{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:47:25Z","timestamp":1725544045656},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540330936"},{"type":"electronic","value":"9783540330943"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11693017_31","type":"book-chapter","created":{"date-parts":[[2006,3,28]],"date-time":"2006-03-28T08:39:54Z","timestamp":1143535194000},"page":"411-425","source":"Crossref","is-referenced-by-count":42,"title":["Relation of Code Clones and Change Couplings"],"prefix":"10.1007","author":[{"given":"Reto","family":"Geiger","sequence":"first","affiliation":[]},{"given":"Beat","family":"Fluri","sequence":"additional","affiliation":[]},{"given":"Harald C.","family":"Gall","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Pinzger","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","volume-title":"Refactoring: Improving the Design of Existing Code","author":"M. Fowler","year":"1999","unstructured":"Fowler, M., Beck, K., Brant, J., Opdyke, W., Roberts, D.: Refactoring: Improving the Design of Existing Code. Addison-Wesley, Reading (1999)"},{"key":"31_CR2","first-page":"244","volume-title":"Proceedings of the International Conference on Software Maintenance (ICSM)","author":"J. Mayrand","year":"1996","unstructured":"Mayrand, J., Leblanc, C., Merlo, E.: Experiment on the Automatic Detection of Function Clones in a Software System Using Metrics. In: Proceedings of the International Conference on Software Maintenance (ICSM), pp. 244\u2013253. IEEE CS, Monterey, CA, USA (1996)"},{"key":"31_CR3","doi-asserted-by":"publisher","DOI":"10.1142\/5318","volume-title":"Software Maintenance \u2013 Concepts and Practice","author":"P. Grubb","year":"2003","unstructured":"Grubb, P., Takang, A.A.: Software Maintenance \u2013 Concepts and Practice, 2nd edn. World Scientific, Singapore (2003)","edition":"2"},{"key":"31_CR4","volume-title":"Program Evolution Processes of Software Change","author":"M.M. Lehman","year":"1985","unstructured":"Lehman, M.M., Belady, L.: Program Evolution Processes of Software Change. Academic Press, London (1985)"},{"key":"31_CR5","first-page":"190","volume-title":"Proceedings of the 14th International Conference on Software Maintenance (ICSM)","author":"H. Gall","year":"1998","unstructured":"Gall, H., Hajek, K., Jazayeri, M.: Detection of Logical Coupling based on Product Release History. In: Proceedings of the 14th International Conference on Software Maintenance (ICSM), pp. 190\u2013198. IEEE CS, Bethesda, Maryland, USA (1998)"},{"key":"31_CR6","volume-title":"Object-Oriented Reengineering Patterns","author":"S. Demeyer","year":"2003","unstructured":"Demeyer, S., Ducasse, S., Nierstrasz, O.: Object-Oriented Reengineering Patterns. Morgan Kaufmann, San Francisco, CA, USA (2003)"},{"key":"31_CR7","first-page":"49","volume":"24","author":"B.S. Baker","year":"1992","unstructured":"Baker, B.S.: A Program for Identifying Duplicated Code. Computing Science and Statistics\u00a024, 49\u201357 (1992)","journal-title":"Computing Science and Statistics"},{"key":"31_CR8","first-page":"109","volume-title":"Proceedings of the 15th International Conference on Software Maintenance (ICSM)","author":"S. Ducasse","year":"1999","unstructured":"Ducasse, S., Rieger, M., Demeyer, S.: A Language Independent Approach for Detecting Duplicated Code. In: Proceedings of the 15th International Conference on Software Maintenance (ICSM), pp. 109\u2013118. IEEE CS, Oxford, England, UK (1999)"},{"key":"31_CR9","doi-asserted-by":"publisher","first-page":"654","DOI":"10.1109\/TSE.2002.1019480","volume":"28","author":"T. Kamiya","year":"2002","unstructured":"Kamiya, T., Kusumoto, S., Inoue, K.: CCfinder: A Multilinguistic Token-based Code Clone Detection System for Large Scale Source Code. IEEE Transaction on Software Engineering\u00a028, 654\u2013670 (2002)","journal-title":"IEEE Transaction on Software Engineering"},{"key":"31_CR10","first-page":"368","volume-title":"Proceedings of the 14th International Conference on Software Maintenance (ICSM)","author":"I.D. Baxter","year":"1998","unstructured":"Baxter, I.D., Yahin, A., Moura, L., Sant\u2019Anna, M., Bier, L.: Clone Detection Using Abstract Syntax Trees. In: Proceedings of the 14th International Conference on Software Maintenance (ICSM), pp. 368\u2013377. IEEE CS, Bethesda, Maryland, USA (1998)"},{"key":"31_CR11","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1109\/WCRE.2001.957835","volume-title":"Proceedings of the 8th Working Conference on Reverse Engineering (WCRE)","author":"J. Krinke","year":"2001","unstructured":"Krinke, J.: Identifying Similar Code with Program Dependence Graphs. In: Proceedings of the 8th Working Conference on Reverse Engineering (WCRE), pp. 301\u2013310. IEEE CS, Stuttgart, Germany (2001)"},{"key":"31_CR12","first-page":"36","volume-title":"Proceedings of the 2nd International Workshop on Source Code Analysis and Manipulation (SCAM)","author":"E. Burd","year":"2002","unstructured":"Burd, E., Bailey, J.: Evaluating Clone Detection Tools for Use during Preventative Maintenance. In: Proceedings of the 2nd International Workshop on Source Code Analysis and Manipulation (SCAM), pp. 36\u201343. IEEE CS, Montreal, Canada (2002)"},{"key":"31_CR13","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1109\/METRIC.2002.1011326","volume-title":"Proceedings of the 8th International Symposium on Software Metrics (METRICS)","author":"Y. Ueda","year":"2002","unstructured":"Ueda, Y., Kamiya, T., Kusumoto, S., Inoue, K.: Gemini: Maintenance Support Environment Based on Code Clone Analysis. In: Proceedings of the 8th International Symposium on Software Metrics (METRICS), pp. 67\u201376. IEEE CS, Ottawa, Canada (2002)"},{"key":"31_CR14","first-page":"75","volume-title":"Workshop on Object-Oriented Technology","author":"M. Rieger","year":"1998","unstructured":"Rieger, M., Ducasse, S.: Visual Detection of Duplicated Code. In: Workshop on Object-Oriented Technology, pp. 75\u201376. Springer, Brussels, Belgium (1998)"},{"key":"31_CR15","first-page":"90","volume-title":"Proceedings of the 1sr International Workshop on Source Code Analysis and Manipulation (SCAM)","author":"G. Casazza","year":"2001","unstructured":"Casazza, G., Antoniol, G., Villano, U., Merlo, E., Penta, M.D.: Identifying Clones in the Linux Kernel. In: Proceedings of the 1sr International Workshop on Source Code Analysis and Manipulation (SCAM), pp. 90\u201397. IEEE CS, Florence, Italy (2001)"},{"key":"31_CR16","first-page":"83","volume-title":"Proceedings of the International Symposium on Empirical Software Engineering (ISESE)","author":"M. Kim","year":"2004","unstructured":"Kim, M., Bergman, L., Lau, T., Notkin, D.: An Ethnographic Study of Copy and Paste Programming Practices in OOPL. In: Proceedings of the International Symposium on Empirical Software Engineering (ISESE), pp. 83\u201392. IEEE Computer Society Press, Redondo Beach, CA, USA (2004)"},{"key":"31_CR17","first-page":"314","volume-title":"Proceedings of the 13th International Conference on Software Maintenance (ICSM)","author":"B. Lague","year":"1997","unstructured":"Lague, B., Proulx, D., Mayrand, J., Merlo, E.M., Hudepohl, J.: Assessing the Benefits of Incorporating Function Clone Detection in a Development Process. In: Proceedings of the 13th International Conference on Software Maintenance (ICSM), pp. 314\u2013323. IEEE CS, Bari, Italy (1997)"},{"key":"31_CR18","first-page":"187","volume-title":"Proceedings of the 10th European software engineering conference held jointly with 13th ACM SIGSOFT international symposium on Foundations of software engineering (ESEC\/FSE)","author":"M. Kim","year":"2005","unstructured":"Kim, M., Sazawal, V., Notkin, D.: An Empirical Study of Code Clone Genealogies. In: Proceedings of the 10th European software engineering conference held jointly with 13th ACM SIGSOFT international symposium on Foundations of software engineering (ESEC\/FSE), pp. 187\u2013196. ACM Press, Lisbon, Protugal (2005)"},{"key":"31_CR19","first-page":"85","volume-title":"Proceedings of the 7th International Workshop on Principles of Software Evolution (IWPSE)","author":"C. Kapser","year":"2004","unstructured":"Kapser, C., Godfrey, M.W.: Aiding Comprehension of Cloning Through Categorization. In: Proceedings of the 7th International Workshop on Principles of Software Evolution (IWPSE), pp. 85\u201394. IEEE CS, Kyoto, Japan (2004)"},{"key":"31_CR20","first-page":"23","volume-title":"Proceedings of the 19th International Conference on Software Maintenance (ICSM)","author":"M. Fischer","year":"2003","unstructured":"Fischer, M., Pinzger, M., Gall, H.: Populating a Release History Database from Version Control and Bug Tracking Systems. In: Proceedings of the 19th International Conference on Software Maintenance (ICSM), pp. 23\u201332. IEEE CS, Amsterdam, The Netherlands (2003)"},{"key":"31_CR21","first-page":"13","volume-title":"Proceedings of the 6th International Workshop on Principles of Software Evolution (IWPSE)","author":"H. Gall","year":"2003","unstructured":"Gall, H., Jazayeri, M., Krajewski, J.: CVS Release History Data for Detecting Logical Couplings. In: Proceedings of the 6th International Workshop on Principles of Software Evolution (IWPSE), p. 13. IEEE CS, Helsinki, Finland (2003)"},{"key":"31_CR22","first-page":"66","volume-title":"Proceedings of the 5th International Workshop on Source Code Analysis and Manipulation","author":"B. Fluri","year":"2005","unstructured":"Fluri, B., Gall, H.C., Pinzger, M.: Fine-Grained Analysis of Change Couplings. In: Proceedings of the 5th International Workshop on Source Code Analysis and Manipulation, pp. 66\u201374. IEEE CS, Budapest, Hungary (2005)"},{"key":"31_CR23","doi-asserted-by":"publisher","first-page":"782","DOI":"10.1109\/TSE.2003.1232284","volume":"29","author":"M. Lanza","year":"2003","unstructured":"Lanza, M., Ducasse, S.: Polymetric Views \u2013 A Lightweight Visual Approach to Reverse Engineering. IEEE Transactions on Software Engineering\u00a029, 782\u2013795 (2003)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"31_CR24","unstructured":"Geiger, R.: Evolution Impact of Code Clones \u2013 Identification of Structural and Change Smells based on Code Clones. Master\u2019s thesis, University of Zurich (2005), \n                    \n                      http:\/\/seal.ifi.unizh.ch\/da"}],"container-title":["Lecture Notes in Computer Science","Fundamental Approaches to Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11693017_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,12]],"date-time":"2019-03-12T01:21:01Z","timestamp":1552353661000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11693017_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540330936","9783540330943"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/11693017_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}