Please use this identifier to cite or link to this item:
|Title:||Mining logical clones in software: Revealing high-level business and programming rules||Authors:||Qian, W.
|Issue Date:||2013||Citation:||Qian, W., Peng, X., Xing, Z., Jarzabek, S., Zhao, W. (2013). Mining logical clones in software: Revealing high-level business and programming rules. IEEE International Conference on Software Maintenance, ICSM : 40-49. ScholarBank@NUS Repository. https://doi.org/10.1109/ICSM.2013.15||Abstract:||Software systems contain many implicit application-specific business and programming rules. These rules represent high-level logical structures and processes for application-specific business and programming concerns. They are crucial for program understanding, consistent evolution, and systematic reuse. However, existing pattern mining and analysis approaches cannot effectively mine such application-specific rules. In this paper, we present an approach for mining logical clones in software that reveal high-level business and programming rules. Our approach extracts a program model from source code, and enriches the program model with code clone information, functional clusters (i.e., a set of methods dealing with similar topics or concerns), and abstract entity classes (representing sibling entity classes). It then analyzes the enriched program model for mining recurring logical structures as logical clones. We have implemented our approach in a tool called MiLoCo (Mining Logical Clone) and conducted a case study with an open-source ERP and CRM software. Our results show that MiLoCo can identify meaningful and useful logical clones for program understanding, evolution and reuse. © 2013 IEEE.||Source Title:||IEEE International Conference on Software Maintenance, ICSM||URI:||http://scholarbank.nus.edu.sg/handle/10635/78231||DOI:||10.1109/ICSM.2013.15|
|Appears in Collections:||Staff Publications|
Show full item record
Files in This Item:
There are no files associated with this item.
checked on Aug 23, 2019
WEB OF SCIENCETM
checked on Aug 15, 2019
checked on Aug 17, 2019
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.