{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T03:21:14Z","timestamp":1730258474587,"version":"3.28.0"},"reference-count":43,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,9]]},"DOI":"10.1109\/icsm.2010.5609665","type":"proceedings-article","created":{"date-parts":[[2010,11,5]],"date-time":"2010-11-05T22:01:44Z","timestamp":1288994504000},"page":"1-9","source":"Crossref","is-referenced-by-count":81,"title":["Index-based code clone detection: incremental, distributed, scalable"],"prefix":"10.1109","author":[{"given":"Benjamin","family":"Hummel","sequence":"first","affiliation":[]},{"given":"Elmar","family":"Juergens","sequence":"additional","affiliation":[]},{"given":"Lars","family":"Heinemann","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Conradt","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/FOSM.2008.4659255"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.97"},{"key":"17","article-title":"Incremental clone detection","author":"go?de","year":"2009","journal-title":"CSMR'09"},{"key":"36","volume":"3","author":"knuth","year":"1997","journal-title":"The art of computer programming"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1996.565012"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2009.5090050"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2008.41"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1002\/spe.423"},{"key":"16","article-title":"Clonedetective - A workbench for clone detection research","author":"juergens","year":"2009","journal-title":"ICSE'09"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1321"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.28"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.30"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1145\/1365815.1365816"},{"key":"11","article-title":"Practical languageindependent detection of near-miss clones","author":"cordy","year":"2004","journal-title":"CASCON'04"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294281"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2006.18"},{"key":"21","article-title":"Tracking code clones in evolving software","author":"duala-ekoko","year":"2007","journal-title":"ICSE'07"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1328279.1328283"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1145\/1810295.1810308"},{"key":"42","article-title":"Detecting and measuring similarity in code clones","author":"smith","year":"2009","journal-title":"Proc of IWSC'09"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1145\/1629175.1629198"},{"key":"40","article-title":"Short chosen-prefix collisions for MD5 and the creation of a rogue CA certificate","author":"stevens","year":"2009","journal-title":"CRYPTO'09"},{"key":"22","article-title":"How much is a clone?","author":"juergens","year":"2010","journal-title":"SQM'10"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2004.25"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2009.5306336"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2005.52"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2008.4493311"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368160"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2009.5069483"},{"key":"29","article-title":"An evaluation of duplicate code detection using anti-unification","author":"bulychev","year":"2009","journal-title":"IWSC'09"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070547"},{"key":"2","first-page":"2007","author":"roy","year":"2007","journal-title":"A survey on software clone detection research"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"journal-title":"Survey of Research on Software Clones","year":"2007","author":"koschke","key":"1"},{"key":"30","article-title":"KClone: A proposed approach to fast precise code clone detection","author":"jia","year":"2009","journal-title":"IWSC'09"},{"key":"7","article-title":"A language independent approach for detecting duplicated code","author":"ducasse","year":"1999","journal-title":"ICSM'99"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738528"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2009.5306283"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1995.514697"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2009.36"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2007.4362615"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2001.957835"},{"key":"8","article-title":"Using slicing to identify duplication in source code","author":"komondoor","year":"2001","journal-title":"SAS'01"}],"event":{"name":"2010 IEEE 26th International Conference on Software Maintenance (ICSM)","start":{"date-parts":[[2010,9,12]]},"location":"Timi oara, Romania","end":{"date-parts":[[2010,9,18]]}},"container-title":["2010 IEEE International Conference on Software Maintenance"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5604771\/5609528\/05609665.pdf?arnumber=5609665","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,19]],"date-time":"2017-03-19T04:56:11Z","timestamp":1489899371000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5609665\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/icsm.2010.5609665","relation":{},"subject":[],"published":{"date-parts":[[2010,9]]}}}