Comprehensive Similarity Measurement Model Based on Three Algorithms

Article Preview

Abstract:

Software source code homologous detection is also called software copy or software clone. It is used to detect the homologous in the source code, by which we can easily find the plagiarism in the code. In this paper, it will discuss the homology detection results based on Text, Token and Abstract Syntax Tree. And will compare the three techniques and raise a model to calculate similarity by synthesizing the results. This model is based on the analysis of a large number of experimental results. Comprehensive similarity calculation model can calculate the respective contribution of the three algorithms and realize integrated computation of similarity according to this respective contribution. Finally, we can get a comprehensive similarity by this integrated similarity calculation model to make the homology detection results more accurate and closer to the actual similarity.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 989-994)

Pages:

1680-1685

Citation:

Online since:

July 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Brenda S. Baker. A Program for Identifying Duplicated Code. In Proceedings of Computing Science and Statistics: 24th Symposium on the Interface, Vol. 24: 49-57, March (1992).

Google Scholar

[2] J Howard Johnson. Identifying Redundancy in Source Code Using Fingerprints. In Proceeding of the 1993 Conference of the Centre for Advanced Studies Conference (CASCON'93), pp.171-183, Toronto, Canada, October (1993).

Google Scholar

[3] S. Ducasse, M. Rieger and S. Demeyer, A Language Independent Approach for Detecting Duplicated Code, in: Proceedings of the 15th International Conference on Software Maintenance, ICSM 1999, pp.109-118.

DOI: 10.1109/icsm.1999.792593

Google Scholar

[4] Li, Z., Lu, S., Myagmar, S., and Zhou, Y. (2004). CP-Miner: A tool for finding copy-paste and related bugs in operating system code. In OSDI, 289–302.

DOI: 10.1109/tse.2006.28

Google Scholar

[5] Toshihiro Kamiya, Shinji Kusumoto, and Katsuro Inoue. (2002, July). CCFinder: A multilinguistic token-based code clone detection system for large scale source code. IEEE Transactions on Software Engineering, 28(7): 654–670.

DOI: 10.1109/tse.2002.1019480

Google Scholar

[6] I. Baxter, A. Yahin, L. Moura and M. Anna. Clone Detection Using Abstract Syntax Trees. In ICSM, pp.368-377, (1998).

Google Scholar

[7] S. Bellon, R. Koschke, G. Antoniol, J. Krinke and E. Merlo. Comparison and Evaluation of Clone Detection Tools. IEEE TSE, 33(9): 577-591, (2007).

DOI: 10.1109/tse.2007.70725

Google Scholar

[8] Liu Leping, Zhao Wen. Application of Hierarchical analysis method in identity method choose.

Google Scholar

[9] Xu Shubo. the. Use the principle of decision-making method, analytic hierarchy process (ahp). Tianjin university press, 1988, 5-13.

Google Scholar

[10] Meng Hu Chenggong. The information security risk assessment model based on AHP method applied research. The tropical agricultural engineering, 2009, 33 (1), 37.

Google Scholar

[11] Bian Ce, based on the analytic hierarchy process (ahp) source code of the original testing technology research, Beijing university of posts and telecommunications master thesis, (2011).

Google Scholar