliability, 2007. ISSRE’07. IEEE, pp 215–224 Juergens E, Deissenboeck F, Hummel B, Wagner S (2009) Do code clones matter?. In: Proceedings of ICSE, pp 485–495 Apache Maven, http://maven.apache.org ParnasDLOn the criteria to be used in decomposing systems into modulesCommun ACM197215121053105810.1145/361598.361623 ChidamberSRKemererCFA metrics suite for object oriented designIEEE Trans Softw Eng199420647649310.1109/32.295895 Baxter ID, Yahin A, Moura L, Sant’Anna M, Bier L (1998) Clone detection using abstract syntax trees. In: Proceedings of the international conference on software maintenance. IEEE Computer Society, p 368 BörstlerJNordströmMPatersonJHOn the quality of examples in introductory Java textbooksACM Transactions on Computing Education (TOCE)20111113 Gode N, Harder J (2011) Clone stability. In: 15th European conference on software maintenance and reengineering (CSMR), 2011. IEEE, pp 65–74 BasiliVRBriandLCMeloWLA validation of object-oriented design metrics as quality indicatorsIEEE Trans Softw Eng1996221075176110.1109/32.544352 Johnson JH (1993) Identifying redundancy in source code using fingerprints. In: Proceedings of the 1993 conference of the centre for advanced studies on collaborative research: software engineering, vol 1. IBM Press, Toronto, pp 171–183 RoyCKCordyJRKoschkeRComparison and evaluation of code clone detection techniques and tools: a qualitative approachSci Comput Program2009747470495267525410.1016/j.scico.2009.02.0071183.68205 Lopes CV, Ossher J (2015) How scale affects structure in Java programs. In: Proceedings of the 2015 ACM SIGPLAN international conference on object-oriented programming, systems, languages, and applications. ACM, pp 675–694 Göde N, Koschke R (2011) Frequency and risks of changes to clones. In: Proceedings of the 33rd international conference on software engineering. ACM, pp 311–320 Krinke J (2008) Is cloned code more stable than non-cloned code?. In: Eighth IEEE international working conference on source code analysis and manipulation, 2008. IEEE, pp 57–66 Lozano A, Wermelinger M (2008) Assessing the effect of clones on changeability. In: IEEE international conference on software maintenance, 2008. ICSM 2008. IEEE, pp 227–236 Andersson M, Vestergren P (2004) Object-oriented design quality metrics. Citeseer. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.1.5047&rep=rep1&type=pdf Komondoor R, Horwitz S (2003) Effective automatic procedure extraction. In: Proceedings of the international workshop on program comprehension. Springer, pp 40–56 Arisholm E, Briand LC (2006) Predicting fault-prone components in a Java legacy system. In: Proceedings of the 2006 ACM/IEEE international symposium on empirical software engineering. ACM, pp 8– 17 Jhawk, http://mondego.ics.uci.edu/projects/clonedetection Kutner MH, Nachtsheim C, Neter J, Li W (2005) Applied Linear Statistical Models. McGraw-Hill Irwin Gode N, Koschke R (2009) Incremental clone detection. In: Proceedings of CSMR Roy CK, Cordy JR (2007) A survey on software clone detection research. Technical report, Queen’s University at Kingston Ducasse S, Rieger M, Demeyer S (1999) A language independent approach for detecting duplicated code. In: Proceedings of the IEEE international conference on software maintenance. IEEE Computer Society, p 109 KafuraDReddyGThe use of software complexity metrics in software maintenanceIEEE Trans Softw Eng1987SE-13333534310.1109/TSE.1987.233164 El EmamKBenlarbiSGoelNRaiSNThe confounding effect of class size on the validity of object-oriented metricsIEEE Trans Softw Eng200127763065010.1109/32.935855 Sajnani H, Saini V, Lopes CV (2014a) A comparative study of bug patterns in Java cloned