{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:54:39Z","timestamp":1725468879365},"reference-count":49,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540306054"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-33279-0_3","type":"book-chapter","created":{"date-parts":[[2006,5,3]],"date-time":"2006-05-03T08:38:43Z","timestamp":1146645523000},"page":"37-55","source":"Crossref","is-referenced-by-count":2,"title":["Model Cloning: A Push to Reuse or a Disaster?"],"prefix":"10.1007","author":[{"given":"Maria","family":"Rigou","sequence":"first","affiliation":[]},{"given":"Spiros","family":"Sirmakessis","sequence":"additional","affiliation":[]},{"given":"Giannis","family":"Tzimas","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Antoniou G., Casazza G., Di Penta M., Merlo E. (2001) Modeling Clones Evolution Through Time Series. In the Proceedings of the International Conference on Software Maintenance, Florence, Italy, pp. 273\u2013280"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Atzeni P., Mecca G., Merialdo P. (1998) Design and Maintenance of Data- Intensive Web Sites. In the Proceedings of the 6th International Conference on Extending Database Technology \u2013 EDBT'98, pp. 436\u2013450","DOI":"10.1007\/BFb0101001"},{"key":"3_CR3","unstructured":"Baeza-Yates R., Ribeiro-Neto B. (1999) Modern Information Retrieval. Addison Wesley, ACM Press"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Baker B.S. (1995) On Finding Duplication and Near-Duplication in Large Software Systems. In the Proceedings of the Second Working Conference on Reverse Engineering, Toronto, Canada, pp. 86\u201395","DOI":"10.1109\/WCRE.1995.514697"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Balazinska M., Merlo E., Dagenais M., Lague B., Kontogiannis K. (1999) Measuring Clone Based Reengineering Opportunities. In the Proceedings of the 6th IEEE International Symposium on Software Metrics, Boca Raton, USA, pp. 292\u2013303","DOI":"10.1109\/METRIC.1999.809750"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Baxter I.D., Yahin A., Moura L., Santa Anna M., Bier L. (1998) Clone Detection Using Abstract Syntax Trees. In the Proceedings of the International Conference on Software Maintenance, Washington DC, USA, pp. 368\u2013377","DOI":"10.1109\/ICSM.1998.738528"},{"key":"3_CR7","unstructured":"Boehm B. (1981) Software Engineering Economics. Prentice Hall PTR"},{"key":"3_CR8","unstructured":"Boldyre. C., Kewish R. (2001) Reverse Engineering to Achieve Maintainable WWW Sites. In the Proceedings of the 8th Working Conference on Reverse Engineering (WCRE'01), Stuttgart, Germany, pp. 249\u2013257"},{"key":"3_CR9","unstructured":"Booch G., Jacobson I., Rumbaugh J. (1998) The United Modeling Language User Guide. The Addison-Wesley Object Technology Series"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Ceri S., Fraternali P., Bongio A. (2000) Web Modeling Language (WebML): a Modeling Language for Designing Web Sites. In the Proceedings of WWW9 Conference, Amsterdam","DOI":"10.1016\/S1389-1286(00)00040-2"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Ceri S., Fraternali P., Bongio A., Brambilla M., Comai S., Matera M. (2002) Designing Data-Intensive Web Applications. Morgan Kauffmann","DOI":"10.1109\/MIC.2002.1020321"},{"issue":"1","key":"3_CR12","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/52.43044","volume":"7","author":"E. Chikofsky","year":"1990","unstructured":"Chikofsky E., Cross J. (1990) Reverse engineering and design recovery: A taxonomy. IEEE Software 7(1): 3\u201317","journal-title":"IEEE Software"},{"issue":"8","key":"3_CR13","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/2.303623","volume":"27","author":"D.M. Coleman","year":"1994","unstructured":"Coleman