IEICE Transactions on Information and Systems
Online ISSN : 1745-1361
Print ISSN : 0916-8532
On the Application of Bandit Algorithm for Selecting Clone Detection Methods
Masateru TSUNODATakuto KUDOAkito MONDENAmjed TAHIRKwabena Ebo BENNINKoji TODAKeitaro NAKASAIKenichi MATSUMOTO
著者情報
ジャーナル フリー 早期公開

論文ID: 2024IIL0002

詳細
抄録

Various clone detection methods have been proposed, with results varying depending on the combination of the methods and hyperparameters used (i.e., configurations). To help select a suitable clone detection configuration, we propose two Bandit Algorithm (BA) based methods that can help evaluate the configurations used dynamically while using detection methods. Our analysis showed that the two proposed methods, the naïve method and BANC (BA considering Negative Cases), identified the best configurations from four used code clone detection methods with high probability.

著者関連情報
© 2024 The Institute of Electronics, Information and Communication Engineers
前の記事 次の記事
feedback
Top