[Remote] C³: Code Clone-Based Identification of Duplicated Components
Reinventing the wheel is a detrimental programming practice in software development that frequently results in the introduction of duplicated components. This practice not only leads to increased maintenance and labor costs but also poses a higher risk of propagating bugs throughout the system. Despite numerous issues introduced by duplicated components in software, the identification of component-level clones remains a significant challenge that existing studies struggle to effectively tackle. Specifically, existing methods face two primary limitations that are challenging to overcome: 1) Measuring the similarity between different components presents a challenge due to the significant size differences among them; 2) Identifying functional clones is a complex task as determining the primary functionality of components proves to be difficult.
To overcome the aforementioned challenges, we present a novel approach named C³ (Component-level Code Clone detector) to effectively identify both textual and functional cloned components. In addition, to enhance the efficiency of eliminating cloned components, we develop an assessment method based on six component-level clone features, which assists developers in prioritizing the cloned components based on the refactoring necessity.
To validate the effectiveness of C³, we employ a large-scale industrial product developed by Huawei, a prominent global ICT company, as our dataset and apply C³ to this dataset to identify the cloned components. Our experimental results demonstrate that C³ is capable of accurately detecting cloned components, achieving impressive performance in terms of precision (0.93), recall (0.91), and F1-score (0.9). Besides, we conduct a comprehensive user study to further validate the effectiveness and practicality of our assessment method and the proposed clone features in assessing the refactoring necessity of different cloned components. Our study establishes solid alignment between assessment outcomes and participant responses, indicating the accurate prioritization of clone components with a high refactoring necessity through our method. This finding further confirms the usefulness of the six “golden features” in our assessment.
Wed 6 DecDisplayed time zone: Pacific Time (US & Canada) change
14:00 - 15:30 | Clone and Similarity DetectionResearch Papers / Industry Papers at Golden Gate A Chair(s): Denys Poshyvanyk William & Mary | ||
14:00 15mTalk | AdaptivePaste: Intelligent Copy-Paste in IDE Industry Papers Xiaoyu Liu Microsoft Corporation, Jinu Jang Microsoft, Neel Sundaresan Microsoft, Miltiadis Allamanis Google DeepMind, Alexey Svyatkovskiy Microsoft DOI Media Attached | ||
14:15 15mTalk | Scalable Program Clone Search Through Spectral Analysis Research Papers Tristan Benoit Université de Lorraine, CNRS, LORIA, Jean-Yves Marion LORIA, Université de Lorraine, Sébastien Bardin CEA, Université Paris Saclay DOI Pre-print Media Attached | ||
14:30 15mTalk | [Remote] Tritor: Detecting Semantic Code Clones by Building Social Network-based Triads Model Research Papers Deqing Zou Huazhong University of Science and Technology, Siyue Feng Huazhong University of Science and Technology, Yueming Wu Nanyang Technological University, Wenqi Suo Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology Media Attached | ||
14:45 15mTalk | [Remote] C³: Code Clone-Based Identification of Duplicated Components Industry Papers Yanming Yang Zhejiang University, Ying Zou Queen's University, Kingston, Ontario, Xing Hu Zhejiang University, David Lo School of Computing and Information Systems, Singapore Management University, Chao Ni School of Software Technology, Zhejiang University, John Grundy Monash University, Xin Xia Huawei Technologies DOI Media Attached | ||
15:00 15mTalk | [Remote] Demystifying the Composition and Code Reuse in Solidity Smart Contracts Research Papers Kairan Sun Nanyang Technological University, Zhengzi Xu Nanyang Technological University, Chengwei Liu Nanyang Technological University, Kaixuan Li East China Normal University, Yang Liu Nanyang Technological University Pre-print Media Attached | ||
15:15 15mTalk | [Remote] Gitor: Scalable Code Clone Detection by Building Global Sample Graph Research Papers Junjie shan Westlake University, Shihan Dou Fudan University, Yueming Wu Nanyang Technological University, Hairu wu Fudan University, Yang Liu Nanyang Technological University Media Attached |