{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:47:51Z","timestamp":1729619271873,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,9]]},"DOI":"10.1109\/scam.2007.19","type":"proceedings-article","created":{"date-parts":[[2008,4,28]],"date-time":"2008-04-28T12:50:08Z","timestamp":1209387008000},"page":"203-212","source":"Crossref","is-referenced-by-count":24,"title":["A Framework for Studying Clones In Large Software Systems"],"prefix":"10.1109","author":[{"given":"Zhen Ming","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Ahmed E.","family":"Hassan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1188835.1188846"},{"key":"ref32","first-page":"1","article-title":"Practical language-independent detection of near-miss clones","author":"cordy","year":"2004","journal-title":"IBM Centre for Advanced Studies Conference"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/333151.333159"},{"journal-title":"Introduction to Data Mining","year":"2005","author":"tan","key":"ref30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1994.336783"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/BF00126960"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/METRIC.2002.1011328"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1997.624575"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2002.1134103"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1145\/1095430.1081737","article-title":"An empirical study of code cloning genealogies","volume":"30","author":"kim","year":"2005","journal-title":"SIGSOFT Softw Eng Notes"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1109\/APSEC.2006.63","article-title":"Visualizing Clone Cohesion and Coupling","author":"jiang","year":"2006","journal-title":"Proceedings of APSEC 2006 IEEE Asia Pacific Conference on Software Engineering"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1145\/1081706.1081733","article-title":"Detecting higher-level similarity patterns in programs","author":"basit","year":"2005","journal-title":"Proceedings of the 10th European Software Engineering Conference Held Jointly with 13th ACM SIGSOFT international Symposium on Foundations of Software Engineering Lisbon Portugal"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1145\/502059.502042","article-title":"An empirical study of operating system errors","author":"chou","year":"2001","journal-title":"Proceedings of the 18th ACM Symposium on Operating systems principles (SOSP)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1002\/smr.327"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2006.1"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2004.35"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1999.792593"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062537"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ISESE.2005.1541846"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1109\/WPC.2003.1199203","article-title":"Comprehending Reality: Practical Challenges to Software Maintenance Automation","author":"cordy","year":"2003","journal-title":"Proceedings of IEEE 11 th International Workshop on Program Comprehension"},{"key":"ref8","article-title":"An Ethnographic Study of Copy and Paste Programming Practices in OOPL","author":"kim","year":"2004","journal-title":"International Symposium on Empirical Software Engineering"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2004.1357804"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1995.514697"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738528"},{"key":"ref1","first-page":"314","article-title":"Assessing the Benefits of Incorporating Function Clone Detection in a Development Process","author":"bruno","year":"1997","journal-title":"Proceedings of the International Conference on Software Maintenance"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2000.883030"},{"key":"ref22","first-page":"31","article-title":"Dotplot Patterns: a Literal Look at Pattern Languages","author":"helfman","year":"1995","journal-title":"TAPOS"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/IWPSE.2005.17"},{"key":"ref24","article-title":"Gemini: Code cloning analysis tool","author":"ueda","year":"2002","journal-title":"Proc of 2002 International Symposium on Empirical Software Engineering (1SESE2002) Nara Japan"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2004.25"},{"key":"ref26","article-title":"Navigating the textual redundancy web in legacy source","author":"johnson","year":"1996","journal-title":"Proceedings of the 1996 conference of the Centre for Advanced Studies on Collaborative research"},{"key":"ref25","article-title":"Visualizing textual redundancy in legacy source","author":"johnson","year":"1994","journal-title":"In Proceedings of CASCON 94"}],"event":{"name":"Seventh IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007)","start":{"date-parts":[[2007,9,30]]},"location":"Paris, France","end":{"date-parts":[[2007,10,1]]}},"container-title":["Seventh IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4362882\/4362883\/04362914.pdf?arnumber=4362914","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T03:29:59Z","timestamp":1497756599000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4362914\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/scam.2007.19","relation":{},"subject":[],"published":{"date-parts":[[2007,9]]}}}