Results 231 to 240 of about 7,941 (270)
Some of the next articles are maybe not open access.

Program Slice Based Vulnerable Code Clone Detection

2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2020
Vulnerabilities in software will not only lead to security problems of the software itself, but also cause the spread of vulnerabilities through code clones. It is important to detect and locate vulnerabilities among the source code to facilitate the fix.
Liu Shirun   +6 more
openaire   +2 more sources

Unifying clones with a generative programming technique: a case study

Journal of Software Maintenance and Evolution: Research and Practice, 2006
AbstractSoftware clones—similar program structures repeated in variant forms—increase the risk of update anomalies, blow up the program size and complexity, possibly contributing to high maintenance costs. Yet, programs are often polluted by clones. In this paper, we present a case study of cloning in the Java Buffer library, JDK 1.5.
Jarzabek, S., Li, S.
openaire   +1 more source

Semantic Code Clones in Logic Programs

2013
In this paper, we study what is a semantic code clone pair in a logic program. Unlike our earlier work, that focused on simple syntactic equivalence for defining clones, we propose a more general approximation based on operational semantics and transformation rules.
Celine Dandois, Wim Vanhoof
openaire   +2 more sources

Frankencode: Creating Diverse Programs Using Code Clones

2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER), 2016
In this paper, we present an approach to detectingnovel cyber attacks though a form of program diversification, similar to the use of n-version programming forfault tolerant systems. Building on extensive previousand ongoing work by others on the use of code clonesin a wide variety of areas, our Functionally EquivalentVariants using Information ...
Mary Southern   +7 more
openaire   +2 more sources

Clones in Logic Programs and How to Detect Them

2012
In this paper, we propose a theoretical framework that allows us to capture, by program analysis, the notion of code clone in the context of logic programming. Informally, two code fragments are considered as cloned if they implement the same functionality.
Wim Vanhoof, Celine Dandois
openaire   +3 more sources

Clone detection through srcClone: A program slicing based approach

Journal of Systems and Software, 2022
Abstract Software clone detection is an often used approach to understand and maintain software systems. One category of clones that is challenging to detect but very useful is semantic clones, which are similar in semantics but differ in syntax significantly. Semantic clone detectors have trouble scaling to larger systems and sometimes struggle with
Matthew Stephan, Hakam W. Alomari
openaire   +2 more sources

Rearranging the order of program statements for code clone detection

2017 IEEE 11th International Workshop on Software Clones (IWSC), 2017
A code clone is a code fragment identical or similar to another code fragment in source code. Some of code clones are considered as a factor of bug replications and make it more difficult to maintain software. Various code clone detection tools have been proposed so far.
Shinji Kusumoto   +2 more
openaire   +2 more sources

Learning navigation Teleo-Reactive Programs using behavioural cloning [PDF]

open access: possible2009 IEEE International Conference on Mechatronics, 2009
Programming a robot to perform tasks in dynamic environments is a complex process. Teleo-Reactive Programs (TRPs) have proved to be an effective framework to continuously perform a set of actions to achieve particular goals and react in the presence of unexpected events, however, their definition is a difficult and time-consuming process. In this paper,
Blanca A. Vargas, Eduardo F. Morales
openaire   +1 more source

Clone selection programming and its application to symbolic regression

Expert Systems with Applications, 2009
A new idea 'clone selection programming (CSP)' is introduced in this paper. The proposed methodology is used for deriving new algorithms in the area of evolutionary computing aimed at solving a wide range of problems. In CSP, antibodies represent candidate solutions, which are encoded according to the structure of antibody.
W. N. Chau   +2 more
openaire   +2 more sources

Mapping Similarity Detectors of Code Clone to Academic Integrity in Programming

2021 IEEE World Conference on Engineering Education (EDUNINE), 2021
When dealing with academic integrity in programming, code similarity detectors are often used to raise suspicion of student programs with undue similarity. However, it appears that only detectors designed for that purpose are discussed in computing education publications, although similarity detectors for other purposes might also be beneficial, both ...
Simon   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy