Filters








456 Hits in 6.0 sec

Analysis of the Linux Kernel Evolution Using Code Clone Coverage

Simone Livieri, Yoshiki Higo, Makoto Matsushita, Katsuro Inoue
2007 Fourth International Workshop on Mining Software Repositories (MSR'07:ICSE Workshops 2007)  
In this paper, we present our preliminary investigation of the evolution of the Linux kernel using code-clone analysis and the code-clone coverage metrics.  ...  We examined 136 versions of the stable Linux kernel using a distributed extension of the code clone detection tool CCFinder. The result is shown as a heat map.  ...  Also it has been performed under Grant-in-Aid for Scientific Research (A)(17200001) supported by Japan Society for the Promotion of Science.  ... 
doi:10.1109/msr.2007.1 dblp:conf/msr/LivieriHMI07 fatcat:hqypzpxmwva45l5etmj6a4c2fe

A Study of Cloning in the Linux SCSI Drivers

Wei Wang, Michael W. Godfrey
2011 2011 IEEE 11th International Working Conference on Source Code Analysis and Manipulation  
In this paper, we present the results of a longitudinal study of cloning among the SCSI drivers for the Linux operating system that spans 16 years of evolution.  ...  To date, most research on software code cloning has concentrated on detection and analysis techniques and their evaluation, and most empirical studies of cloning have investigated cloning within single  ...  ACKNOWLEDGEMENTS We thank Rainer Koschke, Nils Göde, and Jan Harder for kindly providing the iClones incremental clone detector for our research.  ... 
doi:10.1109/scam.2011.17 dblp:conf/scam/WangG11 fatcat:xcd7jn4f7jcnlhcxgedzd7yqaq

Managing Big Clones to Ease Evolution: Linux Kernel Example

Kuldeep Kumar, Stan Jarzabek, Daniel Dan
2016 Proceedings of the 2016 Federated Conference on Computer Science and Information Systems  
ART templates are constructed on top of the Linux code, without conflicts with the state-of-art techniques and tools used to manage the Linux kernel.  ...  Using the Linux kernel as an example, we show that big clones arise in the Linux kernel despite careful architecture design and a systematic approach for managing variability.  ...  ., Singapore for applying ART in his projects and providing us with invaluable feedback.  ... 
doi:10.15439/2016f173 dblp:conf/fedcsis/KumarJD16 fatcat:wymbif7blbbxzadslvey3es5ga

Exploring Large-Scale System Similarity Using Incremental Clone Detection and Live Scatterplots

James R. Cordy
2011 2011 IEEE 19th International Conference on Program Comprehension  
Using the NiCad incremental clone detector, we find function clones between two recent versions of Linux and FreeBSD, analyze the nature and causes of some of these similarities in detail, and compare  ...  our observations with the earlier study of token-sequence clones between previous versions of these systems using CCFinder almost a decade ago.  ...  ACKNOWLEDGEMENTS This work is supported by the Natural Sciences and Engineering Research Council of Canada (NSERC), and by an IBM Centre for Advanced Studies faculty award.  ... 
doi:10.1109/icpc.2011.25 dblp:conf/iwpc/Cordy11 fatcat:sflvym4pfrarvmulyk2li2wuf4

Analyzing and Forecasting Near-Miss Clones in Evolving Software: An Empirical Study

Minhaz F. Zibran, Ripon K. Saha, Muhammad Asaduzzaman, Chanchal K. Roy
2011 2011 16th IEEE International Conference on Engineering of Complex Computer Systems  
Effort for development and maintenance of complex large software is believed to have dependency on the amount of duplicated code fragments (code clones) present in codebases.  ...  Our study offers significant insights into the existence and evolution of code clones and their relationships with programming language or paradigm and program size.  ...  [19] studied the evolution of the Linux kernel and observed that although clone coverage increased early in the development, it stabilized over time.  ... 
doi:10.1109/iceccs.2011.36 dblp:conf/iceccs/ZibranSAR11 fatcat:2i7sseiz3rh3tbewkuabh4js64

Context-based detection of clone-related bugs

Lingxiao Jiang, Zhendong Su, Edwin Chiu
2007 Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering - ESEC-FSE '07  
We have implemented our algorithm and evaluated it on large open source projects including the latest versions of the Linux kernel and Eclipse.  ...  One of the main reasons for introducing clones is programmers' tendency to copy and paste code to quickly duplicate functionality.  ...  There are also studies that address the questions of clone coverage and evolution and clone removal, other than bug detection.  ... 
doi:10.1145/1287624.1287634 dblp:conf/sigsoft/JiangSC07 fatcat:tojldpcgwrdqho3xosv4lbi5nu

Contents

2013 2013 10th Working Conference on Mining Software Repositories (MSR)  
: Case Study on the Linux Kernel Yujuan Jiang, Bram Adams, and Daniel M.  ...  Knutson -Brigham Young University, USA . . . . . . . . . . . . . . . . . . . 135 Understanding the Evolution of Type-3 Clones: An Exploratory Study Ripon K. Saha, Chanchal K. Roy, Kevin A.  ... 
doi:10.1109/msr.2013.6623994 fatcat:qujhmiqbknfh3gkrp7w6en2jsy

Relation of Code Clones and Change Couplings [chapter]

