A Taxonomy of High Level Software Clones
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2012, Vol 3, Issue 9
Abstract
The idea of software clones is linked with similarity, which can occur at various levels of abstraction. Simple clones i.e. clones at lower levels of abstraction are classified in literature, however; high level clones are not. We propose and exemplify a consolidated yet novel taxonomy of high level clones. Our discussion augments thus far knowledge of high level clone types and their specialized detection techniques. Clone taxonomies can help in further analysis of high level clone phenomenon like in prioritizing clones for reengineering and for specifying reengineering guidelines.
Authors and Affiliations
Niyati Baliyan , Dr. Vidushi Sharma
Optimum Design of Composite Plates under Thermal Buckling Loads using Imperialist Competitive Algorithm
Thermal buckling loads of laminated composite plates are maximized for a given total thickness. Fiber directions and relative thickness of layers are considered as design variables. Analysis of buckling temperature is ca...
Prediction of Road Accidents in Delhi using Back Propagation Neural Network Model
Road accidents cause more than 1,35,000 deaths in India every year which is higher than any other country in the world. Increasing motorization without adequate institutional mechanism is a major cause of this problem. A...
DETERMINING OPTIMIZED LEARNING PATH FOR AN ELEARNING SYSTEM USING ANT COLONY OPTIMIZATION ALGORITHM
This paper analyzes the optimized learning path based on the behavior of student’s pattern by applying ant colony optimization algorithm in e-learning application. The behavior of pattern is analyzed based on the behavio...
Energy Efficient Techniques In Virtualized Data Center: A Survey
Energy efficiency simply means that how efficiently energy can be used or consumed by any virtualized datacenters providing cloud services. Main aim of energy efficiency is to reduce the amount of energy consumed or requ...
SPOOFING ATTACK DETECTION AND LOCALIZATION IN WIRELESS SENSOR NETWORK: A REVIEW
Spoofing attack is an identity based attack through which a malicious user can spoof the MAC address of a node to create multiple illegitimate identities that highly affect the performance of wireless sensor network. The...