On the Application of Bandit Algorithm for Selecting Clone Detection Methods

Masateru Tsunoda, Takuto Kudo, Akito Monden, Amjed Tahir, Kwabena Ebo Bennin, Koji Toda, Keitaro Nakasai, Kenichi Matsumoto

Research output: Contribution to journalLetterAcademic

Abstract

Various clone detection methods have been proposed, with results varying depending on the combination of the methods and hyperparameters used (i.e., configurations). To help select a suitable clone detection configuration, we propose two Bandit Algorithm (BA) based methods that can help evaluate the configurations used dynamically while using detection methods. Our analysis showed that the two proposed methods, the naïve method and BANC (BA considering Negative Cases), identified the best configurations from four used code clone detection methods with high probability.
Original languageEnglish
Article number2024IIL0002
Pages (from-to)718-722
JournalIEICE Transactions on Information and Systems
VolumeE108.D
Issue number7
Early online date11 Nov 2024
DOIs
Publication statusPublished - 2025

Fingerprint

Dive into the research topics of 'On the Application of Bandit Algorithm for Selecting Clone Detection Methods'. Together they form a unique fingerprint.

Cite this