Filters








8,074 Hits in 4.1 sec

Models are code too: Near-miss clone detection for Simulink models

Manar H. Alalfi, James R. Cordy, Thomas R. Dean, Matthew Stephan, Andrew Stevenson
2012 2012 28th IEEE International Conference on Software Maintenance (ICSM)  
By transforming graph-based models to normalized text form, SI-MONE extends NICAD to identify near-miss subsystem clones in Simulink models, uncovering important model similarities that are difficult to  ...  While graph-based techniques show good results in finding exactly similar subgraphs in graphical models, they have great difficulty in finding near-miss matches.  ...  of Benjamin Hummel of the Technical University of Munich in helping us to understand and run ConQAT, and the inspiration of Mark Harman's SCAM 2010 keynote address [15] , in which he observed that "models  ... 
doi:10.1109/icsm.2012.6405285 dblp:conf/icsm/AlalfiCDSS12 fatcat:e5sdwzrck5eedhqhbjzrdip65y

Type 2 Clone Detection On ASCET Models

Francesco Gerardi, Jochen Quante
2012 Softwaretechnik-Trends  
Clones are a well-known bad smell pattern in software. So far, research has concentrated on detection of clones in textual languages, while model-based development becomes increasingly important.  ...  This paper presents the adaptation and extension of an existing approach for detection of clones in models.  ...  It provides the base functionality for detecting clones in Matlab/Simulink models. We call it CMCD (ConQAT's Model Clone Detection) in this paper.  ... 
doi:10.1007/bf03323464 fatcat:laxfsznkm5a2bd3ozw7h5ttv2a

ENHANCEMENT OF GENERIC CODE CLONE DETECTION MODEL FOR PYTHON APPLICATION

Ilyana Najwa Aiza Asmad, Faculty of Computing, College of Computing and Applied Sciences, Universiti Malaysia Pahang, 26600 Pekan, Pahang Darul Makmur., Al-Fahim Mubarak Ali, Nik Intan Syahiddatul Ilani Jailani, Faculty of Computing, College of Computing and Applied Sciences, Universiti Malaysia Pahang, 26600 Pekan, Pahang Darul Makmur, Faculty of Computing, College of Computing and Applied Sciences, Universiti Malaysia Pahang, 26600 Pekan, Pahang Darul Makmur.
2022 International Journal of Software Engineering and Computer Systems  
A prototype has been developed to detect code clones in Java programming language that starts with Pre-processing Transformation, Parameterization, Categorization and ends with the Match Detection process  ...  Code clones can be identified using various approaches and models. Generic Code Clone Detection (GCCD) model was created to detect all four terminologies of code clones through five processes.  ...  ACKNOWLEDGEMENT The authors would like to thank UMP for partially funding this work under an internal grant RDU190362.  ... 
doi:10.15282/ijsecs.8.1.2022.1.0091 fatcat:ihxtiqupznefzftodwday7opum

Cross-Language Binary-Source Code Matching with Intermediate Representations [article]

Yi Gui, Yao Wan, Hongyu Zhang, Huifang Huang, Yulei Sui, Guandong Xu, Zhiyuan Shao, Hai Jin
2022 arXiv   pre-print
We present a novel approach XLIR, which is a Transformer-based neural network by learning the intermediate representations for both binary and source code.  ...  To this end, this paper formulates the problem of cross-language binary-source code matching, and develops a new dataset for this new problem.  ...  We would like to thank all the anonymous reviewers for their constructive comments on improving this paper.  ... 
arXiv:2201.07420v1 fatcat:k6ued5xc6fcujl3d7m3qxfi6mq

A Survey of Model Comparison Approaches and Applications
english

Matthew Stephan, James R. Cordy
2013 Proceedings of the 1st International Conference on Model-Driven Engineering and Software Development  
Keywords: Model Comparison, Model-Driven Engineering, Model Versioning, Model Clone Detection.  ...  We find that many of the latest model comparison techniques are geared towards facilitating arbitrary meta models and use similarity-based matching.  ...  Much of the recent work is focusing on model transformation testing and model clone detection.  ... 
doi:10.5220/0004311102650277 dblp:conf/modelsward/StephanC13 fatcat:lb43apqflbhwnmnd4h32tdwr7i

A Survey of Model Comparison Strategies and Techniques in Model Driven Engineering

Junaid Rashid, Waqar Mehmood, Muhammad Wasif Nisar
2016 International Journal of Software Engineering and Technologies (IJSET)  
We find out that many of the latest model comparison strategies are geared near enabling Meta model and similarity based matching.  ...  Therefore model versioning is the most dominant application of the model comparison. Recently to work on comparison for versioning has begun to deteriorate, giving way to different applications.  ...  Much of a recent operate is focusing at model transformation testing along with model clone detection.  ... 
doi:10.11591/ijset.v1i3.4579 fatcat:zn33mbyprva2jpxphy3tw7espa

A Survey Of Model Comparison Strategies And Techniques In Model Driven Engineering

Junaid Rashid, Waqar Mehmood, Muhammad Wasif Nisar
2015 Zenodo  
We found out that many of the latest model comparison strategies are geared near enabling Meta model and similarity based matching.  ...  Therefore model versioning is the most dominant application of the model comparison. Recently to work on comparison for versioning has begun to deteriorate, giving way to different applications.  ...  Much of a recent operate is focusing at model transformation testing along with model clone detection.  ... 
doi:10.5281/zenodo.1108708 fatcat:xykdkteyi5gspenok3ulori77y

A Model Engineering Approach to Tool Interoperability [chapter]

