期刊文献+

基于演化模式克隆代码Bugs倾向性分析

Comparative study on Bugs-proneness of different evolution pattern of clone code
下载PDF
导出
摘要 针对当前克隆代码管理不科学,没有侧重点,提出基于演化模式克隆代码Bugs倾向性分析方法。首先使用自主研发工具CloneCodeTracker跟踪克隆演化,然后结合克隆代码Bugs修复数据分视角讨论不同演化模式下克隆代码Bugs倾向性。经过对12款软件近2万个版本实验,结果表明:克隆群视角下复杂演化模式Bugs倾向性最高,合并演化模式Bugs倾向性较高;克隆片段视角下去除演化模式Bug倾向性明显高于其他演化模式;克隆代码内容视角下一致变化演化模式与不一致变化模式Bugs倾向性差别不明显。这些结论可以为克隆重构、克隆管理提供建议,例如,选择复杂演化模式,合并演化模式,去除演化模式的克隆代码优先重构。 The present clone management is unscientific and lacks emphasis of study, so a method for analyzing clone code Bugs bias based on evolutionary model is proposed. Firstly, the independent development tool CloneCodeTracker is used to conduct clone evolution trace. It makes statistics of fixed clone code Bugs according to code modify logs, and discusses Bugs proneness of clone code in different evolution mode from various perspective. The experiment is made on nearly 20 thousand versions of 12 different softwares. The results show that under the perspective of clone group, complex evolution mode represents stronger Bugs proneness, and Bugs proneness of merge evolution model is higher than other model. However, in view of clone fragments, higher Bugs proneness is expressed in remove evolution model than those in other evolution mode. And under the perspective of clone code itself, Bugs proneness remains stable between consistence and inconsistence evolution mode. These conclusions will provide support for clone refactor and management, such as,clone code of complex evolution model, merge evolution model, and remove evolution model has high priority of refactoring.
作者 葛广帅 闫盛 刘东升 张丽萍 GE Guangshuai;YAN Sheng;LIU Dongsheng;ZHANG Liping(College of Computer and Information Engineering,Inner Mongolia Normal University,Hohhot 010022,China)
出处 《计算机工程与应用》 CSCD 北大核心 2018年第13期59-66,共8页 Computer Engineering and Applications
基金 国家自然科学基金(No.61462071 No.61363017)
关键词 克隆代码 Bugs倾向性 演化模式 克隆管理 clone code Bugs-proneness evolution pattern clone management
  • 相关文献

参考文献5

二级参考文献123

  • 1KAMIYA T, KUSUMOTO S, INOUE K. CCFinder: a multi-linguistic token-based code clone detection system for large scale source code [ J]. IEEE Trans on Software Engineering, 2002,28 (7) : 654- 670.
  • 2DEISSENBOECK F, HUMMEL B, JUERGENS E. Code clone detection in practice [ C ]//Proc of the 32nd ACM/IEEE International Conference on Software Engineering. New York:ACM Press,2010: 499- 500.
  • 3RIEGER M, DUCASSE S, LANZA M. Insight into system-wide code duplication[ C]//Proc of the llth Working Conference on Reverse Engineering. Washington DC : IEEE Computer Society, 2004 : 100- 109.
  • 4INOUE K, CORDY J R, KOSCHKE R. 6th International Workshop on Software Clones[ EB/OL]. [ 2012-10-15 ]. http ://iwsc2012. ist. osaka-u, ac. jp/.
  • 5CORDY J R. Comprehending reality: practical barriers to industrial adoption of software maintenance automation [ C ]//Proc of the 11 th IEEE International Workshop on Program Comprehension. Washington DC : IEEE Computer Society, 2003 : 196-206.
  • 6RIEGER M. Effective clone detection without language barriers[D]. Bern, Switzerland : University of Bern, 2005.
  • 7JIANG Ling-xiao, SU Zhen-dong, CHIU E. Context-based detection of clone-related bugs [ C ]//Proc of the 6th Joint Meeting of the European Software Engineering Conference and ACM SIGSOFT Symposium on Foundations of Software Engineering. New York: ACM Press, 2007 : 55-64.
  • 8SAHA R. Detection and analysis of near-miss clone genealogies[ D]. Saskatoon : University of Saskatchewan, 2011.
  • 9RAHMAN F, BIRD C, DEVANBU P. Clones: What is that smell? [ C ] //Proc of the 7th IEEE Working Conference on Mining Software Repositories. Washington DC: IEEE Computer Society, 2010:72-81.
  • 10BAKER B S. A program for identifying duplicated code[J]. Computing Science and Statistics, 1992,24( 1 ) : 49-57.

共引文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部