Software Clones - Guilty until Proven Innocent?
Material type:
- text
- computer
- online resource
- 9783832592592
- 005.12
- QA76.758 .H373 2017
Intro -- 1 Introduction -- 1.1 Contributions -- 1.1.1 Clone Stability -- 1.1.2 Clone Authorship -- 1.1.3 Clones and Programmer Performance -- 1.2 Previously Published Content -- 1.3 Thesis Outline -- 2 Definition and Terminology -- 2.1 Definition -- 2.2 Terminology -- 3 Detecting Clones -- 3.1 Detection -- 3.1.1 Textual Comparison -- 3.1.2 Token Comparison -- 3.1.3 Syntactical Comparison -- 3.1.4 Metric Comparison -- 3.1.5 Dependency Comparison -- 3.1.6 Other techniques -- 3.2 Evolution -- 3.2.1 Incremental Detection -- 3.2.2 Tracking Clones -- 3.2.3 Evolution Patterns -- 3.3 Clone Detection for this Thesis -- 3.3.1 Detection and Tracking Approach -- 3.3.2 Improving Precision -- 3.3.3 Detection Thresholds -- 4 Causes and Effects of Clones -- 4.1 Causes -- 4.1.1 Technical Reasons -- 4.1.2 Organizational Reasons -- 4.1.3 Personal Reasons -- 4.2 Effects -- 4.2.1 Program Changeability -- 4.2.2 Program Correctness -- 4.2.3 Program Comprehension -- 5 Managing Clones -- 5.1 Preventive -- 5.2 Compensative -- 5.3 Corrective -- 6 Clone Stability -- 6.1 Research Questions -- 6.2 The Original Study Compared to Ours -- 6.3 Study Setup -- 6.3.1 Clone Detection -- 6.3.2 Subject Systems -- 6.3.3 Data Collection -- 6.3.4 Measurement -- 6.4 Results -- 6.4.1 Validation of the original studies' results -- 6.4.2 Generalizability -- 6.4.3 The Relationship of Detection Parameters and Stability -- 6.4.4 Deletion Characteristics -- 6.4.5 Distribution Over Time -- 6.5 Threats to Validity -- 6.5.1 Internal validity -- 6.5.2 Construct Validity -- 6.5.3 External Validity -- 6.6 Discussion -- 6.7 Further Studies on Clone Stability -- 6.7.1 Modification Frequency -- 6.7.2 Proportional Stability Metrics -- 6.8 Conclusion -- 7 Clone Authorship -- 7.1 Research Questions -- 7.2 Authorship Detection -- 7.2.1 Authorship vs. Ownership -- 7.2.2 Existing Techniques.
7.2.3 Token-based Authorship Detection -- 7.3 Study Setup -- 7.3.1 Clone Detection -- 7.3.2 Subject Systems -- 7.4 Results -- 7.4.1 Clone Authors -- 7.4.2 Change Frequency -- 7.4.3 Change Consistency -- 7.4.4 Intentions and Bugs -- 7.5 Discussion -- 7.6 Threats to Validity -- 7.6.1 Internal Validity -- 7.6.2 Construct Validity -- 7.6.3 External Validity -- 7.7 Conclusion -- 8 Clones and Programmer Performance -- 8.1 Research Questions -- 8.2 Experimental Design -- 8.2.1 Hypotheses and Variables -- 8.2.2 Design -- 8.2.3 Subjects -- 8.2.4 Objects -- 8.2.5 Instrumentation -- 8.3 Execution -- 8.4 Analysis -- 8.4.1 Descriptive Statistics -- 8.4.2 Hypothesis Testing -- 8.5 Interpretation & -- Discussion -- 8.5.1 Time -- 8.5.2 Correctness -- 8.6 Threats to Validity -- 8.6.1 Internal validity -- 8.6.2 Construct Validity -- 8.6.3 External Validity -- 8.7 Conclusion -- 9 Conclusion -- Appendices -- List of Figures -- List of Tables -- Bibliography.
Description based on publisher supplied metadata and other sources.
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
There are no comments on this title.