A systematic mapping study of clone visualization
Tài liệu tham khảo
Roy, 2007
Kapser, 2008, ”cloning considered harmful” considered harmful: patterns of cloning in software, Empir. Softw. Eng., 13, 645, 10.1007/s10664-008-9076-6
Monden, 2002, Software quality analysis by code clones in industrial legacy software, 87
Clements, 2002
Funaro, 2010, A hybrid approach (syntactic and textual) to clone detection, 79
Jacko, 2012
Diehl, 2007
R. Koschke, Survey of research on software clones, in: Dagstuhl Seminar Proceedings. No. 06301 in Dagstuhl Seminar Proceedings, 2006.
Roy, 2009, Comparison and evaluation of code clone detection techniques and tools: a qualitative approach, Sci. Comput. Progr., 74, 470, 10.1016/j.scico.2009.02.007
Carpendale, 2008
Teyseyre, 2009, An overview of 3D software visualization, IEEE Trans. Vis. Comput. Graphics, 15, 87, 10.1109/TVCG.2008.86
Bassil, 2001, A qualitative and quantitative evaluation of software visualization tools, 33
Koschke, 2003, Software visualization in software maintenance, reverse engineering, and re-engineering: a research survey, J. Softw. Maint. Evol.: Res. Pract., 15, 87, 10.1002/smr.270
Caserta, 2011, Visualization of the static aspects of software: A survey, IEEE Trans. Vis. Comput. Graphics, 17, 913, 10.1109/TVCG.2010.110
M.F. Zibran, Analysis and visualization for clone refactoring, in: International Workshop on Software Clones, 2015, pp. 47–48.
Kitchenham, 2007
Petersen, 2008, Systematic mapping studies in software engineering, 68
Petersen, 2015, Guidelines for conducting systematic mapping studies in software engineering: An update, Inf. Softw. Technol., 64, 1, 10.1016/j.infsof.2015.03.007
Basit, 2015, What do we need to know about clones? deriving information needs from user goals, 51
Basit, 2015, A survey on goal-oriented visualization of clone data, 46
E. Adar, GUESS: a language and interface for graph exploration, in: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2006, pp. 791–800.
S. Carter, R. Frank, D. Tansley, Clone detection in telecommunications software systems: A neural net approach, in: Int. Workshop on Application of Neural Networks to Telecommunications, 1993, pp. 273–287.
Basit, 2005, Detecting higher-level similarity patterns in programs, 156
Koschke, 2008, Identifying and removing software clones, 15
Roy, 2008, Scenario-based comparison of clone detection techniques, 153
Novais, 2013, Software evolution visualization: A systematic mapping study, Inf. Softw. Technol., 55, 1860, 10.1016/j.infsof.2013.05.008
Bassi, 2001, Software visualization tools: Survey and analysis, 7
Brereton, 2007, Lessons from applying the systematic literature review process within the software engineering domain, J. Syst. Softw., 80, 571, 10.1016/j.jss.2006.07.009
Kitchenham, 2009, Systematic literature reviews in software engineering—a systematic literature review, Inf. Softw. Technol., 51, 7, 10.1016/j.infsof.2008.09.009
Kitchenham, 2010, The value of mapping studies—a participant-observer case study, 25
Wohlin, 2013, On the reliability of mapping studies in software engineering, J. Syst. Softw., 86, 2594, 10.1016/j.jss.2013.04.076
Wieringa, 2006, Requirements engineering paper classification and evaluation criteria: a proposal and a discussion, Requir. Eng., 11, 102, 10.1007/s00766-005-0021-6
Bellon, 2007, Comparison and evaluation of clone detection tools, IEEE Trans. Softw. Eng., 33, 577, 10.1109/TSE.2007.70725
C.K. Roy, M.F. Zibran, R. Koschke, The vision of software clone management: Past, present and the future, in: IEEE Conference on Software Maintenance, Reengineering and Reverse Engineering (CSMR-WCRE), 2014 Software Evolution Week, 2014, pp. 18–33.
Rattana, 2013, Software clone detection: A systematic review, Inf. Softw. Technol., 55, 1165, 10.1016/j.infsof.2013.01.008
Gupta, 2018, A survey on code clone, its behavior and applications, 27
Basili, 1984, A methodology for collecting valid software engineering data, IEEE Trans. Softw. Eng., SE-10, 728, 10.1109/TSE.1984.5010301
P. Geesaman, J. Cordy, A. Zouaq, Light-weight ontology alignment using best-match clone detection, in: Software Clones (IWSC), 2013 7th International Workshop on, 2013.
D. Martin, J.R. Cordy, Analyzing web service similarity using contextual clones, in: Proceedings of the 5th International Workshop on Software Clones, 2011, 41–46.
Giesecke, 2006, Generic modelling of code clones, 1
R. Koschke, I. Baxter, M. Conradt, J.R. Cordy, Software clone management towards industrial application, in: Dagstuhl Seminar: Software Clone Management Towards Industrial Application, 2012.
Harder, 2012, A controlled experiment on software clones, 219
Bazrafshan, 2014, Effect of clone information on the performance of developers fixing cloned bugs, 1
Bazrafshan, 2017
N. Tsantalis, G.P. Krishnan, Refactoring clones: A new perspective, in: International Workshop on Software Clones, 2013, pp. 12–13.
