Implementation of Enhanced CloSpan Algorithm for CP-Miner
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 8
Abstract
Copy-pasted code is very common in large software and product line software because programmers prefer reusing code via copy-paste in order to reduce programming effort. Copy pasted code is prone to introducing errors. Unfortunately, it is challenging to efficiently identify copy-pasted code in large software. Existing copy-paste detection tools are either not scalable to large software, or cannot handle small modifications in copy-pasted code. In this paper we propose an enhanced CloSpan algorithm for CPMiner tool that uses data mining techniques to efficiently identify copy-pasted code in large software including operating systems. Specifically, it takes less than 20 minutes for CP-Miner with enhanced CloSpan Algorithm to identify 190,000 copy pasted segments in Linux and 150,000 in FreeBSD
Authors and Affiliations
Amita Kiran , Soujanya K. L. S. , Raju . G received
Improving Memory Access time by Building an AMBA AHB compliant Memory Controller
Memory access time has been a bottleneck in many microprocessor applications which limits the system performance. Memory controller (MC) is designed and built to attacking this problem. The memory controller is the...
A Framework renders Data integrity issue and Bandwidth allocation over in Cloud
Cloud Computing is a technology where users can remotely store their data into the cloud environment so as to have the on-demand applications and services from the common pool of computing resources. By this, users...
Model Based Test Case Generation From Natural Language Requirements And Inconsistency, Incompleteness Detection in Natural Language Using Model-Checking Approach
Natural language (NL) is any language that arises in an unpremeditated fashion as the result of the innate facility for language possessed by the human intellect. A natural language is typically used for communication, a...
Techniques for Reducing Power in Multipliers
In this work, a new topology was proposed to optimize the power dissipation of Multipliers. Low power digital Multiplier Design based on bypassing technique mainly used to reduce the switching power dissipation....
Using Genetic Algorithm for Symmetric key Generation in Image Encryption
Cryptography is essential for protecting information as the importance of security is increasing day by day with the advent of online transaction processing and e commerce. In now a day the security of digital imag...