{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T20:20:41Z","timestamp":1709410841084},"reference-count":23,"publisher":"Elsevier BV","issue":"9-10","license":[{"start":{"date-parts":[[2007,9,1]],"date-time":"2007-09-01T00:00:00Z","timestamp":1188604800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information and Software Technology"],"published-print":{"date-parts":[[2007,9]]},"DOI":"10.1016\/j.infsof.2006.10.005","type":"journal-article","created":{"date-parts":[[2006,11,28]],"date-time":"2006-11-28T15:32:22Z","timestamp":1164727942000},"page":"985-998","source":"Crossref","is-referenced-by-count":27,"title":["Method and implementation for investigating code clones in a software system"],"prefix":"10.1016","volume":"49","author":[{"given":"Yoshiki","family":"Higo","sequence":"first","affiliation":[]},{"given":"Toshihiro","family":"Kamiya","sequence":"additional","affiliation":[]},{"given":"Shinji","family":"Kusumoto","sequence":"additional","affiliation":[]},{"given":"Katsuro","family":"Inoue","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.infsof.2006.10.005_bib1","unstructured":"Ant. http:\/\/ant.apache.org\/."},{"key":"10.1016\/j.infsof.2006.10.005_bib2","unstructured":"B.S. Baker, A program for identifying duplicated code, in: Proceedings of the 24th Symposium of Computing Science and Statistics, March 1992, pp. 49\u201357."},{"key":"10.1016\/j.infsof.2006.10.005_bib3","unstructured":"B.S. Baker, On finding duplication and near-duplication in large software systems. in: Proceedings of the 2nd Working Conference on Reverse Engineering, July 1995, pp. 86\u201395."},{"key":"10.1016\/j.infsof.2006.10.005_bib4","unstructured":"M. Balazinska, E. Merlo, M. Dagenais, B. Lag\u00fce, K. Kontogiannis, Advanced clone-analysis to support object-oriented system refactoring, in: Proceedings of the 7th IEEE International Working Conference on Reverse Engineering, November 2000, pp. 98\u2013107."},{"key":"10.1016\/j.infsof.2006.10.005_bib5","doi-asserted-by":"crossref","unstructured":"H.A. Basit, S. Jarzabek, Detecting higher-level similarity patterns in programs, in: Proceedings of the ACM SIGSOFT Symposium on the Foundations of Software Engineering, September 2005, pp. 156\u2013165.","DOI":"10.1145\/1095430.1081733"},{"key":"10.1016\/j.infsof.2006.10.005_bib6","unstructured":"I. Baxter, A. Yahin, L. Moura, M. Anna, L. Bier, Clone detection using abstract syntax trees, in: Proceedings of the International Conference on Software Maintenance 98, March 1998, pp. 368\u2013377."},{"key":"10.1016\/j.infsof.2006.10.005_bib7","unstructured":"ClearCase. http:\/\/www-306.ibm.com\/software\/awdtools\/clearcase\/."},{"key":"10.1016\/j.infsof.2006.10.005_bib8","doi-asserted-by":"crossref","unstructured":"S. Ducasse, M. Rieger, S. Demeyer, A language independent approach for detecting duplicated code, in: Proceedings of the International Conference on Software Maintenance 99, August 1999, pp. 109\u2013118.","DOI":"10.1109\/ICSM.1999.792593"},{"key":"10.1016\/j.infsof.2006.10.005_bib9","series-title":"Refactoring: Improving the Design of Existing Code","author":"Fowlor","year":"1999"},{"key":"10.1016\/j.infsof.2006.10.005_bib10","unstructured":"J.H. Johnson, Navigating the textual redundancy web in legacy source, in: Proceedings of the 1996 Conference of Centre for Advanced Studies on Collaborative Research, November 1996, pp. 7\u201316."},{"issue":"7","key":"10.1016\/j.infsof.2006.10.005_bib11","doi-asserted-by":"crossref","first-page":"654","DOI":"10.1109\/TSE.2002.1019480","article-title":"Ccfinder: A multi-linguistic token-based code clone detection system for large scale source code","volume":"28","author":"Kamiya","year":"2002","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/j.infsof.2006.10.005_bib12","doi-asserted-by":"crossref","unstructured":"C. Kapser, M. Godfrey, Improved tool support for the investigation of duplication in software, in: Proceedings of the 21st International Conference on Software Maintenance, September 2005, pp. 305\u2013314.","DOI":"10.1109\/ICSM.2005.52"},{"key":"10.1016\/j.infsof.2006.10.005_bib13","doi-asserted-by":"crossref","unstructured":"R. Komondoor, S. Horwitz, Using slicing to identify duplication in source code, in: Proceedings of the 8th International Symposium on Static Analysis, July 2001, pp. 40\u201356.","DOI":"10.1007\/3-540-47764-0_3"},{"key":"10.1016\/j.infsof.2006.10.005_bib14","doi-asserted-by":"crossref","unstructured":"J. Mayrand, C. Leblanc, E. Merlo, Experiment on the automatic detection of function clones in a software system using metrics, in: Proceedings of the International Conference on Software Maintenance 96, November 1996, pp. 244\u2013253.","DOI":"10.1109\/ICSM.1996.565012"},{"key":"10.1016\/j.infsof.2006.10.005_bib15","unstructured":"M. Rieger, S. Ducasse, M. Lanza, Insights into system-wide code duplication, in: Proceedings of the 11th Working Conference on Reverse Engineering, November 2004, pp. 100\u2013109."},{"key":"10.1016\/j.infsof.2006.10.005_bib16","unstructured":"SourceOffSize. http:\/\/www.sourcegear.com\/sos\/."},{"key":"10.1016\/j.infsof.2006.10.005_bib17","unstructured":"Y. Ueda, T. Kamiya, S. Kusumoto, K. Inoue, Gemini: maintenance support environment based on code clone analysis, in: Proceedings of the 8th International Symposium on Software Matrics, June 2002, pp. 67\u201376."},{"key":"10.1016\/j.infsof.2006.10.005_bib18","unstructured":"Y. Ueda, T. Kamiya, S. Kusumoto, K. Inoue, On detection of gapped code clones using gap locations, in: Proceedings of the 9th Asia-Pacific Software Engineering Conference, December 2002, pp. 327\u2013336."},{"key":"10.1016\/j.infsof.2006.10.005_bib19","unstructured":"VisualSourceSafe. http:\/\/msdn.microsoft.com\/vstudio\/previous\/ssafe\/."},{"key":"10.1016\/j.infsof.2006.10.005_bib20","unstructured":"A. Walenstein, N. Jyoti, J. Li, Y. Yang, A. Lakhotia, Problems creating task-relevant clone detection reference data, in: Proceedings of the 10th Working Conference on Reverse Engineering, November 2003, pp. 285\u2013294."},{"key":"10.1016\/j.infsof.2006.10.005_bib21","unstructured":"WebLogic. http:\/\/www.beasys.com\/products\/weblogic\/."},{"key":"10.1016\/j.infsof.2006.10.005_bib22","unstructured":"WebSphere. http:\/\/www-306.ibm.com\/software\/websphere\/."},{"key":"10.1016\/j.infsof.2006.10.005_bib23","unstructured":"S.W.L. Yip, T. Lam, A software maintenance survey, in: Proceedings of the 1st Asia-Pacific Software Engineering Conference, December 1994, pp. 70\u201379."}],"container-title":["Information and Software Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950584906001443?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950584906001443?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,22]],"date-time":"2019-04-22T15:48:06Z","timestamp":1555948086000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0950584906001443"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9]]},"references-count":23,"journal-issue":{"issue":"9-10","published-print":{"date-parts":[[2007,9]]}},"alternative-id":["S0950584906001443"],"URL":"https:\/\/doi.org\/10.1016\/j.infsof.2006.10.005","relation":{},"ISSN":["0950-5849"],"issn-type":[{"value":"0950-5849","type":"print"}],"subject":[],"published":{"date-parts":[[2007,9]]}}}