{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T10:22:22Z","timestamp":1762251742414,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642198106"},{"type":"electronic","value":"9783642198113"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19811-3_30","type":"book-chapter","created":{"date-parts":[[2011,3,14]],"date-time":"2011-03-14T09:06:18Z","timestamp":1300093578000},"page":"432-446","source":"Crossref","is-referenced-by-count":21,"title":["An Empirical Study of Long-Lived Code Clones"],"prefix":"10.1007","author":[{"given":"Dongxiang","family":"Cai","sequence":"first","affiliation":[]},{"given":"Miryung","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","first-page":"81","volume-title":"CSMR 2007","author":"L. Aversano","year":"2007","unstructured":"Aversano, L., Cerulo, L., Penta, M.D.: How clones are maintained: An empirical study. In: CSMR 2007, pp. 81\u201390. IEEE Computer Society Press, Washington, DC, USA (2007)"},{"key":"30_CR2","first-page":"98","volume-title":"WCRE 2000","author":"M. Balazinska","year":"2000","unstructured":"Balazinska, M., Merlo, E., Dagenais, M., Lag\u00fce, B., Kontogiannis, K.: Advanced clone-analysis to support object-oriented system refactoring. In: WCRE 2000, p. 98. IEEE Computer Society, Washington, DC, USA (2000)"},{"key":"30_CR3","first-page":"56","volume-title":"ICPC 2006","author":"M. Balint","year":"2006","unstructured":"Balint, M., Marinescu, R., Girba, T.: How developers copy. In: ICPC 2006, pp. 56\u201368. IEEE Computer Society, Washington, DC, USA (2006)"},{"key":"30_CR4","first-page":"368","volume-title":"ICSM 1998","author":"I.D. Baxter","year":"1998","unstructured":"Baxter, I.D., Yahin, A., Moura, L., Sant\u2019Anna, M., Bier, L.: Clone detection using abstract syntax trees. In: ICSM 1998, p. 368. IEEE Computer Society, Washington, DC, USA (1998)"},{"issue":"9","key":"30_CR5","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1109\/TSE.2007.70725","volume":"33","author":"S. Bellon","year":"2007","unstructured":"Bellon, S., Koschke, R., Antoniol, G., Krinke, J., Merlo, E.: Comparison and evaluation of clone detection tools. IEEE Trans. Softw. Eng.\u00a033(9), 577\u2013591 (2007)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"2","key":"30_CR6","first-page":"123","volume":"24","author":"L. Breiman","year":"1996","unstructured":"Breiman, L.: Bagging predictors. Mach. Learn.\u00a024(2), 123\u2013140 (1996)","journal-title":"Mach. Learn."},{"key":"30_CR7","first-page":"196","volume-title":"IWPC 2003","author":"J.R. Cordy","year":"2003","unstructured":"Cordy, J.R.: Comprehending reality practical barriers to industrial adoption of software maintenance automation. In: IWPC 2003, p. 196. IEEE Computer Society, Washington, DC, USA (2003)"},{"key":"30_CR8","first-page":"165","volume-title":"ESEC-FSE 2007","author":"R. Cottrell","year":"2007","unstructured":"Cottrell, R., Chang, J.J.C., Walker, R.J., Denzinger, J.: Determining detailed structural correspondence for generalization tasks. In: ESEC-FSE 2007, Dubrovnik, Croatia, pp. 165\u2013174. ACM, New York (2007)"},{"key":"30_CR9","first-page":"109","volume-title":"ICSM 1999","author":"S. Ducasse","year":"1999","unstructured":"Ducasse, S., Rieger, M., Demeyer, S.: A language independent approach for detecting duplicated code. In: ICSM 1999, p. 109. IEEE Computer Society, Washington, DC, USA (1999)"},{"key":"30_CR10","volume-title":"Refactoring: Improving the Design of Existing Code","author":"M. Fowler","year":"2000","unstructured":"Fowler, M.: Refactoring: Improving the Design of Existing Code. Addison-Wesley Professional, Reading (2000)"},{"key":"30_CR11","first-page":"255","volume-title":"CSMR 2009","author":"J. Garcia","year":"2009","unstructured":"Garcia, J., Popescu, D., Edwards, G., Medvidovic, N.: Identifying architectural bad smells. In: CSMR 2009, pp. 255\u2013258. IEEE Computer Society, Washington, DC, USA (2009)"},{"key":"30_CR12","unstructured":"Godfrey, M.W., Svetinovic, D., Tu, Q.: Evolution, growth, and cloning in linux, a case study. In: CASCON 2000 (2000)"},{"key":"30_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/978-3-540-24659-6_16","volume-title":"Product Focused Software Process Improvement","author":"Y. Higo","year":"2004","unstructured":"Higo, Y., Kamiya, T., Kusumoto, S., Inoue, K.: Refactoring support based on code clone analysis. In: Bomarius, F., Iida, H. (eds.) PROFES 2004. LNCS, vol.