期刊文献+

克隆代码映射的方法与应用

Method and application of code clone mapping
下载PDF
导出
摘要 克隆代码是指重复或类似的代码片段,这些重复代码来自于"复制粘贴修改"的编程方式,此类代码会严重影响软件的可维护性。研究者们从各种角度来探索克隆代码的存在、发展和变化规律,对克隆代码进行追踪并发现在其演化过程中表现的特征和模式,从而更好地研究和管理,而克隆映射是整个研究过程的核心步骤。介绍了克隆相关概念及术语,详细阐述了不同类型的映射方法并总结方法的优缺点,说明了克隆映射在克隆演化分析和克隆质量评估方面的应用,对克隆映射的发展趋势进行了总结和展望。 Clone code is duplicate or similar code fragment. These duplicate codes from the“copy and paste modification”of programming, such codes are believed to reduce the maintainability of software severely. The existence, development and change rule of clone code are explored from various perspectives. Clone code is traced and found the characteristics and patterns of performance in the evolution process, so as to better research and management, and clone mapping is the key step of the whole research process. In this paper, several different types of mapping methods are introduced, the advantages and disadvantages of various mapping methods are summarized, and the application of the clone mapping in clone evolution analysis and clone quality evaluation is described; the development trend of clone mapping is summarized and prospected.
作者 陈桌 张丽萍 边琦 CHEN Zhuo;ZHANG Liping;BIAN Qi(College of Computer and Information Engineering, Inner Mongolia Normal University, Hohhot 010022, China;College of Education Science, Inner Mongolia Normal University, Hohhot 010022, China)
出处 《计算机工程与应用》 CSCD 北大核心 2017年第6期14-21,90,共9页 Computer Engineering and Applications
基金 国家自然科学基金(No.61462071 No.61363017) 内蒙古自然科学基金(No.2014MS0613) 内蒙古教育厅资助项目(No.NJZY14039)
关键词 克隆代码 克隆映射 软件维护 演化分析 克隆质量 code clone clone mapping software maintenance clone evolution clone quality
  • 相关文献

参考文献5

二级参考文献172

  • 1叶进,林士敏.基于贝叶斯网络的推理在移动客户流失分析中的应用[J].计算机应用,2005,25(3):673-675. 被引量:12
  • 2Shaw M. Truth Vs. knowledge: The difference between what a component does and what we know it does//Proeeedings of the 8th International Workshop Software Specification and Design. Budapest, Hungary, 1996: 181- 185.
  • 3Binkley David. Source code analysis: A road map//Proceedings of the Future of Software Engineering. Minneapolis, MN, USA, 2007:104 -119.
  • 4Dwyer Matthew B, Hatcliff John, Robby, Pasareanu Corina S, Visser Willem. Formal software analysis emerging trends in software model cheeking//Proceedings of the Future of Software Engineering. Minneapolis, MN, USA, 2007: 120- 136.
  • 5Flemming Nielson, Hanne Riis Nielson, Chris Hankin. Principles of Program Analysis. Berlin, Germany: Springer Verlag, 2005.
  • 6Jackson Daniel, Rinard Martin. Software analysis: A roadmap//Proceedings of the Future of Software Engineering. Limerick, Ireland, 2000:133-145.
  • 7Aho Alfred V, Sethi Ravi, Ullman Jeffrey D. Compilers: Principles, Techniques, and Tools. New Jersey, USA: Addison-Wesley, 1986.
  • 8Clarke E M, Jr Grumberg O, Peled D A. Model Checking, Cambridge, MA: MIT Press, 2000.
  • 9Ball T, Rajamani S K. Automatically validating temporal safety properties of interfaces//Dwyer M B ed. Proceedings of the 8th SPIN Workshop. LNCS 2057. Springer, 2001:103-122.
  • 10Chen H, Wagner D A. MOPS: An infrastructure for examining security properties of software//Proceedings of the 9th ACM Conference on Computer and Communications Security. Washengton, DC, USA, 2002:235-244.

共引文献122

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部