IEICE Transactions on Information and Systems
Online ISSN : 1745-1361
Print ISSN : 0916-8532

この記事には本公開記事があります。本公開記事を参照してください。
引用する場合も本公開記事を引用してください。

On the Application of Bandit Algorithm for Selecting Clone Detection Methods
Masateru TSUNODATakuto KUDOAkito MONDENAmjed TAHIRKwabena Ebo BENNINKoji TODAKeitaro NAKASAIKenichi MATSUMOTO
著者情報
ジャーナル フリー 早期公開

論文ID: 2024IIL0002

この記事には本公開記事があります。
詳細
抄録

Various clone detection methods have been proposed, with results varying depending on the combination of the methods and hyperparameters used (i.e., configurations). To help select a suitable clone detection configuration, we propose two Bandit Algorithm (BA) based methods that can help evaluate the configurations used dynamically while using detection methods. Our analysis showed that the two proposed methods, the naïve method and BANC (BA considering Negative Cases), identified the best configurations from four used code clone detection methods with high probability.

著者関連情報
© 2024 The Institute of Electronics, Information and Communication Engineers
feedback
Top