Supervisor:Mr. Sayed Morteza Zaker Presentor:Fateme hadinezhad.

Slides:



Advertisements
Similar presentations
Duplicate code detection using Clone Digger Peter Bulychev Lomonosov Moscow State University CS department.
Advertisements

European Modelling Symposium 2009 EMS2009 UKSim 3 rd European Symposium on Computer Modelling and Simulation 25 – 27 November, Athens, Greece Guidelines.
IEEE/FIPA WG Mobile Agents Ulrich Pinsdorf Fraunhofer-Institute IGD, Germany Dept. Security Technology
ANTLR in SSP Xingzhong Xu Hong Man Aug Outline ANTLR Abstract Syntax Tree Code Equivalence (Code Re-hosting) Future Work.
Clean code. Motivation Total cost = the cost of developing + maintenance cost Maintenance cost = cost of understanding + cost of changes + cost of testing.
Multi-Phase Reasoning of temporal semantic knowledge Sakirulai O. Isiaq and Taha Osman School of Computer and Informatics Nottingham Trent University Nottingham.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Programming and Languages Chapter 13.
Reverse Engineering © SERG Code Cloning: Detection, Classification, and Refactoring.
Unified theory of software evolution Reengineering – Business process reengineering and software reengineering BPR model – Business definition, process.
Detection of Plagiarism In University Projects Using Metrics-Based Similarity Dagstuhl Seminar on Duplication, Redundancy, and Similarity in Software July,
Automated Analysis and Code Generation for Domain-Specific Models George Edwards Center for Systems and Software Engineering University of Southern California.
Aki Hecht Seminar in Databases (236826) January 2009
Reliability and Software metrics Done by: Tayeb El Alaoui Software Engineering II Course.
Analyzing Software Code and Execution – Plagiarism and Bug Detection Shoaib Jameel.
UMass Lowell Computer Science Advanced Algorithms Computational Geometry Prof. Karen Daniels Spring, 2004 Project.
The Semantic Web Week 1 Module Content + Assessment Lee McCluskey, room 2/07 Department of Computing And Mathematical Sciences Module.
Senior Design Project 2004/2005 Web Enabled Calling Number Delivery Daniel St. Clair Barron Shurn Professor Soules 10/28/2004.
Revision Control Practices in Software Engineering Surekha, Kotiyala Madhuri, Komuravelly Suchitra, Yerramalla.
1 Software Reuse in Eclipse Kellie-Ann Smith Norgye Yuanyuan Song Xiang Yin Jia Xu.
Strategies to relate the program and problem domains using code instrumentation Mario Marcelo Berón University of Minho Pedro Rangel Henriques University.
Software Engineering Laboratory, Department of Computer Science, Graduate School of Information Science and Technology, Osaka University Industrial Application.
Seminar II: Parts/1 1 Seminar II Objectives – –briefly explain the parts of a proposal as required by the Faculty of Engineering , Semester.
IT Update Sally Waselik June 2005 IOC meeting. IT Vision - “We Deliver Quality Solutions For Our Customers” 2 Today l Level of Service Concepts l IT Enterprise.
OASIS WSQM TC Meeting Dugki Min. 컴퓨터공학부 건국대학교 Agenda 1. Roll Call 2. Review and approval of the agenda 3. Review and approval of the previous.
Department of Computer Science, Graduate School of Information Science & Technology, Osaka University A clone detection approach for a collection of similar.
Project Coordinators: Eduardo Santana de Almeida Silvio Romero de Lemos Meira Federal University of Pernambuco Informatics Center Recife Center for Advanced.
Change Impact Analysis for AspectJ Programs Sai Zhang, Zhongxian Gu, Yu Lin and Jianjun Zhao Shanghai Jiao Tong University.
PAUL ALEXANDRU CHIRITA STEFANIA COSTACHE SIEGFRIED HANDSCHUH WOLFGANG NEJDL 1* L3S RESEARCH CENTER 2* NATIONAL UNIVERSITY OF IRELAND PROCEEDINGS OF THE.
Department of Computer Science, Graduate School of Information Science & Technology, Osaka University A Method to Detect License Inconsistencies for Large-
“An Approach to Identify Duplicated Web Pages” G. Lucca, M. Penta, A. Fasolino Compsac’02 pp Today presented by Kenny Kwok.
1 3. Computing System Fundamentals 3.1 Language Translators.