and non-cloned code. In: IEEE 14th international working conference on source code analysis and manipulation (SCAM), 2014. IEEE, pp 21–30 Alghamdi JS, Rufai RA, Khan SM (2005) Oometer: a software quality assurance tool. In: IEEE, pp 190–191 BasiliVRCaldieraGRombachHDThe goal question metric approachEncyclopedia of Software Engineering19941528532 Johnson JH (1994) Substring matching for clone detection and change tracking. In: International conference on software maintanence, pp 120–126 FowlerMBeckKBrantJOpdykeWRobertsDRefactoring: improving the design of existing code1999ReadingAddison-Wesley Professional GuptaVAggarwalKSinghYA fuzzy approach for integrated measure of object-oriented software testabilityJ Comput Sci20051227628210.3844/jcssp.2005.276.282 Mubarak A, Counsell S, Hierons RM (2010) An evolutionary study of fan-in and fan-out metrics in OSS. In: Fourth international conference on research challenges in information science (RCIS), 2010. IEEE, pp 473–482 Sajnani H, Saini V, Ossher J, Lopes C (2014b) Is popularity a measure of its quality? An analysis of maven components. In: Proceedings of the 30th software maintenance and evolution(to appear in ICSME 2014). IEEE Computer Society Ossher J, Sajnani H, Lopes CV (2011) File cloning in open source Java projects: the good, the bad, and the ugly. In: ICSM. IEEE Krinke J (2001) Identifying similar code with program dependence graphs. In: Proceedings of the eighth working conference on reverse engineering (WCRE’01). IEEE Computer Society, p 301 Lozano A, Wermelinger M, Nuseibeh B (2007) Evaluating the harmfulness of cloning: a change based experiment. In: Mining software repositories, pp 18–22 Cordy J (2003) Comprehending reality - practical barriers to industrial adoption of software maintenance automation. In: Proceedings of international conference on program compreh K El Emam (9572_CR22) 2001; 27 9572_CR47 9572_CR48 9572_CR45 9572_CR46 9572_CR43 9572_CR44 9572_CR41 9572_CR42 9572_CR40 cr-split#-9572_CR75.2 cr-split#-9572_CR75.1 M Cartwright (9572_CR17) 2000; 26 CK Roy (9572_CR68) 2009; 74 V Gupta (9572_CR27) 2005; 1 K Herzig (9572_CR29) 2013 9572_CR39 9572_CR34 9572_CR78 9572_CR35 9572_CR79 9572_CR32 9572_CR33 9572_CR77 9572_CR30 9572_CR74 9572_CR31 R Subramanyam (9572_CR76) 2003; 29 S Bellon (9572_CR11) 2007; 33 9572_CR72 D Kafura (9572_CR36) 1987; SE-13 9572_CR73 M Bruntink (9572_CR16) 2005; 31 9572_CR70 9572_CR71 J Börstler (9572_CR14) 2011; 11 M Borrego (9572_CR13) 2009; 98 F Rahman (9572_CR64) 2012; 17 TJ McCabe (9572_CR55) 1976; 4 9572_CR28 9572_CR25 9572_CR69 9572_CR26 9572_CR67 9572_CR24 9572_CR3 9572_CR21 9572_CR65 9572_CR4 W Li (9572_CR49) 1993; 23 9572_CR66 9572_CR5 9572_CR6 9572_CR20 9572_CR61 9572_CR62 9572_CR1 9572_CR2 9572_CR60 VR Basili (9572_CR8) 1996; 22 M Fowler (9572_CR23) 1999 C Kapser (9572_CR38) 2008; 13 VR Basili (9572_CR7) 1994; 1 9572_CR19 9572_CR58 9572_CR59 VR Basili (9572_CR9) 1999; 25 9572_CR12 9572_CR56 SR Chidamber (9572_CR18) 1994; 20 9572_CR57 9572_CR10 9572_CR54 9572_CR52 9572_CR53 9572_CR50 DL Parnas (9572_CR63) 1972; 15 9572_CR51 T Kamiya (9572_CR37) 2002; 28 LC Briand (9572_CR15) 2000; 51 |
