Loading…

Clone Detection Method Selection Based on Bandit Algorithm: a Preliminary Analysis

Various clone detection methods have been proposed in the past, with results varying depending on the combination of the methods and parameters setting used (i.e., configurations). To help with the selection of a suitable clone detection configuration, we propose Bandit Algorithm (BA) approach that...

Full description

Saved in:
Bibliographic Details
Main Authors: Tabo, Takeru, Kudo, Takuto, Tsunoda, Masateru, Tahir, Amjed, Bennin, Kwabena Ebo, Toda, Koji, Nakasai, Keitaro, Monden, Akito
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Various clone detection methods have been proposed in the past, with results varying depending on the combination of the methods and parameters setting used (i.e., configurations). To help with the selection of a suitable clone detection configuration, we propose Bandit Algorithm (BA) approach that can help in evaluating the configuration used dynamically while using detection methods. Our preliminary analysis showed that our approach is able to identify the best configurations from four used code clone detection methods.
ISSN:2572-6587
DOI:10.1109/IWSC55060.2022.00017