SlideShare a Scribd company logo
I, Clone
The paper formerly known as

“Studying Late Propagations in Code Clone
Evolution Using Software Repository Mining”
by Hsiao Hui Mui, Andy Zaidman, Martin Pinzger
Delft University of Technology
IWSC 2014, Antwerp, Belgium
What you should know…
Hsiao Hui Mui
Former MSc student
Now working in industry
 Main driver behind this research!
I, Robot
Plot
A robot goes against his “programming”…
…thereby disobeying the “three laws”1
1. A robot may not injure a human being
2. A robot must obey orders given by a human
3. A robot must protect its own existence
1. By Isaac Asimov
• D’oh!!!
• (wrong movie)
Plot
A robot goes against his “programming”…
…thereby disobeying the “three laws”1
1. A robot may not injure a programmer
2. A robot must obey orders given by a programmer
3. A robot must protect its own existence
1. By Andy Zaidman
I, Late Propagation
Law 1:

A clone may not injure a programmer

 Do late propagations cause bugs?
Answer: this paper
Law 2:

A clone must obey orders given by a
programmer

 Do late propagations obey?
Answer: code clone management???
Law 3:


A clone must protect its own existence

Do late propagations survive, or do they
become inconsistent?
Answer: this paper (partially)
Study
System

Revisions

# Clone
Sets

Short-term
Late
Propagations

Long-term
Late
Propagations

#
Bugs

Subclipse

1946

632

1

6

2

JEdit

2481

696

30

5

8

FreeCol

4935

311

8

0

0

Seam

3005

584

0

0

0
Q1: Are late propagations frequently occurring?
System

Revisions

# Clone
Sets

Short-term
Late
Propagations

Long-term
Late
Propagations

#
Bugs

Subclipse

1946

632

1

6

2

JEdit

2481

696

30

5

8

FreeCol

4935

311

8

0

0

Seam

3005

584

0

0

0
Q2: Do late propagations induce bugs?
System

Revisions

# Clone
Sets

Short-term
Late
Propagations

Long-term
Late
Propagations

#
Bugs

Subclipse

1946

632

1

6

2

JEdit

2481

696

30

5

8

FreeCol

4935

311

8

0

0

Seam

3005

584

0

0

0
Q3: Package distance of clone pairs involved in
late propagations?
I clone, you clone, we clone…

Questions?

More Related Content

Similar to Studying Late Propagations in Code Clone Evolution Using Software Repository Mining

Artificial Life & Robotics.pptx
Artificial Life & Robotics.pptxArtificial Life & Robotics.pptx
Artificial Life & Robotics.pptx
Raehan6
 
How does Optimality Theory work? -Aicha Adoui
How does Optimality Theory work? -Aicha AdouiHow does Optimality Theory work? -Aicha Adoui
How does Optimality Theory work? -Aicha Adoui
Aicha Adoui
 
Robots2
Robots2Robots2
Robots2
ssuser8d4bae
 
The #FreeAI Manifesto
The #FreeAI ManifestoThe #FreeAI Manifesto
The #FreeAI Manifesto
Pandora Boxchain
 
lesson 4.pptx
lesson 4.pptxlesson 4.pptx
lesson 4.pptx
CrispinoTDace
 
Robots
RobotsRobots
Robbie the robot goes (w)rong!
Robbie the robot goes (w)rong!Robbie the robot goes (w)rong!
Robbie the robot goes (w)rong!
lilianedwards
 
Robotics
RoboticsRobotics
Robotics
Pravin Dubey
 
Ethics de lintelligence artificielle dans le domaine de business
Ethics de lintelligence artificielle dans le domaine de businessEthics de lintelligence artificielle dans le domaine de business
Ethics de lintelligence artificielle dans le domaine de business
olfaharrabi2
 
[Challenge:Future] Terminators in reality
[Challenge:Future] Terminators in reality[Challenge:Future] Terminators in reality
[Challenge:Future] Terminators in realityChallenge:Future
 
Robotics presentation
Robotics presentationRobotics presentation
Robotics presentation
mandela48
 
roboticspresentationanononesimeseraphin-170324141916.pdf
roboticspresentationanononesimeseraphin-170324141916.pdfroboticspresentationanononesimeseraphin-170324141916.pdf
roboticspresentationanononesimeseraphin-170324141916.pdf
SameerBaiju
 
Advanced Artificial Intelligence
Advanced Artificial IntelligenceAdvanced Artificial Intelligence
Advanced Artificial Intelligence
Ashik Iqbal
 
