The lack of code abstraction ended up being
similar in both cases. Questions about the profile of
both Java and PL/SQL development teams must be
asked to check if experience, age, instruction degree
and other factors, may affect the coding
maintainability.
We encourage more research inside private
environments to test hypothesis only studied on
Open Source Software systems. Also, our corporate
Object-Oriented Systems had very few SLOC than
other Object-Oriented Open Source Systems. It is
important to replicate this experiment inside several
other private repositories to check if they present the
same behavior. The more the systems are tested,
more we assure external validity.
As mentioned before, we adapted the software
engineering experimental process described in
Wohlin et al (2000) to clones mining experiments.
We believe that the studies, applications, and tools
for software clone mining can benefit from this type
of approach. Rigorous experimental description
facilitates replication of studies and the executing of
systematic reviews and other types of secondary
analysis.
As future work, we have in mind a few projects
related to clone incidence. The first one is to verify
if the human profile of development team has some
direct effect on clone appearance. Data like age,
experience and qualification may be extracted and
combined from several sources to mount this profile.
Other insight is to explore code comments to find
out words that indicate something that was
purposely implemented missing some pieces (for
many reasons) and this will have to be done some
time, indicating a Technical Debt (TD) issue.
ACKNOWLEDGEMENTS
This study could only be developed due to the
support of Tiradentes University – UNIT, along with
the Technology Information Department – DTI, who
provided the repository used in our experiment.
REFERENCES
I. D. Baxter, A. Yahin, L. Moura, M. Sant’Anna, and L.
Bier, “Clone detection using abstract syntax trees,” in
ICSM, 1998,pp. 368–377.
Y. Ma and D. Woo. Applying a Code Clone Detection
Method to Domain Analysis of Device Drivers. In
Proceedings of the 14th Asia Pacific Software
Engineering Conference (APSEC’07), pp. 254–261,
Nagoya, Japan, December 2006.
A. Marcus and J. I. Maletic. Identification of high-level
concept clones in source code.In Proceedings of the
16th IEEE International Conference on Automated
Software Engineering (ASE’01), pp. 107-114, San
Diego, CA, USA, November 2001.
S. Khatoon, A. Mahmood, and G. Li, “An evaluation of
source code mining techniques,” Proc. - 2011 8th Int.
Conf. Fuzzy Syst. Knowl. Discov. FSKD 2011, vol. 3,
pp. 1929–1933, 2011.
C. K. Roy and J. R. Cordy, “An Empirical Study of
Function Clones in Open Source Software,” 2008 15th
Work. Conf. Reverse Eng., pp. 81–90,2008.
J. R. Cordy and C. K. Roy, “The NiCad Clone Detector,”
2011 IEEE 19th Int. Conf. Progr. Compr., no. Figure
3, pp. 219–220, 2011.
N. Schwarz, M. Lungu, and R. Robbes, “On how often
code is cloned across repositories,” Proc. - Int. Conf.
Softw. Eng., pp. 1289–1292, 2012.
D. Rattan, R. Bhatia, and M. Singh, Software clone
detection: A systematic review, vol. 55, no. 7. Elsevier
B.V., 2013.
M. Kim, V. Sazawal, and D. Notkin, “An empirical study
of code clone genealogies,” ACM SIGSOFT Softw.
Eng. Notes, vol. 30, p. 187, 2005.
C. K. Roy, J. R. Cordy, and R. Koschke, “Comparison and
evaluation of code clone detection techniques and
tools: A qualitative approach,” Sci. Comput. Program.,
vol. 74, pp. 470–495, 2009.
D. Rattan, R. Bhatia, and M. Singh, Software clone
detection: A systematic review, vol. 55, no. 7. Elsevier
B.V., 2013.
C. J. Kapser and M. W. Godfrey, “‘cloning considered
harmful’ considered harmful: Patterns of cloning in
software,” Empir. Softw. Eng., vol. 13, pp. 645–692,
2008.
Wohlin, P. Runeson, M. Host, M. C. Ohlsson, B. Regnell,
and A. Wesslén (2000). Experimentation in software
engineering: an introduction. Kluwer Academic
Publishers, ISBN: 0-7923-8682-5.
M. Colaço, M. Mendonça, M. André, D. F. Farias, and P.
Henrique, “A Neurolinguistic-based Methodology for
Identifying OSS Developers Context-Specific
Preferred Representational Systems,” Context, no. c,
pp. 112–121, 2012.
OpenSource.com What is open source? Retrieved from
https://opensource.com/resources/what-open-source
Y. Guo, C. Seaman, R. Gomes, A. Cavalcanti, G. Tonin,
F. Q. B. Da Silva, A. L. M. Santos, and C. Siebra,
“Tracking technical debt - An exploratory case study,”
IEEE Int. Conf. Softw. Maintenance, ICSM, pp. 528–
531, 2011.
R. van Solingen and E. Berghout (1999). The
Goal/Question/Metric Method: A practical guide for
quality improvement of software development.
McGraw-Hill.
SPSS, IBM Software, http://goo.gl/eXfcT3
C. K. Roy and J. R. Cordy, “A Survey on Software Clone
Detection Research,” Queen’s Sch. Comput. TR, vol.
115, p. 115, 2007.
ICEIS 2017 - 19th International Conference on Enterprise Information Systems
402