{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:11:51Z","timestamp":1763467911386},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642005923"},{"type":"electronic","value":"9783642005930"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00593-0_31","type":"book-chapter","created":{"date-parts":[[2009,3,27]],"date-time":"2009-03-27T10:26:08Z","timestamp":1238149568000},"page":"440-455","source":"Crossref","is-referenced-by-count":44,"title":["Accurate and Efficient Structural Characteristic Feature Extraction for Clone Detection"],"prefix":"10.1007","author":[{"given":"Hoan Anh","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Tung Thanh","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Nam H.","family":"Pham","sequence":"additional","affiliation":[]},{"given":"Jafar M.","family":"Al-Kofahi","sequence":"additional","affiliation":[]},{"given":"Tien N.","family":"Nguyen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"Kontogiannis, K.A., Demori, R., Merlo, E., Galler, M., Bernstein, M.: Pattern matching for clone and concept detection. Reverse Engineering, 77\u2013108 (1996)","DOI":"10.1007\/978-0-585-27477-5_4"},{"key":"31_CR2","first-page":"137","volume-title":"C3S2E 2008","author":"C. Roy","year":"2008","unstructured":"Roy, C., Cordy, J.: Towards a mutation-based automatic framework for evaluating code clone detection tools. In: C3S2E 2008, pp. 137\u2013140. ACM, New York (2008)"},{"key":"31_CR3","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1002\/jgt.3190010410","volume":"1","author":"R. Read","year":"1977","unstructured":"Read, R., Corneil, D.: The graph isomorph disease. Journal of Graph Theory\u00a01, 339\u2013363 (1977)","journal-title":"Journal of Graph Theory"},{"key":"31_CR4","first-page":"368","volume-title":"ICSM 1998","author":"I.D. Baxter","year":"1998","unstructured":"Baxter, I.D., Yahin, A., Moura, L., Sant\u2019Anna, M., Bier, L.: Clone detection using abstract syntax trees. In: ICSM 1998, p. 368. IEEE CS, Los Alamitos (1998)"},{"issue":"3","key":"31_CR5","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1109\/TSE.2006.28","volume":"32","author":"Z. Li","year":"2006","unstructured":"Li, Z., Lu, S., Myagmar, S.: CP-Miner: Finding copy-paste and related bugs in large-scale software code. IEEE Trans. Softw. Eng.\u00a032(3), 176\u2013192 (2006)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"7","key":"31_CR6","doi-asserted-by":"publisher","first-page":"654","DOI":"10.1109\/TSE.2002.1019480","volume":"28","author":"T. Kamiya","year":"2002","unstructured":"Kamiya, T., Kusumoto, S., Inoue, K.: CCFinder: a multilinguistic token-based code clone detection system for large scale source code. IEEE Trans. Softw. Eng.\u00a028(7), 654\u2013670 (2002)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"31_CR7","first-page":"150","volume-title":"WCRE 2007: Working Conference on Reverse Engineering","author":"W.S. Evans","year":"2007","unstructured":"Evans, W.S., Fraser, C.W., Ma, F.: Clone detection via structural abstraction. In: WCRE 2007: Working Conference on Reverse Engineering, pp. 150\u2013159. IEEE CS, Los Alamitos (2007)"},{"key":"31_CR8","first-page":"96","volume-title":"ICSE 2007","author":"L. Jiang","year":"2007","unstructured":"Jiang, L., Misherghi, G., Su, Z., Glondu, S.: Deckard: scalable and accurate tree-based detection of code clones. In: ICSE 2007, pp. 96\u2013105. IEEE CS, Los Alamitos (2007)"},{"key":"31_CR9","volume-title":"ASE 2008","author":"T.T. Nguyen","year":"2008","unstructured":"Nguyen, T.T., Nguyen, H.A., Pham, N.H., Al-Kofahi, J.M., Nguyen, T.N.: Cleman: Comprehensive clone group evolution management. In: ASE 2008. IEEE CS, Los Alamitos (2008)"},{"key":"31_CR10","unstructured":"The MathWorks Inc. SIMULINK Model-Based and System-Based Design (2002)"},{"key":"31_CR11","first-page":"603","volume-title":"ICSE 2008","author":"F. Deissenboeck","year":"2008","unstructured":"Deissenboeck, F., Hummel, B., J\u00fcrgens, E., Sch\u00e4tz, B., Wagner, S., Girard, J.F., Teuchert, S.: Clone detection in automotive model-based development. In: ICSE 2008, pp. 603\u2013612. ACM, New York (2008)"},{"key":"31_CR12","volume-title":"ICSE 2009, International Conference on Software Engineering","author":"N.H. Pham","year":"2009","unstructured":"Pham, N.H., Nguyen, H.A., Nguyen, T.T., Al-Kofahi, J.M., Nguyen, T.N.: Complete and Accurate Clone Detection in Graph-based Models. In: ICSE 2009, International Conference on Software Engineering. IEEE CS, Los Alamitos (2009)"},{"key":"31_CR13","doi-asserted-by":"crossref","unstructured":"Ukkonen, E.: Approximate string matching with q-grams and maximal matches. Albert-Ludwigs University at Freiburg. Technical report (1991)","DOI":"10.1016\/0304-3975(92)90143-4"},{"key":"31_CR14","doi-asserted-by":"crossref","unstructured":"Yang, R., Kalnis, P., Tung, A.K.H.: Similarity evaluation on tree-structured data. In: SIGMOD 2005: International conference on Management of data (2005)","DOI":"10.1145\/1066157.1066243"},{"issue":"3","key":"31_CR15","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s10618-005-0003-9","volume":"11","author":"M. Kuramochi","year":"2005","unstructured":"Kuramochi, M., Karypis, G.: Finding frequent patterns in a large sparse graph*. Data Mining and Knowledge Discovery\u00a011(3), 243\u2013271 (2005)","journal-title":"Data Mining and Knowledge Discovery"},{"key":"31_CR16","first-page":"269","volume-title":"APSEC 2006","author":"H. Liu","year":"2006","unstructured":"Liu, H., Ma, Z., Zhang, L., Shao, W.: Detecting duplications in sequence diagrams based on suffix trees. In: APSEC 2006, pp. 269\u2013276. IEEE CS, Los Alamitos (2006)"},{"issue":"5","key":"31_CR17","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1145\/949952.940102","volume":"28","author":"D. Ohst","year":"2003","unstructured":"Ohst, D., Welle, M., Kelter, U.: Differences between versions of UML diagrams. SIGSOFT Softw. Eng. Notes\u00a028(5), 227\u2013236 (2003)","journal-title":"SIGSOFT Softw. Eng. Notes"},{"key":"31_CR18","first-page":"54","volume-title":"ASE 2005","author":"Z. Xing","year":"2005","unstructured":"Xing, Z., Stroulia, E.: UMLDiff: an algorithm for object-oriented design differencing. In: ASE 2005, pp. 54\u201365. ACM, New York (2005)"},{"key":"31_CR19","first-page":"204","volume-title":"ASE 2005","author":"A. Mehra","year":"2005","unstructured":"Mehra, A., Grundy, J., Hosking, J.: A generic approach to supporting diagram differencing and merging for collaborative design. In: ASE 2005, pp. 204\u2013213. ACM, New York (2005)"},{"key":"31_CR20","first-page":"54","volume-title":"ICSE 2007","author":"S. Nejati","year":"2007","unstructured":"Nejati, S., Sabetzadeh, M., Chechik, M., Easterbrook, S., Zave, P.: Matching and merging of statecharts specifications. In: ICSE 2007, pp. 54\u201364. IEEE CS, Los Alamitos (2007)"},{"key":"31_CR21","first-page":"164","volume-title":"ASE 2007","author":"Y. Xiong","year":"2007","unstructured":"Xiong, Y., Liu, D., Hu, Z., Zhao, H., Takeichi, M., Mei, H.: Towards automatic model synchronization from model transformations. In: ASE 2007, pp. 164\u2013173. ACM, New York (2007)"},{"key":"31_CR22","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1515\/9783110206630","volume-title":"GRaMoT 2008: Proc. of international workshop on graph and model transformations","author":"G. Bergmann","year":"2008","unstructured":"Bergmann, G., \u00d6kr\u00f6s, A., R\u00e1th, I., Varr\u00f3, D., Varr\u00f3, G.: Incremental pattern matching in the viatra model transformation system. In: GRaMoT 2008: Proc. of international workshop on graph and model transformations, pp. 25\u201332. ACM, New York (2008)"},{"issue":"11","key":"31_CR23","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1109\/TSE.2007.70731","volume":"33","author":"B. Fluri","year":"2007","unstructured":"Fluri, B., Wuersch, M., PInzger, M., Gall, H.: Change distilling: Tree differencing for fine-grained source code change extraction. IEEE Trans. Softw. Eng.\u00a033(11), 725\u2013743 (2007)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"31_CR24","first-page":"513","volume-title":"FSE 2007","author":"H. Basit","year":"2007","unstructured":"Basit, H., Jarzabek, S.: Efficient token based clone detection with flexible tokenization. In: FSE 2007, pp. 513\u2013516. ACM, New York (2007)"},{"issue":"9","key":"31_CR25","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1109\/TSE.2007.70725","volume":"33","author":"S. Bellon","year":"2007","unstructured":"Bellon, S., Koschke, R., Antoniol, G., Krinke, J., Merlo, E.: Comparison and evaluation of clone detection tools. IEEE Trans. Softw. Eng.\u00a033(9), 577\u2013591 (2007)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"31_CR26","first-page":"253","volume-title":"WCRE 2006","author":"R. Koschke","year":"2006","unstructured":"Koschke, R., Falke, R., Frenzel, P.: Clone detection using abstract syntax suffix trees. In: WCRE 2006, pp. 253\u2013262. IEEE CS, Los Alamitos (2006)"},{"issue":"1","key":"31_CR27","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1006\/jcss.1996.0003","volume":"26","author":"B.S. Baker","year":"1996","unstructured":"Baker, B.S.: Parameterized pattern matching: Algorithms and applications. Journal of Computer and System Sciences\u00a026(1), 28\u201342 (1996)","journal-title":"Journal of Computer and System Sciences"},{"key":"31_CR28","unstructured":"Johnson, J.H.: Identifying redundancy in source code using fingerprints. In: CASCON 1993, pp. 171\u2013183. IBM Press (1993)"},{"issue":"5","key":"31_CR29","doi-asserted-by":"publisher","first-page":"1343","DOI":"10.1137\/S0097539793246707","volume":"26","author":"B.S. Baker","year":"1997","unstructured":"Baker, B.S.: Parameterized duplication in strings: Algorithms and an application to software maintenance. SIAM J. Comput.\u00a026(5), 1343\u20131362 (1997)","journal-title":"SIAM J. Comput."},{"key":"31_CR30","first-page":"625","volume-title":"ICSE 2004","author":"I.D. Baxter","year":"2004","unstructured":"Baxter, I.D., Pidgeon, C., Mehlich, M.: DMS\u00ae: Program transformations for practical scalable software evolution. In: ICSE 2004, pp. 625\u2013634. IEEE CS, Los Alamitos (2004)"},{"key":"31_CR31","first-page":"128","volume-title":"SCAM 2004","author":"V. Wahler","year":"2004","unstructured":"Wahler, V., Seipel, D., Gudenberg, J.W., Fischer, G.: Clone detection in source code by frequent itemset techniques. In: SCAM 2004, pp. 128\u2013135. IEEE CS, Los Alamitos (2004)"},{"key":"31_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/3-540-47764-0_3","volume-title":"Static Analysis","author":"R. Komondoor","year":"2001","unstructured":"Komondoor, R., Horwitz, S.: Using slicing to identify duplication in source code. In: Cousot, P. (ed.) SAS 2001. LNCS, vol.\u00a02126, pp. 40\u201356. Springer, Heidelberg (2001)"},{"key":"31_CR33","first-page":"244","volume-title":"ICSM 1996","author":"J. Mayrand","year":"1996","unstructured":"Mayrand, J., Leblanc, C., Merlo, E.: Experiment on the automatic detection of function clones in a software system using metrics. In: ICSM 1996, p. 244. IEEE CS, Los Alamitos (1996)"}],"container-title":["Lecture Notes in Computer Science","Fundamental Approaches to Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00593-0_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,24]],"date-time":"2023-05-24T17:06:41Z","timestamp":1684948001000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00593-0_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642005923","9783642005930"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00593-0_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}