Detecting Clones in Business Applications

被引:11
作者
Guo, Jin [1 ,2 ]
Zou, Ying [2 ]
机构
[1] Queens Univ, Sch Comp, Kingston, ON, Canada
[2] Queens Univ, Dept Elect & Comp Engn, Kingston, ON, Canada
来源
FIFTEENTH WORKING CONFERENCE ON REVERSE ENGINEERING, PROCEEDINGS | 2008年
关键词
D O I
10.1109/WCRE.2008.12
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A business application automates a collection of business processes. A business process describes how a set of logically related tasks are executed, ordered and managed by following business rides to achieve business objectives. An online bookstore business application contains several tasks such as buying a book, ordering a book, and sending out promotions. Business analysts specify business tasks and software developers implement these tasks. Throughout the lifetime of a business application, business analysts may clone (e.g., copy and slightly modify) business processes to handle special circumstances or promotions. Identifying these clones and removing them helps improve the efficiency of an organization. However most clone detection techniques are source code based not business process based. In this paper, we propose an approach that makes use of traditional source code detection techniques to detect clones in business applications. The effectiveness of our approach is demonstrated through a case study on 10 large open source business applications in the Apache Open for Business Project.
引用
收藏
页码:91 / +
页数:3
相关论文
共 32 条
[21]  
Komondoor R., 2002, ELIMINATING DUPLICAT
[22]  
KONTOGIANNIS K, 1996, J AUTOMATED SOFTWARE, P77
[23]   Assessing the benefits of incorporating function clone detection in a development process [J].
Lague, B ;
Proulx, D ;
Merlo, E ;
Mayrand, J ;
Hudepohl, J .
INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS, 1997, :314-321
[24]   Finding function clones in web applications [J].
Lanubile, F ;
Mallardo, T .
SEVENTH EUROPEAN CONFERENCE ON SOFTWARE MAINTENANCE AND REENGINEERING, PROCEEDINGS, 2003, :379-386
[25]  
LUCIA AD, 2004, P INT C ENT INF SYST, P391
[26]  
Mayrand J, 1996, INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS, P244, DOI 10.1109/ICSM.1996.565012
[27]  
Rajapakse D, 2005, P INT WORLD WID WEB, P924
[28]  
Ricca F, 2003, PROG COMPREHEN, P207
[29]  
SEQUOIA OPEN SOURCE
[30]  
CLONE DR