Yu Sun, Zekai Demirezen, Frédéric Jouault, Robert Tairas, Jeff Gray
2009 Lecture Notes in Computer Science  
., the integration of results from various clone detection tools).  ...  This tool demonstration summary presents a software language engineering solution technique that uses Model-Driven Engineering to address tool interoperability.  ...  SVG is an XML-based language that enables the specification of a graph containing rich elements, so a complete metamodel for SVG can be very large.  ... 
doi:10.1007/978-3-642-00434-6_12 fatcat:ve3cvhrxivfsld27yr623i66mu

Semantic Clone Detection for Model-Based Development of Embedded Systems [chapter]

Bakr Al-Batran, Bernhard Schätz, Benjamin Hummel
2011 Lecture Notes in Computer Science  
Therefore, techniques for the automatic detection of clones in those models have been developed to improve their maintainability.  ...  The submission presents a generalized concept of clones for Simulink models, describes a pattern-based normal-form approach, and discusses results of the application of an implementation of this approach  ...  In [6] , a formalism is shown for detecting equivalent business process models based on detecting of semantically equivalent model fragments, transforming a business process model into a term system and  ... 
doi:10.1007/978-3-642-24485-8_19 fatcat:go4xz5wscbdwdot6wxfp7yx7o4

A Survey of Deep Learning Models for Structural Code Understanding [article]

Ruoting Wu, Yuxin Zhang, Qibiao Peng, Liang Chen, Zibin Zheng
2022 arXiv   pre-print
We categorize the models for understanding code in recent years into two groups: sequence-based and graph-based models, further make a summary and comparison of them.  ...  Finally, we make some suggestions for future research in structural code understanding field.  ...  Graph Attention Network. Li et al. [91] propose an event-based method CSEM for clone detection.  ... 
arXiv:2205.01293v1 fatcat:xuuatcxajjh3homyksh5rgrw44

GraphCodeBERT: Pre-training Code Representations with Data Flow [article]

Daya Guo, Shuo Ren, Shuai Lu, Zhangyin Feng, Duyu Tang, Shujie Liu, Long Zhou, Nan Duan, Alexey Svyatkovskiy, Shengyu Fu, Michele Tufano, Shao Kun Deng (+6 others)
2021 arXiv   pre-print
We evaluate our model on four tasks, including code search, clone detection, code translation, and code refinement.  ...  We present GraphCodeBERT, a pre-trained model for programming language that considers the inherent structure of code.  ...  GRAPHCODEBERT In this section, we describe GraphCodeBERT, a graph-based pre-trained model based on Transformer for programming language.  ... 
arXiv:2009.08366v4 fatcat:mzlq5wxrfzbt5mjp46vcylbwcq

SIMONE

James R. Cordy
2015 Proceedings of the First International Workshop on Automotive Software Architecture - WASA '15  
By transforming the graph-based models to normalized text form for comparison, SIMONE is able to uncover important model similarities that are difficult to find  ...  While graph-based model clone detection techniques show good results in finding exactly similar subgraphs in graphical models, they have difficulty in finding near-miss matches, which may vary by incidentally  ...  I will begin by outlining the problem of Simulink model clone detection, and walk through the challenges we faced in designing and implementing SIMONE.  ... 
doi:10.1145/2752489.2752498 fatcat:pqpnjarqbjhb5dlmijfy7do5a4

Learning Program Semantics with Code Representations: An Empirical Study [article]

Jing Kai Siow and Shangqing Liu and Xiaofei Xie, Guozhu Meng, Yang Liu
2022 arXiv   pre-print
Program semantics learning is the core and fundamental for various code intelligent tasks e.g., vulnerability detection, clone detection.  ...  evaluate its performance on three diverse and popular code intelligent tasks i.e., Code Classification, Vulnerability Detection, and Clone Detection on the public released benchmark.  ...  , Vulnerability Detection and Clone Detection with typical approaches for these representations i.e., SVM, Naive Bayes, XGBoost for the feature-based representation; LSTM, BiL-STM, and Transformer for  ... 
arXiv:2203.11790v1 fatcat:zyrt57qg7fb4vmvwxl2kykbchi

Comparison of Graph-based Model Transformation Rules

Alexander Schultheiß, Alexander Boll, Timo Kehrer
2020 Journal of Object Technology  
with the graph-based model transformation language Henshin (Sect. 5).  ...  We focus on rule-based model transformations based on graph transformation concepts [EEPT06], one of the major model transformation approaches that has been adopted by several widely used model transformation  ...  The benchmark set comprises different kinds of graph-based model transformation rules, written in the model transformation language Henshin.  ... 
doi:10.5381/jot.2020.19.2.a3 fatcat:uciewbresndetm7zxhcyh5kiyq

Custom-Tailored Clone Detection for IEC 61131-3 Programming Languages [article]

Kamil Rosiak and Alexander Schlie and Lukas Linsbauer and Birgit Vogel-Heuser and Ina Schaefer
2021 arXiv   pre-print
On the one hand, an analysis of code clones within a variant (i.e., clone detection in the classical sense) supports experts in refactoring respective code into library components.  ...  It is also applied on the coarse-granular system level, where the entire system is cloned and adapted to create a system variant, for example for another customer.  ...  [34, 35] showed a clone detection approach for model-based languages on MAT-LAB/Simulink models using a depth-first search heuristic for cloned pairs on a labeled graph that is created out of a model  ... 
arXiv:2108.09753v1 fatcat:q2e7jm6gtnhb5oxd6bhxppfla4
« Previous Showing results 1 — 15 out of 8,074 results