Reference Hub2
Non-Trivial Software Clone Detection Using Program Dependency Graph

Non-Trivial Software Clone Detection Using Program Dependency Graph

Pratiksha Gautam, Hemraj Saini
Copyright: © 2017 |Volume: 8 |Issue: 2 |Pages: 24
ISSN: 1942-3926|EISSN: 1942-3934|EISBN13: 9781522512684|DOI: 10.4018/IJOSSP.2017040101
Cite Article Cite Article

MLA

Gautam, Pratiksha, and Hemraj Saini. "Non-Trivial Software Clone Detection Using Program Dependency Graph." IJOSSP vol.8, no.2 2017: pp.1-24. http://doi.org/10.4018/IJOSSP.2017040101

APA

Gautam, P. & Saini, H. (2017). Non-Trivial Software Clone Detection Using Program Dependency Graph. International Journal of Open Source Software and Processes (IJOSSP), 8(2), 1-24. http://doi.org/10.4018/IJOSSP.2017040101

Chicago

Gautam, Pratiksha, and Hemraj Saini. "Non-Trivial Software Clone Detection Using Program Dependency Graph," International Journal of Open Source Software and Processes (IJOSSP) 8, no.2: 1-24. http://doi.org/10.4018/IJOSSP.2017040101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Code clones are copied fragments that occur at different levels of abstraction and may have different origins in a software system. This article presents an approach which shows the significant parts of source code. Further, by using significant parts of a source code, a control flow graph can be generated. This control flow graph represents the statements of a code/program in the form of basic blocks or nodes and the edges represent the control flow between those basic blocks. A hybrid approach, named the Program Dependence Graph (PDG) is also presented in this article for the detection of non-trivial code clones. The program dependency graph approach consists of two approaches as a control dependency graph and a data dependency graph. The control dependency graph is generated by using a control flow graph. This article proposes an approach which can easily generate control flow graphs and by using control flow graph and reduced flowgraph approach, the trivial software clone, a similar textual structure, can be detected.The proposed approach is based on a tokenization concept.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.