Department of Computer Science, Graduate School of Information Science & Technology, Osaka University Detection and evolution analysis of code clones for.
Model-Driven Analysis Frameworks for Embedded Systems George Edwards USC Center for Systems and Software Engineering
Software Engineering Laboratory, Department of Computer Science, Graduate School of Information Science and Technology, Osaka University Applying Clone.
Department of Computer Science, Graduate School of Information Science & Technology, Osaka University Inoue Laboratory Eunjong Choi 1 Investigating Clone.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
1 Introduction to Software Engineering Lecture 1.
Investigating a Semantic Metrics Suite for Object-Oriented Design Dr. Letha Etzkorn (PI) Ms. Cara Stein Dr. Glenn Cox Dr. Sampson Gholston Dr. Dawn Utley.
1 The Modular Structure of Complex Systems Presented by: SeyedMasoud Sadjadi and Wei Zhu David L. Parnas, Paul C. Clement, and David M. Weiss ICSE 1984.
Presented by: Ashgan Fararooy Referenced Papers and Related Work on:
Duplicate code detection using anti-unification Peter Bulychev Moscow State University Marius Minea Institute eAustria, Timisoara.
Query Expansion By: Sean McGettrick. What is Query Expansion? Query Expansion is the term given when a search engine adding search terms to a user’s weighted.
An approach for Framework Construction and Instantiation Using Pattern Languages Rosana Teresinha Vaccare Braga Paulo Cesar Masiero ICMC-USP: Institute.
Chapter 5: Software Re-Engineering Omar Meqdadi SE 3860 Lecture 5 Department of Computer Science and Software Engineering University of Wisconsin-Platteville.
SE 2310 Seminar DESIGN PATTERN MINING ENHANCED BY MACHINE LEARNING Presented By BHAVIN MODI.
How Can I Use This Method? 2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING HOW.
 Software Clones:( Definitions from Wikipedia) ◦ Duplicate code: a sequence of source code that occurs more than once, either within a program or across.
Diagnosing Design Problems in Object Oriented Systems Adrian Trifu, Radu Marinescu Proceedings of the 12th IEEE Working Conference on Reverse Engineering.
What kind of and how clones are refactored? A case study of three OSS projects WRT2012 June 1, Eunjong Choi†, Norihiro Yoshida‡, Katsuro Inoue†
G042 - Lecture 09 Commencing Task A Mr C Johnston ICT Teacher
Recommending Adaptive Changes for Framework Evolution Barthélémy Dagenais and Martin P. Robillard ICSE08 Dec 4 th, 2008 Presented by EJ Park.
Yu, et al.’s “A Model-Driven Development Framework for Enterprise Web Services” In proceedings of the 10 th IEEE Intl Enterprise Distributed Object Computing.
HYBRID APPROACH TO INTERFACE ADAPTATION.  Computing power anywhere and everywhere  Need interfaces that can adapt to different device conditions and.
Software Engineering Laboratory, Department of Computer Science, Graduate School of Information Science and Technology, Osaka University 1 Aries: Refactoring.
From Use Cases to Implementation 1. Structural and Behavioral Aspects of Collaborations  Two aspects of Collaborations Structural – specifies the static.
Presented by Lu Xiao Drexel University Quantifying Architectural Debt.
George Edwards Computer Science Department Center for Systems and Software Engineering University of Southern California
From Use Cases to Implementation 1. Mapping Requirements Directly to Design and Code  For many, if not most, of our requirements it is relatively easy.
Estimating Code Size After a Complete Code-Clone Merge Buford Edwards III, Yuhao Wu, Makoto Matsushita, Katsuro Inoue 1 Graduate School of Information.
How Students “Measure Up”: Creation of an Assessment Tool for CS1
Authors: Khaled Abdelsalam Mohamed Amr Kamel
Model-Driven Analysis Frameworks for Embedded Systems
Reverse Engineering: A Roadmap
Ada – 1983 History’s largest design effort
: Clone Refactoring Davood Mazinanian Nikolaos Tsantalis Raphael Stein
Software Refactoring Group
Finding replicated web collections
Automated Printed Circuit Board Development
Automated Analysis and Code Generation for Domain-Specific Models
By Hyunsook Do, Sebastian Elbaum, Gregg Rothermel
Presentation transcript:

