Now showing items 1-6 of 6
Business Process Recovery Using UI Design Patterns and Clone Detection in Business Processes
A business application automates a collection of business processes. A business process describes how a set of logically related tasks are executed, ordered and managed by following business rules to achieve business ...
Towards Web Service Tagging By Similarity Detection
The web of the future will require automated tagging of equivalent or similar services in support of service discovery and the selection of appropriate alternatives in case of failure. Code similarity detection tools, or ...
An Approach to Clone Detection in Behavioral Models
In this thesis, we present an approach for identifying near-miss interaction clones in reverse-engineered UML behavioural models. Our goal is to identify patterns of interaction ("conversations") that can be used to ...
NeCO: Ontology Alignment using Near-miss Clone Detection
The Semantic Web is an endeavour to enhance the web with the ability to represent knowledge. The knowledge is expressed through what are called ontologies. In order to make ontologies useful, it is important to be able to ...
Leveraging Historical Code Changes to Support Clone Management Activities
Code clones are code snippets that come into existence when developers copy paste (and possibly modify) an existing piece of code. Studies show that cloning is an inevitable phenomenon leading to a significant presence of ...
An Empirical Study for the Impact of Maintenance Activities in Clone Evolution
Code clones are duplicated code fragments that are copied to re-use functionality and speed up development. However, due to the duplicate nature of code clones, inconsistent updates can lead to bugs in the software system. ...