期刊文献+

基于抽象语法树和最优映射算法的克隆代码映射研究

Research on Clone Code Mapping Based on Abstract Syntax Tree and Optimal Mapping Algorithm
下载PDF
导出
摘要 以具有嵌套结构的克隆代码为研究对象,使用NiCad检测工具获取克隆代码的检测结果,然后将检测出的克隆代码转换为抽象语法树,利用递归函数返回最优子树,筛选出具有相同嵌套结构的克隆代码;再利用最优映射算法对具有相同嵌套结构的克隆对进行映射.此方法更好地支持了Type-3类型克隆代码的映射,为进一步研究克隆代码重构奠定了基础. Taking the clone code with a nested structure as an object of the study,the research gets results of clone code by the detection tool of NiCad.Then,the clone code is transferred to an abstract syntax tree.Using the recursive function,the optimal subtree is returned,and the clone code which has the same nested structure is selected out.Finally,the optimal mapping algorithm is used to map the clone pair which has the same nested structure.This method supports the mapping of Type-3 clone code better,and lays a foundation for further research on clone code refactoring.
作者 赵凤荣 姚永婷 张丽萍 赵俊奇 ZHAO Feng-rong;YAO Yong-ting;ZHANG Li-ping;ZHAO Jun-qi(College of Computer and Information Engineering,Inner Mongolia Normal University,Hohhot 010022,China;China United Network Communications Group Co.,Ltd Inner Mongolia Autonomous Region Branch,Hohhot 010050,China)
出处 《内蒙古大学学报(自然科学版)》 CAS 北大核心 2018年第5期521-527,共7页 Journal of Inner Mongolia University:Natural Science Edition
基金 国家自然科学基金资助项目(61462071) 内蒙古自然科学基金资助项目(2018MS06009) 内蒙古师范大学科研基金项目(2016ZRYB003)
关键词 克隆代码 克隆映射 抽象语法树 最优映射算法 clone code clone mapping abstract syntax tree optimal mapping algorithm
  • 相关文献

参考文献1

二级参考文献20

  • 1Bettenburg N, Shang W, Ibrahim W, et al. An empirical study on inconsistent changes to code clones at release level [C] //Proc of the 16th Working Conference on Reverse Engi- neering. IEEE Press, 2009: 85-94.
  • 2Zibran M F, Roy C K. The road to software clone manage- ment: A survey [R]. Technical Report, The University of Saskatchewan, 2012: 1-66.
  • 3Saha R K, Asduzzaman M, Zibran M F, et al. Evaluating code clone genealogies at release level: An empirical study [C] //Proceedings of the 10th IEEE Working Conference on Source Code Analysis and Manipulation. Washington DC: IEEE Computer Society, 2010: 87-96.
  • 4Bakota T, Ferenc R, Gyimothy T. Clone smells in software evolution [C] //IEEE International Conference on Software Maintenance. Washington DC: IEEE Computer Society, 2007 : 24-33.
  • 5Saha R K, Roy C K, Schneider K A. An automatic framework for extracting and classifying near-miss clone genealogies [C] //27th IEEE International Conference on Software Main- tenance, ZO11 29-302.
  • 6Barbour L, Khomh F, Zou Y. Late propagation in software clones [C] //Proceedings of the 27th IEEE International Con- ference on Software Maintenance. Washington DC: IEEE Computer Society, 2011: 273-282.
  • 7Gode N, Koschke R. Incremental clone detection [C] //Pro- ceedings of the European Conference on Software Maintenance and Reengineering. Washington DC: IEEE Computer Society, 2009 : 219-228.
  • 8Duala-Ekoko E, Robillard M P. Tracking code clones in evol- ving software [C] //Proceedings of the 29th International Conference on Software Engineering. Washington DC: IEEE Computer Society, 2007 .. 158-167.
  • 9Grant S, Cordy J. Estimating the optimal number of latent con- cepts in source code analysis [C] //10th IEEE Working Conference on Source Code Analysis and Manipulation, 2010: 65-74.
  • 10Lukins S, Kraft N, Etzkorn L. Bug localization using latent Diriehlet allocation [J]. Information and Software Technolo- gy, 2010, 52 (9): 972-990.

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部