- 【Updated on May 12, 2025】 Integration of CiNii Dissertations and CiNii Books into CiNii Research
- Trial version of CiNii Research Knowledge Graph Search feature is available on CiNii Labs
- 【Updated on June 30, 2025】Suspension and deletion of data provided by Nikkei BP
- Regarding the recording of “Research Data” and “Evidence Data”
-
- TSUNODA Masateru
- Kindai University
-
- KUDO Takuto
- Nara Institute of Science and Technology
-
- MONDEN Akito
- Kindai University
-
- TAHIR Amjed
- Massey University
-
- BENNIN Kwabena Ebo
- Wageningen University & Research
-
- TODA Koji
- Fukuoka Institute of Technology
-
- NAKASAI Keitaro
- Osaka Metropolitan University College of Technology
-
- MATSUMOTO Kenichi
- Nara Institute of Science and Technology
Search this article
Description
<p>Various clone detection methods have been proposed, with results varying depending on the combination of the methods and hyperparameters used (i.e., configurations). To help select a suitable clone detection configuration, we propose two Bandit Algorithm (BA) based methods that can help evaluate the configurations used dynamically while using detection methods. Our analysis showed that the two proposed methods, the naïve method and BANC (BA considering Negative Cases), identified the best configurations from four used code clone detection methods with high probability.</p>
Journal
-
- IEICE Transactions on Information and Systems
-
IEICE Transactions on Information and Systems advpub (0), 2024
The Institute of Electronics, Information and Communication Engineers
- Tweet
Details 詳細情報について
-
- CRID
- 1390583647823314816
-
- ISSN
- 17451361
- 09168532
-
- Text Lang
- en
-
- Data Source
-
- JaLC
- Crossref
-
- Abstract License Flag
- Disallowed