{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:07:55Z","timestamp":1725574075493},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642183805"},{"type":"electronic","value":"9783642183812"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-18381-2_7","type":"book-chapter","created":{"date-parts":[[2011,1,4]],"date-time":"2011-01-04T11:01:51Z","timestamp":1294138911000},"page":"86-98","source":"Crossref","is-referenced-by-count":7,"title":["Tracking the Evolution of Code Clones"],"prefix":"10.1007","author":[{"given":"Tibor","family":"Bakota","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1109\/ICSM.1996.565012","volume-title":"Proceedings of the 1996 International Conference on Software Maintenance, ICSM 1996","author":"J. Mayrand","year":"1996","unstructured":"Mayrand, J., Leblanc, C., Merlo, E.: Experiment on the automatic detection of function clones in a software system using metrics. In: Proceedings of the 1996 International Conference on Software Maintenance, ICSM 1996, p. 244. IEEE Computer Society, Washington (1996)"},{"key":"7_CR2","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/WCRE.2006.1","volume-title":"Proceedings of the 13th Working Conference on Reverse Engineering, WCRE 2006","author":"C. Kapser","year":"2006","unstructured":"Kapser, C., Godfrey, M.W.: cloning considered harmful\u201d considered harmful. In: Proceedings of the 13th Working Conference on Reverse Engineering, WCRE 2006, pp. 19\u201328. IEEE Computer Society, Washington (2006)"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Rahman, F., Bird, C., Devanbu, P.: Clones: What is that smell? In: 7th IEEE Working Conference on Mining Software Repositories (MSR), pp. 72\u201381 (2010)","DOI":"10.1109\/MSR.2010.5463343"},{"key":"7_CR4","doi-asserted-by":"publisher","first-page":"654","DOI":"10.1109\/TSE.2002.1019480","volume":"28","author":"T. Kamiya","year":"2002","unstructured":"Kamiya, T., Kusumoto, S., Inoue, K.: CCFinder: a multilinguistic token-based code clone detection system for large scale source code. IEEE Transactions on Software Engineering\u00a028, 654\u2013670 (2002)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"7_CR5","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1109\/WCRE.2006.18","volume-title":"Proceedings of the 13th Working Conference on Reverse Engineering (WCRE 2006)","author":"R. Koschke","year":"2006","unstructured":"Koschke, R., Falke, R., Frenzel, P.: Clone detection using abstract syntax suffix trees. In: Proceedings of the 13th Working Conference on Reverse Engineering (WCRE 2006), Washington, DC, USA, pp. 253\u2013262. IEEE Computer Society, Los Alamitos (2006)"},{"key":"7_CR6","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1109\/ICSM.1997.624264","volume-title":"Proceedings of the 13th International Conference on Software Maintenance (ICSM 1997)","author":"B. Lague","year":"1997","unstructured":"Lague, B., Proulx, D., Mayrand, J., Merlo, E.M., Hudepohl, J.: Assessing the benefits of incorporating function clone detection in a development process. In: Proceedings of the 13th International Conference on Software Maintenance (ICSM 1997), Washington, DC, USA, p. 314. IEEE Computer Society, Los Alamitos (1997)"},{"key":"7_CR7","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1109\/ICSM.2001.972740","volume-title":"Proceedings of the 17th International Conference on Software Maintenance (ICSM 2001)","author":"G. Antoniol","year":"2001","unstructured":"Antoniol, G., Casazza, G., Di Penta, M., Merlo, E.: Modeling clones evolution through time series. In: Proceedings of the 17th International Conference on Software Maintenance (ICSM 2001), pp. 273\u2013280. IEEE Computer Society, Los Alamitos (2001)"},{"key":"7_CR8","first-page":"158","volume-title":"ICSE 2007: Proceedings of the 29th International Conference on Software Engineering","author":"E. Duala-Ekoko","year":"2007","unstructured":"Duala-Ekoko, E., Robillard, M.P.: Tracking code clones in evolving software. In: ICSE 2007: Proceedings of the 29th International Conference on Software Engineering, Washington, DC, USA, pp. 158\u2013167. IEEE Computer Society, Los Alamitos (2007)"},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1145\/1095430.1081737","volume":"30","author":"M. Kim","year":"2005","unstructured":"Kim, M., Sazawal, V., Notkin, D., Murphy, G.: An empirical study of code clone genealogies. SIGSOFT Software Engineering Notes\u00a030, 187\u2013196 (2005)","journal-title":"SIGSOFT Software Engineering Notes"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"G\u00f6de, N., Koschke, R.: Incremental clone detection. In: European Conference on Software Maintenance and Reengineering, pp. 219\u2013228 (2009)","DOI":"10.1109\/CSMR.2009.20"},{"key":"7_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10664-009-9108-x","volume":"15","author":"S. Thummalapenta","year":"2010","unstructured":"Thummalapenta, S., Cerulo, L., Aversano, L., Di Penta, M.: An empirical study on the maintenance of source code clones. Empirical Softw. Engg.