IEICE Transactions on Information and Systems
Online ISSN : 1745-1361
Print ISSN : 0916-8532
Special Section on Intelligent Information Processing Technology to be Integrated into Society
On the Application of Bandit Algorithm for Selecting Clone Detection Methods
Masateru TSUNODATakuto KUDOAkito MONDENAmjed TAHIRKwabena Ebo BENNINKoji TODAKeitaro NAKASAIKenichi MATSUMOTO
著者情報
ジャーナル フリー

2025 年 E108.D 巻 7 号 p. 718-722

詳細
抄録

Various clone detection methods have been proposed, with results varying depending on the combination of the methods and hyperparameters used (i.e., configurations). To help select a suitable clone detection configuration, we propose two Bandit Algorithm (BA) based methods that can help evaluate the configurations used dynamically while using detection methods. Our analysis showed that the two proposed methods, the naïve method and BANC (BA considering Negative Cases), identified the best configurations from four used code clone detection methods with high probability.

著者関連情報
© 2025 The Institute of Electronics, Information and Communication Engineers
前の記事 次の記事
feedback
Top