TY - JOUR
T1 - Behavioral analysis for detecting code clones
AU - Priyambadha, Bayu
AU - Rochimah, Siti
N1 - Publisher Copyright:
© 2018 Universitas Ahmad Dahlan.
PY - 2018/6
Y1 - 2018/6
N2 - The activities of copy and paste fragments of code from a source code into the other source code is often done by software developers because it's easier than generate code manually. This behavior leads to the increase of effort to maintain the code. One of the detection methods of semantic cloning is based on the behavior of the code. The code behavior detected by observing at an input, output and the effects of the method. Methods with the same value of input, output, and effect will indicate that semantically the same. However, the detection method based on the input, output, and effect could not be used in a void method or method without parameters, another side comprehensively detection is required. The challenge is how to detect which variable in a method that acts as input, output, and effect. Detection of the variable input, output, and effects in a void method done using Program Dependence Graph. The use of clone detection methods semantically based on behavior can increase the agreement value.
AB - The activities of copy and paste fragments of code from a source code into the other source code is often done by software developers because it's easier than generate code manually. This behavior leads to the increase of effort to maintain the code. One of the detection methods of semantic cloning is based on the behavior of the code. The code behavior detected by observing at an input, output and the effects of the method. Methods with the same value of input, output, and effect will indicate that semantically the same. However, the detection method based on the input, output, and effect could not be used in a void method or method without parameters, another side comprehensively detection is required. The challenge is how to detect which variable in a method that acts as input, output, and effect. Detection of the variable input, output, and effects in a void method done using Program Dependence Graph. The use of clone detection methods semantically based on behavior can increase the agreement value.
KW - Behavioral cloning
KW - Clone detection
KW - Semantic clone
KW - Software maintenance
UR - http://www.scopus.com/inward/record.url?scp=85048781634&partnerID=8YFLogxK
U2 - 10.12928/TELKOMNIKA.v16i3.4442
DO - 10.12928/TELKOMNIKA.v16i3.4442
M3 - Article
AN - SCOPUS:85048781634
SN - 1693-6930
VL - 16
SP - 1264
EP - 1275
JO - Telkomnika (Telecommunication Computing Electronics and Control)
JF - Telkomnika (Telecommunication Computing Electronics and Control)
IS - 3
ER -