Scenario-based comparison of clone detection techniques

被引:39
|
作者
Roy, Chanchal K. [1 ]
Cordy, James R. [1 ]
机构
[1] Queens Univ, Sch Comp, Kingston, ON K7L 3N6, Canada
关键词
D O I
10.1109/ICPC.2008.42
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Over the last decade many techniques for software clone detection have been proposed. In this paper we provide a comprehensive survey of the capabilities of currently available clone detection techniques. We begin with an overall survey based on criteria that capture the main features of detection techniques. We then propose a set of hypothetical editing scenarios for different clone types, and evaluate the techniques based on their estimated potential to accurately detect clones that may be created by those scenarios.
引用
收藏
页码:153 / 162
页数:10
相关论文
共 50 条
  • [1] Scenario-based threat detection and attack analysis
    Hsiu, PC
    Kuo, CF
    Kuo, TW
    Juan, EYT
    [J]. 39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 279 - 282
  • [2] A Mutation Operator-Based Scenario for Evaluating Software Clone Detection Tools and Techniques
    Gautam, Pratiksha
    Saini, Hemraj
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2019, 13 (01) : 30 - 45
  • [3] Comparison of scenario-based software architecture evaluation methods
    Babar, MA
    Gorton, I
    [J]. 11TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2004, : 600 - 607
  • [4] An Experience with Three Scenario-Based Methods: Evaluation and Comparison
    Petkovic, Dejan
    Raikundalia, Gitesh K.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (01): : 180 - 185
  • [5] Fitness Prediction Techniques for Scenario-Based Design Space Exploration
    van Stralen, Peter
    Pimentel, Andy
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2013, 32 (08) : 1240 - 1253
  • [6] Scenario-based techniques for supporting the elaboration and the validation of formal requirements
    Heymans P.
    Dubois E.
    [J]. Requirements Engineering, 1998, 3 (3-4) : 202 - 218
  • [7] A scenario-based approach to protocol design using evolutionary techniques
    Araújo, SG
    Mesquita, AC
    Pedroza, ACP
    [J]. APPLICATIONS OF EVOLUTIONARY COMPUTING, 2004, 3005 : 178 - 187
  • [8] A case study on participatory redesign of Web site with scenario-based techniques
    Go, K
    Takahashi, T
    Imamiya, A
    [J]. SEVENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS: WORKSHOPS, PROCEEDINGS, 2000, : 161 - 166
  • [9] Scenario-Based Insider Threat Detection From Cyber Activities
    Chattopadhyay, Pratik
    Wang, Lipo
    Tan, Yap-Peng
    [J]. IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2018, 5 (03): : 660 - 675
  • [10] Comparison of Scenario-Based and Interval Optimization Approaches to Stochastic SCUC
    Wu, Lei
    Shahidehpour, Mohammad
    Li, Zuyi
    [J]. IEEE TRANSACTIONS ON POWER SYSTEMS, 2012, 27 (02) : 913 - 921