| References_xml | – reference: Svajlenko J, Islam JF, Keivanloo I, Roy CK, Mia MM (2014) Towards a big data curated benchmark of inter-project code clones. In: IEEE international conference on software maintenance and evolution (ICSME), 2014. IEEE, pp 476–480 – reference: Lucrédio D, de Almeida ES, Fortes RP (2012) An investigation on the impact of mde on software reuse. In: Sixth brazilian symposium on software components architectures and reuse (SBCARS), 2012. IEEE, pp 101–110 – reference: RoyCKCordyJRKoschkeRComparison and evaluation of code clone detection techniques and tools: a qualitative approachSci Comput Program2009747470495267525410.1016/j.scico.2009.02.0071183.68205 – reference: Wang T, Harman M, Jia Y, Krinke J (2013) Searching for better configurations: a rigorous approach to clone evaluation. In: Proceedings of the 2013 9th joint meeting on foundations of software engineering. ACM, pp 455–465 – reference: Mondal M, Roy CK, Rahman MS, Saha RK, Krinke J, Schneider KA (2012) Comparative stability of cloned and non-cloned code: an empirical study. In: Proceedings of the 27th annual ACM symposium on applied computing. ACM, pp 1227–1234 – reference: KamiyaTKusumotoSInoueKCCFInder: a multilinguistic token-based code clone detection system for large scale source codeIEEE Trans Softw Eng200228765467010.1109/TSE.2002.1019480 – reference: de Wit M, Zaidman A, van Deursen A (2009) Managing code clones using dynamic change tracking and resolution. In: Proceedings of the 25th international conference on software maintenance (ICSM 2009). IEEE Computer Society – reference: Arisholm E, Briand LC, Fuglerud M (2007) Data mining techniques for building fault-proneness models in telecom Java software. In: The 18th IEEE international symposium on software reliability, 2007. ISSRE’07. IEEE, pp 215–224 – reference: Mubarak A, Counsell S, Hierons RM (2010) An evolutionary study of fan-in and fan-out metrics in OSS. In: Fourth international conference on research challenges in information science (RCIS), 2010. IEEE, pp 473–482 – reference: Krinke J (2008) Is cloned code more stable than non-cloned code?. In: Eighth IEEE international working conference on source code analysis and manipulation, 2008. IEEE, pp 57–66 – reference: Andersson M, Vestergren P (2004) Object-oriented design quality metrics. Citeseer. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.1.5047&rep=rep1&type=pdf – reference: Koschke R (2008) Identifying and removing software clones. In: Software evolution. Springer, pp 15–36 – reference: Jhawk, http://mondego.ics.uci.edu/projects/clonedetection/ – reference: Krinke J (2007) A study of consistent and inconsistent changes to code clones. In: Working conference on reverse engineering, pp 170–178 – reference: Samoladas I, Gousios G, Spinellis D, Stamelos I (2008) The SQO-OSS quality model: measurement based open source software evaluation. In: Open source development, communities and quality, pp 237–248 – reference: Apache Maven, http://maven.apache.org/ – reference: Lopes C, Bajracharya S, Ossher J, Baldi P (2010) UCI Source code data sets. [Online]. Available: http://www.ics.uci.edu/~lopes/datasets/ – reference: BellonSKoschkeRAntoniolGKrinkeJMerloEComparison and evaluation of clone detection toolsIEEE Trans Softw Eng200733957759110.1109/TSE.2007.70725 – reference: SubramanyamRKrishnanMSEmpirical analysis of ck metrics for object-oriented design complexity: Implications for software defectsIEEE Trans Softw Eng200329429731010.1109/TSE.2003.1191795[Online]. Available: https://doi.org/10.1109/TSE.2003.1191795 – reference: ParnasDLOn the criteria to be used in decomposing systems into modulesCommun ACM197215121053105810.1145/361598.361623 – reference: Islam MR, Zibran MF (2016) A comparative study on vulnerabilities in categories of clones and non-cloned code. In: IEEE 23rd international conference on software analysis, evolution, and reengineering (SANER), vol 3. IEEE, pp 8–14 – reference: Rajapakse DC, Jarzabek S (2007) Using server pages to unify clones in web applications: a trade-off analysis. In: Proceedings of international conference on software engineering, pp 116–126 – reference: Lopes CV, Ossher J (2015) How scale affects