On Cloud Computing Infrastructure for Existing Code-Clone Detection Algorithms

被引:0
作者
Walker, Andrew [1 ]
Cerny, Tomas [1 ]
机构
[1] Baylor Univ, Comp Sci, ECS, One Bear Pl 97141, Waco, TX 76798 USA
来源
APPLIED COMPUTING REVIEW | 2020年 / 20卷 / 01期
基金
美国国家科学基金会;
关键词
Microservices; Cloud Computing; Code Clone; Clone Detection; Scalable Code Clone Detection; Software as a Service; MICROSERVICES; ARCHITECTURES;
D O I
10.1145/3338840.3355659
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Microservice Architecture (MSA) is becoming a design standard for modern cloud-based software systems. However, even though cloud-based applications have been thoroughly explored with regards to networking, scalability, and decomposition of existing monolithic applications into MSA based applications, not much research has been done showing the viability of MSA in new problem domains. In this paper, we explore the application of MSA to the code-clone detection problem domain to identify any improvements that can be made over existing local code-clone detection applications. A fragment of source code that is identical or similar to another is a code-clone. Code-clones make it difficult to maintain applications as they create multiple points within the code that bugs must be fixed, new rules enforced, or design decisions imposed. As applications grow larger and larger, the pervasiveness of code-clones likewise grows. To face the code-clone related issues, many tools and algorithms have been proposed to find and document code-clones within an application. In this paper, we show that many improvements can be made by utilizing emerging cloud-based technologies.
引用
收藏
页码:5 / 14
页数:10
相关论文
共 50 条
  • [1] Clone Swarm: A Cloud Based Code-Clone Analysis Tool
    Bandi, Venkat
    Roy, Chanchal K.
    Gutwin, Carl
    PROCEEDINGS OF THE 2020 IEEE 14TH INTERNATIONAL WORKSHOP ON SOFTWARE CLONES (IWSC '20), 2020, : 52 - 56
  • [2] Open-Source Tools and Benchmarks for Code-Clone Detection: Past, Present, and Future Trends
    Walker, Andrew
    Cerny, Tomas
    Song, Eungee
    APPLIED COMPUTING REVIEW, 2019, 19 (04): : 28 - 39
  • [3] Refactoring Code Clone Detection
    Othman, Zhala Sarkawt
    Kaya, Mehmet
    2019 7TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS), 2019,
  • [4] Code Clone Detection: A Literature Review
    Chen Q.-Y.
    Li S.-P.
    Yan M.
    Xia X.
    Ruan Jian Xue Bao/Journal of Software, 2019, 30 (04): : 962 - 980
  • [5] Interface Driven Code Clone Detection
    Misu, Md Rakib Hossain
    Sakib, Kazi
    2017 24TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2017), 2017, : 747 - 748
  • [6] Evaluating map reduce tasks scheduling algorithms over cloud computing infrastructure
    Althebyan, Qutaibah
    Jararweh, Yaser
    Yaseen, Qussai
    AlQudah, Omar
    Al-Ayyoub, Mahmoud
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (18) : 5686 - 5699
  • [7] Modelling Cloud Computing Infrastructure
    Hickey, Marianne
    Rahmouni, Maher
    MECHANISMS FOR AUTONOMOUS MANAGEMENT OF NETWORKS AND SERVICES, 2010, 6155 : 106 - 109
  • [8] A Scalable Cloud Computing Infrastructure for Geospatial Data Analytics for Change Detection
    Jacobsen, Rune Hylsberg
    Jeppesen, Jacob Hoxbroe
    Laursen, Kim Fibiger
    Skovsgaard, John
    Jensen, Henrik Nymann
    Toftegaard, Thomas Skjodeberg
    2017 EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2017, : 403 - 410
  • [9] A study on intrusion detection algorithms for user data cloud computing
    Li Y.
    International Journal of Simulation: Systems, Science and Technology, 2016, 17 (36): : 14.1 - 14.6
  • [10] Prioritizing Code Clone Detection Results for Clone Management
    Venkatasubramanyam, Radhika D.
    Gupta, Shrinath
    Singh, Himanshu Kumar
    2013 7TH INTERNATIONAL WORKSHOP ON SOFTWARE CLONES (IWSC), 2013, : 30 - 36