Loading…
Clone Detection Method Selection Based on Bandit Algorithm: a Preliminary Analysis
Various clone detection methods have been proposed in the past, with results varying depending on the combination of the methods and parameters setting used (i.e., configurations). To help with the selection of a suitable clone detection configuration, we propose Bandit Algorithm (BA) approach that...
Saved in:
Main Authors: | , , , , , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Various clone detection methods have been proposed in the past, with results varying depending on the combination of the methods and parameters setting used (i.e., configurations). To help with the selection of a suitable clone detection configuration, we propose Bandit Algorithm (BA) approach that can help in evaluating the configuration used dynamically while using detection methods. Our preliminary analysis showed that our approach is able to identify the best configurations from four used code clone detection methods. |
---|---|
ISSN: | 2572-6587 |
DOI: | 10.1109/IWSC55060.2022.00017 |