\u00a015, 1\u201334 (2010)","journal-title":"Empirical Softw. Engg."},{"key":"7_CR12","first-page":"170","volume-title":"Proceedings of the 14th Working Conference on Reverse Engineering, WCRE 2007","author":"J. Krinke","year":"2007","unstructured":"Krinke, J.: A study of consistent and inconsistent changes to code clones. In: Proceedings of the 14th Working Conference on Reverse Engineering, WCRE 2007, pp. 170\u2013178. IEEE Computer Society, Washington (2007)"},{"key":"7_CR13","volume-title":"Proceedings of the Fourth International Workshop on Mining Software Repositories, MSR 2007","author":"G. Canfora","year":"2007","unstructured":"Canfora, G., Cerulo, L., Di Penta, M.: Identifying changed source code lines from version repositories. In: Proceedings of the Fourth International Workshop on Mining Software Repositories, MSR 2007, IEEE Computer Society, Washington (2007)"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Bakota, T., Ferenc, R., Gyimothy, T.: Clone smells in software evolution. In: Proceedings of the 23rd International Conference on Software Maintenance (ICSM 2007), October 2-5, pp. 24\u201333 (2007)","DOI":"10.1109\/ICSM.2007.4362615"},{"key":"7_CR15","volume-title":"Refactoring: Improving the Design of Existing Code","author":"M. Fowler","year":"1999","unstructured":"Fowler, M., Beck, K., Brant, J., Opdyke, W., Roberts, D.: Refactoring: Improving the Design of Existing Code. Addison-Wesley Professional, Reading (1999)"},{"key":"7_CR16","unstructured":"jEdit Homepage, http:\/\/www.jedit.org"},{"key":"7_CR17","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1109\/ICSM.2002.1167764","volume-title":"Proceedings of the 18th International Conference on Software Maintenance (ICSM 2002)","author":"R. Ferenc","year":"2002","unstructured":"Ferenc, R., Besz\u00e9des, \u00c1., Tarkiainen, M., Gyim\u00f3thy, T.: Columbus \u2013 Reverse Engineering Tool and Schema for C++. In: Proceedings of the 18th International Conference on Software Maintenance (ICSM 2002), pp. 172\u2013181. IEEE Computer Society, Los Alamitos (2002)"},{"key":"7_CR18","unstructured":"FrontEndART Software Ltd, http:\/\/www.frontendart.com (2001)"},{"key":"7_CR19","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1109\/CSMR.2002.995790","volume-title":"Proceedings of the 6th European Conference on Software Maintenance and Reengineering (CSMR 2002)","author":"R. Ferenc","year":"2002","unstructured":"Ferenc, R., Besz\u00e9des, \u00c1.: Data Exchange with the Columbus Schema for C++. In: Proceedings of the 6th European Conference on Software Maintenance and Reengineering (CSMR 2002), pp. 59\u201366. IEEE Computer Society, Los Alamitos (2002)"},{"key":"7_CR20","unstructured":"Yudin, D., Gol\u2019shtein, E.G.: Linear Programing Problems of Transportation. NAUKA (1969) (in Russian)"},{"key":"7_CR21","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1002\/nav.3800020109","volume":"2","author":"H.W. Kuhn","year":"1955","unstructured":"Kuhn, H.W.: The Hungarian method for the assignment problem. Naval Research Logistic Quarterly\u00a02, 83\u201397 (1955)","journal-title":"Naval Research Logistic Quarterly"},{"key":"7_CR22","unstructured":"Levenshtein distance, http:\/\/en.wikipedia.org\/wiki\/Levenshtein_distance"},{"issue":"4598","key":"7_CR23","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1126\/science.220.4598.671","volume":"220","author":"S. Kirkpatrick","year":"1983","unstructured":"Kirkpatrick, S., Gelatt, C.D., Vecchi, M.P.: Optimization by simulated annealing. Science\u00a0220(4598), 671\u2013680 (1983)","journal-title":"Science"}],"container-title":["Lecture Notes in Computer Science","SOFSEM 2011: Theory and Practice of Computer Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-18381-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,15]],"date-time":"2020-06-15T03:32:04Z","timestamp":1592191924000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-18381-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642183805","9783642183812"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-18381-2_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}