structure in Java programs. In: Proceedings of the 2015 ACM SIGPLAN international conference on object-oriented programming, systems, languages, and applications. ACM, pp 675–694 – reference: Miles MB, Huberman AM (1994) Qualitative data analysis: an expanded sourcebook. Sage – reference: Benestad HC, Anda B, Arisholm E (2006) Assessing software product maintainability based on class-level structural measures. In: Product-focused software process improvement. Springer, pp 94–111 – reference: BorregoMDouglasEPAmelinkCTQuantitative, qualitative, and mixed research methods in engineering educationJ Eng Educ2009981536610.1002/j.2168-9830.2009.tb01005.x – reference: Koschke R (2012) Large-scale inter-system clone detection using suffix trees. In: Proceedings of CSMR, pp 309–318 – reference: KapserCGodfreyM“Cloning considered harmful” considered harmful: patterns of cloning in softwareEmpir Softw Eng200813664569210.1007/s10664-008-9076-6 – reference: Sajnani H, Saini V, Svajlenko J, Roy CK, Lopes CV (2016) Sourcerercc: scaling code clone detection to big code. In: Proceedings of international conference on software engineering, to appear – reference: ChidamberSRKemererCFA metrics suite for object oriented designIEEE Trans Softw Eng199420647649310.1109/32.295895 – reference: Ducasse S, Rieger M, Demeyer S (1999) A language independent approach for detecting duplicated code. In: Proceedings of the IEEE international conference on software maintenance. IEEE Computer Society, p 109 – reference: HerzigKJustSRauAZellerAClassifying code changes and predicting defects using changegenealogies. Technical Report, Tech. Rep2013GermanySaarland University – reference: Johnson JH (1993) Identifying redundancy in source code using fingerprints. In: Proceedings of the 1993 conference of the centre for advanced studies on collaborative research: software engineering, vol 1. IBM Press, Toronto, pp 171–183 – reference: RahmanFBirdCDevanbuPClones: what is that smell?Empir Softw Eng2012174–550353010.1007/s10664-011-9195-3 – reference: Kim M, Sazawal V, Notkin D, Murphy G (2005) An empirical study of code clone genealogies. In: Proceedings of FSE – reference: Krinke J (2001) Identifying similar code with program dependence graphs. In: Proceedings of the eighth working conference on reverse engineering (WCRE’01). IEEE Computer Society, p 301 – reference: FowlerMBeckKBrantJOpdykeWRobertsDRefactoring: improving the design of existing code1999ReadingAddison-Wesley Professional – reference: Cordy J (2003) Comprehending reality - practical barriers to industrial adoption of software maintenance automation. In: Proceedings of international conference on program comprehension, pp 196–205 – reference: El EmamKBenlarbiSGoelNRaiSNThe confounding effect of class size on the validity of object-oriented metricsIEEE Trans Softw Eng200127763065010.1109/32.935855 – reference: BasiliVRBriandLCMeloWLA validation of object-oriented design metrics as quality indicatorsIEEE Trans Softw Eng1996221075176110.1109/32.544352 – reference: Alghamdi JS, Rufai RA, Khan SM (2005) Oometer: a software quality assurance tool. In: IEEE, pp 190–191 – reference: Koschke R (2007) Survey of research on software clones. In: Proceedings of duplication, redundancy, and similarity in software – reference: Hotta K, Sano Y, Higo Y, Kusumoto S (2010) Is duplicate code more frequently modified than non-duplicate code in software evolution?: an empirical study on open source software. In: Proceedings of the joint ERCIM workshop on software evolution (EVOL) and international workshop on principles of software evolution (IWPSE). ACM, pp 73–82 – reference: Arisholm E, Briand LC (2006) Predicting