D.M., Ash D., Lowther B., Oman, P.W. (1994) Using Metrics to Evaluate Software System Maintainability. Computer 27(8): 44\u201349","journal-title":"Computer"},{"key":"3_CR14","unstructured":"Comai S., Matera M., Maurino A. (2002) A Model and an XSL Framework for Analysing the Quality of WebML Conceptual Schemas. In Proc of IWCMQ'02 \u2013 ER'02 International Workshop on Conceptual Modeling Quality, Tampere, Finland, October 2002"},{"issue":"10","key":"3_CR15","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/317665.317677","volume":"42","author":"J. Conallen","year":"1999","unstructured":"Conallen J. (1999) Modeling Web application architectures with UML. Communications of the ACM 42(10): 63\u201370","journal-title":"Communications of the ACM"},{"key":"3_CR16","unstructured":"Conallen J. (1999) Building Web Applications with UML. Addison-Wesley, Reading MA"},{"key":"3_CR17","unstructured":"Di Lucca G.A., Di Penta M., Fasolino A.R., Granato P. (2001) Clone Analysis in the Web Era: an Approach to Identify Cloned Web Pages. In the Proceedings of the 7th IEEE Workshop on Empirical Studies of Software Maintenance, Florence, Italy, pp. 107\u2013113"},{"key":"3_CR18","first-page":"109","volume-title":"In the Proceedings of the International Conference on Software Maintenance","author":"S. Ducasse","year":"1999","unstructured":"Ducasse S., Rieger M., Demeyer S. (1999) A language independent approach for detecting duplicated code. In the Proceedings of the International Conference on Software Maintenance, IEEE Computer Society Press, Oxford, UK, pp. 109\u2013118"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Fernandez M.F., Florescu D., Kang J., Levy A.Y., Suciu D. (1998) Catching the Boat with Strudel: Experiences with a Web-Site Management System. In the Proceedings of ACM-SIGMOD Conference, pp. 414\u2013425","DOI":"10.1145\/276304.276341"},{"key":"3_CR20","unstructured":"Fowler M., Beck K., Brant J., Opdyke W., Roberts, D. (1999) Refactoring: Improving the Design of Existing Code. The Addison-Wesley Object Technology Series"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Fraternali P., Paolini, P. (1998) A Conceptual Model and a Tool Environment for Developing More Scalable, Dynamic, and Customizable Web Applications. In the Proceedings of the 6th International Conference on Extending Database Technology \u2013 EDBT'98, pp. 421\u2013435","DOI":"10.1007\/BFb0101000"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Fraternali P., Lanzi P.L., Matera M., Maurino A. (2004) Exploiting Conceptual Modeling for Web Application Quality Evaluation. In the Proceedings of WWW 2004 Alternate Tracks and Posters, New York, USA, May 2004","DOI":"10.1145\/1013367.1013466"},{"key":"3_CR23","unstructured":"Fraternali P., Lanzi P.L., Matera M., Maurino A. (2004) Model-Driven Web Usage Analysis for the Evaluation of Web Application Quality. Submitted for publication to Journal of Web Engineering, April 2004"},{"key":"3_CR24","unstructured":"Fraternali P., Matera M., Maurino A. (2002) WQA: an XSL Framework for Analyzing the Quality of Web Applications. In the Proceedings of the 2nd International Workshop on Web-Oriented Software Technologies \u2013 IWWOST'02, Malaga, Spain, pp. 46\u201361"},{"key":"3_CR25","volume-title":"In the Proceedings of LA-Web Conference","author":"P. Fraternali","year":"2004","unstructured":"Fraternali P., Matera M., Maurino A. (2004) Conceptual-Level Log Analysis for the Evaluation of Web Application Quality. In the Proceedings of LA-Web Conference, IEEE Press, Cile, November 2004"},{"key":"3_CR26","volume-title":"Computers and Intractability: A guide to NP-Completeness","author":"M.R. Garey","year":"1979","unstructured":"Garey