In Section 5.2, how did the authors perform code clone detection based on the four cases
mentioned in the paper? Which tools did the author use? How accurate is the tool?
One of the authors mechanically inspected each patch to identify instances of the four cases of code clones.