Jarzabek, 2006, Unifying clones with a generative programming technique: a case study, J. Softw. Maint. Evol. Res. Pract., 18, 267, 10.1002/smr.333
Koschke, 2008, Frontiers of software clone management, Front. Softw. Maint., 119
J. Krinke, A study of consistent and inconsistent changes to code clones, in: Reverse Engineering, 2007. WCRE 2007. 14th Working Conference on, 2007, pp. 170–178.
L. Barbour, F. Khomh, Y. Zou, Late propagation in software clones, in: IEEE International Conference on Software Maintenance, 2011, pp. 273–282.
Li, 2007, An empirical study of the bad smells and class error probability in the post-release object-oriented system evolution, J. Syst. Softw., 80, 1120, 10.1016/j.jss.2006.10.018
E. Juergens, F. Deissenboeck, B. Hummel, S. Wagner, Do code clones matter?, in: IEEE/ACM International Conference on Software Engineering, 2009.
Göde, 2011, Frequency and risks of changes to clones, 311
J. Harder, How multiple developers affect the evolution of code clones, in: IEEE International Conference on Software Maintenance, 2013, pp. 30–39.
Basit, 2009, Data mining approach for detecting higher-level clones in software, IEEE Trans. Softw. Eng., 35, 497, 10.1109/TSE.2009.16
B. Lague, D. Proulx, J. Mayrand, E.M. Merlo, J. Hudepohl, Assessing the benefits of incorporating function clone detection in a development process, in: IEEE International Conference on Software Maintenance, 1997, pp. 314–321.
J. Johnson, Identifying redundancy in source code using fingerprints, in: Proceedings of the 1993 Conference of the Centre for Advanced Studies on Collaborative Research: Software Engineering-Volume 1, 1993, pp. 171–183.
Murphy, 1995, Software reflexion models: Bridging the gap between source and high-level models, 18
Koschke, 2009, Extending the reflexion method for consolidating software variants into product lines, Softw. Qual. J., 17, 331, 10.1007/s11219-009-9077-8
Y.S. Ma, D.K. Woo, Applying a code clone detection method to domain analysis of device drivers, in: Software Engineering Conference, 2007. APSEC 2007. 14th Asia-Pacific, 2007, pp. 254–261.
T. Zhang, M. Kim, Automated transplantation and differential testing for clones, in: IEEE/ACM International Conference on Software Engineering, 2017, pp. 665–676.
A. Chou, J. Yang, B. Chelf, S. Hallem, D.R. Engler, An empirical study of operating system errors, in: Symposium on Operating Systems Principles, 2001, pp. 73–88.
Li, 2006, CP-Miner: Finding copy-paste and related bugs in large-scale software code, IEEE Trans. Softw. Eng., 32, 176, 10.1109/TSE.2006.28
E. Juergens, B. Hummel, F. Deissenboeck, M. Feilkas, Static bug detection through analysis of inconsistent clones, in: Testmethoden FÜR Software (TESO), 2008.
S. Bazrafshan, R. Koschke, N. Göde, Approximate code search in program histories, in: Reverse Engineering (WCRE), 2011 18th Working Conference on, 2011, pp. 109–118.
Li, 2012, CBCD: Cloned buggy code detector, 310
J. Jang, A. Agrawal, D. Brumley, ReDeBug: Finding unpatched code clones in entire OS distributions, in: Symposium on Security and Privacy, 2012.
E. Juergens, F. Deissenboeck, C. Domann, M. Feilkas, B. Hummel, B. Schaetz, J. Streit, S. Wagner, Can clone detection support quality assessments of requirements specifications?, in: IEEE/ACM International Conference on Software Engineering, 2010.
Fowler, 2000
Godfrey, 2005, Using origin analysis to detect merging and splitting of source code entities, IEEE Trans. Softw. Eng., 31, 166, 10.1109/TSE.2005.28
J.J. Hunt, W.F. Tichy, Extensible language-aware merging, in: IEEE International Conference on Software Maintenance, 2002, pp. 511–520.
Debray, 2000, Compiler techniques for code compaction, ACM Trans. Program. Lang. Syst., 22, 378, 10.1145/349214.349233
W.-K. Chen, B. Li, R. Gupta, Code compaction of matching single-entry multiple-exit regions, in: International Static Analysis Symposium, 2003, pp. 401–417.
T. Ishihara, K. Hotta, Y. Higo, H. Igaki, S. Kusumoto, Inter-project functional clone detection toward building libraries—An empirical study on 13,000 projects, in: Reverse Engineering (WCRE), 2012 19th Working Conference on, 2012, pp. 387–391.
Bruntink, 2005, On the use of clone detection for identifying crosscutting concern code, IEEE Trans. Softw. Eng., 31, 804, 10.1109/TSE.2005.114
Faust, 2003, Software product line migration and deployment, Softw. - Pract. Exp., 33, 933, 10.1002/spe.530
T. Mende, F. Beckwermert, R. Koschke, G. Meier, Supporting the grow-and-prune model in software product lines evolution using clone detection, in: Software Maintenance and Reengineering, 2008. CSMR 2008. 12th European Conference on, 2008, pp. 163–172.
