An Effective Approach for Detecting Code Clones

Size: px
Start display at page:

Download "An Effective Approach for Detecting Code Clones"

Transcription

1 An Effective Approach for Detecting Code Clones Girija Gupta #1, Indu Singh *2 # M.Tech Student( CSE) JCD College of Engineering, Affiliated to Guru Jambheshwar University,Hisar,India * Assistant Professor( CSE) JCD College of Engineering,Affiliated to Guru Jambheshwar University,Hisar,India Abstract The Software Systems are becoming more complex and so the understandability and maintainability of the software systems is degrading day by day. It has become one of the most expensive activities in the software industries to maintain a system. The copying and duplication of source code is a common activity but it introduces a negative point to reuse by creating code clones. Therefore detection of code clones plays a vital role in software industries and it is also an active research area these days. Detection of duplicate codes increases efficiency of the software maintenance process and decreases the cost of maintenance with increase in the understand ability of the system. Various techniques have been developed for detecting clones but most of them like text based approach and token based approaches take a large amount of time and are expensive too. Other approaches like tree based and PDG based are very complex. The aim of the presented work is to develop a tool based on metric based approach to detect clones for java source files with ease. Keywords Software cloning, metric approach, clone detection tool I. INTRODUCTION The cloning at design as well as at code level is a hindrance in software development activities and so it needed to be removed. It has grown as an active area in software engineering research community resulting in the development of various techniques, various tools and other methods for clone detection and removal. The reuse of code reduces software development and maintenance costs in the process of creating software systems. Copying a segment of source code that can be used to add new functionalities with slight or no modification is a common activity.reasons of reuse are reduction of cost, time, effort, and risk and then increasing the quality and efficiency [1]. The most common form of reuse is to copy-paste the code which results in duplication of code. It is defined that software reuse is the process of creating software systems from existing software systems[3]. It is easier to modify the existing software than developing programs from the scratch. The major shortcomings of such duplicated fragments is that if a bug is detected in a code fragment, all the other fragments similar to it must be investigated to check the clones presence. The cloning not only produces code that is difficult to maintain, but may also introduce errors [6]. Code clones are considered as an obstacle in software industry and it is believed that cloned code has several adverse affects on the maintenance of software systems. That is why, it is benefecial to remove clones and prevent their introduction by constantly checking the source code. [9]. The clones are often the result of copy-paste activities. These activities are very easy and can significantly reduce programming effort and time as they reuse an existing fragment of code rather than rewriting similar code from starting especially in device drivers of operating systems where the algorithms are similar. The code cloning is a more serious problem in industrial software systems. If the clone is present, the normal functioning of the system may not be affected, but without taking action by the maintenance team, further development may become very expensive. The clones are believed to have a negative impact on evolution [5]. The code clones may adversely affect the software systems' quality, especially their maintainability and comprehensibility. The cost of maintaining clones over a system's lifetime has not been estimated yet but it is at least agreed that the financial impact on maintenance is very high. The costs estimated at 40% - 70% of the total costs during a system's lifetime. The research shows that a significant amount of code of a software system is cloned code and this amount may vary depending on the domain and origin of the software system. Baker [1] has found that on large systems between 13% - 20% of source code can be cloned code. B.Lague et al. [9] have studied only function clones and reported that between 6.4% - 7.5% of code is cloned code and Baxter et al. have reported that 12.7% of code being clones of a software system. Mayrand et al. have also estimated that normal industrial source code contains 5% - 20% of duplicated code. Kapser and Godfrey [10] have experienced that as much as 10% -15% of source code of large system is cloned. For COBOL system which are object oriented, the rate of duplicated code is found more than 50% [11]. Due to amount of duplicated code and its maintenance cost of large soft-ware systems, it is therefore, crucial to detect code clones of large systems for performing the respective maintenance tasks. In the presented work a tool is designed that helps in detection of clones for java source files using metric based approach. II. RELATED WORK The code clone is one of the main reason that makes software maintenance more difficult. Code clones are code fragments in source files which are similar to another code ISSN: Page 3236

2 fragment. If there is a fault found in one code fragment then the entire cloned fragments need modifications and it becomes more difficult to maintain a system if the system becomes large. Various research studies have reported that large software companies spent a lot of money to maintain the existing systems. Researchers consider clones to be harmful Brenda Baker[1] concluded that clones are harmful because of the fact that inconsistent changes increase both maintenance effort and introduces various errors. Fowler[2] suggests that duplication of code is a major reason of poor maintainability and if they are not detected on time they can create a lot of problems. Reto Geiger[5] reported that clones are generally considered harmful to the quality of source code and one of the main drawbacks of code clones is that changes to one code fragment may need to be propagated to several other similar ones. Chanchal K.Roy[4] presented a survey report on clones which represented various techniques for clone detection, reasons of code cloning and types of clones. A. Textual based comparison In this approach the code is not transformed into any intermediate form before applying comparison it is directly given to clone detection process. This approach is efficient but cannot detect the structural type of clones having different code but same logic. B. Token based comparison In this approach a parser or lexer is required to convert the code into tokens i.e intermediate form before applying the comparison. It is more efficient than the text based approach if blank spaces and comments are present in the source code. It doesnot convert source code in the token sequence efficiently because various false positive may introduce in the code. C. Abstract Syntax Tree Based Comparison In this approach first source code is converted into an abstract syntax tree and then traversing of the tree is done for finding a similar sub tree and if similarity is found then the code for this sub tree is termed as clone. This approach is quite efficient but it is very difficult and complex to create an abstract syntax tree D. Program Dependency Graph Comparison In this approach first of all PDG is obtained then isomorphic graph comparison is applied to detect the code clones[7]. Now the source code slices which are represented by a sub graph are returned as a clone. It is more efficient because they detect both semantic and syntactic clones but with this approach it becomes very complex for large software systems and it is costly too. E. Metric Based Comparison In this approach the metrics is calculated from the source code and these metrics are used to measure clones in software codes. It doesnot work directly on source code but this approach uses metrics to detect the clones [8]. Though various tools are available for calculating metrics like Columbus is the tool which calculates metrics that are useful in detection of clones, but this tool does not work for Java programs and the tool available for the calculation of Java code metrics is Source Monitor but the metrics provided by this tool are not so useful for detection of clones. Some other tools that are available for calculating Java code metrics are very complex like Datrix which are designed for extending the quality of Java code [12]. In this presented work the code clone is being detected with the help of this tool which is metric based approach. The various reasons by which the code clones can be introduced in the code are : Time Limit : The main reason for code cloning is that a certain time limit is assigned to developer to finish a project and to do this developers just copy and paste the existing one. Difficulty in Understanding Large System : The difficulty in understanding a large software system. It forces the developers to use the example-oriented programming by using previous code. Resue : One of the major reason of code duplication is reusing code by copying and pasting the existing code. By Accident : Code cloning may be done aacidentally. These are caused unintentionally when two software developers may come with same solution. These are not clones technically. Developer s Performance : If the productivity of a developer is measured by the number of lines he produces per hour, in such cases, the developer's focus is to increase the number of lines of the system therefore he tries to reuse the same code again and again by copying and pasting. Risk in New Code : As there is high risk of software error in new code fragments and the existing code is already tested in which there is less risk of error therefore a developer finds the existing code more reliable then creating the new one. Language Limitation : The clones can be introduced due to the limitations of the language. So sometimes the developers are forced to copy because of limitations of their knowledge in that particular programming language. Therefore detecting the code clones is of major concern these days inorder to make the system more efficient. III. PROPOSED WORK The presented work is based on the detection of clones by using metric based approach in which the input in form of byte code is given to the proposed tool and then metrics is computed for the given input and then after performing comparison detection of clones is done. ISSN: Page 3237