\u00a03009, pp. 220\u2013233. Springer, Heidelberg (2004)"},{"key":"30_CR14","unstructured":"Howard Johnson, J.: Identifying redundancy in source code using fingerprints. In: CASCON 1993, pp. 171\u2013183. IBM Press (1993)"},{"issue":"7","key":"30_CR15","doi-asserted-by":"publisher","first-page":"654","DOI":"10.1109\/TSE.2002.1019480","volume":"28","author":"T. Kamiya","year":"2002","unstructured":"Kamiya, T., Kusumoto, S., Inoue, K.: CCFinder: A multilinguistic token-based code clone detection system for large scale source code. IEEE Trans. Softw. Eng.\u00a028(7), 654\u2013670 (2002)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"30_CR16","first-page":"85","volume-title":"IWPSE 2004","author":"C. Kapser","year":"2004","unstructured":"Kapser, C., Godfrey, M.W.: Aiding comprehension of cloning through categorization. In: IWPSE 2004, Washington, DC, USA, pp. 85\u201394. IEEE Computer Society Press, Los Alamitos (2004)"},{"key":"30_CR17","first-page":"305","volume-title":"ICSM 2005: Proceedings of the 21st IEEE International Conference on Software Maintenance","author":"C. Kapser","year":"2005","unstructured":"Kapser, C., Godfrey, M.W.: Improved tool support for the investigation of duplication in software. In: ICSM 2005: Proceedings of the 21st IEEE International Conference on Software Maintenance, Washington, DC, USA, pp. 305\u2013314. IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"30_CR18","first-page":"19","volume-title":"WCRE 2006","author":"C. Kapser","year":"2006","unstructured":"Kapser, C., Godfrey, M.W.: \u201dCloning Considered Harmful\u201d Considered Harmful. In: WCRE 2006, pp. 19\u201328. IEEE Computer Society, Washington, DC, USA (2006)"},{"key":"30_CR19","first-page":"83","volume-title":"ISESE 2004","author":"M. Kim","year":"2004","unstructured":"Kim, M., Bergman, L., Lau, T., Notkin, D.: An ethnographic study of copy and paste programming practices in oopl. In: ISESE 2004, pp. 83\u201392. IEEE Computer Society, Washington, DC, USA (2004)"},{"key":"30_CR20","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1145\/1081706.1081737","volume-title":"ESEC\/FSE-13","author":"M. Kim","year":"2005","unstructured":"Kim, M., Sazawal, V., Notkin, D., Murphy, G.: An empirical study of code clone genealogies. In: ESEC\/FSE-13, pp. 187\u2013196. ACM Press, New York (2005)"},{"key":"30_CR21","first-page":"155","volume-title":"POPL 2000","author":"R. Komondoor","year":"2000","unstructured":"Komondoor, R., Horwitz, S.: Semantics-preserving procedure extraction. In: POPL 2000, pp. 155\u2013169. ACM Press, New York (2000)"},{"key":"30_CR22","first-page":"33","volume-title":"IWPC 2003","author":"R. Komondoor","year":"2003","unstructured":"Komondoor, R., Horwitz, S.: Effective, automatic procedure extraction. In: IWPC 2003, p. 33. IEEE Computer Society, Washington, DC, USA (2003)"},{"key":"30_CR23","unstructured":"Koni-N\u2019-Sapu, G.G.: A scenario based approach for refactoring duplicated code in object-oriented systems. Master\u2019s thesis, University of Bern (2001)"},{"key":"30_CR24","first-page":"170","volume-title":"WCRE 2007","author":"J. Krinke","year":"2007","unstructured":"Krinke, J.: A study of consistent and inconsistent changes to code clones. In: WCRE 2007, pp. 170\u2013178. IEEE Computer Society, Washington, DC, USA (2007)"},{"key":"30_CR25","first-page":"314","volume-title":"ICSM 1997","author":"B. Lague","year":"1997","unstructured":"Lague, B., Proulx, D., Mayrand, J., Merlo, E.M., Hudepohl, J.: Assessing the benefits of incorporating function clone detection in a development process. In: ICSM 1997, p. 314. IEEE Computer Society, Washington, DC, USA (1997)"},{"key":"30_CR26","first-page":"492","volume-title":"ICSE 2006","author":"T.D. LaToza","year":"2006","unstructured":"LaToza, T.D., Venolia, G., DeLine, R.: Maintaining mental models: a study of developer work habits. In: ICSE 2006, pp. 492\u2013501. ACM, New York (2006)"},{"key":"30_CR27","unstructured":"Li, Z., Lu, S., Myagmar, S., Zhou, Y.: CP-Miner: A tool for finding copy-paste and related bugs in operating system code. In: OSDI 2004, pp. 289\u2013302 (2004)"},{"key":"30_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"276","DOI":"10.1007\/978-3-540-78743-3_20","volume-title":"FASE 2008\/ETAPS 2008","author":"N. Moha","year":"2008","unstructured":"Moha, N., Gu\u00e9h\u00e9neuc, Y.-G., Le Meur, A.-F., Duchien, L.: A domain analysis to specify design defects and generate detection algorithms. In: Fiadeiro, J.L., Inverardi, P. (eds.) FASE 2008\/ETAPS 2008. LNCS, vol.\u00a04961, pp. 276\u2013291. Springer, Heidelberg (2008)"},{"key":"30_CR29","volume-title":"C4.5: Programs for Machine Learning","author":"J.R. Quinlan","year":"1993","unstructured":"Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kaufmann, San Francisco (1993)"},{"key":"30_CR30","first-page":"116","volume-title":"ICSE 2007","author":"D.C. Rajapakse","year":"2007","unstructured":"Rajapakse, D.C., Jarzabek, S.: Using server pages to unify clones in web applications: A trade-off analysis. In: ICSE 2007, pp. 116\u2013126. IEEE Computer Society, Washington, DC, USA (2007)"},{"key":"30_CR31","volume-title":"An Introduction to Information Theory","author":"F.M. Reza","year":"1996","unstructured":"Reza, F.M.: An Introduction to Information Theory. Dover Publications, Inc., New York (1996)"},{"key":"30_CR32","doi-asserted-by":"publisher","first-page":"59","DOI":"10.2307\/2685263","volume":"42","author":"J.L. Rodgers","year":"1988","unstructured":"Rodgers, J.L., Nicewander, W.A.: Thirteen ways to look at the correlation coefficient. The American Statistician\u00a042, 59\u201366 (1988)","journal-title":"The American Statistician"},{"key":"30_CR33","first-page":"329","volume-title":"CSMR 2008","author":"N. Tsantalis","year":"2008","unstructured":"Tsantalis, N., Chaikalis, T., Chatzigeorgiou, A.: Jdeodorant: Identification and removal of type-checking bad smells. In: CSMR 2008, pp. 329\u2013331. IEEE Computer Society Press, Washington, DC, USA (2008)"},{"key":"30_CR34","first-page":"119","volume-title":"CSMR 2009","author":"N. Tsantalis","year":"2009","unstructured":"Tsantalis, N., Chatzigeorgiou, A.: Identification of extract method refactoring opportunities. In: CSMR 2009, pp. 119\u2013128. IEEE Computer Society, Washington, DC, USA (2009)"},{"issue":"3","key":"30_CR35","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1109\/TSE.2009.1","volume":"35","author":"N. Tsantalis","year":"2009","unstructured":"Tsantalis, N., Chatzigeorgiou, A.: Identification of move method refactoring opportunities. IEEE Trans. Softw. Eng.\u00a035(3), 347\u2013367 (2009)","journal-title":"IEEE Trans. Softw. Eng."}],"container-title":["Lecture Notes in Computer Science","Fundamental Approaches to Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19811-3_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T06:50:52Z","timestamp":1558421452000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19811-3_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642198106","9783642198113"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19811-3_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}