M.R., Johnson D.S. (1979) Computers and Intractability: A guide to NP-Completeness. New York: Freeman"},{"issue":"1","key":"3_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/151480.151483","volume":"11","author":"F. Garzotto","year":"1993","unstructured":"Garzotto F., Paolini P., Schwabe D. (1993) HDM - A Model-Based Approach to Hypertext Application Design. ACM Transactions on Information Systems 11(1): 1\u201326","journal-title":"ACM Transactions on Information Systems"},{"issue":"10","key":"3_CR28","doi-asserted-by":"publisher","first-page":"739","DOI":"10.1145\/358413.358421","volume":"26","author":"T. Guimaraes","year":"1983","unstructured":"Guimaraes T. (1983) Managing Application Program Maintenance Expenditure. Communications of the ACM 26(10): 739\u2013746","journal-title":"Communications of the ACM"},{"issue":"8","key":"3_CR29","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/208344.208346","volume":"38","author":"T. Isakowitz","year":"1995","unstructured":"Isakowitz T., Sthor E.A., Balasubranian P. (1995) RMM: a methodology for structured hypermedia design. Communications of the ACM 38(8): 34\u201344","journal-title":"Communications of the ACM"},{"key":"3_CR30","unstructured":"Johnson J.H. (1993) Identifying Redundancy in Source Code using Fingerprints. In the Proceedings of the CAS Conference, Toronto, Canada, pp. 171\u2013183"},{"key":"3_CR31","doi-asserted-by":"crossref","unstructured":"Johnson J.H. (1994) Substring Matching for Clone Detection and Change Tracking. In the Proceedings of the International Conference on Software Maintenance, Victoria, Canada, pp. 120\u2013126","DOI":"10.1109\/ICSM.1994.336783"},{"issue":"7","key":"3_CR32","doi-asserted-by":"publisher","first-page":"654","DOI":"10.1109\/TSE.2002.1019480","volume":"28","author":"T. Kamiya","year":"2002","unstructured":"Kamiya T., Kusumoto S., Inoue K. (2002) CCFinder: A Multilinguistic Token- Based Code Clone Detection System for Large Scale Source Code. IEEE Transactions On Software Engineering 28(7): 654\u2013670","journal-title":"IEEE Transactions On Software Engineering"},{"key":"3_CR33","doi-asserted-by":"crossref","unstructured":"Kontogiannis K. (1997) Evaluation Experiments on the Detection of Programming Patterns Using Software Metrics. In the Proceedings of the 4th Working Conference on Reverse Engineering, Amsterdam, The Netherlands, pp. 44\u201354","DOI":"10.1109\/WCRE.1997.624575"},{"key":"3_CR34","doi-asserted-by":"crossref","unstructured":"Krinke J. (2001) Identifying Similar Code with Program Dependence Graphs. In the Proceedings of the 8th Working Conference on Reverse Engineering, Stuttgart, Germany, pp. 301\u2013309","DOI":"10.1109\/WCRE.2001.957835"},{"key":"3_CR35","doi-asserted-by":"crossref","unstructured":"Lague B., Proulx D., Mayrand J., Merlo E.M., Hudepohl J. (1997) Assessing the Benefits of Incorporating Function Clone Detection in a Development Process. In the Proceedings of the International Conference on Software Maintenance, Bari, Italy, pp. 314\u2013321","DOI":"10.1109\/ICSM.1997.624264"},{"key":"3_CR36","volume-title":"In the Proceedings of the International Conference of Web Engineering-ICWE'04, LNCS 3140","author":"P.L. Lanzi","year":"2004","unstructured":"Lanzi P.L., Matera M., Maurino A. (2004) A Framework for Exploiting Conceptual Modeling in the Evaluation of Web Application Quality. In the Proceedings of the International Conference of Web Engineering-ICWE'04, LNCS 3140, Springer Verlag Publ, Munich, Germany, July 2004"},{"key":"3_CR37","unstructured":"Manber U. (1994) Finding Similar Files in a Large File System. In the Proceedings of the USENIX Winter 1994 Technical Conference, San Francisco, USA, pp. 