Keynote Speaker / 特邀报告人
Prof. Yulin Wang, Wuhan University, China
王玉林 教授 武汉大学
Bio: Prof. Yulin Wang is a full professor and PhD supervisor in International School of Software, Wuhan University, China. He got PhD degree in 2005 in Queen Mary, University of London, UK. Before that, he has worked in high-tech industry for more than ten years. He has involved many key projects, and hold 8 patents. He got his master and bachelor degree in 1990 and 1987 respectively from Xi-Dian University, and Huazhong University of Science and Technology（HUST）, both in China. His research interests include digital rights management, digital watermarking, multimedia and network security, and signal processing. In recently 10 years, Prof. Wang has published as first author 3 books, 40 conference papers and 45 journal papers, including in IEEE Transactions and IEE proceedings and Elsevier Journals. Prof. Wang served as editor-in-chief for International Journal of Advances in Multimedia in 2010. He served as reviewer for many journals, including IEEE Transactions on Image Processing, IEEE Signal Processing Letters, Elsevier Journal of Information Sciences. He served as reviewer for many research funds, including National High Technology Research and Development Program of China ( ‘863’ project). Prof. Wang was the external PhD adviser of Dublin City University, Ireland during 2008-2010. He was the keynote speakers in many international conferences. He bas been listed in Marcus ‘who’s who in the world’ since 2008.
Title: Detection of Software Source Code Clone
Abstract: Code clones are separate fragments of code that are very similar. They are a common phenomenon in an application that has been under development for some time. Although modern programming languages offer various abstraction mechanisms to facilitate reuse of code fragments, copy-paste is still a widely used reuse strategy. This often leads to numerous duplicated code fragments -so called clones- in large software systems. However, cloning is problematic for software maintenance for several reasons. First of all, cloning unnecessarily increases program size. Since many maintenance efforts correlate with program size, this increases the maintenance effort. Secondly, changes to one clone, such as bug fixing, typically need to be made to the other clones as well, again increasing maintenance effort. Finally, if changes to duplicated source code fragments are performed inconsistently, this can introduce bugs.In this talk, we begin with background concepts, a generic clone detection process and an overall taxonomy of current techniques and tools. We then classify, compare and evaluate the techniques and tools in two different dimensions. First, we classify and compare approaches based on a number of facets, each of which has a set of (possibly overlapping) attributes. Second, we qualitatively evaluate the classified techniques and tools with respect to a taxonomy of editing scenarios.