Mende, 2009, An evaluation of code similarity identification for the grow-and-prune model, J. Softw. Maint. Evol. Res. Pract., 21, 143, 10.1002/smr.402
Koschke, 2009, Extending the reflexion method for consolidating software variants into product lines, Softw. Qual. J., 17, 331, 10.1007/s11219-009-9077-8
Y. Dubinsky, J. Rubin, T. Berger, S. Duszynski, M. Becker, K. Czarnecki, An Exploratory study of cloning in industrial software product lines, in: Software Maintenance and Reengineering (CSMR), 2013 17th European Conference on, 2013, pp. 25–34.
Göde, 2009, Incremental clone detection, 219
T. Lavoie, F. Khomh, E. Merlo, Y. Zou, Inferring repository file structure modifications using nearest-neighbor clone detection, in: IEEE Working Conference on Reverse Engineering, 2012, pp. 325–334.
Pate, 2013, Clone evolution: a systematic review, J. Softw.: Evol. Process., 25, 261
G. Antoniol, G. Casazza, M. Di Penta, E. Merlo, Modeling clones evolution through time series, in: IEEE International Conference on Software Maintenance, 2001, pp. 273–280.
Antoniol, 2002, Analyzing cloning evolution in the Linux kernel, Inf. Softw. Technol., 44, 755, 10.1016/S0950-5849(02)00123-4
Kim, 2005, An empirical study of code clone genealogies, ACM SIGSOFT Softw. Eng. Notes, 30, 187, 10.1145/1095430.1081737
M. Godfrey, Q. Tu, Tracking structural evolution using origin analysis, in: International Workshop on Principles of Software Evolution, 2002, pp. 117–119.
J. Davies, D.M. German, M.W. Godfrey, A. Hindle, Software bertillonage: finding the provenance of an entity, in: Proceedings of the 8th Working Conference on Mining Software Repositories, 2011, pp. 183–192.
M.W. Godfrey, D.M. German, J. Davies, A. Hindle, Determining the provenance of software artifacts, in: Proceedings of the 5th International Workshop on Software Clones, 2011, pp. 65–66.
D.M. German, M. Di Penta, G. Antoniol, Y.-G. Guéhéneuc, Code siblings: Phenotype evolution, in: International Workshop on Detection of Software Clones, 2009.
E. Merlo, Detection of plagiarism in university projects using metrics-based spectral similarity in: Dagstuhl Seminar Proceedings. No. 06301 in Dagstuhl Seminar Proceedings, 2006.
A. Walenstein, A. Lakhotia, The software similarity problem in malware analysis, in: Dagstuhl Seminar Proceedings. No. 06301 in Dagstuhl Seminar Proceedings, 2006.
D. Bruschi, L. Martignoni, M. Monga, Using code normalization for fighting self-mutating malware, in: Proceedings of the International Symposium on Secure Software Engineering, 2006, pp. 37–44.
Price, 1993, A principled taxonomy of software visualization, J. Vis. Lang. Comput., 4, 211, 10.1006/jvlc.1993.1015
Roman, 1993, A taxonomy of program visualization systems, Computer, 26, 11, 10.1109/2.247643
Shneiderman, 1996, The eyes have it: A task by data type taxonomy for information visualizations, 336
Keim, 1996, Visualization techniques for mining large databases: A comparison, IEEE Trans. Knowl. Data Eng., 8, 923, 10.1109/69.553159
D. Keim, Visual database exploration techniques, in: Tutorial KDD’97 International Conference on Knowledge Discovery and Data Mining, 1997.
S.K. Card, J. Mackinlay, The structure of the information visualization design space, in: Visualization Conference, Information Visualization Symposium and Parallel Rendering Symposium, 1997, pp. 92–99.
1999
E.H. Chi, A taxonomy of visualization techniques using the data state reference model, in: IEEE Symposium on Information Visualization, 2000, pp. 69–75.
Maletic, 2002, A task oriented view of software visualization, 32
de Oliveira, 2003, From visual data exploration to visual data mining: a survey, IEEE Trans. Vis. Comput. Graphics, 9, 378, 10.1109/TVCG.2003.1207445
Gallagher, 2008, Software architecture visualization: An evaluation framework and its application, IEEE Trans. Softw. Eng., 34, 260, 10.1109/TSE.2007.70757
Myller, 2009, Extending the engagement taxonomy: Software visualization and collaborative learning, ACM Trans. Comput. Educ., 9, 7:1, 10.1145/1513593.1513600
Shiffrin, 1977, Controlled and automatic human information processing: II. Perceptual learning, automatic attending, and a general theory, Psychol. Rev., 84, 127, 10.1037/0033-295X.84.2.127
Mackinlay, 1986, Automating the design of graphical presentations of relational information, ACM Trans. Graph., 5, 110, 10.1145/22949.22950
Bertin, 2011
Deissenboeck, 2010, Model clone detection in practice, 57
Cleveland, 1984, Graphical perception: Theory, experimentation, and application to the development of graphical methods, J. Amer. Statist. Assoc., 79, 531, 10.1080/01621459.1984.10478080
Spence, 2005, No humble pie: The origins and usage of a statistical chart, J. Educ. Behav. Stat., 30, 353, 10.3102/10769986030004353
Skau, 2016, Arcs, angles, or areas: individual data encodings in pie and donut charts
Inselberg, 1990, Parallel coordinates: a tool for visualizing multi-dimensional geometry, 361
Mane, 2006
Loua, 1873
Eick, 1992, Seesoft—A tool for visualizing line oriented software statistics, IEEE Trans. Softw. Eng., 18, 957, 10.1109/32.177365
O. Kaser, D. Lemire, Tag-cloud drawing: Algorithms for cloud visualization, in: Workshop on Tagging and Metadata for Social Information Organization, 2007.