3 A. Giving Input to the tool In this step,input is given to the tool in the form of byte code i.e.class file is given as an output because byte code represents unified representation and it is platform independent too which makes the clone detection more efficient. Fig. 1 shows the first page that gets opened when we run FileChooserDemo.class file.the startup page consists of two buttons,first is Open a File button used to select a.class file for which metric is to be calculated and second button is Delete Previous Data used to delete the previous data that is stored in database. Fig. 3 Selecting Factorial2.class(while loop) and giving it as an input to tool Fig. 1 Startup page B. Computation of Metrics The second step is the computation of metrics i.e calculation of metrics is done inorder to detect the clones. Bruno Lague et al. [15] provided the metrics which are useful in the detection of clones and this tool deals with the calculation of only those metrics which help in detection of potential clones. Apart from these metrics some object oriented metrics are also calculated from this tool that helps in identifying potential clones. The metrics that were listed by Bruno Lague et al. [15] are in the form of class metrics and function metrics are : Class Metrics 1. Number of functions present in class 2. Number of if statements present in class 3. The number of lines of code(loc) 4. Number of variables present in the class 5. Number of public variable present in the class 6. Number of private variables present in the class 7. Number of protected variables present in the class 8. Number of friend variables present in the class Function Metrics 1. The name of functions present in a class 2. Total no of variables present at function level 3. Number of lines in a function 4. The return type of function 5.Total no of arguments passed to the function 6. The no. of times a function is called Fig. 2 Selecting Factorial.class(for loop) and giving it as an input to tool The calculated metrics are stored in the database and these are then stored in excel sheets so that the metrics of both files can be compared both at the class and the function level. Now the Fig 4 and Fig 5 represents the metrics calculated for Factorial1.class and Fig 6 and Fig 7 represents the metrics calculated for factorial2.class both at function and class level so that detection of clones be done with more ease. ISSN: Page 3238

4 Fig. 7 Metrics of Factorial2.class(while loop) at function level Fig. 4 Metrics of factorial1.class(for loop) at class level C. Detection of Clones In thie third step after computation of metrics is completed and they are mapped into excel sheets so that they can be compared to detect clones. On the basis of similarity of the metric value in both files detection of clones is done. Fig. 5 Metrics of Factorial1.class(for loop) at function level Fig. 8 Browsing the two excel files for which comparison is performed Fig. 9 Comparison of Metrics of both files at class level Fig. 6 Metric of Factorial2.class(while loop) at class level Now the two files are selected for which comparison is to be performed by the tool. Fig.9 represents the comparison of metrics at class level. In the same way the functional level metrics are compared to find the clones. In ISSN: Page 3239

5 this way clones are detected by the tool. The.class files are given as an input to the tool. The reason of using byte code is that it is platform independent and it generates unified representation of code and thereby detecting the clones more efficiently. After giving input, metric calculation is done to detect clones after comparing files on basis of metrics. Table 1 shows class metrics values for various files and Table 2 shows function metrics values for various files. TABLE I CLASS METRICS VALUE OF VARIOUS FILES Fig. 10 Comparison of Metrics of both files at function level D. Architecture of the tool The Fig 11 represents the architecture of the tool which shows that firstly two.class files(byte codes) are given as an input to the tool then metric calculation is done after that on the basis of metric match i.e comparing the two files the clones are detected. TABLE II FUNCTION METRICS VALUE OF VARIOUS FILES Fig. 11 Architecture of the tool IV. RESULTS AND DISCUSSION V. CONCLUSION AND FUTURE SCOPE ISSN: Page 3240

