Clone Detection in Model-Based Development using Formal Methods to Enhance Performance in Software Development

被引:0
作者
Jnanamurthy, H. K. [1 ]
Henskens, Frans [1 ]
Paul, David [2 ]
Wallis, Mark [1 ]
机构
[1] Univ Newcastle, Sch Elect Engn & Comp Sci, Callaghan, NSW, Australia
[2] Univ New England, Sch Sci & Technol, Armidale, NSW 2351, Australia
来源
2018 3RD INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT) | 2018年
关键词
Clone Detection; Model-based development; Software Maintenance;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Clone detection is gaining more attention due to its advantages of software maintenance. Clone detection helps in code optimization (code present in multiple locations can be updated and optimized once), bug detection (discovering bugs that are copied to multiple locations in the code), and analysis of re-used code in software systems. Importantly, model-based software development is gaining more popularity due to its reduced production time and cost. There are several approaches to detect clones in the code level, but few methods to detect clones at the model level. These methods use syntactic based analysis of models to detect clones at the model level. In this paper, we present a novel approach to detect clones at model-based levels using semantic based analysis. Our method is based on model checking which involves mathematical based analysis. Our method is tested with control flow based models and yields good results in detection of model clones.
引用
收藏
页数:8
相关论文
共 20 条
[1]  
[Anonymous], TECHNICAL REPORT
[2]  
Baker B.S., 1992, Computing Science and Statistics
[3]  
BAKER BS, 1995, SECOND WORKING CONFERENCE ON REVERSE ENGINEERING, PROCEEDINGS, P86, DOI 10.1109/WCRE.1995.514697
[4]   Advanced clone-analysis to support object-oriented system refactoring [J].
Balazinska, M ;
Merlo, E ;
Dagenais, M ;
Lagüe, B ;
Kontogiannis, K .
SEVENTH WORKING CONFERENCE ON REVERSE ENGINEERING - PROCEEDINGS, 2000, :98-107
[5]   Clone detection using abstract syntax trees [J].
Baxter, ID ;
Yahin, A ;
Moura, L ;
Sant'Anna, M ;
Bier, L .
INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS, 1998, :368-377
[6]  
Ben-Ari M., 2008, Principles of the Spin Model Checker
[7]  
Booch Grady, 1999, UNIFIED MODELING LAN, DOI DOI 10.1007/3-540-40011-7_10
[8]  
de Niz D, 2006, Proceedings of the 12th IEEE Real-Time and Embedded Technology and Applications Symposium, P231
[9]  
Deissenboeck F, 2008, ICSE'08 PROCEEDINGS OF THE THIRTIETH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, P603, DOI 10.1145/1368088.1368172
[10]  
Fowler K., 1999, The Addison-Wesley Object Technology Series