A Rievew on Code Smell Techniques using Graph Theory

Chaitanya Kulkarni, S. D Joshi

Abstract


In software engineering field of code clone recognition,
which essentially comprises of the location of the code clones thatis
acquainted in programming due with reuse approach amid
improvement of programming. At the advancement stage for
simplicity of programming, the developers reuse the code by slight
adjustments. In the event that the product has a high level of
likelihood clones, it might bring about numerous issues for the
product, from the support perspective. There are numerous
apparatuses accessible, however yet exactness required in clone
location can't be guaranteed to amazing degree. A portion of the
apparatuses accessible don't identify clones with great effectiveness,
Moreover they devour a considerable measure of time. The aim of
this proposition is to reveal the method by which proposed
instrument can effectively recognize different sorts of clones with
proficient adaptability and striking streamlining.


Full Text:

PDF

References


NikolaosTsantalis, Member, IEEE, DavoodMazinanian, and

GiriPanamoottil Krishnan “Assessing the Refactorability of Software

Clones” , IEEE TRANSACTIONS ON SOFTWARE ENGINEERING,

VOL. XX, NO. XX, MONTH 2015.

G. P. Krishnan and N. Tsantalis, “Unification and refactoring of clones,” in

Proceedings of the IEEE Conference on Software

Maintenance,Reengineering and Reverse Engineering (CSMRWCRE),

Software Evolution Week, 2014, pp. 104–113.

C. K. Roy, J. R. Cordy, and R. Koschke, “Comparison and evaluation of

code clone detection techniques and tools: A qualitativeapproach,” Science

of Computer Programming, vol. 74, no. 7, pp. 470 – 495, 2009.

C. Roy, M. Zibran, and R. Koschke, “The vision of software clone

management: Past, present, and future (keynote paper),”in Proceedings of

the IEEE Conference on Software Maintenance,Reengineering and Reverse

Engineering, 2014 Software Evolution Week, 2014, pp. 18–33.

R. Johnson, D. Pearson, and K. Pingali, “The program structure tree:

Computing control regions in linear time,” in Proceedings of the ACM

SIGPLAN Conference on Programming Language Design and

Implementation, 1994, pp. 171–185.

Prajila Prem, “A Review on Code Clone Analysis andCode Clone

Detection”. IJEIT, Volume 2, Issue 12, June2013, pp. 43-46.

James J. McGregor, “Backtrack search algorithms andthe maximal

common subgraph problem”, Software:Practice and Experience, Volume

, Issue 1, Jan 1982, pp.23-34.

Yu Wang, “A novel efficient algorithm for determiningmaximum common

subgraphs”, Ninth InternationalConference on Information Visualization,

July 2005, pp.657-663.

Mohammad Alshayeb, “Empirical Investigation ofRefactoring Effect on

Software Quality”, Volume 51, Issu9, 2009, Elsevier, pp. 1319-1326.

G. P. Krishnan and N. Tsantalis, “Unification and refactoring of clones,” in

Proc. IEEE Conf. Softw. Maintenance, Reeng. Reverse Eng. Softw. Evol.

Week, 2014, pp. 104–113.


Refbacks

  • There are currently no refbacks.


 

Copyright © IJETT, International Journal on Emerging Trends in Technology