Filters








11,343 Hits in 3.4 sec

ENHANCEMENT OF GENERIC CODE CLONE DETECTION MODEL FOR PYTHON APPLICATION

Ilyana Najwa Aiza Asmad, Faculty of Computing, College of Computing and Applied Sciences, Universiti Malaysia Pahang, 26600 Pekan, Pahang Darul Makmur., Al-Fahim Mubarak Ali, Nik Intan Syahiddatul Ilani Jailani, Faculty of Computing, College of Computing and Applied Sciences, Universiti Malaysia Pahang, 26600 Pekan, Pahang Darul Makmur, Faculty of Computing, College of Computing and Applied Sciences, Universiti Malaysia Pahang, 26600 Pekan, Pahang Darul Makmur.
2022 International Journal of Software Engineering and Computer Systems  
A prototype has been developed to detect code clones in Java programming language that starts with Pre-processing Transformation, Parameterization, Categorization and ends with the Match Detection process  ...  Code clones can be identified using various approaches and models. Generic Code Clone Detection (GCCD) model was created to detect all four terminologies of code clones through five processes.  ...  ACKNOWLEDGEMENT The authors would like to thank UMP for partially funding this work under an internal grant RDU190362.  ... 
doi:10.15282/ijsecs.8.1.2022.1.0091 fatcat:ihxtiqupznefzftodwday7opum

A Model Engineering Approach to Tool Interoperability [chapter]

Yu Sun, Zekai Demirezen, Frédéric Jouault, Robert Tairas, Jeff Gray
2009 Lecture Notes in Computer Science  
., the integration of results from various clone detection tools).  ...  This tool demonstration summary presents a software language engineering solution technique that uses Model-Driven Engineering to address tool interoperability.  ...  Instead of transforming each Clone Detection model to the final SVG model, the Clone Detection model is transformed to the GCC model (Step 6 in Figure 3 ), which is then transformed to the SVG model (  ... 
doi:10.1007/978-3-642-00434-6_12 fatcat:ve3cvhrxivfsld27yr623i66mu

Enhanced Pre-processing and Parameterization Process of Generic Code Clone Detection Model for Clones in Java Applications

Nur Nadzirah Mokhtar, Al-Fahim Mubarak-Ali, Mohd Azwan
2020 International Journal of Advanced Computer Science and Applications  
The code clone detection result from the proposed enhancement shows that private with its weightage is the best constant and weightage for the Generic Code Clone Detection Model.  ...  Various code clone detection models have been used to detect code clone.  ...  GENERIC CODE CLONE DETECTION MODEL Generic Code Clone Detection is a model that was designed and developed with an objective of detecting code clone from Java programming language [26] .  ... 
doi:10.14569/ijacsa.2020.0110669 fatcat:7c23gybdojh7lnttbe6l5qzqyq

Cloning in DSLs: Experiments with OCL [chapter]

Robert Tairas, Jordi Cabot
2012 Lecture Notes in Computer Science  
We introduce a clone detection mechanism using a Model Driven Engineering (MDE) based approach to evaluate the extent of cloning in an initial DSL (i.e., the Object Constraint Language (OCL)).  ...  We suggest potential application scenarios of using clone detection for the maintenance of DSL code.  ...  Match performs the task of determining whether two language constructs match each other based on similarity rules that are pre-defined.  ... 
doi:10.1007/978-3-642-28830-2_4 fatcat:zkmvglgflvd5hg6fzti2e633oi

Semantic Clone Detection for Model-Based Development of Embedded Systems [chapter]

Bakr Al-Batran, Bernhard Schätz, Benjamin Hummel
2011 Lecture Notes in Computer Science  
Therefore, techniques for the automatic detection of clones in those models have been developed to improve their maintainability.  ...  The submission presents a generalized concept of clones for Simulink models, describes a pattern-based normal-form approach, and discusses results of the application of an implementation of this approach  ...  In [6] , a formalism is shown for detecting equivalent business process models based on detecting of semantically equivalent model fragments, transforming a business process model into a term system and  ... 
doi:10.1007/978-3-642-24485-8_19 fatcat:go4xz5wscbdwdot6wxfp7yx7o4

Specifying and detecting meaningful changes in programs

Yijun Yu, Thein Than Tun, Bashar Nuseibeh
2011 2011 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011)  
Our algorithms use these annotations to transform the input programs into a normalised form, and to remove clones across different normalised programs in order to detect non-trivial and relevant differences  ...  Using four elementary annotations on the grammar of any programming language, namely Ignore, Order, Prefer and Scope, developers can specify, with limited effort, the type of change they wish to detect  ...  Jackson for useful discussions.  ... 
doi:10.1109/ase.2011.6100063 dblp:conf/kbse/YuTN11 fatcat:eeqvbxyi65ad7l7ejaojfqd5ou

Guest editorial to the special section on ECMFA and ICMT at STAF 2016

Pieter Van Gorp, Andrzej Wąsowski
2018 Journal of Software and Systems Modeling  
Finally, we would like to thank Martin Schindler from the SoSyM office, for his excellent support throughout the editorial process.  ...  Acknowledgements We would like to thank the various STAF 2016 committees for providing the opportunity to organize ECMFA and ICMT 2016, and especially to the general chair and the organization chair (Gerti  ...  Summarizing, this special section includes the following four papers: -A local and global tour on MOMoT [1] , based on ICMT, -Model clone detection for rule-based model transformation languages [4] ,  ... 
doi:10.1007/s10270-018-0659-4 fatcat:4quxykkxirhh3ewqt7wys3zf5q

