On Cloud Computing Infrastructure for Existing Code-Clone Detection Algorithms

被引:0
作者
Walker, Andrew [1 ]
Cerny, Tomas [1 ]
机构
[1] Baylor Univ, Comp Sci, ECS, One Bear Pl 97141, Waco, TX 76798 USA
来源
APPLIED COMPUTING REVIEW | 2020年 / 20卷 / 01期
基金
美国国家科学基金会;
关键词
Microservices; Cloud Computing; Code Clone; Clone Detection; Scalable Code Clone Detection; Software as a Service; MICROSERVICES; ARCHITECTURES;
D O I
10.1145/3338840.3355659
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Microservice Architecture (MSA) is becoming a design standard for modern cloud-based software systems. However, even though cloud-based applications have been thoroughly explored with regards to networking, scalability, and decomposition of existing monolithic applications into MSA based applications, not much research has been done showing the viability of MSA in new problem domains. In this paper, we explore the application of MSA to the code-clone detection problem domain to identify any improvements that can be made over existing local code-clone detection applications. A fragment of source code that is identical or similar to another is a code-clone. Code-clones make it difficult to maintain applications as they create multiple points within the code that bugs must be fixed, new rules enforced, or design decisions imposed. As applications grow larger and larger, the pervasiveness of code-clones likewise grows. To face the code-clone related issues, many tools and algorithms have been proposed to find and document code-clones within an application. In this paper, we show that many improvements can be made by utilizing emerging cloud-based technologies.
引用
收藏
页码:5 / 14
页数:10
相关论文
共 41 条
[31]   DéjàVu: A map of code duplicates on GitHub [J].
Lopes C.V. ;
Maj P. ;
Martins P. ;
Saini V. ;
Yang D. ;
Zitny J. ;
Sajnani H. ;
Vitek J. .
Proceedings of the ACM on Programming Languages, 2017, 1 (OOPSLA)
[32]  
Mauro T., 2019, NGINX ADOPTING MICRO
[33]  
Mayrand J, 1996, INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS, P244, DOI 10.1109/ICSM.1996.565012
[34]   SPACE-ECONOMICAL SUFFIX TREE CONSTRUCTION ALGORITHM [J].
MCCREIGHT, EM .
JOURNAL OF THE ACM, 1976, 23 (02) :262-272
[35]  
Ren J, 2018, 2018 IEEE 3RD INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING (ICSIP), P7, DOI 10.1109/SIPROCESS.2018.8600485
[36]   SourcererCC: Scaling Code Clone Detection to Big-Code [J].
Sajnani, Hitesh ;
Saini, Vaibhav ;
Svajlenko, Jeffrey ;
Roy, Chanchal K. ;
Lopes, Cristina V. .
2016 IEEE/ACM 38TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2016, :1157-1168
[37]  
Sulaiman N. H., 2012, 2012 IEEE Symposium on Humanities, Science and Engineering Research (SHUSER), P659, DOI 10.1109/SHUSER.2012.6268901
[38]   Processes, Motivations, and Issues for Migrating to Microservices Architectures: An Empirical Investigation [J].
Taibi, Davide ;
Lenarduzzi, Valentina ;
Pahl, Claus .
IEEE CLOUD COMPUTING, 2017, 4 (05) :22-32
[39]   On Automated Role-Based Access Control Assessment in Enterprise Systems [J].
Walker, Andrew ;
Svacina, Jan ;
Simmons, Johnathan ;
Cerny, Tomas .
INFORMATION SCIENCE AND APPLICATIONS, 2020, 621 :375-385
[40]  
Walker Andrew, 2020, ACM SIGAPP APPL COMP, V19, P28, DOI DOI 10.1145/3381307.3381310