IEICE Transactions on Information and Systems
Online ISSN : 1745-1361
Print ISSN : 0916-8532

This article has now been updated. Please use the final version.

On the Application of Bandit Algorithm for Selecting Clone Detection Methods
Masateru TSUNODATakuto KUDOAkito MONDENAmjed TAHIRKwabena Ebo BENNINKoji TODAKeitaro NAKASAIKenichi MATSUMOTO
Author information
JOURNAL FREE ACCESS Advance online publication

Article ID: 2024IIL0002

Details
Abstract

Various clone detection methods have been proposed, with results varying depending on the combination of the methods and hyperparameters used (i.e., configurations). To help select a suitable clone detection configuration, we propose two Bandit Algorithm (BA) based methods that can help evaluate the configurations used dynamically while using detection methods. Our analysis showed that the two proposed methods, the naïve method and BANC (BA considering Negative Cases), identified the best configurations from four used code clone detection methods with high probability.

Content from these authors
© 2024 The Institute of Electronics, Information and Communication Engineers
feedback
Top