Source Code Reuse Evaluation by Using Real/Potential Copy and Paste

被引:0
|
作者
Ohta, Takafumi [1 ]
Murakami, Hiroaki [1 ]
Igaki, Hiroshi [1 ]
Higo, Yoshiki [1 ]
Kusumoto, Shinji [1 ]
机构
[1] Osaka Univ, Grad Sch Informat Sci & Technol, 1-5 Yamadaoka, Suita, Osaka 5650871, Japan
关键词
Reuse Based Software Engineering Teaching; Code Clone; Source Code Reuse;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Developers often reuse existing software by copy and paste. Source code reuse improves productivity and software quality. On the other hand, source code reuse requires several professional skills to developers. In source code reuse, developers must locate reusable code fragments, and judge whether such reusable code is adequate to copy and paste into the source file under development. This paper presents extraction and analysis methods for developers' source code reuse behavior (copy and paste). Our method extracts developers' actual source code reuse (real copy and paste). Then, by using a code clone detection tool, the method extracts code fragments for (potential reuse). Our study of real and potential copy and paste provides a quantitative assessment for source code reuse by developers.
引用
收藏
页码:33 / 39
页数:7
相关论文
共 50 条
  • [1] AN EVALUATION OF ADA SOURCE CODE REUSE
    THOMAS, WM
    DELIS, A
    BASILI, VR
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1992, 603 : 80 - 91
  • [2] Code Similarities Beyond Copy & Paste
    Juergens, Elmar
    Deissenboeck, Florian
    Hummel, Benjamin
    [J]. 14TH EUROPEAN CONFERENCE ON SOFTWARE MAINTENANCE AND REENGINEERING (CSMR 2010), 2010, : 78 - 87
  • [3] Using Code Skeleton Patterns for Open Source Reuse
    Nam, Seungwoo
    Kim, Doohwan
    Hong, Jang-Eui
    [J]. ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2018, 474 : 1091 - 1096
  • [4] Reuse of Patterns' Source Code
    Jakubik, Jaroslav
    Navrat, Pavol
    [J]. KNOWLEDGE-BASED SOFTWARE ENGINEERING, 2006, 140 : 143 - 146
  • [5] Seamless Code Reuse with Source Code Corpus
    Yamamoto, Tetsuo
    Yoshida, Norihiro
    Higo, Yoshiki
    [J]. 2013 20TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2013), VOL 2, 2013, : 31 - 36
  • [6] Analyzing Source Code Identifiers for Code Reuse using NLP Techniques and WordNet
    Pirapuraj, P.
    Perera, Indika
    [J]. 2017 3RD INTERNATIONAL MORATUWA ENGINEERING RESEARCH CONFERENCE (MERCON), 2017, : 105 - 110
  • [7] CopypastaVulGuard - A browser extension to prevent copy and paste spreading of vulnerable source code in forum posts
    van Aerssen, Max
    Leich, Christian
    Schmidt, Holger
    Al Ali, Salar
    Benni, Abdulkader
    Tanz, Jakob
    [J]. PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
  • [8] Identifying Source Code Reuse across Repositories using LCS-based Source Code Similarity
    Kawamitsu, Naohiro
    Ishio, Takashi
    Kanda, Tetsuya
    Kula, Raula Gaikovina
    De Roover, Coen
    Inoue, Katsuro
    [J]. 2014 14TH IEEE INTERNATIONAL WORKING CONFERENCE ON SOURCE CODE ANALYSIS AND MANIPULATION (SCAM 2014), 2014, : 305 - 314
  • [9] Leveraging source code search for reuse
    Happel, Hans-Joerg
    Schuster, Thomas
    Szulman, Peter
    [J]. HIGH CONFIDENCE SOFTWARE REUSE IN LARGE SYSTEMS, PROCEEDINGS, 2008, 5030 : 360 - 371
  • [10] Code reuse in open source software
    Haefliger, Stefan
    von Krogh, Georg
    Spaeth, Sebastian
    [J]. MANAGEMENT SCIENCE, 2008, 54 (01) : 180 - 193