6 The tool designed is a clone detection tool used to detect potential clones present in a java file. The tool calculates the metrics of input java files and after that comparison is done on the basis of metric match and finally the code clones get detected. This tool is efficient and easy to use then other approaches like Abstract syntax based tree and program dependence graphs as these techniques are very complex to use. This tool makes use of byte code(.class files) rather than.java files which makes it more efficient as byte code is platform independent and it is the unified representation of the code. In the future this approach can be combined with other approaches to make it a hybrid approach to detect the clones more efficiently and this tool can be extended to detect clones for other languages also. ACKNOWLEDGMENT We would like to express our gratitude to all who gave their support to complete this paper. We express our gratitude to JCD college for providing us labs to complete our work and all the faculty members who supported us. Technology (IJCET) Volume 3, Issue 1, pp , January-June (2012). [9] Bruno LaguÄe, Daniel Proulx, Jean Mayrand, Ettore M. Merlo and John Hudepohl. Assessing the Benefits of IncorporatingFunction Clone Detection in a Development Process. In the Proceedings of the 13 th International Conference on Software Maintenance (ICSM'97), pp , Bari, Italy, October [10] Cory J. Kapser and Michael W. Godfrey. Supporting the Analysis of Clones in Soft-ware Systems:A Case Study Journal of Software Maintenance and Evolution: Research and Practice, Vol. 18(2): 61-82, March [11] Stephane Ducasse, Matthias Rieger, Serge Demeyer. A Language Independent Approach for Detecting Duplica -ted Code. In Proceedings of the 15 th International Conference on Software Maintenance (ICSM'99), pp , Oxford, England, September [12] Jean-Francois Patenaude, Bruno Lague, Extending the Software Quality Assessment Techniques to Java Object Systems,Seventh International Workshop on the Digital Identifier, pp , REFERENCES [1] Brenda Baker, On Finding Duplication and Near Duplication in Large Software Systems, In Proceedings of the Second Working Conference on Reverse Engineering, pp [2] M. Fowler, Refactoring : Improving the Design of Existing Code, Addison-Wesley, [3] Krueger C. W., Software Reuse, ACM Computing Surveys (CSUR), vol. 24, no. 2, pp ,june1992 [4] Chanchal Kumar Roy and James R. Cordy, A Survey on Software Clone Detection Research, Technical Report No , School of Computing Queen's University at Kingston Ontario, Canada, September 26, [5] Reto Geiger, Beat Fluri, Harald C. Gall and Martin Pinzger. Relation of code clones & change couplings. In Proceedings of the 9th International Conference of Funta-mental Approaches to Software Engineering of (FASE'06), pp , Vienna, Austria,March [6] Zhenmin Li, Shan Lu, Suvda Myagmar, Yuanyuan Zhou. CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code. In Design Proceedings of the 6 th Symposium on Operating System and Implementation (OSDI'04), pp , San Francisco, CA, USA, December [7] C. Liu, C. Chen, J. Han, P. S. Yu, GPLAG: Detection of the Software Plagiarism by Program Dependence Graph Analysis Conf. On Knowledge Discovery and Data Mining, pp , [8] G. Anil Kumar, Dr. C. R. K. Reddy, Dr. A. Govardhan, An Efficient method-level Code Clone Detection Scheme Through textual analysis using metrics, International Journal of Computer Engineering and ISSN: Page 3241

Keywords Clone detection, metrics computation, hybrid approach, complexity, byte code

Keywords Clone detection, metrics computation, hybrid approach, complexity, byte code Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging Approach

More information

Code duplication in Software Systems: A Survey

Code duplication in Software Systems: A Survey Code duplication in Software Systems: A Survey G. Anil kumar 1 Dr. C.R.K.Reddy 2 Dr. A. Govardhan 3 A. Ratna Raju 4 1,4 MGIT, Dept. of Computer science, Hyderabad, India Email: anilgkumar@mgit.ac.in, ratnaraju@mgit.ac.in

More information

Keywords Code cloning, Clone detection, Software metrics, Potential clones, Clone pairs, Clone classes. Fig. 1 Code with clones

Keywords Code cloning, Clone detection, Software metrics, Potential clones, Clone pairs, Clone classes. Fig. 1 Code with clones Volume 4, Issue 4, April 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Detection of Potential

More information

Token based clone detection using program slicing

Token based clone detection using program slicing Token based clone detection using program slicing Rajnish Kumar PEC University of Technology Rajnish_pawar90@yahoo.com Prof. Shilpa PEC University of Technology Shilpaverma.pec@gmail.com Abstract Software

More information

Cross Language Higher Level Clone Detection- Between Two Different Object Oriented Programming Language Source Codes

Cross Language Higher Level Clone Detection- Between Two Different Object Oriented Programming Language Source Codes Cross Language Higher Level Clone Detection- Between Two Different Object Oriented Programming Language Source Codes 1 K. Vidhya, 2 N. Sumathi, 3 D. Ramya, 1, 2 Assistant Professor 3 PG Student, Dept.

More information

Software Clone Detection. Kevin Tang Mar. 29, 2012

Software Clone Detection. Kevin Tang Mar. 29, 2012 Software Clone Detection Kevin Tang Mar. 29, 2012 Software Clone Detection Introduction Reasons for Code Duplication Drawbacks of Code Duplication Clone Definitions in the Literature Detection Techniques

More information

Detection of Non Continguous Clones in Software using Program Slicing

Detection of Non Continguous Clones in Software using Program Slicing Detection of Non Continguous Clones in Software using Program Slicing Er. Richa Grover 1 Er. Narender Rana 2 M.Tech in CSE 1 Astt. Proff. In C.S.E 2 GITM, Kurukshetra University, INDIA Abstract Code duplication

More information

The goal of this project is to enhance the identification of code duplication which can result in high cost reductions for a minimal price.

The goal of this project is to enhance the identification of code duplication which can result in high cost reductions for a minimal price. Code Duplication New Proposal Dolores Zage, Wayne Zage Ball State University June 1, 2017 July 31, 2018 Long Term Goals The goal of this project is to enhance the identification of code duplication which

More information

Algorithm to Detect Non-Contiguous Clones with High Precision

Algorithm to Detect Non-Contiguous Clones with High Precision Algorithm to Detect Non-Contiguous Clones with High Precision Sonam Gupta Research Scholar, Suresh Gyan Vihar University, Jaipur, Rajasthan, India Dr. P.C. Gupta Department of Computer Science and Engineering

More information

A Novel Ontology Metric Approach for Code Clone Detection Using FusionTechnique

A Novel Ontology Metric Approach for Code Clone Detection Using FusionTechnique A Novel Ontology Metric Approach for Code Clone Detection Using FusionTechnique 1 Syed MohdFazalulHaque, 2 Dr. V Srikanth, 3 Dr. E. Sreenivasa Reddy 1 Maulana Azad National Urdu University, 2 Professor,

More information

Clone Detection using Textual and Metric Analysis to figure out all Types of Clones

Clone Detection using Textual and Metric Analysis to figure out all Types of Clones Detection using Textual and Metric Analysis to figure out all Types of s Kodhai.E 1, Perumal.A 2, and Kanmani.S 3 1 SMVEC, Dept. of Information Technology, Puducherry, India Email: kodhaiej@yahoo.co.in

More information

ISSN: (PRINT) ISSN: (ONLINE)

ISSN: (PRINT) ISSN: (ONLINE) IJRECE VOL. 5 ISSUE 2 APR.-JUNE. 217 ISSN: 2393-928 (PRINT) ISSN: 2348-2281 (ONLINE) Code Clone Detection Using Metrics Based Technique and Classification using Neural Network Sukhpreet Kaur 1, Prof. Manpreet