fault-prone components in a Java legacy system. In: Proceedings of the 2006 ACM/IEEE international symposium on empirical software engineering. ACM, pp 8– 17 – reference: Saini V, Sajnani H, Lopes C (2016) Comparing quality metrics for cloned and non cloned java methods: a large scale empirical study. In: IEEE international conference on software maintenance and evolution (ICSME), 2016. IEEE, pp 256–266 – reference: Shomrat M, Feldman Y (2013) Detecting refactored clones. In: Castagna G (ed) ECOOP 2013 European condeference on object-oriented programming, ser. Lecture notes in computer science, vol 7920. Springer, Berlin, pp 502–526 – reference: Gode N, Koschke R (2009) Incremental clone detection. In: Proceedings of CSMR – reference: CartwrightMShepperdMAn empirical investigation of an object-oriented software systemIEEE Trans Softw Eng200026878679610.1109/32.879814 – reference: Baxter ID, Yahin A, Moura L, Sant’Anna M, Bier L (1998) Clone detection using abstract syntax trees. In: Proceedings of the international conference on software maintenance. IEEE Computer Society, p 368 – reference: Roy CK, Cordy JR (2009) A mutation/injection-based automatic framework for evaluating code clone detection tools. In: International conference on software testing, verification and validation workshops, 2009. ICSTW’09. IEEE, pp 157–166 – reference: KafuraDReddyGThe use of software complexity metrics in software maintenanceIEEE Trans Softw Eng1987SE-13333534310.1109/TSE.1987.233164 – reference: Roy CK, Cordy JR (2007) A survey on software clone detection research. Technical report, Queen’s University at Kingston – reference: Juergens E, Deissenboeck F, Hummel B, Wagner S (2009) Do code clones matter?. In: Proceedings of ICSE, pp 485–495 – reference: Johnson JH (1994) Substring matching for clone detection and change tracking. In: International conference on software maintanence, pp 120–126 – reference: Kutner MH, Nachtsheim C, Neter J, Li W (2005) Applied Linear Statistical Models. McGraw-Hill Irwin – reference: Sajnani H, Saini V, Ossher J, Lopes C (2014b) Is popularity a measure of its quality? An analysis of maven components. In: Proceedings of the 30th software maintenance and evolution(to appear in ICSME 2014). IEEE Computer Society – reference: BörstlerJNordströmMPatersonJHOn the quality of examples in introductory Java textbooksACM Transactions on Computing Education (TOCE)20111113 – reference: BriandLCWüstJDalyJWPorterDVExploring the relationships between design measures and software quality in object-oriented systemsJ Syst Softw200051324527310.1016/S0164-1212(99)00102-8 – reference: Xie S, Khomh F, Zou Y, Keivanloo I (2014) An empirical study on the fault-proneness of clone migration in clone genealogies. In: Proceedings of CSMR-WCRE. IEEE, pp 94–103 – reference: BasiliVRShullFLanubileFBuilding knowledge through families of experimentsIEEE Trans Softw Eng199925445647310.1109/32.799939 – reference: Halstead MH (1977) Elements of software science (operating and programming systems series). Elsevier Science Inc. – reference: LiWHenrySObject-oriented metrics that predict maintainabilityJ Syst Softw199323211112210.1016/0164-1212(93)90077-B – reference: Ossher J, Sajnani H, Lopes CV (2011) File cloning in open source Java projects: the good, the bad, and the ugly. In: ICSM. IEEE – reference: Komondoor R, Horwitz S (2003) Effective automatic procedure extraction. In: Proceedings of the international workshop on program comprehension. Springer, pp 40–56 – reference: Mubarak A, Counsell S, Hierons R (2009) Does an 80: 20 rule apply to Java coupling?. In: Proceedings of the international conference on evaluation and assessment