CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Code Clone v/s Model Clones: Pros and Cons

by Ritu Garg, Rajesh Bhatia
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 89 - Number 15
Year of Publication: 2014
Authors: Ritu Garg, Rajesh Bhatia
10.5120/15707-4575

Ritu Garg, Rajesh Bhatia . Code Clone v/s Model Clones: Pros and Cons. International Journal of Computer Applications. 89, 15 ( March 2014), 20-22. DOI=10.5120/15707-4575

@article{ 10.5120/15707-4575,
author = { Ritu Garg, Rajesh Bhatia },
title = { Code Clone v/s Model Clones: Pros and Cons },
journal = { International Journal of Computer Applications },
issue_date = { March 2014 },
volume = { 89 },
number = { 15 },
month = { March },
year = { 2014 },
issn = { 0975-8887 },
pages = { 20-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume89/number15/15707-4575/ },
doi = { 10.5120/15707-4575 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:09:19.804034+05:30
%A Ritu Garg
%A Rajesh Bhatia
%T Code Clone v/s Model Clones: Pros and Cons
%J International Journal of Computer Applications
%@ 0975-8887
%V 89
%N 15
%P 20-22
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Every software has time and budget constraints associated with it. The time and budget of the software also depends on the risk and inconsistencies during the software life cycle phases. These risks and inconsistencies can be reduced by detecting clones in form of redundancy between the software systems. This paper provides a brief overview to the detection of these risk and inconsistencies in either of the two phases of software development system i. e. design phase or the implementation phase along with their pros and cons.

References
  1. C. K. Roy, J. R. Cordy, A Survey on Software Clone Detection Research, Technical Report 2007-541, Queen's University at Kingston Ontario, Canada, 2007, p. 115.
  2. H. Storrle,Towards clone detection in UML domain models, in: Proceedings Software & Systems Modeling, Volume 12, Issue 2, 2013,pp. 307-329.
  3. S. Ducasse, M. Rieger, S. Demeyer, A language independent approach for detecting duplicated code, in: Proceedings of the 15th International Conference on Software Maintenance (ICSM'99), Oxford, England, UK, 1999,pp. 109–119.
  4. J. H. Johnson, Substring matching for clone detection and change tracking, in:Proceedings of the 10th International Conference on Software Maintenance,Victoria, British Columbia, Canada, 1994, pp. 120–126.
  5. C. K. Roy, J. R. Cordy, NICAD: Accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization, in: Proceedings of the 16th IEEE International Conference on Program Comprehension (ICPC'08), Amsterdam, The Netherlands, 2008, pp. 172–181.
  6. T. Kamiya, S. Kusumoto, K. Inoue, CCFinder: a multi-linguistic token-based code clone detection system for large scale source code, IEEE Transactions on Software Engineering 28 (7) (2002) 654–670.
  7. I. D. Baxter, A. Yahin, L. Moura, M. Sant'Anna, L. Bier, Clone detection usingabstract syntax trees, in: Proceedings of the 14th International Conference on Software Maintenance (ICSM '98), Bethesda, Maryland, USA, 1998, pp. 368– 378.
  8. L. Jiang, G. Misherghi, Z. Su, S. Glondu, DECKARD: Scalable and accurate treebased detection of code clones, in: Proceedings of 29th International Conference on Software Engineering (ICSE'07), Minneapolis, MN, USA, 2007, pp. 96–105.
  9. RaghavanKomondoor. Automated Duplicated-Code Detection and Procedure Extraction. Ph. D. Thesis, 2003.
  10. B. Hummel, E. Juergens, L. Heinemann, M. Conradt, Index-based code clonedetection: Incremental, distributed, scalable, in: Proceedings of the 26th IEEE International Conference on Software Maintenance (ICSM'10), Timisoara,Romania, 2010, pp. 1–9.
  11. H. Liu, Z. Ma, L. Zhang, W. Shao, Detecting duplications in sequence diagrams based on suffix trees, in: Proceedings 13th Asia-Pacific Software Engineering Conference (APSEC'06), Bangalore, India, 2006, pp. 269–276.
  12. F. Deissenboeck, B. Hummel, E. Juergens, B. Schätz, S. Wagner, J. Girard, S. Teuchert, Clone detection in automotive model-based development, in: Proceedings of 30th International Conference on Software Engineering (ICSE'08), Leipzig, Germany, 2008, pp. 603–612.
  13. N. H. Pham, H. A. Nguyen, T. T. Nguyen, J. M. Al-Kofahi, T. N. Nguyen, Complete and accurate clone detection in graph based models, in: Proceedings of 31st International Conference on Software Engineering (ICSE'09), Vancouver, Canada, 2009, pp. 276–286.
  14. B. Hummel, E. Juergens, D. Steidl, Index-based model clone detection, in: Proceedings of 5th International Workshop on Software Clones, Honolulu, USA, 2011, pp. 21–27.
  15. D. Rattan, R. K. Bhatia, M. Singh: Software clone detection: A systematic review, in: Information & Software Technology, Volume- 55, 2013, pp. 1165-1199.
Index Terms

Computer Science
Information Sciences

Keywords

Software System Clone detection Model based Clone detection Code based Clone detection