Clone Detection by Comparing Abstract Memory States
نویسندگان
چکیده
In this paper, we propose a new semantic clone detection technique by comparing programs’ abstract memory states, which are computed by a semantic-based static analyzer. Our experimental study using three large-scale open source projects shows that our technique can detect semantic clones that existing syntacticor semantic-based clone detectors miss. Our technique can help developers identify inconsistent clone changes, find refactoring candidates, and understand software evolution related to semantic clones.
منابع مشابه
A High Speed Function Clone Detection Based on Information Retrieval Techniques
A code clone (i.e., code fragment that has identical or similar fragment to it in the source code) is one of the major problems for software maintenance. So far, a lot of approaches have been developed on the detection of code clones. Several of them focus on semantic similarities based on control and data flow analyses, however they lack the scalability for large-scale source code. In this stu...
متن کاملDeep Learning Similarities from Different Representations of Source Code
Assessing the similarity between code components plays a pivotal role in a number of Software Engineering (SE) tasks, such as clone detection, impact analysis, refactoring, etc. Code similarity is generally measured by relying on manually defined or hand-crafted features, e.g., by analyzing the overlap among identifiers or comparing the Abstract Syntax Trees of two code components. These featur...
متن کاملMonoclonal Antibody Production Against Vimentin by Whole Cell Immunization in a Mouse Model
Background: Pancreatic carcinoma is the fourth-leading cause of cancer death in the United States and due to its late presentation, only few patients would be candidates for the curative treatment of pancreactomy. Monoclonal antibodies have brought hope to targeted therapy.Objectives: To identify new biomarkers, a panel of monoclonal antibodies was genera...
متن کاملA New Random Walk for Replica Detection in WSNs
Wireless Sensor Networks (WSNs) are vulnerable to Node Replication attacks or Clone attacks. Among all the existing clone detection protocols in WSNs, RAWL shows the most promising results by employing Simple Random Walk (SRW). More recently, RAND outperforms RAWL by incorporating Network Division with SRW. Both RAND and RAWL have used SRW for random selection of witness nodes which is problema...
متن کاملComparing the effectiveness of strengthening working memory and critical thinking training on emotion regulation strategies of children with special learning disorder
Abstract Objective: To compare the effectiveness of memory work and critical thinking training of children's movement regulation with special methods. Method: The current research was a semi-experimental research with a pre-test, post-test and control group design. The statistical population included all students aged 9 to 12 who referred to the center for special problems in Tabriz distri...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010