Abstract
Various clone detection methods have been proposed, with results varying depending on the combination of the methods and hyperparameters used (i.e., configurations). To help select a suitable clone detection configuration, we propose two Bandit Algorithm (BA) based methods that can help evaluate the configurations used dynamically while using detection methods. Our analysis showed that the two proposed methods, the naïve method and BANC (BA considering Negative Cases), identified the best configurations from four used code clone detection methods with high probability.
| Original language | English |
|---|---|
| Article number | 2024IIL0002 |
| Pages (from-to) | 718-722 |
| Journal | IEICE Transactions on Information and Systems |
| Volume | E108.D |
| Issue number | 7 |
| Early online date | 11 Nov 2024 |
| DOIs | |
| Publication status | Published - 2025 |