A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
ENHANCEMENT OF GENERIC CODE CLONE DETECTION MODEL FOR PYTHON APPLICATION
2022
International Journal of Software Engineering and Computer Systems
A prototype has been developed to detect code clones in Java programming language that starts with Pre-processing Transformation, Parameterization, Categorization and ends with the Match Detection process ...
Code clones can be identified using various approaches and models. Generic Code Clone Detection (GCCD) model was created to detect all four terminologies of code clones through five processes. ...
ACKNOWLEDGEMENT The authors would like to thank UMP for partially funding this work under an internal grant RDU190362. ...
doi:10.15282/ijsecs.8.1.2022.1.0091
fatcat:ihxtiqupznefzftodwday7opum
A Model Engineering Approach to Tool Interoperability
[chapter]
2009
Lecture Notes in Computer Science
., the integration of results from various clone detection tools). ...
This tool demonstration summary presents a software language engineering solution technique that uses Model-Driven Engineering to address tool interoperability. ...
Instead of transforming each Clone Detection model to the final SVG model, the Clone Detection model is transformed to the GCC model (Step 6 in Figure 3 ), which is then transformed to the SVG model ( ...
doi:10.1007/978-3-642-00434-6_12
fatcat:ve3cvhrxivfsld27yr623i66mu
Enhanced Pre-processing and Parameterization Process of Generic Code Clone Detection Model for Clones in Java Applications
2020
International Journal of Advanced Computer Science and Applications
The code clone detection result from the proposed enhancement shows that private with its weightage is the best constant and weightage for the Generic Code Clone Detection Model. ...
Various code clone detection models have been used to detect code clone. ...
GENERIC CODE CLONE DETECTION MODEL Generic Code Clone Detection is a model that was designed and developed with an objective of detecting code clone from Java programming language [26] . ...
doi:10.14569/ijacsa.2020.0110669
fatcat:7c23gybdojh7lnttbe6l5qzqyq
Cloning in DSLs: Experiments with OCL
[chapter]
2012
Lecture Notes in Computer Science
We introduce a clone detection mechanism using a Model Driven Engineering (MDE) based approach to evaluate the extent of cloning in an initial DSL (i.e., the Object Constraint Language (OCL)). ...
We suggest potential application scenarios of using clone detection for the maintenance of DSL code. ...
Match performs the task of determining whether two language constructs match each other based on similarity rules that are pre-defined. ...
doi:10.1007/978-3-642-28830-2_4
fatcat:zkmvglgflvd5hg6fzti2e633oi
Semantic Clone Detection for Model-Based Development of Embedded Systems
[chapter]
2011
Lecture Notes in Computer Science
Therefore, techniques for the automatic detection of clones in those models have been developed to improve their maintainability. ...
The submission presents a generalized concept of clones for Simulink models, describes a pattern-based normal-form approach, and discusses results of the application of an implementation of this approach ...
In [6] , a formalism is shown for detecting equivalent business process models based on detecting of semantically equivalent model fragments, transforming a business process model into a term system and ...
doi:10.1007/978-3-642-24485-8_19
fatcat:go4xz5wscbdwdot6wxfp7yx7o4
Specifying and detecting meaningful changes in programs
2011
2011 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011)
Our algorithms use these annotations to transform the input programs into a normalised form, and to remove clones across different normalised programs in order to detect non-trivial and relevant differences ...
Using four elementary annotations on the grammar of any programming language, namely Ignore, Order, Prefer and Scope, developers can specify, with limited effort, the type of change they wish to detect ...
Jackson for useful discussions. ...
doi:10.1109/ase.2011.6100063
dblp:conf/kbse/YuTN11
fatcat:eeqvbxyi65ad7l7ejaojfqd5ou
Guest editorial to the special section on ECMFA and ICMT at STAF 2016
2018
Journal of Software and Systems Modeling
Finally, we would like to thank Martin Schindler from the SoSyM office, for his excellent support throughout the editorial process. ...
Acknowledgements We would like to thank the various STAF 2016 committees for providing the opportunity to organize ECMFA and ICMT 2016, and especially to the general chair and the organization chair (Gerti ...
Summarizing, this special section includes the following four papers: -A local and global tour on MOMoT [1] , based on ICMT, -Model clone detection for rule-based model transformation languages [4] , ...
doi:10.1007/s10270-018-0659-4
fatcat:4quxykkxirhh3ewqt7wys3zf5q
A Survey of Model Comparison Strategies and Techniques in Model Driven Engineering
2016
International Journal of Software Engineering and Technologies (IJSET)
We find out that many of the latest model comparison strategies are geared near enabling Meta model and similarity based matching. ...