Oelke, 2014, A study on human-generated tag structures to inform tag cloud layout, 297
M. Mandal, C.K. Roy, K.A. Schneider, Automatic ranking of clones for refactoring through mining association rules, in: 2014 Software Evolution Week - IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering (CSMR-WCRE), 2014, pp. 114–123.
Tsantalis, 2011, Identification of extract method refactoring opportunities for the decomposition of methods, J. Syst. Softw., 84, 1757, 10.1016/j.jss.2011.05.016
Tairas, 2012, Increasing clone maintenance support by unifying clone detection and refactoring activities, Inf. Softw. Technol., 54, 1297, 10.1016/j.infsof.2012.06.011
N. Tsantalis, D. Mazinanian, S. Rostami, Clone Refactoring with Lambda Expressions, in: IEEE/ACM International Conference on Software Engineering, 2017, pp. 60–70.
K. Hotta, Y. Higo, S. Kusumoto, Identifying, tailoring, and suggesting form template method refactoring opportunities with program dependence graph, in: Conference on Software Maintenance and Reengineering, 2012, pp. 53–62.
Bian, 2013, SPAPE: A semantic-preserving amorphous procedure extraction method for near-miss clones, J. Syst. Softw., 86, 2077, 10.1016/j.jss.2013.03.061
G. Bavota, A. De Lucia, A. Marcus, R. Oliveto, F. Palomba, Supporting extract class refactoring in Eclipse: The ARIES project, in: IEEE/ACM International Conference on Software Engineering, 2012, pp. 1419–1422.
C. Riva, Visualizing software release histories with 3DSoftVis, in: IEEE/ACM International Conference on Software Engineering, 2000, p. 789.
Collberg, 2003, A system for graph-based visualization of the evolution of software, 77
Wu, 2003
J. Wu, C.W. Spitzer, A.E. Hassan, R.C. Holt, Evolution spectrographs: visualizing punctuated change in software evolution, in: International Workshop on Principles of Software Evolution, 2004, pp. 57–66.
Froehlich, 2004, Unifying artifacts and activities in a visual tool for distributed software development teams, 387
Gall, 2006, Software evolution: Analysis and visualization, 1055
Voinea, 2007
Lanza, 2003, Polymetric views—A lightweight visual approach to reverse engineering, IEEE Trans. Softw. Eng., 29, 782, 10.1109/TSE.2003.1232284
Chen, 1976, The entity-relationship model—Toward a unified view of data, ACM Trans. Database Syst., 1, 9, 10.1145/320434.320440
Gibson, 2013, A survey of two-dimensional graph layout techniques for information visualisation, Inf. Vis., 12, 324, 10.1177/1473871612455749
Eades, 1989
Di Battista, 1994, Algorithms for drawing graphs: an annotated bibliography, Comput. Geom., 4, 235, 10.1016/0925-7721(94)00014-X
Burch, 2011, Evaluation of traditional, orthogonal, and radial tree diagrams by an eye tracking study, IEEE Trans. Vis. Comput. Graphics, 17, 2440, 10.1109/TVCG.2011.193
Coomans, 2001, DDDiver: 3D interactive visualization of entity relationships, 291
Shneiderman, 1992, Tree visualization with tree-maps: 2-d space-filling approach, ACM Trans. Graph., 11, 92, 10.1145/102377.115768
Robertson, 1991, Cone trees: animated 3D visualizations of hierarchical information, 189
Lamping, 1995, A focus+ context technique based on hyperbolic geometry for visualizing large hierarchies, 401
Zhao, 2005, Elastic hierarchies: Combining treemaps and node-link diagrams, 57
T. Dang, A. Forbes, CactusTree: A tree drawing approach for hierarchical edge bundling, in: IEEE Pacific Visualization Symposium, 2017, pp. 210–214.
Dang, 2017, A user study of techniques for visualizing structure and connectivity in hierarchical datasets, vol. 1947, 45
B. Johnson, B. Shneiderman, Tree-maps: A space-filling approach to the visualization of hierarchical information structures, in: IEEE Conference on Visualization, 1991, pp. 284–291.
D. Holten, R. Vliegen, J.J. van Wijk, Visual realism for the visualization of software metrics, in: International Workshop on Visualizing Software for Understanding and Analysis, 2005, pp. 1–6.
J.J. Van Wijk, H. Van de Wetering, Cushion treemaps: visualization of hierarchical information, in: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 1999, pp. 73–78.
