{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:41:11Z","timestamp":1725550871454},"publisher-location":"Berlin, Heidelberg","reference-count":4,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642122132"},{"type":"electronic","value":"9783642122149"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12214-9_102","type":"book-chapter","created":{"date-parts":[[2010,3,31]],"date-time":"2010-03-31T15:11:44Z","timestamp":1270048304000},"page":"568-570","source":"Crossref","is-referenced-by-count":1,"title":["CloneManager: A Tool for Detection of Type1 and Type2 Code Clones"],"prefix":"10.1007","author":[{"given":"E.","family":"Kodhai","sequence":"first","affiliation":[]},{"given":"S.","family":"Kanmani","sequence":"additional","affiliation":[]},{"given":"A.","family":"Kamatchi","sequence":"additional","affiliation":[]},{"given":"R.","family":"Radhika","sequence":"additional","affiliation":[]},{"given":"B. Vijaya","family":"Saranya","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"102_CR1","doi-asserted-by":"crossref","unstructured":"Roy, C.K., Cordy, J.R.: NICAD: Acccurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization in ICPC, pp. 172\u2013181 (2008)","DOI":"10.1109\/ICPC.2008.41"},{"key":"102_CR2","doi-asserted-by":"crossref","unstructured":"Tairas, R., Gray, J.: Phoenix-based Clone Detection using suffix trees. In: ACM-SE, pp. 679\u2013684 (2006)","DOI":"10.1145\/1185448.1185597"},{"issue":"1","key":"102_CR3","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1002\/smr.317","volume":"18","author":"S. Ducasse","year":"2006","unstructured":"Ducasse, S., Nierstrasz, O., Rieger, M.: On the effectiveness of clone detection by string matching. Journal on Software Maintenance and Evolution\u00a018(1), 37\u201358 (2006)","journal-title":"Journal on Software Maintenance and Evolution"},{"key":"102_CR4","unstructured":"Merlo, E.: Detection of Plagiarism in University Projects Using Metrics-based Spectral Similarity. In: The Dagstuhl Seminar: Duplication, Redundancy, and Similarity in Software (2007)"}],"container-title":["Communications in Computer and Information Science","Information Processing and Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12214-9_102.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:51:33Z","timestamp":1606168293000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12214-9_102"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642122132","9783642122149"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12214-9_102","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}