Therefore model versioning is the most dominant application of the model comparison. Recently to work on comparison for versioning has begun to deteriorate, giving way to different applications. ...
A technique in [10] for model matching .The idea derives signature-match rules based towards abstract syntax of a Meta model describing the modeling languages. ...
doi:10.11591/ijset.v1i3.4579
fatcat:zn33mbyprva2jpxphy3tw7espa
Technical Debt in Model Transformation Specifications
[chapter]
2018
Lecture Notes in Computer Science
The questions imply that a significant sample of transformations must be surveyed, for a range of transformation languages and categories. ...
Model transformations (MT), as with any other software artifact, may contain quality flaws. ...
Clone detection in transformations is considered by [15] , and they evaluate alternative tools for clone detection in graph transformations. ...
doi:10.1007/978-3-319-93317-7_6
fatcat:u43aitqog5hazmykkxag5qyb3a
A Survey Of Model Comparison Strategies And Techniques In Model Driven Engineering
2015
Zenodo
We found out that many of the latest model comparison strategies are geared near enabling Meta model and similarity based matching. ...
Therefore model versioning is the most dominant application of the model comparison. Recently to work on comparison for versioning has begun to deteriorate, giving way to different applications. ...
The technique in [10] for model matching derives the signature-match rules based towards abstract syntax of a Meta model describing the modeling languages. ...
doi:10.5281/zenodo.1108708
fatcat:xykdkteyi5gspenok3ulori77y
Comparison of Graph-based Model Transformation Rules
2020
Journal of Object Technology
with the graph-based model transformation language Henshin (Sect. 5). ...
Focusing on rule-based model transformations based on graph transformation concepts, we propose to compare such transformation rules using a maximum common subgraph (MCS) algorithm as the underlying matching ...
The benchmark set comprises different kinds of graph-based model transformation rules, written in the model transformation language Henshin. ...
doi:10.5381/jot.2020.19.2.a3
fatcat:uciewbresndetm7zxhcyh5kiyq
A Survey of Model Comparison Approaches and Applications
english
2013
Proceedings of the 1st International Conference on Model-Driven Engineering and Software Development
english
Keywords: Model Comparison, Model-Driven Engineering, Model Versioning, Model Clone Detection. ...
We find that many of the latest model comparison techniques are geared towards facilitating arbitrary meta models and use similarity-based matching. ...
Selonen and Kettunen (2007) present a technique for model matching that derives signature-match rules based on the abstract syntax of the meta model describing the modeling language. ...
doi:10.5220/0004311102650277
dblp:conf/modelsward/StephanC13
fatcat:lb43apqflbhwnmnd4h32tdwr7i
ENHANCING A HYBRID PRE-PROCESSING AND TRANSFORMATION PROCESS FOR CODE CLONE DETECTION IN .NET APPLICATION
2015
Jurnal Teknologi
The purpose of these two processes is to transform the source codes into a more representable form that can be used later on as input for code clone detection. ...
Main issue arises in both of these processes is the application of the pre-processing and transformation rules might cause loss of critical information thus affecting the code clone detection results. ...
A hybrid technique of pre-processing and transformation process for code clone detection in Java language [12] . ...
doi:10.11113/jt.v77.6202
fatcat:davlizmaejekndmdbb2yxtguii
Cross-Language Binary-Source Code Matching with Intermediate Representations
[article]
2022
arXiv
pre-print
We present a novel approach XLIR, which is a Transformer-based neural network by learning the intermediate representations for both binary and source code. ...
To this end, this paper formulates the problem of cross-language binary-source code matching, and develops a new dataset for this new problem. ...
We would like to thank all the anonymous reviewers for their constructive comments on improving this paper. ...
arXiv:2201.07420v1
fatcat:k6ued5xc6fcujl3d7m3qxfi6mq
A Systematic Review of the Literature of the Techniques to Perform Transformations in Software Engineering
2020
Brazilian Journal of Development
Essas edições podem ser idênticas ou semelhantes a locais diferentes da base de código, o que pode ocorrer quando os desenvolvedores adicionam recursos, refatoram ou corrigem um bug. ...
In this work, we present a systematic review of the literature of the techniques to do transformations in software engineering. ...
These techniques detect code clones, detect edits in clones, and notify developers for clone inconsistencies. ...
doi:10.34117/bjdv6n7-361
fatcat:dj43wxhojjbivajsipzzgmokea
« Previous
Showing results 1 — 15 out of 11,343 results