Semantic Clone Detection for Model-Based Development of Embedded Systems
With model-based development becoming an increasingly common development methodology in embedded systems engineering, models have become an important asset of the the software development process. Therefore, techniques for the automatic detection of clones in those models have been developed to improve their maintainability. As these approaches currently only consider syntactic clones, the detection of clones is limited to syntactically equivalent copies. Using the concept of normal forms, these approaches can be extended to also cover semantic clones with identical behavior but different structure. The submission presents a generalized concept of clones for Simulink models, describes a pattern-based normal-form approach, and discusses results of the application of an implementation of this approach.
KeywordsNormal Form Transformation Rule Graph Transformation Model Fragment Clone Detection
Unable to display preview. Download preview PDF.
- 1.Al-Batran, B.: Model-Based Clone Detection Using Normal Forms. Master’s thesis, Technische Universität München (2011)Google Scholar
- 3.Deissenboeck, F., Hummel, B., Jürgens, E., Schätz, B., Wagner, S., Girard, J.F., Teuchert, S.: Clone Detection in Automotive Model-Based Development. In: International Conference on Software Engineering (2008)Google Scholar
- 5.Gabel, M., Jiang, L., Su, Z.: Scalable detection of semantic clones. In: International Conference on Software Engineering, pp. 321–330 (2008)Google Scholar
- 6.Gerth, C., Luckey, M., Kuster, J.M., Engels, G.: Detection of Semantically Equivalent Fragments for Business Process Model Change Management. In: International Conference on Services Computing, pp. 57–64. IEEE Computer Society, Los Alamitos (2010)Google Scholar
- 7.dSpace GmbH: TargetLink Production Code Generation, http://www.dspace.de
- 8.Krinke, J.: Identifying similar code with program dependence graphs. In: WCRE 2001 (2001)Google Scholar
- 9.Pham, N.H., Nguyen, H.A., Nguyen, T.T., Al-Kofahi, J.M., Nguyen, T.N.: Complete and accurate clone detection in graph-based models. In: International Conference on Software Engineering, pp. 276–286. IEEE Computer Society, Los Alamitos (2009)Google Scholar
- 10.Plump, D.: Termination of graph rewriting is undecidable. Fundam. Inf. 33, 201–209 (1998), http://portal.acm.org/citation.cfm?id=294994.294998 zbMATHMathSciNetGoogle Scholar
- 12.Roy, C.K., Cordy, J.R.: A survey on software clone detection research. Tech. rep., Queen’s University, Canada (2007)Google Scholar