IEICE Transactions on Information and Systems
Online ISSN : 1745-1361
Print ISSN : 0916-8532
Special Section on Intelligent Information Processing Technology to be Integrated into Society
On the Application of Bandit Algorithm for Selecting Clone Detection Methods
Masateru TSUNODATakuto KUDOAkito MONDENAmjed TAHIRKwabena Ebo BENNINKoji TODAKeitaro NAKASAIKenichi MATSUMOTO
Author information
JOURNAL FREE ACCESS

2025 Volume E108.D Issue 7 Pages 718-722

Details
Abstract

Various clone detection methods have been proposed, with results varying depending on the combination of the methods and hyperparameters used (i.e., configurations). To help select a suitable clone detection configuration, we propose two Bandit Algorithm (BA) based methods that can help evaluate the configurations used dynamically while using detection methods. Our analysis showed that the two proposed methods, the naïve method and BANC (BA considering Negative Cases), identified the best configurations from four used code clone detection methods with high probability.

Content from these authors
© 2025 The Institute of Electronics, Information and Communication Engineers
Previous article Next article
feedback
Top