{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T03:12:47Z","timestamp":1725678767033},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1109\/wcre.2010.34","type":"proceedings-article","created":{"date-parts":[[2010,12,9]],"date-time":"2010-12-09T15:18:14Z","timestamp":1291907894000},"page":"237-241","source":"Crossref","is-referenced-by-count":15,"title":["Highly Configurable and Extensible Code Clone Detection"],"prefix":"10.1109","author":[{"given":"B","family":"Biegel","sequence":"first","affiliation":[]},{"given":"S","family":"Diehl","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2003.1287259"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2006.41"},{"journal-title":"A survey on software clone detection research","year":"2007","author":"roy","key":"13"},{"year":"2010","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380250705"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2009.02.007"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738528"},{"year":"2010","key":"2"},{"year":"2010","key":"1"},{"journal-title":"AST-Basierte Erkennung von Komplexen Refactorings","year":"2009","author":"neu","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070566"},{"year":"2010","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859029"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/FOSM.2008.4659255"},{"key":"8","article-title":"Subjectivity in clone judgment: Can we ever agree?","author":"kapser","year":"2007","journal-title":"Duplication Redundancy and Similarity in Software Dagstuhl Seminar Proceedings"}],"event":{"name":"17th Working Conference on Reverse Engineering (WCRE 2010)","start":{"date-parts":[[2010,10,13]]},"location":"Beverly, MA","end":{"date-parts":[[2010,10,16]]}},"container-title":["2010 17th Working Conference on Reverse Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5644814\/5645441\/05645564.pdf?arnumber=5645564","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T11:03:00Z","timestamp":1490094180000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5645564\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/wcre.2010.34","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]}}}