1\u201310"},{"key":"3_CR38","doi-asserted-by":"crossref","unstructured":"Mayrand J., Leblanc C., Merlo E.M. (1996) Experiment on the Automatic Detection of Function Clones in a Software System Using Metrics. In the Proceedings of the International Conference on Software Maintenance, Monterey, USA, pp. 244\u2013254","DOI":"10.1109\/ICSM.1996.565012"},{"key":"3_CR39","doi-asserted-by":"crossref","unstructured":"Mens T., Demeyer S., Du Bois B., Stenten H., Van Gorp P. (2003) Refactoring: Current research and future trends. In the Proceedings of the 3rd Workshop on Language Descriptions, Tools and Applications (LDTA 2003), April 6, Warsaw, Poland","DOI":"10.1016\/S1571-0661(05)82624-6"},{"issue":"2","key":"3_CR40","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/TSE.2004.1265817","volume":"30","author":"Mens T","year":"2004","unstructured":"Mens T, Tourwe, T. (2004) A survey of software refactoring. IEEE Transactions on Software Engineering, 30(2): 126\u2013139","journal-title":"IEEE Transactions on Software Engineering"},{"key":"3_CR41","doi-asserted-by":"crossref","unstructured":"Ricca F., Tonella P. (2003) Using Clustering to Support the Migration from Static to Dynamic Web Pages. In the Proceedings of the 11th International Workshop on Program Comprehension, Portland, USA, pp. 207\u2013216","DOI":"10.1109\/WPC.2003.1199204"},{"key":"3_CR42","unstructured":"Rieger M., Ducasse S. (1998) Visual Detection of Duplicated Code. In the Proceedings of the Workshop on Experiences in Object-Oriented Re-Engineering, Brussels, Belgium, pp. 75\u201376"},{"key":"3_CR43","unstructured":"Roberts D. (1999) Practical Analysis for Refactoring. Ph.D. thesis, University of Illinois at Urbana-Champaign"},{"key":"3_CR44","unstructured":"Sakkopoulos E., Sirmakessis S., Tsakalidis A., Tzimas G. (2005) A Methodology for Evaluating the Personalization Conceptual Schema of a Web Application. in the Proceedings of the 11th International Conference on Human-Computer Interaction (HCI International 2005), July 22\u201327, Las Vegas, Nevada, USA"},{"issue":"4","key":"3_CR45","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1002\/(SICI)1096-9942(1998)4:4<207::AID-TAPO2>3.0.CO;2-2","volume":"4","author":"D. Schwabe","year":"1998","unstructured":"Schwabe D., Rossi G. (1998) An object-oriented approach to web-based application design. Theory and Practice of Object Systems (TAPOS) 4(4): 207\u2013225","journal-title":"Theory and Practice of Object Systems (TAPOS)"},{"key":"3_CR46","doi-asserted-by":"crossref","unstructured":"Wang C., Wang W., Pei J., Zhu Y., Shi B. (2004) Scalable Mining of Large Disk-based Graph Databases. In the Proceedings of ACM KDD04, pp. 316\u2013325","DOI":"10.1145\/1014052.1014088"},{"key":"3_CR47","unstructured":"WebRatio (2005), available at: http:\/\/wwwwebratiocom"},{"key":"3_CR48","unstructured":"Yan X., Han J. (2002) gSpan: Graph-based substructure pattern mining. In the Proceedings of International Conference on Data Mining (ICDM'02), Maebashi, pp. 721\u2013724"},{"key":"3_CR49","doi-asserted-by":"crossref","unstructured":"Yan X., Han J. (2003) CloseGraph: mining closed frequent graph patterns. In the Proceedings of ACM KDD03, pp. 286\u2013295","DOI":"10.1145\/956750.956784"}],"container-title":["Studies in Computational Intelligence","Adaptive and Personalized Semantic Web"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-33279-0_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T01:09:43Z","timestamp":1619572183000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-33279-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540306054"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/3-540-33279-0_3","relation":{},"subject":[]}}