skip to main content
10.1145/1985404.1985409acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

Index-based model clone detection

Authors Info & Claims
Published:23 May 2011Publication History

ABSTRACT

Existing algorithms for model clone detection operate in batch mode. Consequently, if a small part of a large model changes during maintenance, the entire detection needs to be recomputed to produce updated cloning information. Since this can take several hours, the lack of incremental detection algorithms hinders clone management, which requires up-to-date cloning information. In this paper we present an index-based algorithm for model clone detection that is incremental and distributable. We present a case study that demonstrates its capabilities, outline its current limitations and present directions for future work.

References

  1. T. Bakota, R. Ferenc, and T. Gyimothy. Clone smells in software evolution. In ICSM'07, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  2. H. Bunke, P. Foggia, C. Guidobaldi, C. Sansone, and M. Vento. A comparison of algorithms for maximum common subgraph on randomly connected graphs. In SSPR/SPR'02, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. M. Chilowicz, É. Duris, and G. Roussel. Syntax tree fingerprinting for source code similarity detection. In ICPC'09, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  4. M. de Wit, A. Zaidman, and A. van Deursen. Managing code clones using dynamic change tracking and resolution. In ICSM'09, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  5. F. Deissenboeck, B. Hummel, E. Juergens, M. Pfaehler, and B. Schaetz. Model clone detection in practice. In IWSC'10, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. F. Deissenboeck, B. Hummel, E. Juergens, B. Schaetz, S. Wagner, J.-F. Girard, and S. Teuchert. Clone detection in automotive model-based development. In ICSE'08, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. E. Duala-Ekoko and M. P. Robillard. Tracking code clones in evolving software. In ICSE'07, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. R. Garey and D. S. Johnson. Computers and Intractability; A Guide to the Theory of NP-Completeness. W. H. Freeman & Co., 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. N. Göde and R. Koschke. Incremental clone detection. In CSMR'09, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Huan, W. Wang, and J. Prins. Efficient mining of frequent subgraphs in the presence of isomorphism. In ICDM'03, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. B. Hummel, E. Juergens, L. Heinemann, and M. Conradt. Index-Based Code Clone Detection: Incremental, Distributed, Scalable. In ICSM'10, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. P. Jablonski and D. Hou. CReN: a tool for tracking copy-and-paste code clones and renaming identifiers consistently in the IDE. In Eclipse'07, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. E. Juergens and F. Deissenboeck. How much is a clone? In SQM'10, 2010.Google ScholarGoogle Scholar
  14. E. Juergens, F. Deissenboeck, B. Hummel, and S. Wagner. Do code clones matter? In ICSE'09, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. C. J. Kapser and M. W. Godfre. Improved tool support for the investigation of duplication in software. In ICSM'05, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. S. Kawaguchi, T. Yamashina, H. Uwano, K. Fushida, Y. Kamei, M. Nagura, and H. Iida. SHINOBI: A Tool for Automatic Code Clone Detection in the IDE. In WCRE'09, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. R. Koschke. Survey of research on software clones. In Duplication, Redundancy, and Similarity in Software, 2007.Google ScholarGoogle Scholar
  18. R. Koschke. Frontiers of software clone management. In FoSM'08, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  19. T. Neumann. Join ordering -- dynamic programming -- connected subgraphs. http://www-db.in.tum.de/ teaching/ss10/qo/lecture7.pdf, 2010. Lecture slides for Query Optimization, Lecture 7.Google ScholarGoogle Scholar
  20. T. T. Nguyen, H. A. Nguyen, J. M. Al-Kofahi, N. H. Pham, and T. N. Nguyen. Scalable and incremental clone detection for evolving software. ICSM'09, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  21. N. H. Pham, H. A. Nguyen, T. T. Nguyen, J. M. Al-Kofahi, and T. N. Nguyen. Complete and accurate clone detection in graph-based models. In ICSE'09, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. J. W. Raymond and P. Willett. Maximum common subgraph isomorphism algorithms for the matching of chemical structures. J. Computer-Aided Molecular Design, 16(7):521--533, 2002.Google ScholarGoogle ScholarCross RefCross Ref
  23. M. Rieger, S. Ducasse, and M. Lanza. Insights into system-wide code duplication. In WCRE'04, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. C. K. Roy and J. R. Cordy. A survey on software clone detection research. Technical Report 2007--541, Queen's University, Kingston, Canada, 2007.Google ScholarGoogle Scholar
  25. D. Steidl. Index-based model clone detection. http:// www4.in.tum.de/~hummelb/theses/2010_steidl.pdf, 2010. Bachelor Thesis, Technische Universität München.Google ScholarGoogle Scholar

Index Terms

  1. Index-based model clone detection

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        IWSC '11: Proceedings of the 5th International Workshop on Software Clones
        May 2011
        92 pages
        ISBN:9781450305884
        DOI:10.1145/1985404

        Copyright © 2011 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 23 May 2011

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Upcoming Conference

        ICSE 2025

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader