{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T08:42:17Z","timestamp":1774687337126,"version":"3.50.1"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319091556","type":"print"},{"value":"9783319091563","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-09156-3_35","type":"book-chapter","created":{"date-parts":[[2014,7,2]],"date-time":"2014-07-02T11:15:22Z","timestamp":1404299722000},"page":"492-507","source":"Crossref","is-referenced-by-count":35,"title":["On the Structural Code Clone Detection Problem: A Survey and Software Metric Based Approach"],"prefix":"10.1007","author":[{"given":"Mustafa","family":"Kapdan","sequence":"first","affiliation":[]},{"given":"Mehmet","family":"Aktas","sequence":"additional","affiliation":[]},{"given":"Melike","family":"Yigit","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","unstructured":"Fowler, M.: Refactoring: improving the design of existing code. Addison-Wesley Professional (1999)"},{"key":"35_CR2","unstructured":"Roy, C.K., Cordy, J.R.: A survey on software clone detection research. Technical report, Citeseer (2007)"},{"key":"35_CR3","doi-asserted-by":"crossref","unstructured":"Baker, B.S.: On finding duplication and near-duplication in large software systems. In: Proceedings of 2nd Working Conference on Reverse Engineering, pp. 86\u201395. IEEE (1995)","DOI":"10.1109\/WCRE.1995.514697"},{"key":"35_CR4","doi-asserted-by":"crossref","unstructured":"Casazza, G., Antoniol, G., Villano, U., Merlo, E., Di Penta, M.: Identifying clones in the linux kernel. In: Proceedings of the First IEEE International Workshop on Source Code Analysis and Manipulation, pp. 90\u201397. IEEE (2001)","DOI":"10.1109\/SCAM.2001.972670"},{"issue":"7","key":"35_CR5","doi-asserted-by":"publisher","first-page":"654","DOI":"10.1109\/TSE.2002.1019480","volume":"28","author":"T. Kamiya","year":"2002","unstructured":"Kamiya, T., Kusumoto, S., Inoue, K.: Ccfinder: a multilinguistic token-based code clone detection system for large scale source code. IEEE Transactions on Software Engineering\u00a028(7), 654\u2013670 (2002)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"35_CR6","doi-asserted-by":"crossref","unstructured":"Kontogiannis, K.: Evaluation experiments on the detection of programming patterns using software metrics. In: Proceedings of the Fourth Working Conference on Reverse Engineering, pp. 44\u201354. IEEE (1997)","DOI":"10.1109\/WCRE.1997.624575"},{"issue":"3","key":"35_CR7","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1109\/TSE.2006.28","volume":"32","author":"Z. Li","year":"2006","unstructured":"Li, Z., Lu, S., Myagmar, S., Zhou, Y.: Cp-miner: Finding copy-paste and related bugs in large-scale software code. IEEE Transactions on Software Engineering\u00a032(3), 176\u2013192 (2006)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"35_CR8","doi-asserted-by":"crossref","unstructured":"Jiang, L., Misherghi, G., Su, Z., Glondu, S.: Deckard: Scalable and accurate treebased detection of code clones. In: Proceedings of the 29th International Conference on Software Engineering, pp. 96\u2013105. IEEE Computer Society (2007)","DOI":"10.1109\/ICSE.2007.30"},{"key":"35_CR9","doi-asserted-by":"crossref","unstructured":"Lague, B., Proulx, D., Mayrand, J., Merlo, E.M., Hudepohl, J.: Assessing the benefits of incorporating function clone detection in a development process. In: Proceedings of the International Conference on Software Maintenance, pp. 314\u2013321. IEEE (1997)","DOI":"10.1109\/ICSM.1997.624264"},{"key":"35_CR10","doi-asserted-by":"crossref","unstructured":"Baxter, I.D., Yahin, A., Moura, L., Sant\u2019Anna, M., Bier, L.: Clone detection using abstract syntax trees. In: Proceedings of the International Conference on Software Maintenance, pp. 368\u2013377. IEEE (1998)","DOI":"10.1109\/ICSM.1998.738528"},{"key":"35_CR11","doi-asserted-by":"crossref","unstructured":"Mayrand, J., Leblanc, C., Merlo, E.M.: Experiment on the automatic detection of function clones in a software system using metrics. In: Proceedings of the International Conference on Software Maintenance 1996, pp. 244\u2013253. IEEE (1996)","DOI":"10.1109\/ICSM.1996.565012"},{"issue":"2","key":"35_CR12","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1002\/smr.327","volume":"18","author":"C.J. Kapser","year":"2006","unstructured":"Kapser, C.J., Godfrey, M.W.: Supporting the analysis of clones in software systems. Journal of Software Maintenance and Evolution: Research and Practice\u00a018(2), 61\u201382 (2006)","journal-title":"Journal of Software Maintenance and Evolution: Research and Practice"},{"key":"35_CR13","doi-asserted-by":"crossref","unstructured":"Rysselberghe, F.V., Demeyer, S.: Evaluating clone detection techniques from a refactoring perspective. In: Proceedings of the 19th IEEE International Conference on Automated Software Engineering, pp. 336\u2013339. IEEE Computer Society (2004)","DOI":"10.1109\/ASE.2004.1342759"},{"issue":"13","key":"35_CR14","doi-asserted-by":"publisher","first-page":"755","DOI":"10.1016\/S0950-5849(02)00123-4","volume":"44","author":"G. Antoniol","year":"2002","unstructured":"Antoniol, G., Villano, U., Merlo, E., Di Penta, M.: Analyzing cloning evolution in the linux kernel. Information and Software Technology\u00a044(13), 755\u2013765 (2002)","journal-title":"Information and Software Technology"},{"key":"35_CR15","unstructured":"Johnson, J.H.: Identifying redundancy in source code using fingerprints. In: Proceedings of the 1993 Conference of the Centre for Advanced Studies on Collaborative Research: Software Engineering, vol.\u00a01, pp. 171\u2013183. IBM Press (1993)"},{"key":"35_CR16","doi-asserted-by":"crossref","unstructured":"Grubb, P., Takang, A.A.: Software maintenance: concepts and practice. World Scientific (2003)","DOI":"10.1142\/5318"},{"key":"35_CR17","unstructured":"Baker, B.S.: A program for identifying duplicated code. Computing Science and Statistics, 49\u201349 (1993)"},{"key":"35_CR18","unstructured":"Ducasse, S., Nierstrasz, O., Rieger, M.: Lightweight detection of duplicated codea language-independent approach. Institute for Applied Mathematics and Computer Science, University of Berne, Switzerland (2004)"},{"key":"35_CR19","doi-asserted-by":"crossref","unstructured":"Ducasse, S., Rieger, M., Demeyer, S.: A language independent approach for detecting duplicated code. In: Proceedings of the IEEE International Conference on Software Maintenance (ICSM 1999), pp. 109\u2013118. IEEE (1999)","DOI":"10.1109\/ICSM.1999.792593"},{"key":"35_CR20","unstructured":"Li, Z., Lu, S., Myagmar, S., Zhou, Y.: Cp-miner: A tool for nding copy-paste and related bugs in operating system code. In: OSDI, vol.\u00a04, pp. 289\u2013302 (2004)"},{"key":"35_CR21","unstructured":"Baker, B.S.: On finding duplication in strings and software. submitted for publication (1993)"},{"key":"35_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/11767077_6","volume-title":"Reliable Software Technologies \u2013 Ada-Europe 2006","author":"A. Raza","year":"2006","unstructured":"Raza, A., Vogel, G., Pl\u00f6dereder, E.: Bauhaus \u2013 A tool suite for program analysis and reverse engineering. In: Pinho, L.M., Gonz\u00e1lez Harbour, M. (eds.) Ada-Europe 2006. LNCS, vol.\u00a04006, pp. 71\u201382. Springer, Heidelberg (2006)"},{"key":"35_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/3-540-47764-0_3","volume-title":"Static Analysis","author":"R. Komondoor","year":"2001","unstructured":"Komondoor, R., Horwitz, S.: Using slicing to identify duplication in source code. In: Cousot, P. (ed.) SAS 2001. LNCS, vol.