Reto Geiger, Beat Fluri, Harald C. Gall, Martin Pinzger
2006 Lecture Notes in Computer Science  
For that, we propose a framework to examine code clones and relate them to change couplings taken from release history analysis.  ...  Code clones have long been recognized as bad smells in software systems and are considered to cause maintenance problems during evolution.  ...  They explore the cloning percentages across different platform-dependent modules of the Linux kernel. The percentage of cloning that has been detected can be considered low.  ... 
doi:10.1007/11693017_31 fatcat:q3utwuanhncktgz3splbsip3qu

gCad: A Near-Miss Clone Genealogy Extractor to Support Clone Evolution Analysis

Ripon K. Saha, Chanchal K. Roy, Kevin A. Schneider
2013 2013 IEEE International Conference on Software Maintenance  
Understanding the evolution of code clones is important for both developers and researchers to understand the maintenance implications of clones and to design robust clone management systems.  ...  of clone fragments even in the same clone class.  ...  A detailed analysis of the time complexity is discussed elsewhere [6] . We successfully ran gCad for 45 releases of the Linux kernel. 7) Extensibility: gCad is extensible.  ... 
doi:10.1109/icsm.2013.79 dblp:conf/icsm/SahaRS13 fatcat:6sfidfhtrbacxfooskodrjofgq

Impact of tool support in patch construction

Anil Koyuncu, Tegawendé F. Bissyandé, Dongsun Kim, Jacques Klein, Martin Monperrus, Yves Le Traon
2017 Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis - ISSTA 2017  
In this work, we investigate the practice of patch construction in the Linux kernel development, focusing on the differences between three patching processes: (1) patches crafted entirely manually to fix  ...  Patch application tools enable developers to remain committed to contributing patches to the code base.  ...  ACKNOWLEDGEMENTS The authors would like to thank the anonymous reviewers for their helpful comments and suggestions.  ... 
doi:10.1145/3092703.3092713 dblp:conf/issta/KoyuncuBKKMT17 fatcat:m5duelymw5aepd5odnc42f7uqu

Statistical test coverage for Linux-based next-generation autonomous safety-related systems

Imanol Allende, Nicholas Mc Guire, Jon Perez-Cerrolaza, Lisandro G. Monsalve, Jens Petersohn, Roman Obermaisser
2021 IEEE Access  
In this manuscript, we explore the limitations of traditional test coverage techniques, and we provide two complementary methods to pave the way towards the testing of Linux-based complex safety-related  ...  The methods, which are based on statistical analyses, are presented and applied to a Linux-based Autonomous Emergency Braking (AEB) case study, specifically focusing on the kernel execution path test coverage  ...  case specifically on the Linux kernel execution path test coverage.  ... 
doi:10.1109/access.2021.3100125 fatcat:uzcdxwhfwrcuhpzfu2ungniycq

On the scalability of Linux kernel maintainers' work

Minghui Zhou, Qingying Chen, Audris Mockus, Fengguang Wu
2017 Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering - ESEC/FSE 2017  
We, therefore, aim to understand how the Linux kernel sustains its growth, how to characterize the workload of maintainers, and whether or not the existing mechanisms are scalable.  ...  The impact of failure for critical ecosystems such as Linux is enormous, yet the understanding of why they function and are effective is limited.  ...  We used the 2015 data set for exploration and present our results based on the 2017 clone. The Linux kernel moved to Git in 2005; the present study omitted the pre-2005 history of Linux.  ... 
doi:10.1145/3106237.3106287 dblp:conf/sigsoft/ZhouCMW17 fatcat:hqpdk37k6rcethauaf42hh73tu

The MalSource Dataset: Quantifying Complexity and Code Reuse in Malware Development [article]

Alejandro Calleja, Juan Tapiador, Juan Caballero
2018 arXiv   pre-print
In this work, we analyze the evolution of malware from 1975 to date from a software engineering perspective.  ...  We detect a significant number of code clones across malware families and report which features and functionalities are more commonly shared.  ...  MALWARE EVOLUTION ANALYSIS This section describes our analysis of the evolution of malware source code using software metrics.  ... 
arXiv:1811.06888v1 fatcat:3vjjtk2eqngvfgro2btqepvwai

Engineering Record And Replay For Deployability: Extended Technical Report [article]

Robert O'Callahan, Chris Jones, Nathan Froyd, Kyle Huey, Albert Noll, Nimrod Partush
2017 arXiv   pre-print
analysis of failures in deployed systems.  ...  "rr" forms the basis of an open-source reverse-execution debugger seeing significant use in practice.  ...  To understand obscure details of Linux kernel behavior and bugs, we frequently have had to resort to reading kernel source code. We have also used the kernel's ftrace [2] feature several times.  ... 
arXiv:1705.05937v1 fatcat:yxehhbob2bhbtdbnt2pl3va7fi

What is Your Code Clone Detection and Evolution Research Made Of?

Chaman Wijesiriwardana, Prasad Wimalaratne
2021 Computing and informatics  
Over the past few decades, clone detection and evolution have become a major area of study in software engineering.  ...  The reusability of the Building Blocks was validated using four case studies selected from the literature.  ...  Acknowledgements The authors of this paper gratefully acknowledge the financial support provided by the National Research Council of Sri Lanka (Grant No. NRC . We thankfully  ... 
doi:10.31577/cai_2021_3_690 fatcat:x6r4tn2wrrbvzlaglbby6jonqa
« Previous Showing results 1 — 15 out of 456 results