Do You Trust Your Robots?
Do You Trust Your Robots?Do You Trust Your Robots?
Do You Trust Your Robots?
becca_kennedy
 
The Epistemology of Software Engineering
The Epistemology of Software EngineeringThe Epistemology of Software Engineering
The Epistemology of Software Engineering
nathanmarz
 
Robots – Superhuman Killers Or What? Ted Salon - Newtown - 2009 April 2nd
Robots – Superhuman Killers Or What? Ted Salon - Newtown - 2009 April 2ndRobots – Superhuman Killers Or What? Ted Salon - Newtown - 2009 April 2nd
Robots – Superhuman Killers Or What? Ted Salon - Newtown - 2009 April 2nd
Michael Harries
 
Robotics
RoboticsRobotics
Robotics
ABHISHEK SINGH
 
Immunology-Basics-Biology-Lecture-PowerPoint-VMCct.pptx
Immunology-Basics-Biology-Lecture-PowerPoint-VMCct.pptxImmunology-Basics-Biology-Lecture-PowerPoint-VMCct.pptx
Immunology-Basics-Biology-Lecture-PowerPoint-VMCct.pptx
KhotchawanBangpanwim
 

Similar to Studying Late Propagations in Code Clone Evolution Using Software Repository Mining (20)

Ai
AiAi
Ai
 
Artificial Life & Robotics.pptx
Artificial Life & Robotics.pptxArtificial Life & Robotics.pptx
Artificial Life & Robotics.pptx
 
How does Optimality Theory work? -Aicha Adoui
How does Optimality Theory work? -Aicha AdouiHow does Optimality Theory work? -Aicha Adoui
How does Optimality Theory work? -Aicha Adoui
 
Robots2
Robots2Robots2
Robots2
 
The #FreeAI Manifesto
The #FreeAI ManifestoThe #FreeAI Manifesto
The #FreeAI Manifesto
 
lesson 4.pptx
lesson 4.pptxlesson 4.pptx
lesson 4.pptx
 
Robots
RobotsRobots
Robots
 
Robbie the robot goes (w)rong!
Robbie the robot goes (w)rong!Robbie the robot goes (w)rong!
Robbie the robot goes (w)rong!
 
Robotics
RoboticsRobotics
Robotics
 
Ethics de lintelligence artificielle dans le domaine de business
Ethics de lintelligence artificielle dans le domaine de businessEthics de lintelligence artificielle dans le domaine de business
Ethics de lintelligence artificielle dans le domaine de business
 
[Challenge:Future] Terminators in reality
[Challenge:Future] Terminators in reality[Challenge:Future] Terminators in reality
[Challenge:Future] Terminators in reality
 
Robotics presentation
Robotics presentationRobotics presentation
Robotics presentation
 
roboticspresentationanononesimeseraphin-170324141916.pdf
roboticspresentationanononesimeseraphin-170324141916.pdfroboticspresentationanononesimeseraphin-170324141916.pdf
roboticspresentationanononesimeseraphin-170324141916.pdf
 
Advanced Artificial Intelligence
Advanced Artificial IntelligenceAdvanced Artificial Intelligence
Advanced Artificial Intelligence
 
Do You Trust Your Robots?
Do You Trust Your Robots?Do You Trust Your Robots?
Do You Trust Your Robots?
 
Academic Course: 12 Safety and Ethics
Academic Course: 12 Safety and EthicsAcademic Course: 12 Safety and Ethics
Academic Course: 12 Safety and Ethics
 
The Epistemology of Software Engineering
The Epistemology of Software EngineeringThe Epistemology of Software Engineering
The Epistemology of Software Engineering
 
Robots – Superhuman Killers Or What? Ted Salon - Newtown - 2009 April 2nd
Robots – Superhuman Killers Or What? Ted Salon - Newtown - 2009 April 2ndRobots – Superhuman Killers Or What? Ted Salon - Newtown - 2009 April 2nd
Robots – Superhuman Killers Or What? Ted Salon - Newtown - 2009 April 2nd
 
Robotics
RoboticsRobotics
Robotics
 
Immunology-Basics-Biology-Lecture-PowerPoint-VMCct.pptx
Immunology-Basics-Biology-Lecture-PowerPoint-VMCct.pptxImmunology-Basics-Biology-Lecture-PowerPoint-VMCct.pptx
Immunology-Basics-Biology-Lecture-PowerPoint-VMCct.pptx
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 

Studying Late Propagations in Code Clone Evolution Using Software Repository Mining