\u00a02126, pp. 40\u201356. Springer, Heidelberg (2001)"},{"key":"35_CR24","unstructured":"Komondoor, R.V.: Automated duplicated-code detection and procedure extraction. PhD thesis, UNIVERSITY OF WISCONSIN (2003)"},{"key":"35_CR25","doi-asserted-by":"crossref","unstructured":"Gallagher, K., Layman, L.: Are decomposition slices clones? In: 11th IEEE International Workshop on Program Comprehension, pp. 251\u2013256. IEEE (2003)","DOI":"10.1109\/WPC.2003.1199209"},{"key":"35_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/3-540-44898-5_23","volume-title":"Static Analysis","author":"W.K. Chen","year":"2003","unstructured":"Chen, W.K., Li, B., Gupta, R.: Code compaction of matching single-entry multipleexit regions. In: Cousot, R. (ed.) SAS 2003. LNCS, vol.\u00a02694, pp. 401\u2013417. Springer, Heidelberg (2003)"},{"key":"35_CR27","doi-asserted-by":"crossref","unstructured":"Patenaude, J.F., Merlo, E., Dagenais, M., Lagu\u00eb, B.: Extending software quality assessment techniques to java systems. In: Proceedings of the Seventh International Workshop on Program Comprehension, pp. 49\u201356. IEEE (1999)","DOI":"10.1109\/WPC.1999.777743"},{"key":"35_CR28","unstructured":"Raheja, K., Tekchandani, R.: An emerging approach towards code clone detection: metric based approach on byte code. International Journal of Advanced Research in Computer Science and Software Engineering\u00a03(5) (2013)"},{"issue":"5","key":"35_CR29","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1145\/1095430.1081733","volume":"30","author":"H.A. Basit","year":"2005","unstructured":"Basit, H.A., Jarzabek, S.: Detecting higher-level similarity patterns in programs. ACM SIGSOFT Software Engineering Notes\u00a030(5), 156\u2013165 (2005)","journal-title":"ACM SIGSOFT Software Engineering Notes"},{"key":"35_CR30","doi-asserted-by":"crossref","unstructured":"De Lucia, A., Francese, R., Scanniello, G., Tortora, G.: Reengineering web applications based on cloned pattern analysis. In: Proceedings of the 12th IEEE International Workshop on Program Comprehension, pp. 132\u2013141. IEEE (2004)","DOI":"10.1109\/WPC.2004.1311055"},{"key":"35_CR31","doi-asserted-by":"crossref","unstructured":"Marcus, A., Maletic, J.I.: Identification of high-level concept clones in source code. In: Proceedings of the 16th Annual International Conference on Automated Software Engineering (ASE 2001), pp. 107\u2013114. IEEE (2001)","DOI":"10.1109\/ASE.2001.989796"},{"key":"35_CR32","doi-asserted-by":"crossref","unstructured":"Gil, J.Y., Maman, I.: Micro patterns in java code. In: ACM SIGPLAN Notices, vol.\u00a040, pp. 97\u2013116. ACM (2005)","DOI":"10.1145\/1103845.1094819"},{"key":"35_CR33","doi-asserted-by":"crossref","unstructured":"Shi, N., Olsson, R.A.: Reverse engineering of design patterns from java source code. In: 21st IEEE\/ACM International Conference on Automated Software Engineering, ASE 2006, pp. 123\u2013134. IEEE (2006)","DOI":"10.1109\/ASE.2006.57"},{"key":"35_CR34","doi-asserted-by":"crossref","unstructured":"Bakota, T., Ferenc, R., Gyimothy, T.: Clone smells in software evolution. In: IEEE International Conference on Software Maintenance, ICSM 2007, pp. 24\u201333. IEEE (2007)","DOI":"10.1109\/ICSM.2007.4362615"},{"key":"35_CR35","unstructured":"Dangel, A., Pelisse, R.: Pmd is a source code analyzer (2014) (accessed March 10, 2014)"},{"key":"35_CR36","unstructured":"Kapdan, M.: Akta\u015f, M., Yi\u011fit, M.: Yap\u0131sal kod klon analizinde metrik tabanl\u0131 teknikler. In: Ulusal Yazilim Muhendisligi Sempozyumu (UYMS), pp.1\u201319 (2013)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2014"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-09156-3_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T16:56:13Z","timestamp":1746291373000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-09156-3_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319091556","9783319091563"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-09156-3_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}