in software engineering – reference: Nagappan N, Ball T, Zeller A (2006) Mining metrics to predict component failures. In: Proceedings of the 28th international conference on software engineering. ACM – reference: Göde N, Koschke R (2011) Frequency and risks of changes to clones. In: Proceedings of the 33rd international conference on software engineering. ACM, pp 311–320 – reference: Gode N, Harder J (2011) Clone stability. In: 15th European conference on software maintenance and reengineering (CSMR), 2011. IEEE, pp 65–74 – reference: Nasseri E, Counsell S, Shepperd M (2008) An empirical study of evolution of inheritance in Java OSS. In: 19th Australian conference on software engineering, 2008. ASWEC 2008. IEEE, pp 269–278 – reference: BasiliVRCaldieraGRombachHDThe goal question metric approachEncyclopedia of Software Engineering19941528532 – reference: BruntinkMvan DeursenAvan EngelenRTourwéTOn the use of clone detection for identifying cross cutting concern codeIEEE Trans Softw Eng2005311080481810.1109/TSE.2005.114 – reference: GuptaVAggarwalKSinghYA fuzzy approach for integrated measure of object-oriented software testabilityJ Comput Sci20051227628210.3844/jcssp.2005.276.282 – reference: Scandariato R, Walden J (2012) Predicting vulnerable classes in an android application. In: Proceedings of the 4th international workshop on security measurements and metrics. ACM, pp 11–16 – reference: Baker B (1992) A program for identifying duplicated code. In: Proceedings of 24th Symposium of Computing Science and Statistics, March 1992, pp 49–57 – reference: Lozano A, Wermelinger M, Nuseibeh B (2007) Evaluating the harmfulness of cloning: a change based experiment. In: Mining software repositories, pp 18–22 – reference: Komondoor R, Horwitz S (2001) Using slicing to identify duplication in source code. In: Proceedings of the 8th international symposium on static analysis. Springer, pp 40–56 – reference: Sajnani H, Saini V, Lopes CV (2014a) A comparative study of bug patterns in Java cloned and non-cloned code. In: IEEE 14th international working conference on source code analysis and manipulation (SCAM), 2014. IEEE, pp 21–30 – reference: Lozano A, Wermelinger M (2008) Assessing the effect of clones on changeability. In: IEEE international conference on software maintenance, 2008. ICSM 2008. IEEE, pp 227–236 – reference: McCabeTJA complexity measureIEEE Trans Softw Eng1976430832044590410.1109/TSE.1976.2338370352.68066 – volume: 22 start-page: 751 issue: 10 year: 1996 ident: 9572_CR8 publication-title: IEEE Trans Softw Eng doi: 10.1109/32.544352 – ident: 9572_CR21 doi: 10.1109/ICSM.1999.792593 – volume: 25 start-page: 456 issue: 4 year: 1999 ident: 9572_CR9 publication-title: IEEE Trans Softw Eng doi: 10.1109/32.799939 – ident: 9572_CR53 doi: 10.1109/MSR.2007.8 – volume: SE-13 start-page: 335 issue: 3 year: 1987 ident: 9572_CR36 publication-title: IEEE Trans Softw Eng doi: 10.1109/TSE.1987.233164 – volume: 23 start-page: 111 issue: 2 year: 1993 ident: 9572_CR49 publication-title: J Syst Softw doi: 10.1016/0164-1212(93)90077-B – ident: 9572_CR2 – ident: 9572_CR72 doi: 10.1145/2884781.2884877 – ident: 9572_CR26 doi: 10.1145/1985793.1985836 – ident: 9572_CR33 – ident: 9572_CR56 – ident: 9572_CR44 doi: 10.1109/CSMR.2012.37 – ident: 9572_CR71 doi: 10.1109/ICSME.2014.45 – ident: 9572_CR6 – volume: 1 start-page: 528 year: 1994 ident: 9572_CR7 publication-title: Encyclopedia of Software Engineering – volume: 98 start-page: 53 issue: 1 year: 2009 ident: 9572_CR13 publication-title: J Eng Educ doi: 10.1002/j.2168-9830.2009.tb01005.x – volume: 11 start-page: 3 issue: 1 year: 2011 ident: 9572_CR14 publication-title: ACM Transactions on