2013 20th Working Conference on Reverse Engineering (WCRE) 2013
DOI: 10.1109/wcre.2013.6671325
|View full text |Cite
|
Sign up to set email alerts
|

An approach to clone detection in behavioural models

Abstract: Abstract-In this paper we present an approach for identifying near-miss interaction clones in reverse-engineered UML behavioural models. Our goal is to identify patterns of interaction ("conversations") that can be used to characterize and abstract the run-time behaviour of web applications and other interactive systems. In order to leverage robust near-miss code clone technology, our approach is text-based, working on the level of XMI, the standard interchange serialization for UML. Behavioural model clone de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
2

Relationship

4
3

Authors

Journals

citations
Cited by 14 publications
(18 citation statements)
references
References 10 publications
0
18
0
Order By: Relevance
“…MCD can applied to various kinds of models and domains, with the most mature MCD target being Simulink data-flow models [10], [13], [14]. However, recently, there has been advancements in MCD for other model types including various types of UML models [15], [16], Stateflow models [17], [18], and others. Similarly to model comparison approaches, MCD can be realized using a variety of graph-based and text-based approaches, each with their own unique advantages and disadvantages [11].…”
Section: Background and Related Work A Model Comparison And Modementioning
confidence: 99%
See 2 more Smart Citations
“…MCD can applied to various kinds of models and domains, with the most mature MCD target being Simulink data-flow models [10], [13], [14]. However, recently, there has been advancements in MCD for other model types including various types of UML models [15], [16], Stateflow models [17], [18], and others. Similarly to model comparison approaches, MCD can be realized using a variety of graph-based and text-based approaches, each with their own unique advantages and disadvantages [11].…”
Section: Background and Related Work A Model Comparison And Modementioning
confidence: 99%
“…On the other hand, newer model clone detection approaches that are able to detect Type 2 (renamed) and Type 3 (nearmiss) clones [13], [15], [17], [14] are ideally suited for this task. For simpler, more purely structure-based patterns, the detected instances will be examples of Type 2 clones of the pattern, in that the structure of both the pattern model and the models being analyzed will be identical, but the element names or types will be different.…”
Section: B Detecting Instances Using MCDmentioning
confidence: 99%
See 1 more Smart Citation
“…More recently, however, model clone detection approaches have been emerging for other types of models such as Stateflow models [17], [18], UML models [19], [20], and others. Some model clone detectors employ a graph-based analysis approach, while others use a text-based approach, each having their own unique benefits and shortcomings [13].…”
Section: B Model Clone Detectionmentioning
confidence: 99%
“…Model clone detectors capable of detecting Type 3 (nearmiss) and Type 2 (renamed) model clones [15]- [17], [19] are suitable candidates. Detection of Type 2 model clones will allow engineers to detect simple structure-based model patterns that have identical structure to, but different element names than, the systems being evaluated.…”
Section: ) Representation Of Model Patternsmentioning
confidence: 99%