Traceability/Code Clones
Learning Outcomes
- describe how ML can be used to connect software artifacts
- identify four types of code clones and their potential benefits and harms
Exercises
Required Readings
- Roy and Cordy, A Survey on Software Clone Detection Research Section 1-7, and then 16-17.
- Majdinasab et al., Trained without My Consent: Detecting Code Inclusion in Language Models Trained on Code Sections 1,2, 3.2, 3.3, 4.2, 4.5,5.1,7,8,9