distributed storage systems store data on the "unreliable" network peers that can leave the system at any moment and their network bandwidth is limited. In this case, the only way to assure reliability of th...
详细信息
ISBN:
(纸本)9783642283079;9783642283086
distributed storage systems store data on the "unreliable" network peers that can leave the system at any moment and their network bandwidth is limited. In this case, the only way to assure reliability of the data is to add redundancy using either replication or erasure codes. As a generalization of replication, erasure codes require less storage space with the same reliability as replication. Recently, a near-optimal erasure code named Hierarchical Codes, has been proposed that can significantly reduce the repair traffic by reducing the number of nodes participating in repair, which is referred to as repair degree d. To overcome the complexity of reintegration and efficiently control the reliability of Hierarchical Codes, we refine two concepts called location and relocation, then we propose an integrated maintenance scheme, which allow us to tune the code construction.
With the development of the Internet and the construction of open source software communities, there has been a surge in open source software. Code Reuse-copy-past and modify open source code, which becomes a convenie...
详细信息
With the development of the Internet and the construction of open source software communities, there has been a surge in open source software. Code Reuse-copy-past and modify open source code, which becomes a convenie...
详细信息
ISBN:
(数字)9781728169729
ISBN:
(纸本)9781728169736
With the development of the Internet and the construction of open source software communities, there has been a surge in open source software. Code Reuse-copy-past and modify open source code, which becomes a convenient choice for developers to save time and reduce labor costs. So there are more and more similar code fragments, code clones, in code project as a popular phenomenon. The code clone may import uncertainties into the program, which is a hot spot for urgent exploration. This paper summarized code clone detection tools and techniques in four categories at present and introduced one detection tool, NiCad, with high recall and precision. However, NiCad is not perfect for large-scale code clone detection scenarios, because NiCad is slow when dealing with large-scale of codes. Therefore, we speeded the detection process of NiCad, and and named the improved tool NiCad+. We greatly improved the efficiency of NiCad without effecting its recall and precision. The time-cost of detecting code clone was remarkable shortened by reducing the matching times. When testing with BigCloneEval, it only takes 28.43% time-cost as original NiCad. When testing with varying input sizes, the speeded detection process performs better than the original one from 10 KLoC (lines of code) to 5 MLoC.
暂无评论