{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T03:46:20Z","timestamp":1760586380445},"reference-count":16,"publisher":"Wiley","issue":"4","license":[{"start":{"date-parts":[[2015,9,1]],"date-time":"2015-09-01T00:00:00Z","timestamp":1441065600000},"content-version":"tdm","delay-in-days":5906,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Softw. Maint: Res. Pract."],"published-print":{"date-parts":[[1999,7]]},"DOI":"10.1002\/(sici)1096-908x(199907\/08)11:4<223::aid-smr194>3.0.co;2-d","type":"journal-article","created":{"date-parts":[[2005,12,5]],"date-time":"2005-12-05T02:19:23Z","timestamp":1133749163000},"page":"223-243","source":"Crossref","is-referenced-by-count":17,"title":["Removing clones from the code"],"prefix":"10.1002","volume":"11","author":[{"given":"Richard","family":"Fanta","sequence":"first","affiliation":[]},{"given":"V\u00e1clav","family":"Rajlich","sequence":"additional","affiliation":[]}],"member":"311","reference":[{"key":"10.1002\/(SICI)1096-908X(199907\/08)11:4<223::AID-SMR194>3.0.CO;2-D-BIB1","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/WCRE.1995.514697","volume-title":"Proceedings 2nd Working Conference on Reverse Engineering","author":"Baker","year":"1995","unstructured":"(1995) \u2018On finding duplication and near-duplication in large software systems\u2019, in Proceedings 2nd Working Conference on Reverse Engineering, IEEE Computer Society Press, Los Alamitos CA, pp. 86-95."},{"key":"10.1002\/(SICI)1096-908X(199907\/08)11:4<223::AID-SMR194>3.0.CO;2-D-BIB2","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1109\/ICSM.1998.738528","volume-title":"Proceedings International Conference on Software Maintenance","author":"Baxter","year":"1998","unstructured":", , and (1998) \u2018Clone detection using abstract trees\u2019, in Proceedings International Conference on Software Maintenance, IEEE Computer Society Press, Los Alamitos CA, pp. 368-377."},{"key":"10.1002\/(SICI)1096-908X(199907\/08)11:4<223::AID-SMR194>3.0.CO;2-D-BIB3","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1109\/WCRE.1996.558881","volume-title":"Proceedings 3rd Working Conference on Reverse Engineering","author":"Blaha","year":"1996","unstructured":"and (1996) \u2018A catalog of object model transformations\u2019, in Proceedings 3rd Working Conference on Reverse Engineering, IEEE Computer Society Press, Los Alamitos CA, pp. 87-96."},{"key":"10.1002\/(SICI)1096-908X(199907\/08)11:4<223::AID-SMR194>3.0.CO;2-D-BIB4","first-page":"322","volume-title":"Proceedings International Conference on Software Maintenance","author":"Burd","year":"1997","unstructured":"and (1997) \u2018Investigating the maintenance implications of the replication of code\u2019, in Proceedings International Conference on Software Maintenance, IEEE Computer Society Press, Los Alamitos CA, pp. 322-329."},{"key":"10.1002\/(SICI)1096-908X(199907\/08)11:4<223::AID-SMR194>3.0.CO;2-D-BIB5","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1109\/ICSE.1992.753508","volume-title":"Proceedings of the 14th International Conference on Software Engineering","author":"Devanbu","year":"1992","unstructured":"(1992) \u2018GENOA\u2014a customizable, language- and front-end independent code analyzer\u2019, in Proceedings of the 14th International Conference on Software Engineering, ACM Press, New York NY, pp. 307-317"},{"key":"10.1002\/(SICI)1096-908X(199907\/08)11:4<223::AID-SMR194>3.0.CO;2-D-BIB6","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1109\/ICSM.1998.738515","volume-title":"Proceedings International Conference on Software Maintenance","author":"Fanta","year":"1998","unstructured":"and (1998) \u2018Reengineering object-oriented code\u2019, in Proceedings International Conference on Software Maintenance, IEEE Computer Society Press, Los Alamitos CA, pp. 238-246."},{"key":"10.1002\/(SICI)1096-908X(199907\/08)11:4<223::AID-SMR194>3.0.CO;2-D-BIB7","author":"Griswold","year":"1991","unstructured":"(1991) Program restructuring as an aid in software maintenance, Doctoral Dissertation, Department of Computer Science and Engineering, University of Washington, Seattle WA, 190 pp."