More information

On Refactoring for Open Source Java Program

On Refactoring for Open Source Java Program On Refactoring for Open Source Java Program Yoshiki Higo 1,Toshihiro Kamiya 2, Shinji Kusumoto 1, Katsuro Inoue 1 and Yoshio Kataoka 3 1 Graduate School of Information Science and Technology, Osaka University

More information

Dr. Sushil Garg Professor, Dept. of Computer Science & Applications, College City, India

Dr. Sushil Garg Professor, Dept. of Computer Science & Applications, College City, India Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Study of Different

More information

COMPARISON AND EVALUATION ON METRICS

COMPARISON AND EVALUATION ON METRICS COMPARISON AND EVALUATION ON METRICS BASED APPROACH FOR DETECTING CODE CLONE D. Gayathri Devi 1 1 Department of Computer Science, Karpagam University, Coimbatore, Tamilnadu dgayadevi@gmail.com Abstract

More information

International Journal of Scientific & Engineering Research, Volume 8, Issue 2, February ISSN

International Journal of Scientific & Engineering Research, Volume 8, Issue 2, February ISSN International Journal of Scientific & Engineering Research, Volume 8, Issue 2, February-2017 164 DETECTION OF SOFTWARE REFACTORABILITY THROUGH SOFTWARE CLONES WITH DIFFRENT ALGORITHMS Ritika Rani 1,Pooja

More information

Relation of Code Clones and Change Couplings

Relation of Code Clones and Change Couplings Relation of Code Clones and Change Couplings Reto Geiger, Beat Fluri, Harald C. Gall, and Martin Pinzger s.e.a.l. software evolution and architecture lab, Department of Informatics, University of Zurich,

More information

To Enhance Type 4 Clone Detection in Clone Testing Swati Sharma #1, Priyanka Mehta #2 1 M.Tech Scholar,

To Enhance Type 4 Clone Detection in Clone Testing Swati Sharma #1, Priyanka Mehta #2 1 M.Tech Scholar, To Enhance Type 4 Clone Detection in Clone Testing Swati Sharma #1, Priyanka Mehta #2 1 M.Tech Scholar, 2 Head of Department, Department of Computer Science & Engineering, Universal Institute of Engineering

More information

A Novel Technique for Retrieving Source Code Duplication

A Novel Technique for Retrieving Source Code Duplication A Novel Technique for Retrieving Source Code Duplication Yoshihisa Udagawa Computer Science Department, Faculty of Engineering Tokyo Polytechnic University Atsugi-city, Kanagawa, Japan udagawa@cs.t-kougei.ac.jp

More information

Refactoring Support Based on Code Clone Analysis

Refactoring Support Based on Code Clone Analysis Refactoring Support Based on Code Clone Analysis Yoshiki Higo 1,Toshihiro Kamiya 2, Shinji Kusumoto 1 and Katsuro Inoue 1 1 Graduate School of Information Science and Technology, Osaka University, Toyonaka,

More information

A Weighted Layered Approach for Code Clone Detection

A Weighted Layered Approach for Code Clone Detection Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,

More information

Code Clone Detector: A Hybrid Approach on Java Byte Code

Code Clone Detector: A Hybrid Approach on Java Byte Code Code Clone Detector: A Hybrid Approach on Java Byte Code Thesis submitted in partial fulfillment of the requirements for the award of degree of Master of Engineering in Software Engineering Submitted By

More information

Clone Detection Using Scope Trees

Clone Detection Using Scope Trees Int'l Conf. Software Eng. Research and Practice SERP'18 193 Clone Detection Using Scope Trees M. Mohammed and J. Fawcett Department of Computer Science and Electrical Engineering, Syracuse University,

More information

A Measurement of Similarity to Identify Identical Code Clones

A Measurement of Similarity to Identify Identical Code Clones The International Arab Journal of Information Technology, Vol. 12, No. 6A, 2015 735 A Measurement of Similarity to Identify Identical Code Clones Mythili ShanmughaSundaram and Sarala Subramani Department

More information

IJREAS Volume 2, Issue 2 (February 2012) ISSN: SOFTWARE CLONING IN EXTREME PROGRAMMING ENVIRONMENT ABSTRACT

IJREAS Volume 2, Issue 2 (February 2012) ISSN: SOFTWARE CLONING IN EXTREME PROGRAMMING ENVIRONMENT ABSTRACT SOFTWARE CLONING IN EXTREME PROGRAMMING ENVIRONMENT Ginika Mahajan* Ashima** ABSTRACT Software systems are evolving by adding new functions and modifying existing functions over time. Through the evolution,

More information

Software Clone Detection and Refactoring

Software Clone Detection and Refactoring Software Clone Detection and Refactoring Francesca Arcelli Fontana *, Marco Zanoni *, Andrea Ranchetti * and Davide Ranchetti * * University of Milano-Bicocca, Viale Sarca, 336, 20126 Milano, Italy, {arcelli,marco.zanoni}@disco.unimib.it,

More information

Impact of Dependency Graph in Software Testing

Impact of Dependency Graph in Software Testing Impact of Dependency Graph in Software Testing Pardeep Kaur 1, Er. Rupinder Singh 2 1 Computer Science Department, Chandigarh University, Gharuan, Punjab 2 Assistant Professor, Computer Science Department,

More information

DETECTING SIMPLE AND FILE CLONES IN SOFTWARE

DETECTING SIMPLE AND FILE CLONES IN SOFTWARE DETECTING SIMPLE AND FILE CLONES IN SOFTWARE *S.Ajithkumar, P.Gnanagurupandian, M.Senthilvadivelan, Final year Information Technology **Mr.K.Palraj ME, Assistant Professor, ABSTRACT: The objective of this

More information

From Whence It Came: Detecting Source Code Clones by Analyzing Assembler

From Whence It Came: Detecting Source Code Clones by Analyzing Assembler From Whence It Came: Detecting Source Code Clones by Analyzing Assembler Ian J. Davis and Michael W. Godfrey David R. Cheriton School of Computer Science University of Waterloo Waterloo, Ontario, Canada

More information

Software Reengineering P1: Intro & Organization. Martin Pinzger Delft University of Technology