Wang, 2006, Visualization of large hierarchical data by circle packing, 517
Babaria, 2004
Bruls, 2000, Squarified treemaps, 33
Stasko, 2000, An evaluation of space filling information visualizations for depicting hierarchical structures, Int. J. Hum.-Comput. Stud., 53, 663, 10.1006/ijhc.2000.0420
Aurenhammer, 1991, Voronoi diagrams—A survey of a fundamental geometric data structure, Commun. ACM, 23, 345
Wattenberg, 2005, A note on space-filling visualizations and space-filling curves, 181
Auber, 2013, Gospermap: Using a gosper curve for laying out hierarchical data, IEEE Trans. Vis. Comput. Graphics, 19, 1820, 10.1109/TVCG.2013.91
R. Wettel, M. Lanza, Visualizing software systems as cities, in: International Workshop on Visualizing Software for Understanding and Analysis, 2007, pp. 92–99.
Wettel, 2008, Codecity: 3D visualization of large-scale software, 921
R. Wettel, M. Lanza, Visual exploration of large-scale system evolution, in: 2008 15th Working Conference on Reverse Engineering, 2008, pp. 219–228.
T. Bladh, D.A. Carr, M. Kljun, The effect of animated transitions on user navigation in 3D tree-maps, in: IEEE Conference on Information Visualization, 2005, pp. 297–305.
Steinbrückner, 2013, Understanding software evolution with software cities, Inf. Vis., 12, 200, 10.1177/1473871612438785
Steinbrückner, 2013
Holten, 2006, Hierarchical edge bundles: Visualization of adjacency relations in hierarchical data, IEEE Trans. Vis. Comput. Graphics, 12, 741, 10.1109/TVCG.2006.147
Knight, 2000, Virtual but visible software, 198
Capece, 2017, Visualising a software system as a city through virtual reality, 319
J.I. Maletic, J. Leigh, A. Marcus, G. Dunlap, Visualizing object-oriented software in virtual reality, in: International Workshop on Program Comprehension, 2001, 26–35.
Panas, 2003, A 3d metaphor for software production visualization, 314
Panas, 2007, Communicating software architecture using a unified single-view visualization, 217
Fittkau, 2015, Exploring software cities in virtual reality, 130
Khaloo, 2017, Code park: A new 3D code visualization tool, 43
Merino, 2017, On the impact of the medium in the effectiveness of 3D software visualizations, 11
Schreiber, 2017, Interactive visualization of software components with virtual reality headsets, 119
Ogami, 2017, Using high-rising cities to visualize performance in real-time, 33
F. Fernandes, C.S. Rodrigues, C. Werner, Dynamic analysis of software systems through virtual reality, in: Symposium on Virtual and Augmented Reality (SVR), 2017, pp. 331–340 (in Spanish).
Elliott, 2015, Virtual reality in software engineering: Affordances, applications, and challenges, 547
Bowman, 1999, Maintaining spatial orientation during travel in an immersive virtual environment, Presence: Teleoper. Virtual Environ., 8, 618, 10.1162/105474699566521
Riecke, 2007, Spatial updating in virtual reality: the sufficiency of visual information, Psychol. Res., 71, 298, 10.1007/s00426-006-0085-z
Regian, 1992, Virtual reality: An instructional medium for visual-spatial tasks, J. Commun., 42, 136, 10.1111/j.1460-2466.1992.tb00815.x
Chance, 1998, Locomotion mode affects the updating of objects encountered during travel: The contribution of vestibular and proprioceptive inputs to path integration, Presence: Teleoper. Virtual Environ., 7, 168, 10.1162/105474698565659
Sousa Santos, 2009, Head-mounted display versus desktop for 3D navigation in virtual reality: A user study, Multimedia Tools Appl., 41, 161, 10.1007/s11042-008-0223-2
J. Vincur, P. Navrat, I. Polasek, VR City: Software analysis in virtual reality environment, in: 2017 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), 2017, pp. 509–516.
Rüdel, 2018, A controlled experiment on spatial orientation in VR-based software cities, 21
J.H. Johnson, Substring matching for clone detection and change tracking, in: IEEE International Conference on Software Maintenance, 1994, pp. 120–126.
Freese, 2004, Automated lattice drawing, 112
Crampes, 2014, Visualizing and interacting with concept hierarchies, 5
C. Melo, B. Le-Grand, M. Aufaure, A. Bezerianos, Extracting and visualising tree-like structures from concept lattices, IEEE Conference on Information Visualization, 2011, pp. 261–266.
Behrisch, 2016, Matrix reordering methods for table and network visualization, Comput. Graph. Forum, 35, 693, 10.1111/cgf.12935
Holten, 2009
Wertheimer, 1923, Untersuchungen zur lehre von der gestalt, 301
Alsallakh, 2012, Reinventing the contingency wheel: Scalable visual analytics of large Categorical data, IEEE Trans. Vis. Comput. Graphics, 18, 2849, 10.1109/TVCG.2012.254
Pohl, 2014, Evaluating the dot-based contingency wheel: Results from a usability and utility study, 76
Fruchterman, 1991, Graph drawing by force-directed placement, Softw. Pract. Exp., 21, 1129, 10.1002/spe.4380211102
M.-A. Storey, H.A. Muller, Manipulating and documenting software structures using SHriMP views, in: IEEE International Conference on Software Maintenance, 1995, pp. 275–284.
Bartram, 1995, The continuous zoom: A constrained fisheye technique for viewing and navigating large information spaces, 207
Herman, 2000, Graph visualization and navigation in information visualization: A survey, IEEE Trans. Vis. Comput. Graphics, 6, 24, 10.1109/2945.841119
E. Juergens, F. Deissenboeck, How much is a clone, in: International Workshop on Software Quality and Maintainability, 2010.