Supervisor:Mr. Sayed Morteza Zaker Presentor:Fateme hadinezhad

1) Introduction 2) Definition 3) Problems Statement 4) Results 5) Contribution 6) Concluson 7) Refrance 1

1) The rapid diffusion of the Internet and of the World Wide Web infrastructure is producing a considerable growth of the demand of new Web sites and Web Applications. 2) to obtain a further reduction of time-to-market, new pages are obtained by reusing the code of existing pages, just by copy-and- paste operations. 3) Duplicated Web pages,having the same structure and justdiffering for the data they include, can be considered as clones. 2

4) In this paper an approach to detect duplicated pages in WAs is Proposed. 5) The validity of the proposed approach has been assessed by means of experiments involving several WAs. 6) Section1:clone analysis Section2:WAs’ duplicated pages identification Section3:experiments carried Section4:conclusive remarks 3

WAs: a Web site may be thought of as a static site that may provide dynamic information too. A Web application provides the Web user.with a means to modify the site status Clones: Duplicated or similar portions of code in software artifacts Levenshtein:introduced the concept of near miss clone, which is a fragment of code that partially coincides with another one. [Bax98] clone analysis :clone analysis is the research area that investigates methods and techniques for automatically detecting them. 4

 The detection of duplicated WA pages based on the Levenshtein distance is in general very expensive from a computational point of view.  The computational complexity of the algorithm for computing the Levenshtein distance is in fact O (n2),where n is the length of the longer string. 5

6

<img src="../images/Nuovo.jpg" width="92" height="27"> (td, width, img, src, width, height, /td) u = hifgieb <img src ="../pic1.jpg" width="92" height="27"> (td, width, div, align, img, src, width, height, /div, /td) v = hidcfgieab 7

8 D(u, v)=3 ED=1.732

9

 Background and motivations: 1) Software clones and clone analysis 2) Web applications and Software clones Client pages: a) static page b. dynamic page 10

Web page: a. control component b. data component  Metrics to detect duplicated Web pages 1) Detecting duplicated Web pages by the Levenshtein distance 11

a) Detecting duplicated client pages 2) Detecting duplicated client pages using a frequency based metric 3) Detecting duplicated server pages  Case studies Clone detection within a WA 12

 In this paper an approach to clone analysis in the context of Web systems has been proposed.  Pages of a WA having the same control component were considered as clones, even if they differed for the data component. Two methods for detecting duplicated WA pages - one exploiting the Levenshtein distance and the other one based on the frequency of the HTML tags in a page - have been defined and experimented with. 13

 The proposed approach has been successfully applied to identify a case of plagiarism too.  Further experimentation should be carried out to better validate the proposed methods. 14

[Bak93] Baker S. B., A theory of parametrized pattern matching: algorithms and applications, in Proceedings of the 25th Annual ACM Symposium on Theory of Computing, 71-80, May [Bak95] Baker B. S., On finding duplication and near duplication in large software systems, in Proc. of the 2nd Working Conference on Reverse Engineering, IEEE Computer Society Press, [Bak95b] Baker S. B., Parametrized pattern matching via Boyer-Moore algorithms, in Proceedings of Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, , Jan

[Bal00] Balazinska M., Merlo E., Dagenais M., Lagüe B., Kontogiannis K., Advanced clone-analysis to support object-oriented system refactoring, in Seventh Working Conference on Reverse Engineering, , Nov [Bal99] Balazinska M., Merlo E., Dagenais M., Lagüe B., Kontogiannis K., Measuring clone based reengineering opportunities, in International Symposium on software metrics. METRICS’99. IEEE Computer Society Press, Nov

[Bax98] Baxter I. D., Yahin A., Moura L., Sant’Anna M., Bier L., Clone Detection Using Abstract Syntax Trees, in Proceedings of the International Conference on Software Maintenance, , IEEE Computer Society Press, [Ber84] Berghel H.L., Sallach D.L., Measurements of program similarity in identical task environments, SIGPLAN Notices, 9(8):65-76, Aug [Frak92] W.B. Frakes, R. Baeza-Yates - Information Retrieval: Data Structures and Algorithms. Prentice-Hall, Englewood Cliffs, NJ,

[Gri81] Grier S., A tool that detects plagiarism in PASCAL programs, in SIGSCE Bulletin, 13(1), [Hor90] Horwitz Susan, Identifying the semantics and textual differences between two versions of a program, in Proceedings of ACM SIGPLAN Conference on Programming Language Design and Implementation, , June [Jan88] Jankowitz H.T., Detecting plagiarism in student PASCAL programs, in Computer Journal, 31(1):1-8, [ 18

[ Kon96] Kontogiannis K., De Mori R., Merlo E., Galler M., Bernstein M., Pattern Matching for clone and concept detection, in Journal of Automated Software Engineering, 3:77-108, Mar [Kon95] Kontogiannis K., De Mori R., Bernstein M., Merlo E., Pattern Matching for Design Concept Localization, in Proc. of the 2nd Working Conference on Reverse Engineering, IEEE Computer Society Press,