Software Reengineering P1: Intro & Organization. Martin Pinzger Delft University of Technology Software Reengineering P1: Intro & Organization Martin Pinzger Delft University of Technology Greenfield software development 2 Non-greenfield software development? 3 How often did you...... encounter

More information

IMPACT OF DEPENDENCY GRAPH IN SOFTWARE TESTING

IMPACT OF DEPENDENCY GRAPH IN SOFTWARE TESTING IMPACT OF DEPENDENCY GRAPH IN SOFTWARE TESTING Pardeep kaur 1 and Er. Rupinder Singh 2 1 Research Scholar, Dept. of Computer Science and Engineering, Chandigarh University, Gharuan, India (Email: Pardeepdharni664@gmail.com)

More information

Accuracy Enhancement in Code Clone Detection Using Advance Normalization

Accuracy Enhancement in Code Clone Detection Using Advance Normalization Accuracy Enhancement in Code Clone Detection Using Advance Normalization 1 Ritesh V. Patil, 2 S. D. Joshi, 3 Digvijay A. Ajagekar, 4 Priyanka A. Shirke, 5 Vivek P. Talekar, 6 Shubham D. Bankar 1 Research

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 2, Mar-Apr 2015

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 2, Mar-Apr 2015 RESEARCH ARTICLE Code Clone Detection and Analysis Using Software Metrics and Neural Network-A Literature Review Balwinder Kumar [1], Dr. Satwinder Singh [2] Department of Computer Science Engineering

More information

Lecture 25 Clone Detection CCFinder. EE 382V Spring 2009 Software Evolution - Instructor Miryung Kim

Lecture 25 Clone Detection CCFinder. EE 382V Spring 2009 Software Evolution - Instructor Miryung Kim Lecture 25 Clone Detection CCFinder Today s Agenda (1) Recap of Polymetric Views Class Presentation Suchitra (advocate) Reza (skeptic) Today s Agenda (2) CCFinder, Kamiya et al. TSE 2002 Recap of Polymetric

More information

On Refactoring Support Based on Code Clone Dependency Relation

On Refactoring Support Based on Code Clone Dependency Relation On Refactoring Support Based on Code Dependency Relation Norihiro Yoshida 1, Yoshiki Higo 1, Toshihiro Kamiya 2, Shinji Kusumoto 1, Katsuro Inoue 1 1 Graduate School of Information Science and Technology,

More information

HOW AND WHEN TO FLATTEN JAVA CLASSES?

HOW AND WHEN TO FLATTEN JAVA CLASSES? HOW AND WHEN TO FLATTEN JAVA CLASSES? Jehad Al Dallal Department of Information Science, P.O. Box 5969, Safat 13060, Kuwait ABSTRACT Improving modularity and reusability are two key objectives in object-oriented

More information

Software Quality Analysis by Code Clones in Industrial Legacy Software

Software Quality Analysis by Code Clones in Industrial Legacy Software Software Quality Analysis by Code Clones in Industrial Legacy Software Akito Monden 1 Daikai Nakae 1 Toshihiro Kamiya 2 Shin-ichi Sato 1,3 Ken-ichi Matsumoto 1 1 Nara Institute of Science and Technology,

More information

Detection and Behavior Identification of Higher-Level Clones in Software

Detection and Behavior Identification of Higher-Level Clones in Software Detection and Behavior Identification of Higher-Level Clones in Software Swarupa S. Bongale, Prof. K. B. Manwade D. Y. Patil College of Engg. & Tech., Shivaji University Kolhapur, India Ashokrao Mane Group

More information

A Study of Bad Smells in Code

A Study of Bad Smells in Code International Journal for Science and Emerging ISSN No. (Online):2250-3641 Technologies with Latest Trends 7(1): 16-20 (2013) ISSN No. (Print): 2277-8136 A Study of Bad Smells in Code Gurpreet Singh* and

More information

Falsification: An Advanced Tool for Detection of Duplex Code

Falsification: An Advanced Tool for Detection of Duplex Code Indian Journal of Science and Technology, Vol 9(39), DOI: 10.17485/ijst/2016/v9i39/96195, October 2016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Falsification: An Advanced Tool for Detection of

More information

Rochester Institute of Technology. Making personalized education scalable using Sequence Alignment Algorithm

Rochester Institute of Technology. Making personalized education scalable using Sequence Alignment Algorithm Rochester Institute of Technology Making personalized education scalable using Sequence Alignment Algorithm Submitted by: Lakhan Bhojwani Advisor: Dr. Carlos Rivero 1 1. Abstract There are many ways proposed

More information

Exploring the Relations between Code Cloning and Programming Languages

Exploring the Relations between Code Cloning and Programming Languages Exploring the Relations between Code Cloning and Programming Languages Ilca Webster Department of Computer Science York University 1. Introduction Copying code within a software system and adapting it

More information

Improving Evolvability through Refactoring

Improving Evolvability through Refactoring Improving Evolvability through Refactoring Jacek Ratzinger, Michael Fischer Vienna University of Technology Institute of Information Systems A-1040 Vienna, Austria {ratzinger,fischer}@infosys.tuwien.ac.at

More information

Formalizing Fact Extraction

Formalizing Fact Extraction atem 2003 Preliminary Version Formalizing Fact Extraction Yuan Lin 1 School of Computer Science University of Waterloo 200 University Avenue West Waterloo, ON N2L 3G1, Canada Richard C. Holt 2 School of

More information

1/30/18. Overview. Code Clones. Code Clone Categorization. Code Clones. Code Clone Categorization. Key Points of Code Clones

1/30/18. Overview. Code Clones. Code Clone Categorization. Code Clones. Code Clone Categorization. Key Points of Code Clones Overview Code Clones Definition and categories Clone detection Clone removal refactoring Spiros Mancoridis[1] Modified by Na Meng 2 Code Clones Code clone is a code fragment in source files that is identical

More information

Design Code Clone Detection System uses Optimal and Intelligence Technique based on Software Engineering

Design Code Clone Detection System uses Optimal and Intelligence Technique based on Software Engineering Volume 8, No. 5, May-June 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN No. 0976-5697 Design Code Clone Detection System uses

More information

Software Clone Detection Using Cosine Distance Similarity

Software Clone Detection Using Cosine Distance Similarity Software Clone Detection Using Cosine Distance Similarity A Dissertation SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENT FOR THE AWARD OF DEGREE OF MASTER OF TECHNOLOGY IN COMPUTER SCIENCE & ENGINEERING