M. Seeberger, A. Kuhn, T. Girba, S. Ducasse, Chronia: visualizing how developers change software systems, in: Conference on Software Maintenance and Reengineering, 2006, pp. 348–349.
D’Ambros, 2008, Analysing software repositories to understand software evolution, 37
German, 2009, Code siblings: Technical and legal implications of copying code between applications, 81
Penta, 2010, Identifying licensing of jar archives using a code-search approach, 151
Di Penta, 2010, An exploratory study of the evolution of software licensing, 145
German, 2010, A sentence-matching method for automatic license identification of source code files, 437
I. Galvao, A. Goknil, Survey of traceability approaches in model-driven engineering, in: IEEE International Enterprise Distributed Object Computing Conference, 2007, pp. 313–324.
Winkler, 2010, A survey of traceability in requirements engineering and model-driven development, Softw. Syst. Model., 9, 529, 10.1007/s10270-009-0145-0
Bouillon, 2013, A survey on usage scenarios for requirements traceability in practice, 158
Antoniol, 2000, Design-code traceability for object-oriented systems, Ann. Softw. Eng., 9, 35, 10.1023/A:1018916522804
Marcus, 2003, Recovering documentation-to-source-code traceability links using latent semantic indexing, 125
Antoniol, 2002, Recovering traceability links between code and documentation, IEEE Trans. Softw. Eng., 28, 970, 10.1109/TSE.2002.1041053
Lucia, 2007, Recovering traceability links in software artifact management systems using information retrieval methods, ACM Trans. Softw. Eng. Methodol., 16, 10.1145/1276933.1276934
Hayes Huffman, 2007, Requirements tracing on target (RETRO): improving software maintenance through traceability recovery, Innov. Syst. Softw. Eng., 3, 193, 10.1007/s11334-007-0024-1
X. Chen, J. Hosking, J. Grundy, Visualizing traceability links between source code and documentation, in: IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC), 2012, pp. 119–126.
Marcus, 2005, When and how to visualize traceability links?, 56
T. Merten, D. Jüppner, A. Delater, Improved representation of traceability links in requirements engineering knowledge using Sunburst and Netmap visualizations, in: International Workshop on Managing Requirements Knowledge, 2011, pp. 17–21.
Li, 2012, Which traceability visualization is suitable in this context? a comparative study, 194
S. Winkler, On usability in requirements trace visualizations, in: Requirements Engineering Visualization, 2008, pp. 56–60.
Merino, 2018, A systematic literature review of software visualization evaluation, J. Syst. Softw., 144, 165, 10.1016/j.jss.2018.06.027
Ghoniem, 2005, On the readability of graphs using node-link and matrix-based representations: a controlled experiment and statistical analysis, Inf. Vis., 4, 114, 10.1057/palgrave.ivs.9500092
M. Ghoniem, J.-D. Fekete, P. Castagliola, A comparison of the readability of graphs using node-link and matrix-based representations, in: IEEE Symposium on Information Visualization, 2004, pp. 17–24.
Keller, 2006, Matrices or node-link diagrams: which visual representation is better for visualising connectivity models?, Inf. Vis., 5, 62, 10.1057/palgrave.ivs.9500116
van Ham, 2008, Perceptual organization in user-generated graph layouts, IEEE Trans. Vis. Comput. Graphics, 14, 1333, 10.1109/TVCG.2008.155
Cárdenas, 2017, Evaluating the graph-based visualization technique: A controlled experiment, Enfoqute, 8, 201, 10.29019/enfoqueute.v8n1.134
Cárdenas Caro, 2016
Azzam, 2013, Data visualization and evaluation, vol. 138, 7
Carpendale, 2008, Evaluating information visualizations, vol. 4950, 19
Crisan, 2008, How to evaluate an evaluation study? Comparing and contrasting practices in vis with those of other disciplines
Isenberg, 2008, Grounded evaluation of information visualizations, 6:1
Kim, 2014, Oopsy-daisy: Failure stories in quantitative evaluation studies for visualizations, 142
Plaisant, 2004, The challenge of information visualization evaluation, 109
Redpath, 2003, Criteria for a comparative study of visualization techniques in data mining
Sousa Santos, 2008, Evaluating visualization techniques and tools: what are the main issues?
B.S. Santos, P. Dias, Evaluation in visualization: some issues and best practices, in: IS&T/SPIE Electronic Imaging, Visualization and Data Analysis, vol. 9017, pp. 90170O–1–8.
Sensalire, 2009
M. Sensalire, P. Ogao, A. Telea, Evaluation of software visualization tools: Lessons learned, in: International Workshop on Visualizing Software for Understanding and Analysis, 2009, pp. 19–26.
Shneiderman, 2006, Strategies for evaluating information visualization tools: multi-dimensional in-depth long-term Case studies, 1
Tory, 2008, Qualitative analysis of visualization: A building design field study, 7:1
M..D. Storey, K. Wong, P. Fong, D. Hooper, K. Hopkins, H.A. Muller, On designing an experiment to evaluate a reverse engineering tool, in: Working Conference on Reverse Engineering, 1996, pp. 31–40.
