{"id":"https://openalex.org/W2017043565","doi":"https://doi.org/10.1109/qsic.2012.37","title":"Modular Heap Abstraction-Based Code Clone Detection for Heap-Manipulating Programs","display_name":"Modular Heap Abstraction-Based Code Clone Detection for Heap-Manipulating Programs","publication_year":2012,"publication_date":"2012-08-01","ids":{"openalex":"https://openalex.org/W2017043565","doi":"https://doi.org/10.1109/qsic.2012.37","mag":"2017043565"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/qsic.2012.37","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100513014","display_name":"Longming Dong","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"funder","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Longming Dong","raw_affiliation_strings":["[Nat. Lab. for Parallel & Distrib. Process., Nat. Univ. of Defense Technol., Changsha, China]"],"affiliations":[{"raw_affiliation_string":"[Nat. Lab. for Parallel & Distrib. Process., Nat. Univ. of Defense Technol., Changsha, China]","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046184004","display_name":"Ji Wang","orcid":"https://orcid.org/0000-0002-4199-2793"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"funder","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ji Wang","raw_affiliation_strings":["[Nat. Lab. for Parallel & Distrib. Process., Nat. Univ. of Defense Technol., Changsha, China]"],"affiliations":[{"raw_affiliation_string":"[Nat. Lab. for Parallel & Distrib. Process., Nat. Univ. of Defense Technol., Changsha, China]","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019450472","display_name":"Liqian Chen","orcid":"https://orcid.org/0000-0002-7390-5690"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"funder","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liqian Chen","raw_affiliation_strings":["[Nat. Lab. for Parallel & Distrib. Process., Nat. Univ. of Defense Technol., Changsha, China]"],"affiliations":[{"raw_affiliation_string":"[Nat. Lab. for Parallel & Distrib. Process., Nat. Univ. of Defense Technol., Changsha, China]","institution_ids":["https://openalex.org/I170215575"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":1,"citation_normalized_percentile":{"value":0.279002,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":64,"max":72},"biblio":{"volume":null,"issue":null,"first_page":"197","last_page":"200"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9962,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9957,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/heap","display_name":"Heap (data structure)","score":0.8019593}],"concepts":[{"id":"https://openalex.org/C134757568","wikidata":"https://www.wikidata.org/wiki/Q274089","display_name":"Heap (data structure)","level":2,"score":0.8019593},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7606034},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.6349864},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.5202114},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.37095392}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/qsic.2012.37","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.52,"display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":15,"referenced_works":["https://openalex.org/W1567790484","https://openalex.org/W2008085811","https://openalex.org/W2043100293","https://openalex.org/W2043855508","https://openalex.org/W2051746071","https://openalex.org/W2066688923","https://openalex.org/W2119887272","https://openalex.org/W2120322286","https://openalex.org/W2125260159","https://openalex.org/W2128782367","https://openalex.org/W2136099030","https://openalex.org/W2138756793","https://openalex.org/W2145544369","https://openalex.org/W2298313545","https://openalex.org/W3104103145"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W4387561287","https://openalex.org/W4301885003","https://openalex.org/W3158777280","https://openalex.org/W2951476362","https://openalex.org/W2949158926","https://openalex.org/W2748952813","https://openalex.org/W2093687902","https://openalex.org/W1996981508","https://openalex.org/W1989205740"],"abstract_inverted_index":{"Code":[0],"clone":[1,45,106],"is":[2,13],"a":[3,42,65,85],"prevalent":[4],"activity":[5],"during":[6],"the":[7,16,50,53,93],"development":[8],"of":[9,20,58,87],"softwares.":[10,21],"However,":[11],"it":[12],"harmful":[14],"to":[15,99],"maintenance":[17],"and":[18,31,55,67],"evolution":[19],"Current":[22],"techniques":[23],"for":[24],"detecting":[25],"code":[26,35],"clones":[27,102],"are":[28,62],"most":[29],"syntax-based,":[30],"cannot":[32],"detect":[33,100],"all":[34],"clones.":[36],"In":[37],"this":[38],"paper,":[39],"we":[40],"present":[41],"novel":[43],"semantic-based":[44],"detection":[46],"technique":[47],"by":[48,64],"obtaining":[49],"similarity":[51],"about":[52,84],"precondition":[54],"post":[56],"condition":[57],"each":[59],"procedure,":[60],"which":[61],"computed":[63],"context":[66],"field":[68],"sensitive":[69],"fix":[70],"point":[71],"iteration":[72],"algorithm":[73],"based":[74],"on":[75],"modular":[76],"heap":[77],"abstraction":[78],"in":[79],"heap-manipulating":[80],"programs.":[81],"Experimental":[82],"evaluation":[83],"set":[86],"C":[88],"benchmark":[89],"programs":[90],"shows":[91],"that":[92,103],"proposed":[94],"approach":[95],"can":[96],"be":[97],"scalable":[98],"various":[101],"existing":[104],"syntax-based":[105],"detectors":[107],"have":[108],"missed.":[109]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2017043565","counts_by_year":[{"year":2020,"cited_by_count":1}],"updated_date":"2025-03-19T13:33:04.405007","created_date":"2016-06-24"}