[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/2666527.2666530acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

Clone detection meets semantic web-based transitive closure computation

Published: 05 June 2012 Publication History

Abstract

In this paper we discuss a new application of Semantic Web and Artificial Intelligence in software analysis research. We show on a concrete example - clone detection for object-oriented source code that transitivity closure computation can provide added value to the clone detection community. Our novel approach models the domain of discourse knowledge as a mixture of source code patterns and inheritance trees represented as Directed Acyclic Graphs. Our approach promotes the use of Semantic Web and inference engines in source code analysis. More specifically we take advantage of the Semantic Web and its support for knowledge modeling and transitive closure computation to detect semantic source code clones not detected by traditional detection tools.

References

[1]
C. K. Roy, J. R. Cordy, and R. Koschke, "Comparison and evaluation of code clone detection techniques and tools: A qualitative approach," Science of Computer Programming, vol. 74, no. 7, pp. 470--495, 2009.
[2]
S. Bellon, R. Koschke, G. Antoniol, J. Krinke, and E. Merlo, "Comparison and evaluation of clone detection tools," IEEE Transactions on Software Engineering, vol. 33, no. 9, pp. 577--591, 2007.
[3]
B. S. Baker and U. Manber, "Deducing similarities in Java source from bytecodes," USENIX Annual Technical Conference. 1998.
[4]
R. Koschke, R. Falke, and P. Frenzel, "Clone Detection Using Abstract Syntax Suffix Trees," Working Conference on Reverse Engineering, pp. 253--262, 2006.
[5]
T. Kamiya, S. Kusumoto, and K. Inoue, "CCFinder: a multilinguistic token-based code clone detection system for large scale source code," IEEE Transactions on Software Engineering, vol. 28, no. 7, pp. 654--670, 2002.
[6]
Y. Higo and S. Kusumoto, "Enhancing Quality of Code Clone Detection with Program Dependency Graph," Working Conference on Reverse Engineering, pp. 315--316, 2009.
[7]
E. Merlo, G. Antoniol, M. D. Penta, and V. F. Rollo, "Linear Complexity Object -- Oriented Similarity for Clone Detection and Software Evolution Analyses," IEEE International Conference on Software Maintenance, pp. 0--4, 2004.
[8]
M. Tokunaga, N. Yoshida, K. Yoshioka, M. Matsushita, K. Inoue "Towards Collection of Refactoring Patterns Based on Code Clone Classification," Asian Conference on Pattern Languages of Programs, 2011.
[9]
M. Fowler, "Refactoring: Improving the Design of Existing Code," Lecture notes in computer science, 2418, pp. 256, 2002.
[10]
Y. Ioannidis, R. Ramakrishnan, and L. Winger, "Transitive closure algorithms based on graph traversal," ACM Trans. Database Syst. 18, 3, 512--576, 1993.
[11]
B. Roy, "Transitivité et connexité," C. R. Acad. Sci. Paris 249, 216--218, 1959.
[12]
S. Warshall, "A Theorem on Boolean Matrices." J. ACM 9, 11--12, 1962.
[13]
S. Dar and R. Ramakrishnan, "A performance study of transitive closure algorithms," ACM SIGMOD International Conference on Management of Data, 1994.
[14]
J. Urbani, S. Kotoulas, J. Maassen, F. Van Harmelen, and H. Bal, "OWL reasoning with WebPIE: calculating the closure of 100 billion triples," The Semantic Web: Research and Applications, pp. 213--227, 2010.
[15]
D. Beyer, A. Noack, and C. Lewerentz, "Efficient relational calculation for software analysis," IEEE Transactions on Software, vol. 31, no. 2, pp. 137--149, 2005.
[16]
I. Keivanloo, C. Forbes, and J. Rilling, "Towards sharing source code facts using linked data," ICSE International Workshop on Search-driven Development: Users, Infrastructure, Tools, and Evaluation, pp. 25--28, 2011.

Cited By

View all
  • (2018)Ways of applying artificial intelligence in software engineeringProceedings of the 6th International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering10.1145/3194104.3194109(35-41)Online publication date: 28-May-2018
  • (2016)A review-based comparative study of bad smell detection toolsProceedings of the 20th International Conference on Evaluation and Assessment in Software Engineering10.1145/2915970.2915984(1-12)Online publication date: 1-Jun-2016
  • (2015)Database-backed program analysis for scalable error propagationProceedings of the 37th International Conference on Software Engineering - Volume 110.5555/2818754.2818827(586-597)Online publication date: 16-May-2015
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
RAISE '12: Proceedings of the First International Workshop on Realizing AI Synergies in Software Engineering
June 2012
61 pages
ISBN:9781467317535

Sponsors

Publisher

IEEE Press

Publication History

Published: 05 June 2012

Check for updates

Author Tags

  1. clone detection
  2. object oriented
  3. semantic web

Qualifiers

  • Research-article

Conference

ICSE '12
Sponsor:

Upcoming Conference

ICSE 2025

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 02 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2018)Ways of applying artificial intelligence in software engineeringProceedings of the 6th International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering10.1145/3194104.3194109(35-41)Online publication date: 28-May-2018
  • (2016)A review-based comparative study of bad smell detection toolsProceedings of the 20th International Conference on Evaluation and Assessment in Software Engineering10.1145/2915970.2915984(1-12)Online publication date: 1-Jun-2016
  • (2015)Database-backed program analysis for scalable error propagationProceedings of the 37th International Conference on Software Engineering - Volume 110.5555/2818754.2818827(586-597)Online publication date: 16-May-2015
  • (2014)Software trustworthiness 2.0-A semantic web enabled global source code analysis approachJournal of Systems and Software10.5555/2747476.274752589:C(33-50)Online publication date: 1-Mar-2014

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media