},{"key":"10.1002\/(SICI)1096-908X(199907\/08)11:4<223::AID-SMR194>3.0.CO;2-D-BIB8","first-page":"314","volume-title":"Proceedings International Conference on Software Maintenance","author":"Lagu\u00eb","year":"1997","unstructured":", , and (1997) \u2018Assessing the benefits of incorporating function clone detection in a development process\u2019, in Proceedings International Conference on Software Maintenance, IEEE Computer Society Press, Los Alamitos CA, pp. 314-321."},{"key":"10.1002\/(SICI)1096-908X(199907\/08)11:4<223::AID-SMR194>3.0.CO;2-D-BIB9","first-page":"72","volume-title":"Proceedings 6th International Workshop on Program Comprehension","author":"Lakhotia","year":"1998","unstructured":"(1998) \u2018DIME: a direct manipulation environment for evolutionary development of software\u2019, in Proceedings 6th International Workshop on Program Comprehension, IEEE Computer Society Press, Los Alamitos CA, pp. 72-79."},{"key":"10.1002\/(SICI)1096-908X(199907\/08)11:4<223::AID-SMR194>3.0.CO;2-D-BIB10","doi-asserted-by":"crossref","first-page":"677","DOI":"10.1016\/S0950-5849(98)00091-3","volume":"40","author":"Lakotia","year":"1998","journal-title":"Information and Software Technology"},{"key":"10.1002\/(SICI)1096-908X(199907\/08)11:4<223::AID-SMR194>3.0.CO;2-D-BIB11","first-page":"135","volume-title":"Proceedings of the 9th International Pacific Conference on Automotive Engineering","volume":"2","author":"Mikulec","year":"1996","unstructured":"and (1996) \u2018Transmission design with Powertrain Engineering Tool (PET)\u2019, in Proceedings of the 9th International Pacific Conference on Automotive Engineering, vol. 2, Ikatan Ahli Teknik Otomotif (IATO SAE), Jakarta, Indonesia, pp. 135-140."},{"key":"10.1002\/(SICI)1096-908X(199907\/08)11:4<223::AID-SMR194>3.0.CO;2-D-BIB12","author":"Opdyke","year":"1992","unstructured":"(1992) Refactoring object-oriented frameworks, Doctoral Dissertation, Department of Computer Science, University of Illinois at Urbana-Champaign IL, 142 pp."},{"key":"10.1002\/(SICI)1096-908X(199907\/08)11:4<223::AID-SMR194>3.0.CO;2-D-BIB13","first-page":"66","volume-title":"Proceedings of the 21st Computer Science Conference","author":"Opdyke","year":"1993a","unstructured":"and (1993a) \u2018Creating abstract superclasses by refactoring\u2019, in Proceedings of the 21st Computer Science Conference, ACM Press, New York NY, pp. 66-73."},{"key":"10.1002\/(SICI)1096-908X(199907\/08)11:4<223::AID-SMR194>3.0.CO;2-D-BIB14","series-title":"Lecture Notes","first-page":"264","volume-title":"Object Technologies for Advanced Software","author":"Opdyke","year":"1993b","unstructured":"and (1993b) \u2018Refactoring and aggregation\u2019, in Object Technologies for Advanced Software, vol. 742 of Lecture Notes in Computer Science, Springer-Verlag, Berlin, Germany, pp. 264-278"},{"key":"10.1002\/(SICI)1096-908X(199907\/08)11:4<223::AID-SMR194>3.0.CO;2-D-BIB15","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1002\/(SICI)1096-9942(1997)3:4<253::AID-TAPO3>3.0.CO;2-T","volume":"3","author":"Roberts","year":"1997","journal-title":"Theory and Practice of Object Systems"},{"key":"10.1002\/(SICI)1096-908X(199907\/08)11:4<223::AID-SMR194>3.0.CO;2-D-BIB16","volume-title":"Object-oriented Modeling and Design","author":"Rumbaugh","year":"1991","unstructured":", , and (1991) Object-oriented Modeling and Design, Prentice-Hall, Englewood Cliffs NJ, 500 pp."}],"container-title":["Journal of Software Maintenance: Research and Practice"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2F(SICI)1096-908X(199907%2F08)11:4%3C223::AID-SMR194%3E3.0.CO;2-D","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full\/10.1002\/(SICI)1096-908X(199907\/08)11:4%3C223::AID-SMR194%3E3.0.CO;2-D","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,11]],"date-time":"2020-08-11T19:09:18Z","timestamp":1597172958000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/(SICI)1096-908X(199907\/08)11:4<223::AID-SMR194>3.0.CO;2-D"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,7]]},"references-count":16,"journal-issue":{"issue":"4","published-print":{"date-parts":[[1999,7]]}},"URL":"https:\/\/doi.org\/10.1002\/(sici)1096-908x(199907\/08)11:4<223::aid-smr194>3.0.co;2-d","relation":{},"ISSN":["1040-550X","1096-908X"],"issn-type":[{"value":"1040-550X","type":"print"},{"value":"1096-908X","type":"electronic"}],"subject":[],"published":{"date-parts":[[1999,7]]}}}