File path: /columba-1.4-src/core/src/main/java/org/columba/core/selection/SelectionHandler.java | File path: /columba-1.4-src/mail/src/main/java/org/columba/mail/folder/headercache/BerkeleyDBHeaderList.java | |||
Method name: void fireSelectionChanged(SelectionChangedEvent)
|
Method name: void fireHeaderListCorrupted()
|
|||
Number of AST nodes: 2 | Number of AST nodes: 2 | |||
1 | for ( int i=0; i<selectionListener.size(); i++) {↵ | 1 | for( int i=0; i<listeners.size(); i++) {↵ | |
2 | ((ISelectionListener)selectionListener.get(i)).selectionChanged(e);↵ | 2 | ((IHeaderListCorruptedListener)listeners.get(i)).headerListCorrupted(this);↵ | |
3 | } | 3 |
| |
See real code fragment | See real code fragment |
Number of common nesting structure subtrees | 1 |
Number of refactorable cases | 0 |
Number of non-refactorable cases | 1 |
Time elapsed for finding largest common nesting structure subtrees (ms) | 0.2 |
Clones location | Clones are in different classes |
Number of node comparisons | 4 |
Number of mapped statements | 1 |
Number of unmapped statements in the first code fragment | 1 |
Number of unmapped statements in the second code fragment | 1 |
Time elapsed for statement mapping (ms) | 1.0 |
Clone type | Type 2 |
ID | Statement | ID | Statement | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | for (int i = 0; i < selectionListener.size(); i++) |
| 1 | for (int i = 0; i < listeners.size(); i++) | ||||||||||
|
| 2 | ((IHeaderListCorruptedListener)listeners.get(i)).headerListCorrupted(this); | |||||||||||
2 | ((ISelectionListener)selectionListener.get(i)).selectionChanged(e); |
| |
Row | Violation |
---|---|
1 | Unmatched statement ((IHeaderListCorruptedListener)listeners.get(i)).headerListCorrupted(this); cannot be moved before or after the extracted code, because it has dependencies to/from statements that will be extracted |
2 | Unmatched statement ((ISelectionListener)selectionListener.get(i)).selectionChanged(e); cannot be moved before or after the extracted code, because it has dependencies to/from statements that will be extracted |
3 | The refactoring of the clones is infeasible, because the number of macthed statements is equal to zero |