Computing Education (TOCE) – ident: 9572_CR62 doi: 10.1109/ICSM.2011.6080795 – ident: 9572_CR19 doi: 10.1109/WPC.2003.1199203 – volume: 1 start-page: 276 issue: 2 year: 2005 ident: 9572_CR27 publication-title: J Comput Sci doi: 10.3844/jcssp.2005.276.282 – ident: 9572_CR65 – volume: 74 start-page: 470 issue: 7 year: 2009 ident: 9572_CR68 publication-title: Sci Comput Program doi: 10.1016/j.scico.2009.02.007 – ident: 9572_CR25 doi: 10.1109/CSMR.2009.20 – ident: 9572_CR58 doi: 10.14236/ewic/EASE2009.6 – ident: 9572_CR42 – ident: 9572_CR1 doi: 10.1109/CSMR.2005.44 – ident: 9572_CR40 doi: 10.1007/3-540-47764-0_3 – ident: 9572_CR77 doi: 10.1109/ICSME.2014.77 – ident: 9572_CR79 doi: 10.1109/CSMR-WCRE.2014.6747229 – ident: 9572_CR3 – volume-title: Classifying code changes and predicting defects using changegenealogies. Technical Report, Tech. Rep year: 2013 ident: 9572_CR29 – ident: 9572_CR35 doi: 10.1109/ICSE.2009.5070547 – ident: 9572_CR41 doi: 10.1109/WPC.2003.1199187 – ident: 9572_CR12 doi: 10.1007/11767718_11 – ident: 9572_CR4 doi: 10.1145/1159733.1159738 – ident: 9572_CR34 doi: 10.1109/ICSM.1994.336783 – ident: 9572_CR28 – ident: 9572_CR69 doi: 10.1109/ICSME.2016.94 – ident: 9572_CR31 – ident: 9572_CR61 doi: 10.1109/ASWEC.2008.4483215 – ident: 9572_CR20 doi: 10.1109/ICSM.2009.5306336 – ident: 9572_CR78 doi: 10.1145/2491411.2491420 – volume: 20 start-page: 476 issue: 6 year: 1994 ident: 9572_CR18 publication-title: IEEE Trans Softw Eng doi: 10.1109/32.295895 – ident: 9572_CR66 – ident: 9572_CR74 doi: 10.1145/2372225.2372231 – volume: 13 start-page: 645 issue: 6 year: 2008 ident: 9572_CR38 publication-title: Empir Softw Eng doi: 10.1007/s10664-008-9076-6 – volume: 28 start-page: 654 issue: 7 year: 2002 ident: 9572_CR37 publication-title: IEEE Trans Softw Eng doi: 10.1109/TSE.2002.1019480 – ident: 9572_CR52 doi: 10.1109/ICSM.2008.4658071 – ident: #cr-split#-9572_CR75.1 doi: 10.1007/978-3-642-39038-8_21 – ident: 9572_CR45 doi: 10.1109/WCRE.2001.957835 – ident: 9572_CR43 doi: 10.1007/978-3-540-76440-3_2 – ident: 9572_CR51 – ident: 9572_CR54 doi: 10.1109/SBCARS.2012.16 – volume: 29 start-page: 297 issue: 4 year: 2003 ident: 9572_CR76 publication-title: IEEE Trans Softw Eng doi: 10.1109/TSE.2003.1191795 – volume: 17 start-page: 503 issue: 4–5 year: 2012 ident: 9572_CR64 publication-title: Empir Softw Eng doi: 10.1007/s10664-011-9195-3 – ident: 9572_CR46 doi: 10.1109/WCRE.2007.7 – ident: 9572_CR57 doi: 10.1145/2245276.2231969 – ident: 9572_CR48 – ident: 9572_CR59 doi: 10.1109/RCIS.2010.5507329 – ident: 9572_CR67 – ident: 9572_CR5 doi: 10.1109/ISSRE.2007.22 – volume: 31 start-page: 804 issue: 10 year: 2005 ident: 9572_CR16 publication-title: IEEE Trans Softw Eng doi: 10.1109/TSE.2005.114 – ident: #cr-split#-9572_CR75.2 – volume: 27 start-page: 630 issue: 7 year: 2001 ident: 9572_CR22 publication-title: IEEE Trans Softw Eng doi: 10.1109/32.935855 – volume: 51 start-page: 245 issue: 3 year: 2000 ident: 9572_CR15 publication-title: J Syst Softw doi: 10.1016/S0164-1212(99)00102-8 – volume-title: Refactoring: improving the design of existing code year: 1999 ident: 9572_CR23 – volume: 4 start-page: 308 year: 1976 ident: 9572_CR55 publication-title: IEEE Trans Softw Eng doi: 10.1109/TSE.1976.233837 – ident: 9572_CR32 – ident: 9572_CR24 doi: 10.1109/CSMR.2011.11 – ident: 9572_CR47 doi: 10.1109/SCAM.2008.14 – volume: 15 start-page: 1053 issue: 12 year: 1972 ident: 9572_CR63 publication-title: Commun ACM doi: 10.1145/361598.361623 – volume: 33 start-page: 577 issue: 9 year: 2007 ident: 9572_CR11 publication-title: IEEE Trans Softw Eng doi: 10.1109/TSE.2007.70725 – ident: 9572_CR70 doi: 10.1109/SCAM.2014.12 – ident: 9572_CR50 – ident: 9572_CR39 doi: 10.1145/1081706.1081737 – ident: 9572_CR60 doi: 10.1145/1134285.1134349 – ident: 9572_CR10 doi: 10.1109/ICSM.1998.738528 – volume: 26 start-page: 786 issue: 8 year: 2000 ident: 9572_CR17 publication-title: IEEE Trans Softw Eng doi: 10.1109/32.879814 – ident: 9572_CR73 doi: 10.1007/978-0-387-09684-1_19 – ident: 9572_CR30 doi: 10.1145/1862372.1862390 |