More information

Research Article Software Clone Detection and Refactoring

Research Article Software Clone Detection and Refactoring ISRN Software Engineering Volume 2013, Article ID 129437, 8 pages http://dx.doi.org/10.1155/2013/129437 Research Article Software Clone Detection and Refactoring Francesca Arcelli Fontana, Marco Zanoni,

More information

Automated Approach for Anti-Pattern Detection

Automated Approach for Anti-Pattern Detection Automated Approach for Anti-Pattern Detection Neha Nanda Computer Science and Engineering Lovely Professional University, Phagwara, Punjab, India nehananda50@gmail.com Rohitt Sharma Computer Science and

More information

Evolizer A Platform for Software Evolution Analysis and Research

Evolizer A Platform for Software Evolution Analysis and Research Evolizer A Platform for Software Evolution Analysis and Research Michael Würsch, Harald C. Gall University of Zurich Department of Informatics software evolution & architecture lab Friday, April 23, 200

More information

Study and Analysis of Object-Oriented Languages using Hybrid Clone Detection Technique

Study and Analysis of Object-Oriented Languages using Hybrid Clone Detection Technique Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 6 (2017) pp. 1635-1649 Research India Publications http://www.ripublication.com Study and Analysis of Object-Oriented

More information

Parallel and Distributed Code Clone Detection using Sequential Pattern Mining

Parallel and Distributed Code Clone Detection using Sequential Pattern Mining Parallel and Distributed Code Clone Detection using Sequential Pattern Mining Ali El-Matarawy Faculty of Computers and Information, Cairo University Mohammad El-Ramly Faculty of Computers and Information,

More information

Automating the test case generation for Object Oriented Systems using Activity Diagrams

Automating the test case generation for Object Oriented Systems using Activity Diagrams www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 4 Issue 9 Sep 2015, Page No. 14163-14171 Automating the test case generation for Object Oriented Systems using

More information

Clone code detector using Boyer Moore string search algorithm integrated with ontology editor

Clone code detector using Boyer Moore string search algorithm integrated with ontology editor EUROPEAN ACADEMIC RESEARCH Vol. IV, Issue 2/ May 2016 ISSN 2286-4822 www.euacademic.org Impact Factor: 3.4546 (UIF) DRJI Value: 5.9 (B+) Clone code detector using Boyer Moore string search algorithm integrated

More information

Automatic Mining of Functionally Equivalent Code Fragments via Random Testing. Lingxiao Jiang and Zhendong Su

Automatic Mining of Functionally Equivalent Code Fragments via Random Testing. Lingxiao Jiang and Zhendong Su Automatic Mining of Functionally Equivalent Code Fragments via Random Testing Lingxiao Jiang and Zhendong Su Cloning in Software Development How New Software Product Cloning in Software Development Search

More information

Evaluating the Effect of Inheritance on the Characteristics of Object Oriented Programs

Evaluating the Effect of Inheritance on the Characteristics of Object Oriented Programs Journal of Computer Science 2 (12): 872-876, 26 ISSN 1549-3636 26 Science Publications Evaluating the Effect of Inheritance on the Characteristics of Object Oriented 1 Thabit Sultan Mohammed and 2 Hayam

More information

Clone Analysis in the Web Era: an Approach to Identify Cloned Web Pages

Clone Analysis in the Web Era: an Approach to Identify Cloned Web Pages Clone Analysis in the Web Era: an Approach to Identify Cloned Web Pages Giuseppe Antonio Di Lucca, Massimiliano Di Penta*, Anna Rita Fasolino, Pasquale Granato dilucca@unina.it, dipenta@unisannio.it, fasolino@unina.it,

More information

Problematic Code Clones Identification using Multiple Detection Results

Problematic Code Clones Identification using Multiple Detection Results Problematic Code Clones Identification using Multiple Detection Results Yoshiki Higo, Ken-ichi Sawa, and Shinji Kusumoto Graduate School of Information Science and Technology, Osaka University, 1-5, Yamadaoka,

More information

A Survey of Software Clone Detection Techniques

A Survey of Software Clone Detection Techniques A Survey of Software Detection Techniques Abdullah Sheneamer Department of Computer Science University of Colorado at Colo. Springs, USA Colorado Springs, USA asheneam@uccs.edu Jugal Kalita Department

More information

Visual Detection of Duplicated Code

Visual Detection of Duplicated Code Visual Detection of Duplicated Code Matthias Rieger, Stéphane Ducasse Software Composition Group, University of Berne ducasse,rieger@iam.unibe.ch http://www.iam.unibe.ch/scg/ Abstract Code duplication

More information

Reverse Software Engineering Using UML tools Jalak Vora 1 Ravi Zala 2

Reverse Software Engineering Using UML tools Jalak Vora 1 Ravi Zala 2 IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 03, 2014 ISSN (online): 2321-0613 Reverse Software Engineering Using UML tools Jalak Vora 1 Ravi Zala 2 1, 2 Department

More information

Code Clone Discovery Based on Concolic Analysis

Code Clone Discovery Based on Concolic Analysis Nova Southeastern University NSUWorks CEC Theses and Dissertations College of Engineering and Computing 2013 Code Clone Discovery Based on Concolic Analysis Daniel Edward Krutz Nova Southeastern University,

More information

An Exploratory Study on Interface Similarities in Code Clones

An Exploratory Study on Interface Similarities in Code Clones 1 st WETSoDA, December 4, 2017 - Nanjing, China An Exploratory Study on Interface Similarities in Code Clones Md Rakib Hossain Misu, Abdus Satter, Kazi Sakib Institute of Information Technology University

More information

V. Thulasinath M.Tech, CSE Department, JNTU College of Engineering Anantapur, Andhra Pradesh, India

V. Thulasinath M.Tech, CSE Department, JNTU College of Engineering Anantapur, Andhra Pradesh, India International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 5 ISSN : 2456-3307 Natural Language Interface to Database Using Modified

More information

Zjednodušení zdrojového kódu pomocí grafové struktury

Zjednodušení zdrojového kódu pomocí grafové struktury Zjednodušení zdrojového kódu pomocí grafové struktury Ing. Tomáš Bublík 1. Introduction Nowadays, there is lot of programming languages. These languages differ in syntax, usage, and processing. Keep in

