Detecting Clones in Business Applications

被引:11
作者
Guo, Jin [1 ,2 ]
Zou, Ying [2 ]
机构
[1] Queens Univ, Sch Comp, Kingston, ON, Canada
[2] Queens Univ, Dept Elect & Comp Engn, Kingston, ON, Canada
来源
FIFTEENTH WORKING CONFERENCE ON REVERSE ENGINEERING, PROCEEDINGS | 2008年
关键词
D O I
10.1109/WCRE.2008.12
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A business application automates a collection of business processes. A business process describes how a set of logically related tasks are executed, ordered and managed by following business rides to achieve business objectives. An online bookstore business application contains several tasks such as buying a book, ordering a book, and sending out promotions. Business analysts specify business tasks and software developers implement these tasks. Throughout the lifetime of a business application, business analysts may clone (e.g., copy and slightly modify) business processes to handle special circumstances or promotions. Identifying these clones and removing them helps improve the efficiency of an organization. However most clone detection techniques are source code based not business process based. In this paper, we propose an approach that makes use of traditional source code detection techniques to detect clones in business applications. The effectiveness of our approach is demonstrated through a case study on 10 large open source business applications in the Apache Open for Business Project.
引用
收藏
页码:91 / +
页数:3
相关论文
共 32 条
[1]  
[Anonymous], XML PROCESS DEFINITI
[2]  
[Anonymous], Business Process Modeling Notation (BPMN)
[3]  
BAKER BS, 1995, SECOND WORKING CONFERENCE ON REVERSE ENGINEERING, PROCEEDINGS, P86, DOI 10.1109/WCRE.1995.514697
[4]   Clone detection using abstract syntax trees [J].
Baxter, ID ;
Yahin, A ;
Moura, L ;
Sant'Anna, M ;
Bier, L .
INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS, 1998, :368-377
[5]   Comparison and evaluation of clone detection tools [J].
Bellon, Stefan ;
Koschke, Rainer ;
Antoniol, Giuliano ;
Krinke, Jens ;
Merlo, Ettore .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2007, 33 (09) :577-591
[6]  
Boldyreff C, 2001, EIGHTH WORKING CONFERENCE ON REVERSE ENGINEERING, PROCEEDINGS, P249, DOI 10.1109/WCRE.2001.957829
[7]  
*CCFINDERX, CCFINDERX QUICK GUID
[8]  
Cordy JR, 2003, PROG COMPREHEN, P196
[9]  
CORDY JR, 2004, P CASCON 2004 14 IBM, P29
[10]  
Di Lucca G. A, 2001, P 7 IEEE WORKSH EMP, P107