Kirk, 2001
Sim, 2000, A structured demonstration of program comprehension tools, 184
Storey, 2000, How do program understanding tools affect how programmers understand programs?, Sci. Comput. Program., 36, 183, 10.1016/S0167-6423(99)00036-2
Systä, 2001, Shimba—An environment for reverse engineering java software systems, Softw. - Pract. Exp., 31, 371, 10.1002/spe.386
M.J. Pacione, M. Roper, M. Wood, A novel software visualisation model to support software comprehension, in: Working Conference on Reverse Engineering, 2004, pp. 70–79.
Buckley, 2009, Requirements-based visualization tools for software maintenance and evolution, IEEE Comput., 42, 106, 10.1109/MC.2009.127
P.S.M. d. Santos, G.H. Travassos, Action research use in software engineering: An initial survey, in: International Symposium on Empirical Software Engineering and Measurement, 2009, pp. 414–417.
dos Santos, 2011, Action research can swing the balance in experimental software engineering, vol. 83, 205
Staron, 2019, Action research in software engineering: Metrics’ research perspective (invited talk), 39
Dang, 2011, Code clone detection experience at Microsoft, 63
Wang, 2012, CAn I clone this piece of code here?, 170
Yamanaka, 2013, Applying clone change notification system into an industrial development process, 199
Venkatasubramanyam, 2013, Prioritizing code clone detection results for clone management, 30
E. Adar, M. Kim, SoftGUESS: Visualization and exploration of code clones in context, in: International Conference on Software Engineering, vol. 7, pp. 762–766, focus: only, research method: constructive, participants: personal, viualiza- tions: cev, db, htv.
Alalfi, 2014, Analysis and clustering of model clones: An automotive industrial experience, 375
Asaduzzaman, 2011, VisCad: Flexible code clone analysis support for NiCad, 77
B.S. Baker, A program for identifying duplicated code, in: Computing Science and Statistics: Proceedings of the Symposium on the Interface, 1992, pp. 49–57. Similar to [0], focus: secondary, research method: constructive, participants: personal, viualizations: dp.
B.S. Baker, On finding duplication and near-duplication in large software systems, in: IEEE Working Conference on Reverse Engineering, 1995, pp. 86–95. Similar to [0], focus: secondary, research method: constructive, participants: personal, viualizations: dp.
Burch, 2015, Visual analysis of source code similarities, 21
Chen, 2018, Clone refactoring inspection by summarizing clone refactorings and detecting inconsistent changes during software evolution, J. Softw.: Evol. Process, 30
Church, 1993, Dotplot: A program for exploring self-similarity in millions of lines of text and code, J. Comput. Graph. Statist., 2, 153
J.R. Cordy, Exploring large-scale system similarity using incremental clone detection and live scatterplots, in: IEEE International Conference on Program Comprehension, 2011, pp. 151–160.
R. Cottrell, R.J. Walker, J. Denzinger, Jigsaw: a tool for the small-scale reuse of source code, in: Companion Proceedings of International Conference on Software Engineering, 2008, pp. 933–934, focus: secondary, research method: constructive, participants: none, viualizations: civ.
Dang, 2012, XIAO: Tuning code clones at hands of engineers in practice, 369
Dang, 2017, Transferring code-clone detection and analysis to practice, 53
de Wit, 2009
de Wit, 2009, Managing code clones using dynamic change tracking and resolution, 169
Ducasse, 1999, A language independent approach for detecting duplicated code, 109
Fish, 2018, CloneMap: A clone-aware code inspection tool in evolving software, 0368
C. Forbes, I. Keivanloo, J. Rilling, Doppel-Code: A clone visualization tool for prioritizing global and local clone impacts, in: Annual Computer Software and Applications Conference, 2012, pp. 366–367, focus: only, research method: constructive, participants: none, viualizations: bm, civ.
Göde, 2011
Hanjalić, 2013, ClonEvol: Visualizing software evolution with code clones, 1
Harder, 2011, Efficiently handling clone data: RCF and cyclone, 81
B. Hauptmann, V. Bauer, M. Junker, Using edge bundle views for clone visualization, in: International Workshop on Software Clones, 2012, pp. 86–87, focus: only, research method: constructive, participants: none, viualizations: wv.
Helfman, 1996, Dotplot patterns: a literal look at pattern languages, Theory Pract. Object Syst., 2, 31, 10.1002/(SICI)1096-9942(1996)2:1<31::AID-TAPO3>3.0.CO;2-A
Higo, 2006
Higo, 2004, Aries: Refactoring support environment based on code clone analysis, 222
Jablonski, 2007, CReN: A tool for tracking copy-and-paste code clones and renaming identifiers consistently in the IDE, 16
Jacob, 2010, Actively comparing clones inside the code editor, 9
Jiang, 2006
Jiang, 2007, A framework for studying clones in large software systems, 203
Z.M. Jiang, A.E. Hassan, R.C. Holt, Visualizing clone cohesion and coupling, in: Asia-Pacific Software Engineering Conference, pp. 467–476. Similar to [0], focus: only, research method: constructive, participants: personal, viualizations: cccg.
Johnson, 1994, Visualizing textual redundancy in legacy source, 32
T. Kamiya, An execution-semantic and content-and-context-based code-clone detection and analysis, in: International Workshop on Software Clones, 2015, pp. 1–7, focus: secondary, research method: constructive, participants: none, viualizations: ccd.
Kamiya, 2002, CCFinder: a multilinguistic token-based code clone detection system for large scale source code, IEEE Trans. Softw. Eng., 28, 654, 10.1109/TSE.2002.1019480
Kapser, 2005, Improved tool support for the investigation of duplication in software, 305
Liu, 2018, Supporting exploratory code search with differencing and visualization, 300
S. Livieri, Y. Higo, M. Matushita, K. Inoue, Very-large scale code clone analysis and visualization of open source programs using distributed CCFinder: D-CCFinder, in: International Conference on Software Engineering, 2007, pp. 106–115, focus: primary, research method: constructive, participants: personal, viualizations: dp.
D. Luciv, Detecting and tracking near duplicates in software documentation, in: Proceedings of the Spring/Summer Young Researchers’ Colloquium on Software Engineering, Innopolis, Republic of Tatarstan, Russian Federation, 2017, pp. 125–129. Similar to [0], focus: secondary, research method: constructive, participants: none, viualizations: civ, hm.
Luciv, 2018, Duplicate finder toolkit, 171
Martinez, 2014, Identifying and visualising commonality and variability in model variants, vol. 8569, 117
Mazinanian, 2016, JDeodorant: clone refactoring, 613
Mondal, 2019, Clone-world: A visual analytic system for large scale software clones, Vis. Inf., 3, 18
Mondal, 2019, Towards visualizing large scale evolving clones, 302
Murakami, 2015, Clonepacker: A tool for clone set visualization, 474
Reniers, 2014, The solid* toolset for software visual analytics of program structure and metrics comprehension: From research prototype to product, J. Sci. Comput. Program., 79, 224, 10.1016/j.scico.2012.05.002
Rieger, 2005
M. Rieger, S. Ducasse, Visual detection of duplicated code, in: European Conference on Object-Oriented Programming Workshops, 1998, pp. 75–76. Similar to [0], similar to (P44), focus: only, research method: constructive, participants: none, viualizations: civ, dp.
M. Rieger, S. Ducasse, M. Lanza, Insights into system-wide code duplication, in: IEEE Working Conference on Reverse Engineering, 2004, pp. 100–109. Similar to [0], focus: only, research method: constructive, participants: none, viualizations: ccfe, cs, dwv, htv, tm.
Saha, 2011, Visualizing the evolution of code clones, 71
Sano, 2014, Supporting clone analysis with tag cloud visualization, 94
Steinbeck, 2017, An arc-based approach for visualization of code smells, 397
Steinbeck, 2019, Comparing the evostreet visualization technique in two- and three-dimensional environments—A controlled experiment, 231
R. Tairas, J. Gray, I. Baxter, Visualization of clone detection results, in: ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA) Workshop on Eclipse Technology EXchange, 2006, pp. 50–54, focus: only, research method: constructive, participants: none, viualizations: ntv, ss, dp.
Tairas, 2011, Representing clones in a localized manner, 54
M. Toomim, A. Begel, S.L. Graham, Managing duplicated code with linked editing, in: Symposium on Visual Languages and Human Centric Computing, 2004, pp. 173–180, focus: primary, research method: quantitative and quantitative empirical, participants: students, viualizations: civ.
Tsantalis, 2015, Assessing the refactorability of software clones, IEEE Trans. Softw. Eng., 41, 1055, 10.1109/TSE.2015.2448531
Uddin, 2015, On the comprehension of code clone visualizations: A controlled study using eye tracking, 161
Uddin, 2015, Towards convenient management of software clone codes in practice: an integrated approach, 211
Y. Ueda, Y. Higo, T. Kamiya, S. Kusumoto, K. Inoue, Gemini: Code clone analysis tool, in: International Symposium on Empirical Software Engineering, vol. 2, 2002, pp. 31–32. Similar to [0], focus: only, research method: constructive, participants: none, viualizations: civ, dp, ntv, pcv.
Y. Ueda, T. Kamiya, S. Kusumoto, K. Inoue, Gemini: maintenance support environment based on code clone analysis, in: IEEE Symposium on Software Metrics, 2002, pp. 67–76. Similar to [0], focus: only, research method: constructive, participants: personal, viualizations: civ, dp, ntv, pcv.
L. Voinea, A. Telea, Visual clone analysis with SolidSDD, in: Working Conference on Software Visualization, 2014, pp. 79–82, focus: only, research method: constructive, participants: personal, viualizations: bm, civ, wv.
Yoshimura, 2012, Visualizing code clone outbreak: An industrial case study, 96
Yujiang, 2014, A tool for suggesting similar program element modifications, IPSJ SIG Notes, 2014, 1
Y. Zhang, H.A. Basit, S. Jarzabek, D. Anh, M. Low, Query-based filtering and graphical view generation for clone analysis, in: IEEE International Conference on Software Maintenance, 2008, pp. 376–385, focus: only, research method: constructive, participants: personal, viualizations: bc, bm, civ, ntv, pc, ss (our own tool).
2019
2019
2019
2019
2019
2019
2019
2017
2019
2019
2019
2019
2019
2019
2019
2019