More information

DETERMINE COHESION AND COUPLING FOR CLASS DIAGRAM THROUGH SLICING TECHNIQUES

DETERMINE COHESION AND COUPLING FOR CLASS DIAGRAM THROUGH SLICING TECHNIQUES IJACE: Volume 4, No. 1, January-June 2012, pp. 19-24 DETERMINE COHESION AND COUPLING FOR CLASS DIAGRAM THROUGH SLICING TECHNIQUES Akhilesh Kumar 1* & Sunint Kaur Khalsa 1 Abstract: High cohesion or module

More information

Similarities in Source Codes

Similarities in Source Codes Similarities in Source Codes Marek ROŠTÁR* Slovak University of Technology in Bratislava Faculty of Informatics and Information Technologies Ilkovičova 2, 842 16 Bratislava, Slovakia rostarmarek@gmail.com

More information

Folding Repeated Instructions for Improving Token-based Code Clone Detection

Folding Repeated Instructions for Improving Token-based Code Clone Detection 2012 IEEE 12th International Working Conference on Source Code Analysis and Manipulation Folding Repeated Instructions for Improving Token-based Code Clone Detection Hiroaki Murakami, Keisuke Hotta, Yoshiki

More information

code pattern analysis of object-oriented programming languages

code pattern analysis of object-oriented programming languages code pattern analysis of object-oriented programming languages by Xubo Miao A thesis submitted to the School of Computing in conformity with the requirements for the degree of Master of Science Queen s

More information

Fine-grained Software Version Control Based on a Program s Abstract Syntax Tree

Fine-grained Software Version Control Based on a Program s Abstract Syntax Tree Master Thesis Description and Schedule Fine-grained Software Version Control Based on a Program s Abstract Syntax Tree Martin Otth Supervisors: Prof. Dr. Peter Müller Dimitar Asenov Chair of Programming

More information

CONVERTING CODE CLONES TO ASPECTS USING ALGORITHMIC APPROACH

CONVERTING CODE CLONES TO ASPECTS USING ALGORITHMIC APPROACH CONVERTING CODE CLONES TO ASPECTS USING ALGORITHMIC APPROACH by Angad Singh Gakhar, B.Tech., Guru Gobind Singh Indraprastha University, 2009 A thesis submitted to the Faculty of Graduate and Postdoctoral

More information

Visualization of Clone Detection Results

Visualization of Clone Detection Results Visualization of Clone Detection Results Robert Tairas and Jeff Gray Department of Computer and Information Sciences University of Alabama at Birmingham Birmingham, AL 5294-1170 1-205-94-221 {tairasr,

More information

Mining of Source Code Concepts and Idioms

Mining of Source Code Concepts and Idioms Mining of Source Code Concepts and Idioms An Approach based on Clone Detection Techniques Torsten Görg Dept. of Programming Languages and Compilers Institute of Software Technology University of Stuttgart,

More information

Code Duplication++ Status Report Dolores Zage, Wayne Zage, Nathan White Ball State University November 2018

Code Duplication++ Status Report Dolores Zage, Wayne Zage, Nathan White Ball State University November 2018 Code Duplication++ Status Report Dolores Zage, Wayne Zage, Nathan White Ball State University November 2018 Long Term Goals The goal of this project is to enhance the identification of code duplication

More information

DCC / ICEx / UFMG. Software Code Clone. Eduardo Figueiredo.

DCC / ICEx / UFMG. Software Code Clone. Eduardo Figueiredo. DCC / ICEx / UFMG Software Code Clone Eduardo Figueiredo http://www.dcc.ufmg.br/~figueiredo Code Clone Code Clone, also called Duplicated Code, is a well known code smell in software systems Code clones

More information

Automatized Generating of GUIs for Domain-Specific Languages

Automatized Generating of GUIs for Domain-Specific Languages Automatized Generating of GUIs for Domain-Specific Languages Michaela Bačíková, Dominik Lakatoš, and Milan Nosáľ Technical University of Košice, Letná 9, 04200 Košice, Slovakia, (michaela.bacikova, dominik.lakatos,

More information

FUNCTION CLONE DETECTION IN WEB APPLICATIONS: A SEMIAUTOMATED APPROACH

FUNCTION CLONE DETECTION IN WEB APPLICATIONS: A SEMIAUTOMATED APPROACH Journal of Web Engineering, Vol. 3, No.1 (2004) 003-021 Rinton Press FUNCTION CLONE DETECTION IN WEB APPLICATIONS: A SEMIAUTOMATED APPROACH FABIO CALEFATO, FILIPPO LANUBILE, TERESA MALLARDO Dipartimento

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 2, Mar Apr 2017

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 2, Mar Apr 2017 RESEARCH ARTICLE OPEN ACCESS Handling Anomalies in the System Design: A Unique Methodology and Solution Pratik Rajan Bhore [1], Dr. Shashank D. Joshi [2], Dr. Naveenkumar Jayakumar [3] Department of Computer

More information

Hybrid Clustering Approach for Software Module Clustering

Hybrid Clustering Approach for Software Module Clustering Hybrid Clustering Approach for Software Module Clustering 1 K Kishore C, 2 Dr. K. Ramani, 3 Anoosha G 1,3 Assistant Professor, 2 Professor 1,2 Dept. of IT, Sree Vidyanikethan Engineering College, Tirupati

More information

Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET

Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET Ekta Barkhodia 1, Parulpreet Singh 2, Gurleen Kaur Walia 3 Lovely Professional University, Phagwara, India ektab0@gmail.com,

More information

A Supervised Method for Multi-keyword Web Crawling on Web Forums

A Supervised Method for Multi-keyword Web Crawling on Web Forums Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

A Tree Kernel Based Approach for Clone Detection

A Tree Kernel Based Approach for Clone Detection A Tree Kernel Based Approach for Clone Detection Anna Corazza 1, Sergio Di Martino 1, Valerio Maggio 1, Giuseppe Scanniello 2 1) University of Naples Federico II 2) University of Basilicata Outline Background

More information

Tool Support for Refactoring Duplicated OO Code

Tool Support for Refactoring Duplicated OO Code Tool Support for Refactoring Duplicated OO Code Stéphane Ducasse and Matthias Rieger and Georges Golomingi Software Composition Group, Institut für Informatik (IAM) Universität Bern, Neubrückstrasse 10,

