International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 116

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015


Performance Evaluation of Clone Detection Tools

Shilpa Dang [3] | Shahid Ahmad Wani


Abstract: Code clones are code portions which are similar in syntax or semantics. Copy-paste activity is the main reason for introducing clones in a software system. These clones must be identified and removed from a system to improve the quality of a software system. Various clone detection tools have been proposed that provide assistance to professionals in identifying code clones and once identified clones can be removed from software systems. These clone detection tools implement different clone detection techniques and have different approach in detection of clones. This study presents an investigation of clone detection tools to understand the performance of each tool and to judge the usefulness and accuracy of clone detection tools. This study can be helpful while making a selection of a particular tool for detection of clones in a software system.


Keywords: Syntax Tree AST, Program Dependence Graph PDG, String Matching, Precision and Recall


Edition: Volume 4 Issue 4, April 2015,


Pages: 1903 - 1906


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Shilpa Dang, Shahid Ahmad Wani, "Performance Evaluation of Clone Detection Tools", International Journal of Science and Research (IJSR), Volume 4 Issue 4, April 2015, pp. 1903-1906, https://www.ijsr.net/get_abstract.php?paper_id=SUB153536

Similar Articles with Keyword 'Syntax'

Downloads: 0

Research Paper, Computer Science & Engineering, Singapore, Volume 13 Issue 5, May 2024

Pages: 711 - 722

General Multi-Objective Performance Expression for Population-Based Search and Optimization

Eik Fun Khor

Share this Article

Downloads: 102

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1732 - 1734

A Secure Video Encryption Technique Using Rijndael Algorithm

N. Geetha [4] | K. Mahesh [9]

Share this Article
Top