全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

基于依赖图的程序克隆分析及近似解求解方法

DOI: 10.3969/j.issn.1671-7627.2013.05.010, PP. 52-56

Keywords: 程序缺陷,克隆代码,程序依赖图,克隆分析,软件演化

Full-Text   Cite this paper   Add to My Lib

Abstract:

大型软件系统中的代码复制和修改现象可能导致程序缺陷的扩大以及无用代码的存在,克隆代码检测分析则有助于抽取可复用的软件组件和模式,在软件重构和软件演化中起重要的作用。在给出了一种基于子图同构进行克隆代码检测的方法基础上,加入依赖边类型约束求近似解的算法,以改善算法的时间复杂性。

References

[1]  kumarroyc,cordyjr.anempiricalstudyoffunctionclonesinopensourcesoftware[c]//the15thworkingconferenceonreverseengineering(wcre’08).belgium:[s.n.],2008:81-90.
[2]  kumarroyc,cordyjr,koschker.comparisonandevaluationofcodeclonedetectiontechniquesandtools:aqualitativeapproach[j].scienceofcomputerprogramming,2009,74(7):470-495.
[3]  koschker.surveyofresearchonsoftwareclones[c]//duplication,redundancy,andsimilarityinsoftware.dagstuhl:[s.n.],2006.
[4]  ducasses,riegerm,demeyers.alanguageindependentapproachfordetectingduplicatedcode[c]//internationalworkshoponempiricalstudiesofsoftwaremaintenance-wess’99.oxford:[s.n.],1999.
[5]  cordellalp,foggiap,sansonec,etal.animprovedalgorithmformatchinglargegraphs[c]//the3rdiaprtc-15workshopongraphbasedrepresentationsinpatternrecognition.ischia:[s.n.],2001:149-159.
[6]  邹潇湘,戴琼.图同构中的一类顶点细分方法[j].软件学报,2007,18(2):213-219.
[7]  ullmannjr.analgorithmforsubgraphisomorphism[j].journaloftheassociationforcomputingmachinery,1976,23:31-42.
[8]  schmidtdc,druffelle.afastbacktrackingalgorithmtotestdirectedgraphsforisomorphismusingdistancematrices[j].journaloftheacm,1976,23(3):433-445.
[9]  hopcroftj,wongj.lineartimealgorithmforisomorphismofplanargraphs[c]//the6thannualacmsymposium,theoryofcomputing.washington:[s.n.],1974:172-184.
[10]  吴军华,汪婷婷.一种获取web结构切片的方法及其应用[j].南京工业大学学报:自然科学版,2008(4):79-83.
[11]  johnsonj.identifyingredundancyinsourcecodeusingfingerprints[c]//ibmcentreforadvancedstudiesconference,softwareengineering.toronto:ibmpress,1993:171-183.
[12]  kamiyat,kusumotos,katsuroi.ccfinder:amultilinguistictoken-basedcodeclonedetectionsystemforlargescalesourcecode[j].transactionsonsoftwareengineering,2002,28(7):654-670.
[13]  baxteri,yahina,moural,etal.clonedetectionusingabstractsyntaxtrees[c]//the14thinternationalconferenceonsoftwaremaintenance(icsm’98).bethesda:[s.n.],1998:368-377.
[14]  krinkj.identifyingsimilarcodewithprogramdependencegraph[c]//the8thworkingconferenceonreverseengineering(wcre’01).stuttgart:[s.n.],2001:301-309.
[15]  李必信.程序切片技术及其应用[m].北京:科学出版社,2006.
[16]  徐宝文,张挺,陈振强.递归子程序的依赖性分析及其应用[j].计算机学报,2001,24(11):1278-1284.
[17]  bakerbs.atheoryofparameterizedpatternmatching:algorithmsandapplications[c]//the25thacmsymposiumontheoryofcomputing.newyork:[s.n.],1993:71-80.
[18]  mccreightem.aspace-economicalsuffixtreeconstructionalgorithm[j].jacm,1976,23(2):262-272.
[19]  cordellalp,foggiap,sansonec,etal.subgraphtransformationsfortheinexactmatchingofattributedrelationalgraphs[j].computing,1998,12(suppl.):43-52.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133