More information

CnP: Towards an Environment for the Proactive Management of Copy-and-Paste Programming

CnP: Towards an Environment for the Proactive Management of Copy-and-Paste Programming CnP: Towards an Environment for the Proactive Management of Copy-and-Paste Programming Daqing Hou, Patricia Jablonski, and Ferosh Jacob Electrical and Computer Engineering, Clarkson University, Potsdam,

More information

IDENTIFICATION OF PROMOTED ECLIPSE UNSTABLE INTERFACES USING CLONE DETECTION TECHNIQUE

IDENTIFICATION OF PROMOTED ECLIPSE UNSTABLE INTERFACES USING CLONE DETECTION TECHNIQUE International Journal of Software Engineering & Applications (IJSEA), Vol.9, No.5, September 2018 IDENTIFICATION OF PROMOTED ECLIPSE UNSTABLE INTERFACES USING CLONE DETECTION TECHNIQUE Simon Kawuma 1 and

More information

Identification of File and Directory Level Near-Miss Clones For Higher Level Cloning Sonam Gupta, Vishwachi

Identification of File and Directory Level Near-Miss Clones For Higher Level Cloning Sonam Gupta, Vishwachi International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 8958, Volume-3, Issue-8 Identification of File and Directory Level Near-Miss Clones For Higher Level Cloning Sonam Gupta,

More information

Towards the Code Clone Analysis in Heterogeneous Software Products

Towards the Code Clone Analysis in Heterogeneous Software Products Towards the Code Clone Analysis in Heterogeneous Software Products 11 TIJANA VISLAVSKI, ZORAN BUDIMAC AND GORDANA RAKIĆ, University of Novi Sad Code clones are parts of source code that were usually created

More information

Effect of Principle Component Analysis and Support Vector Machine in Software Fault Prediction

Effect of Principle Component Analysis and Support Vector Machine in Software Fault Prediction International Journal of Computer Trends and Technology (IJCTT) volume 7 number 3 Jan 2014 Effect of Principle Component Analysis and Support Vector Machine in Software Fault Prediction A. Shanthini 1,

More information

AN APPROACH TO THE DESIGN SOFTWARE AUTOMATION TESTING ENVIROMENT

AN APPROACH TO THE DESIGN SOFTWARE AUTOMATION TESTING ENVIROMENT International Journal on Information Technologies & Security, 3 (vol. 10), 2018 65 AN APPROACH TO THE DESIGN SOFTWARE AUTOMATION TESTING ENVIROMENT Srđan Nogo, Zoran Škrkar Faculty of Electrical Engineering

More information

Construction of Software Model Graph and Analysing Object-Oriented Program(C#) Using Abstract Syntax Tree Method

Construction of Software Model Graph and Analysing Object-Oriented Program(C#) Using Abstract Syntax Tree Method Construction of Software Model Graph and Analysing Object-Oriented Program(C#) Using Abstract Syntax Tree Method Appala Srinuvasu Muttipati #1, Poosapati Padmaja *2 # Research Scholar, Department of Computer

More information

Code Similarity Detection by Program Dependence Graph

Code Similarity Detection by Program Dependence Graph 2016 International Conference on Computer Engineering and Information Systems (CEIS-16) Code Similarity Detection by Program Dependence Graph Zhen Zhang, Hai-Hua Yan, Xiao-Wei Zhang Dept. of Computer Science,

More information

Rearranging the Order of Program Statements for Code Clone Detection

Rearranging the Order of Program Statements for Code Clone Detection Rearranging the Order of Program Statements for Code Clone Detection Yusuke Sabi, Yoshiki Higo, Shinji Kusumoto Graduate School of Information Science and Technology, Osaka University, Japan Email: {y-sabi,higo,kusumoto@ist.osaka-u.ac.jp

More information

Analyzing Outlier Detection Techniques with Hybrid Method

Analyzing Outlier Detection Techniques with Hybrid Method Analyzing Outlier Detection Techniques with Hybrid Method Shruti Aggarwal Assistant Professor Department of Computer Science and Engineering Sri Guru Granth Sahib World University. (SGGSWU) Fatehgarh Sahib,

More information

ISSN: (Online) Volume 2, Issue 3, March 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: (Online) Volume 2, Issue 3, March 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 2, Issue 3, March 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com

More information

Keywords Repository, Retrieval, Component, Reusability, Query.

Keywords Repository, Retrieval, Component, Reusability, Query. Volume 4, Issue 3, March 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Multiple Search

More information

Enhancing Source-Based Clone Detection Using Intermediate Representation

Enhancing Source-Based Clone Detection Using Intermediate Representation Enhancing Source-Based Detection Using Intermediate Representation Gehan M. K. Selim School of Computing, Queens University Kingston, Ontario, Canada, K7L3N6 gehan@cs.queensu.ca Abstract Detecting software

More information

International Journal of Software and Web Sciences (IJSWS) EVALUATING TESTABILITY OF OBJECT ORIENTED SYSTEM

International Journal of Software and Web Sciences (IJSWS)   EVALUATING TESTABILITY OF OBJECT ORIENTED SYSTEM International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International

More information

Detecting code re-use potential

Detecting code re-use potential Detecting code re-use potential Mario Konecki, Tihomir Orehovački, Alen Lovrenčić Faculty of Organization and Informatics University of Zagreb Pavlinska 2, 42000 Varaždin, Croatia {mario.konecki, tihomir.orehovacki,

More information

A Comparison of Text-Categorization Methods applied to N-Gram Frequency Statistics

A Comparison of Text-Categorization Methods applied to N-Gram Frequency Statistics A Comparison of Text-Categorization Methods applied to N-Gram Frequency Statistics Helmut Berger and Dieter Merkl 2 Faculty of Information Technology, University of Technology, Sydney, NSW, Australia hberger@it.uts.edu.au

More information

Clone Detection Using Abstract Syntax Suffix Trees

Clone Detection Using Abstract Syntax Suffix Trees Clone Detection Using Abstract Syntax Suffix Trees Rainer Koschke, Raimar Falke, Pierre Frenzel University of Bremen, Germany http://www.informatik.uni-bremen.de/st/ {koschke,rfalke,saint}@informatik.uni-bremen.de

More information