Return to Article Details Investigating Developers Prevalent Copy and Paste Activities and validating associated Cloning Patterns Download Download PDF