Duplicated code detection has been an active research field for several decades. Although many algorithms have been proposed, only a few researches have focused on the comprehensive presentation of the detected clones. During the evaluation of clone detectors developed by the authors, it was observed that the results of the clone detectors were hard to comprehend. Therefore, in this paper a broadly suitable grouping method with which clone pairs can be easily grouped together to provide a more compact result is presented.

1.
C. K.
Roy
,
J. R.
Cordy
, and
R.
Koschke
, “
Comparison and Evaluation of Code Clone Detection Techniques and Tools: A Qualitative Approach
,”
Elsevier North-Holland, Inc.
,
Amsterdam, The Netherlands, The Netherlands
,
2009
, vol.
74
, pp.
470
495
,
ISSN 0167-6423
.
2.
C.
Brown
, and
S.
Thompson
, “
Clone Detection and Elimination for Haskell
,” in
PEPM’10: Proceedings of the 2010 ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation
, edited by
J.
Gallagher
, and
J.
Voigtlander
,
ACM Press
,
2010
, pp.
111
120
, ISBN 978-1-60558-727-1, URL http://www.cs.kent.ac.uk/pubs/2010/2976.
3.
V.
Fördős
, and
M.
Tóth
, “
Identifying Code Clones with RefactorErl
,” in
Proceedings of the 13th Symposium on Programming Languages and Software Tools
, ISBN 978-963-306-228-9,
Szeged, Hungary
,
2013
, pp.
31
45
.
4.
V.
Fördős
, and
M.
Tóth
,
Identifying Code Clones with RefactorErl (extended version)
,
Submitted to the special issue of Acta Cybernetica
,
2014
.
5.
V.
Fördős
, and
M.
Tóth
, “
Utilising the software metrics of RefactorErl to identify code clones in Erlang
,” in
Proceedings of 10th Joint Conference on Mathematics and Computer Science
,
Studia Universitatis Babeş-Bolyai
,
Cluj-Napoca, Romania
,
2014
, vol.
LIX
of Informatica, pp.
103
118
,
ISSN 2065–9601
.
6.
J.
Armstrong
,
Programming Erlang: Software for a Concurrent World
,
Pragmatic Bookshelf
,
2007
, ISBN 193435600X, 9781934356005.
7.
H.
Li
, and
S.
Thompson
, “
Clone detection and removal for Erlang/OTP within a refactoring environment
,” in
Proceedings of the 2009 ACM SIGPLAN workshop on Partial evaluation and program manipulation
,
PEPM ’09
,
ACM
,
New York, NY, USA
,
2009
, pp.
169
178
, ISBN 978-1-60558-327-3, URL .
8.
L. R.
Dice
, “
Measures of the Amount of Ecologic Association Between Species
,”
1945
, vol.
26
, pp.
297
302
, URL http://www.jstor.org/pss/1932409.
9.
I. M.
Bomze
,
M.
Budinich
,
P. M.
Pardalos
, and
M.
Pelillo
,
Handbook of Combinatorial Optimization (Supplement Volume A)
4
,
1
74
(
1999
), URL http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.56.6221.
10.
G.
Csardi
, and
T.
Nepusz
,
Inter Journal Complex Systems
,
1695
(
2006
), URL http://igraph.org.
11.
R.
Koschke
, “
Large-Scale Inter-System Clone Detection Using Suffix Trees
,” in
Software Maintenance and Reengineering (CSMR)
,
2012 16th European Conference
,
2012
, pp.
309
318
,
ISSN 1534-5351
.
12.
R.
Smith
, and
S.
Horwitz
,
Detecting and Measuring Similarity in Code Clones
(
2009
).
13.
I.
Keivanloo
,
J.
Rilling
, and
P.
Charland
, “
SeClone - A Hybrid Approach to Internet-Scale Real-Time Code Clone Search
,” in
Program Comprehension (ICPC), 2011 IEEE 19th International Conference
,
2011
, pp.
223
224
,
ISSN 1092-8138
.
14.
R.
Tairas
, and
J.
Gray
, “
An Information Retrieval Process to Aid in the Analysis of Code Clones
,”
Kluwer Academic Publishers
,
Hingham, MA, USA
,
2009
, vol.
14
, pp.
33
56
,
ISSN 1382-3256
, URL .
This content is only available via PDF.
You do not currently have access to this content.