2017
DOI: 10.1007/s10270-017-0625-6
|View full text |Cite
|
Sign up to set email alerts
|

Model clone detection for rule-based model transformation languages

Abstract:  Users may download and print one copy of any publication from the public portal for the purpose of private study or research.  You may not further distribute the material or use it for any profit-making activity or commercial gain  You may freely distribute the URL identifying the publication in the public portal If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(10 citation statements)
references
References 60 publications
0
10
0
Order By: Relevance
“…However, they are generally designed with a different purpose: finding similar intra-model (and to a lesser extent inter-model) fragments generated by a legitimate copy and paste reuse. Approaches for model clone detection have been proposed on UML models (Störrle, 2015), graphs (Pham, Nguyen, Nguyen, Al-Kofahi, & Nguyen, 2009), Simulink models (Deissenboeck, Hummel, Juergens, Pfaehler, & Schaetz, 2010) or rule-based model transformations (Strüber, Acret ¸oaie, & Plöger, 2017) while other proposals target general model comparison (Brun & Pierantonio, 2008), model alignment (Falleri, Huchard, Lafourcade, & Nebut, 2008;Kolovos, 2009) or model versioning (Constant, 2012). In theory, all these works could be systematically executed on all combinations of models in a repository to find suspicious pairs of models but in practice this is not really feasible.…”
Section: Related Workmentioning
confidence: 99%
“…However, they are generally designed with a different purpose: finding similar intra-model (and to a lesser extent inter-model) fragments generated by a legitimate copy and paste reuse. Approaches for model clone detection have been proposed on UML models (Störrle, 2015), graphs (Pham, Nguyen, Nguyen, Al-Kofahi, & Nguyen, 2009), Simulink models (Deissenboeck, Hummel, Juergens, Pfaehler, & Schaetz, 2010) or rule-based model transformations (Strüber, Acret ¸oaie, & Plöger, 2017) while other proposals target general model comparison (Brun & Pierantonio, 2008), model alignment (Falleri, Huchard, Lafourcade, & Nebut, 2008;Kolovos, 2009) or model versioning (Constant, 2012). In theory, all these works could be systematically executed on all combinations of models in a repository to find suspicious pairs of models but in practice this is not really feasible.…”
Section: Related Workmentioning
confidence: 99%
“…Syntactic techniques are either metric-based or tree-based. Tree-based (e.g., [2]) and graph-based techniques (e.g., [22]) parse the code into abstract syntax trees and find cloned code parts using tree-matching algorithms. Metric-based ones (e.g.…”
Section: Related Workmentioning
confidence: 99%
“…UML models are also a growing target for MCD [15], [17]. More recently, researchers are working on approaches for MCD in EMF metamodels [18], and model transformation languages [19]. The information provided by model clone analysis includes pattern clustering [11], [20], anti pattern detection [21], security and quality analysis [22], [23], and more.…”
Section: Background -Model Clone Detectionmentioning
confidence: 99%