Function Clone Detection in Web Applications: A Semiautomated Approach
نویسندگان
چکیده
Analogously to traditional applications, code duplication occurs frequently during the development and evolution of web applications. This ad-hoc but pathological form of reuse consists in copying, and eventually modifying, a block of existing code that implements a piece of required functionality. Duplicated blocks are named clones and the act of copying, including slight modifications, is called cloning. When entire functions are copied rather than fragments, duplicated functions are called function clones.
منابع مشابه
Clone Detection in UML Sequence Diagrams Using Token Based Approach
Model Based Development appears to progress extremely in large scale software companies. UML (Unified Modeling Language) is raising as an utility in software development. In object oriented development, the complete details for the lifecycle are provided by UML. UML is a standard modeling language, so that it is used for analysis, design and implementation of software based systems. Clone detec...
متن کاملA Review: Clone Detection in Web Application Using Clone Metrics
In software engineering, the concept of code reuse is very common. Code reuse is the concept of copying and pasting the code in multiple places in the same software or different software without modification. In the last few decades numerous code clone detection technique and tools have been proposed for capturing duplicated redundant code, which is also known as software clone. In this study, ...
متن کاملFinding Function Clones in Web Applications
Many web applications use a mixture of HTML and scripting language code as the front-end to business services. Analogously to traditional applications, redundant code is introduced by copy-and-paste practices. Code duplication is a pathological form of software reuse because of its effects on the maintenance of large software systems. This paper describes how a simple semi-automated approach ca...
متن کاملAnomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism
Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are an approach to protect users. But, these systems are suffering from such drawbacks as low accuracy in ...
متن کاملSearch Engine Refactoring tool for Code Clone Detection of Static and Dynamic WebPages
Today cloning of codes of an authorized person leads a positive approach. But the code cloning is done by unauthorized person leads a negative approach. In the recent years, many clone detection tools have been proposed. It produces an over whelming volume of simple clones of data or structure [3]. Code clone detection the content similarity between the programs or webpages. An attempt is made ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- J. Web Eng.
دوره 3 شماره
صفحات -
تاریخ انتشار 2004