Academia.eduAcademia.edu

Outline

A Combined Weighted Approach to Detect Code Cloning

Abstract
sparkles

AI

The paper presents a multi-parameter weighted approach to detect code cloning, which includes textual analysis, token-based analysis, and statistical measures. Code cloning significantly affects software efficiency and reliability, often resulting in legal issues related to copyright. The proposed model aims to improve the detection of cloned code segments, addressing limitations in existing detection methods.

FAQs

sparkles

AI

What advantages does the proposed combined weighted approach offer in code detection?add

The paper demonstrates that the combined weighted approach improves detection accuracy by integrating textual analysis, token-based analysis, and statistical measures, adapting dynamically to software requirements.

How does flow path analysis enhance clone detection compared to traditional methods?add

Flow path analysis identifies clones without relying on one-to-one literal matching, allowing for better detection of altered or reorganized code segments.

What percentage of code in organizations is typically cloned according to previous studies?add

Previous research indicates that between 7% to 23% of code within software organizations consists of cloned segments.

How does token-based analysis contribute to the efficiency of clone detection?add

Token-based analysis enhances efficiency by breaking down source and object programs into identifiable tokens, excluding non-functional text and focusing on keywords.

What are the components of the hybrid approach for code clone detection?add

The hybrid approach integrates three components: textual analysis for line matching, token-based analysis for structural comparison, and statistical analysis for matching key identifiers.

References (13)

  1. Girija Gupta," A Novel Approach Towards Code Clone Detection and Redesigning", International Journal of Advanced Research in Computer Science and Software Engineering 2013 ISSN: 2277 128X
  2. Paul Baker," Detecting and Resolving Semantic Pathologies in UML Sequence Diagrams", ESECFSE' 05, September 5-9, 2005, Lisbon, Portugal. ACM 1-59593-901-4-0/05/0009
  3. Huiqing Li," Similar Code Detection and Elimination for Erlang Programs", PADL 2010
  4. Bakr Al-Batran," Semantic Clone Detection for Model-Based Development of Embedded Systems", MODELS 2011
  5. Yang Yuan," Boreas: An Accurate and Scalable Token-Based Approach to Code Clone Detection", ASE '12, ACM 978-1-4503-1204-2/12/09
  6. Radhika D. Venkatasubramanyam," Prioritizing Code Clone Detection Results for Clone Management", IWSC 2013, 978-1-4673-6445-4/13@ 2013 IEEE
  7. Hiroaki Murakami," Folding Repeated Instructions for Improving Token-based Code Clone Detection", 2012 IEEE 12th International Working Conference on Source Code Analysis and Manipulation 978-0-7695-4783-1/12 © 2012 IEEE
  8. Ian J. Davis," From Whence It Came: Detecting Source Code Clones by Analyzing Assembler".
  9. Miryung Kim," An Empirical Study of Code Clone Genealogies", ESECFSE' 05, September 5-9, 2005, Lisbon, Portugal. ACM 1-59593-014-0/05/0009
  10. D. Gayathri Devi, "Comparison and evaluation on metrics based approach for detecting code clone", Indian Journal of Computer Science and Engineering (IJCSE)2011, ISSN : 0976-5166
  11. Chanchal K. Roy," Comparison and Evaluation of Code Clone Detection Techniques and Tools: A Qualitative Approach", 2009
  12. Deepak Sethi," Detection of code clones using Datasets", International Journal of Advanced Research in Computer Science and Software Engineering 2012 ISSN: 2277 128X
  13. Kanika Raheja," An Emerging Approach towards Code Clone Detection: Metric Based Approach on Byte Code", International Journal of Advanced Research in Computer Science and Software Engineering 2013, ISSN: 2277 128X