A Survey of Model Comparison Strategies and Techniques in Model Driven Engineering

Junaid Rashid, Waqar Mehmood, Muhammad Wasif Nisar
2016 International Journal of Software Engineering and Technologies (IJSET)  
We find out that many of the latest model comparison strategies are geared near enabling Meta model and similarity based matching.  ...  Therefore model versioning is the most dominant application of the model comparison. Recently to work on comparison for versioning has begun to deteriorate, giving way to different applications.  ...  A technique in [10] for model matching .The idea derives signature-match rules based towards abstract syntax of a Meta model describing the modeling languages.  ... 
doi:10.11591/ijset.v1i3.4579 fatcat:zn33mbyprva2jpxphy3tw7espa

Technical Debt in Model Transformation Specifications [chapter]

Kevin Lano, Shekoufeh Kolahdouz-Rahimi, Mohammadreza Sharbaf, Hessa Alfraihi
2018 Lecture Notes in Computer Science  
The questions imply that a significant sample of transformations must be surveyed, for a range of transformation languages and categories.  ...  Model transformations (MT), as with any other software artifact, may contain quality flaws.  ...  Clone detection in transformations is considered by [15] , and they evaluate alternative tools for clone detection in graph transformations.  ... 
doi:10.1007/978-3-319-93317-7_6 fatcat:u43aitqog5hazmykkxag5qyb3a

A Survey Of Model Comparison Strategies And Techniques In Model Driven Engineering

Junaid Rashid, Waqar Mehmood, Muhammad Wasif Nisar
2015 Zenodo  
We found out that many of the latest model comparison strategies are geared near enabling Meta model and similarity based matching.  ...  Therefore model versioning is the most dominant application of the model comparison. Recently to work on comparison for versioning has begun to deteriorate, giving way to different applications.  ...  The technique in [10] for model matching derives the signature-match rules based towards abstract syntax of a Meta model describing the modeling languages.  ... 
doi:10.5281/zenodo.1108708 fatcat:xykdkteyi5gspenok3ulori77y

Comparison of Graph-based Model Transformation Rules

Alexander Schultheiß, Alexander Boll, Timo Kehrer
2020 Journal of Object Technology  
with the graph-based model transformation language Henshin (Sect. 5).  ...  Focusing on rule-based model transformations based on graph transformation concepts, we propose to compare such transformation rules using a maximum common subgraph (MCS) algorithm as the underlying matching  ...  The benchmark set comprises different kinds of graph-based model transformation rules, written in the model transformation language Henshin.  ... 
doi:10.5381/jot.2020.19.2.a3 fatcat:uciewbresndetm7zxhcyh5kiyq

A Survey of Model Comparison Approaches and Applications
english

Matthew Stephan, James R. Cordy
2013 Proceedings of the 1st International Conference on Model-Driven Engineering and Software Development  
Keywords: Model Comparison, Model-Driven Engineering, Model Versioning, Model Clone Detection.  ...  We find that many of the latest model comparison techniques are geared towards facilitating arbitrary meta models and use similarity-based matching.  ...  Selonen and Kettunen (2007) present a technique for model matching that derives signature-match rules based on the abstract syntax of the meta model describing the modeling language.  ... 
doi:10.5220/0004311102650277 dblp:conf/modelsward/StephanC13 fatcat:lb43apqflbhwnmnd4h32tdwr7i

ENHANCING A HYBRID PRE-PROCESSING AND TRANSFORMATION PROCESS FOR CODE CLONE DETECTION IN .NET APPLICATION

Al-Fahim Mubarak-Ali, Shahida Sulaiman
2015 Jurnal Teknologi  
The purpose of these two processes is to transform the source codes into a more representable form that can be used later on as input for code clone detection.  ...  Main issue arises in both of these processes is the application of the pre-processing and transformation rules might cause loss of critical information thus affecting the code clone detection results.  ...  A hybrid technique of pre-processing and transformation process for code clone detection in Java language [12] .  ... 
doi:10.11113/jt.v77.6202 fatcat:davlizmaejekndmdbb2yxtguii

Cross-Language Binary-Source Code Matching with Intermediate Representations [article]

Yi Gui, Yao Wan, Hongyu Zhang, Huifang Huang, Yulei Sui, Guandong Xu, Zhiyuan Shao, Hai Jin
2022 arXiv   pre-print
We present a novel approach XLIR, which is a Transformer-based neural network by learning the intermediate representations for both binary and source code.  ...  To this end, this paper formulates the problem of cross-language binary-source code matching, and develops a new dataset for this new problem.  ...  We would like to thank all the anonymous reviewers for their constructive comments on improving this paper.  ... 
arXiv:2201.07420v1 fatcat:k6ued5xc6fcujl3d7m3qxfi6mq

A Systematic Review of the Literature of the Techniques to Perform Transformations in Software Engineering

Reudismam Rolim de Sousa
2020 Brazilian Journal of Development  
Essas edições podem ser idênticas ou semelhantes a locais diferentes da base de código, o que pode ocorrer quando os desenvolvedores adicionam recursos, refatoram ou corrigem um bug.  ...  In this work, we present a systematic review of the literature of the techniques to do transformations in software engineering.  ...  These techniques detect code clones, detect edits in clones, and notify developers for clone inconsistencies.  ... 
doi:10.34117/bjdv6n7-361 fatcat:dj43wxhojjbivajsipzzgmokea
« Previous Showing results 1 — 15 out of 11,343 results