| SSID | ssj0009745 |
| Score | 2.2145774 |
| Snippet | Reusing code via copy-and-paste, with or without modification is a common behavior observed in software engineering. Traditionally, cloning has been considered... |
| SourceID | crossref springer |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 2232 |
| SubjectTerms | Compilers Computer Science Interpreters Programming Languages Software Engineering/Programming and Operating Systems |
| Title | Cloned and non-cloned Java methods: a comparative study |
| URI | https://link.springer.com/article/10.1007/s10664-017-9572-7 |
| Volume | 23 |
| WOSCitedRecordID | wos000435804100013&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAVX databaseName: SpringerLINK Contemporary 1997-Present customDbUrl: eissn: 1573-7616 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0009745 issn: 1382-3256 databaseCode: RSV dateStart: 19970101 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEB60evBifWJ9kYMnZWHbbDobb1IsIlLER-ltmZ1NQChVurW_32Qf1oIKelyYDWHIzDdhJt8HcIY2sprZxbcx7oISRzqgzMeVK-8jTYxUDNEM73AwiEcjfV-9487rafe6JVlk6i-P3bpdPzHhW47oysJVWHNoF3u9hofH4YJpFwtlYs-tF0gH6HUr87sllsFouRNaAEy_-a-tbcFmVU-Kq_IAbMOKmexAs9ZqEFXo7gL2xq8uowqaZMLd-AMuP29pTqJUkc4vBQlekIGLgnl2D57710-9m6ASTQhYdnAWtDW3O9QhLSWFktIwCwlJSTRoKGRCtKys1WmmNIWpJamIVWY5TNGTecl9aLhtmAMQFBlOOSKjYxl1ldEG00i57Bgrj-pZC8LaewlXjOJe2GKcLLiQvWMS55jEOybBFpx__vJW0mn8ZnxRuzupIiv_2frwT9ZHsOFKn7gc5TuGxmz6bk5gneezl3x6WpyoD4DHxFA |
| linkProvider | Springer Nature |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEB60CnqxPrE-c_CkLGybpLPxJsVStRbRWnpbZrNZEEqVbu3vN9mHtaCCHhdmQxgy802YyfcBnGEiEqW1jW9j7AUlEMqj2MWVLe-FIo2UDdEMutjrBcOheijecafltHvZkswy9ZfHbs2mm5hwLUe0ZeEyrAgLWI4w__FpMGfaxUyZ2HHredwCetnK_G6JRTBa7IRmANOu_mtrm7BR1JPsKj8AW7BkxttQLbUaWBG6O4Ct0avNqIzGMbM3fk_nn7c0I5arSKeXjJiek4GzjHl2F57b1_1WxytEEzzNGzj16krXG9QgxTn5nCI_9glJcjRoyNeEmGiZJCqKpSI_SohL0jJOtB-hI_Pie1Cx2zD7wEgYHWlBRgVcNKVRBiMhbXYMpEP1uAZ-6b1QF4ziTthiFM65kJ1jQuuY0DkmxBqcf_7yltNp_GZ8Ubo7LCIr_dn64E_Wp7DW6d93w-5N7-4Q1m0ZFORjfUdQmU7ezTGs6tn0JZ2cZKfrA76nxzQ |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LSwMxEB60inixPrE-c_CkLN02SbPxJtXio5SCWnpbZrMJCGVb2rW_32Qf1oIK4jEwCeEjk5kwk-8DuBCGGamU9W-t7QMlYNLD2PmVTe-ZRCUwa6IZdEWvFwyHsl_onM7KbveyJJn_aXAsTUlan8Sm_uXjW6vluidc-VHYFHEV1pjro3fP9efBgnVXZCrFjmfPoza4l2XN75ZYDkzLVdEs2HSq_97mNmwVeSa5yQ_GDqzoZBeqpYYDKVx6D0R7NLY3LcEkJsk48VQ-fMQ5klxdenZNkKgFSTjJGGn34bVz99K-9woxBU_Rpki9hlSNJjZRUoo-xciPfRTIqdBCo69QCKO4MTKKuUQ_Mkg5Kh4b5UfCkXzRA6jYbehDIMi0ihRDLQPKWlxLLSLG7a0ZcBft4xr4JZKhKpjGneDFKFxwJDtgQgtM6IAJRQ0uP6dMcpqN34yvSujDwuNmP1sf_cn6HDb6t52w-9B7OoZNmx0FebffCVTS6bs-hXU1T99m07PsoH0AoBXQGA |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cloned+and+non-cloned+Java+methods%3A+a+comparative+study&rft.jtitle=Empirical+software+engineering+%3A+an+international+journal&rft.au=Saini%2C+Vaibhav&rft.au=Sajnani%2C+Hitesh&rft.au=Lopes%2C+Cristina&rft.date=2018-08-01&rft.issn=1382-3256&rft.eissn=1573-7616&rft.volume=23&rft.issue=4&rft.spage=2232&rft.epage=2278&rft_id=info:doi/10.1007%2Fs10664-017-9572-7&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s10664_017_9572_7 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1382-3256&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1382-3256&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1382-3256&client=summon |