Tree Slicing in Clone Detection: Syntactic Analysis Made (Semi)-Semantic
Modelirovanie i analiz informacionnyh sistem, Tome 19 (2012) no. 6, pp. 69-78.

Voir la notice de l'article provenant de la source Math-Net.Ru

Nowadays most of software contains code duplication that leads to serious problems in software maintenance. A lot of different clone detection approaches have been proposed over the years to deal with this problem, but almost all of them do not consider semantic properties of the source code. We propose to reinforce traditional tree-based clone detection algorithms by using additional information about variable slices. This allows to find intertwined/gapped clones on variables; preliminary evaluation confirms applicability of our approach to real-world software.
Keywords: Clone Detection, Tree Slicing, Tree Patterns, Software Maintenance.
@article{MAIS_2012_19_6_a5,
     author = {Marat Akhin and Vladimir Itsykson},
     title = {Tree {Slicing} in {Clone} {Detection:} {Syntactic} {Analysis} {Made} {(Semi)-Semantic}},
     journal = {Modelirovanie i analiz informacionnyh sistem},
     pages = {69--78},
     publisher = {mathdoc},
     volume = {19},
     number = {6},
     year = {2012},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/MAIS_2012_19_6_a5/}
}
TY  - JOUR
AU  - Marat Akhin
AU  - Vladimir Itsykson
TI  - Tree Slicing in Clone Detection: Syntactic Analysis Made (Semi)-Semantic
JO  - Modelirovanie i analiz informacionnyh sistem
PY  - 2012
SP  - 69
EP  - 78
VL  - 19
IS  - 6
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/MAIS_2012_19_6_a5/
LA  - ru
ID  - MAIS_2012_19_6_a5
ER  - 
%0 Journal Article
%A Marat Akhin
%A Vladimir Itsykson
%T Tree Slicing in Clone Detection: Syntactic Analysis Made (Semi)-Semantic
%J Modelirovanie i analiz informacionnyh sistem
%D 2012
%P 69-78
%V 19
%N 6
%I mathdoc
%U http://geodesic.mathdoc.fr/item/MAIS_2012_19_6_a5/
%G ru
%F MAIS_2012_19_6_a5
Marat Akhin; Vladimir Itsykson. Tree Slicing in Clone Detection: Syntactic Analysis Made (Semi)-Semantic. Modelirovanie i analiz informacionnyh sistem, Tome 19 (2012) no. 6, pp. 69-78. http://geodesic.mathdoc.fr/item/MAIS_2012_19_6_a5/

[1] A. Deshpande, D. Riehle, “The Total Growth of Open Source”, Conference on Open Source Systems, Springer-Verlag, 2008

[2] C. K. Roy, J. R. Cordy, A Survey on Software Clone Detection Research, TR 2007-541, School of Computing, Queen's University, 2007

[3] M. Kh. Akhin, V. M. Itsykson, “Obnaruzhenie klonov iskhodnogo koda: teoriya i praktika”, Sistemnoe programmirovanie, 5 (2010), 145–163

[4] Z. Li, S. Lu, S. Myagmar, Y. Zhou, “CP-Miner: a Tool for Finding Copy-Paste and Related Bugs in Operating System Code”, Conference on Symposium on Opearting Systems Design Implementation, USENIX Association, Berkeley, 2004, 20

[5] K. Kontogiannis, “Evaluation Experiments on the Detection of Programming Patterns Using Software Metrics”, Working Conference on Reverse Engineering, IEEE Computer Society, Washington, DC, 1997, 44

[6] R. Koschke, R. Falke, P. Frenzel, “Clone Detection Using Abstract Syntax Suffix Trees”, Working Conference on Reverse Engineering, IEEE Computer Society, Washington, DC, 2006, 253–262

[7] B. Hummel, E. Juergens, L. Heinemann, M. Conradt, “Index-based Code Clone Detection: Incremental, Distributed, Scalable”, International Conference on Software Maintenance, IEEE Computer Society, Washington, DC, 2010, 1–9

[8] M. Gabel, L. Jiang, S. Su, “Scalable Detection of Semantic Clones”, International Conference on Software Engineering, IEEE Computer Society, Washington, DC, 2008, 321–330

[9] J. Krinke, “Identifying Similar Code with Program Dependence Graphs”, Working Conference on Reverse Engineering, IEEE Computer Society, Washington, DC, 2001

[10] L. Jiang, G. Misherghi, S. Su, S. Glondu, “DECKARD: Scalable and Accurate Tree-based Detection of Code Clones”, International Conference on Software Engineering, IEEE Computer Society, Washington, DC, 2007, 96–105

[11] A. Andoni, P. Indyk, “Near-optimal Hashing Algorithms for Approximate Nearest Neighbour in High Dimensions”, Commun. ACM, 51:1 (2008), 117–122

[12] W. Evans, C. Fraser, F. Ma, “Clone Detection via Structural Abstraction”, Software Quality Journal, 17:4 (2009), 309–330

[13] P. Bulychev, M. Minea, “Duplicate Code Detection Using Anti-unification”, Spring Young Researchers Colloquium on Software Engineering, 2008, 51–54

[14] T. Kamiya, S. Kusumoto, K. Inoue, “CCFinder: Multilinguistic Token-based Code Clone Detection System for Large Scale Source Code”, IEEE Trans. Softw. Eng., 28:7 (2002), 654–670 | MR