{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T00:06:30Z","timestamp":1767139590763,"version":"build-2238731810"},"publisher-location":"Singapore","reference-count":38,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811619267","type":"print"},{"value":"9789811619274","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-1927-4_3","type":"book-chapter","created":{"date-parts":[[2021,8,3]],"date-time":"2021-08-03T01:02:40Z","timestamp":1627952560000},"page":"45-50","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["NiCad: A Modern Clone Detector"],"prefix":"10.1007","author":[{"given":"Manishankar","family":"Mondal","sequence":"first","affiliation":[]},{"given":"Chanchal K.","family":"Roy","sequence":"additional","affiliation":[]},{"given":"James R.","family":"Cordy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,4]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"M.\u00a0Asaduzzaman, C.K. Roy, K.A. Schneider, Viscad: flexible code clone analysis support for nicad, in IWSC, pp. 77\u201378 (2011)","DOI":"10.1145\/1985404.1985425"},{"issue":"3","key":"3_CR2","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.scico.2006.04.002","volume":"61","author":"JR Cordy","year":"2006","unstructured":"J.R. Cordy, The TXL source transformation language. Sci. Comput. Program. 61(3), 190\u2013210 (2006)","journal-title":"Sci. Comput. Program."},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"J.R. Cordy, C.K. Roy, The NiCad clone detector, in Proceedings of the 2011 IEEE 19th International Conference on Program Comprehension (ICPC\u2019 11), pp. 219\u2013220 (2011)","DOI":"10.1109\/ICPC.2011.26"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"F.A. Fontana, M.\u00a0Zanoni, F.\u00a0Zanoni, A duplicated code refactoring advisor, in Agile Processes, in Software Engineering, and Extreme Programming, LNBIP(212), pp. 3\u201314 (2015)","DOI":"10.1007\/978-3-319-18612-2_1"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"J.F. Islam, M.\u00a0Mondal, C.K. Roy, Bug replication in code clones: an empirical study, in Proceedings of the 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER\u201916), pp. 68\u201378 (2016)","DOI":"10.1109\/SANER.2016.78"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"J.F. Islam, M.\u00a0Mondal, C.K. Roy, A comparative study of software bugs in micro-clones and regular code clones, in SANER, pp. 1\u201311 (2019)","DOI":"10.1109\/SANER.2019.8667993"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"J.F. Islam, M.\u00a0Mondal, C.K. Roy, K.A. Schneider, Comparing bug replication in regular and micro code clones, in ICPC, pp. 1\u201311 (2019)","DOI":"10.1109\/ICPC.2019.00022"},{"issue":"1","key":"3_CR8","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.visinf.2019.03.003","volume":"3","author":"D Mondal","year":"2019","unstructured":"D. Mondal, M. Mondal, C.K. Roy, K.A. Schneider, Y. Li, S. Wang, Clone-world: a visual analytic system for large scale software clones. Vis. Inform. 3(1), 18\u201326 (2019)","journal-title":"Vis. Inform."},{"issue":"2","key":"3_CR9","doi-asserted-by":"publisher","first-page":"693","DOI":"10.1007\/s10664-017-9528-y","volume":"23","author":"M Mondal","year":"2018","unstructured":"M. Mondal, M.S. Rahman, C.K. Roy, K.A. Schneider, Is cloned code really stable? Empir. Softw. Eng. 23(2), 693\u2013770 (2018)","journal-title":"Empir. Softw. Eng."},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"M. Mondal, B. Roy, C.K. Roy, K.A. Schneider, An empirical study on bug propagation through code cloning. J. Syst. Softw. (2019)","DOI":"10.1016\/j.jss.2019.110407"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"M.\u00a0Mondal, B.\u00a0Roy, C.K. Roy, K.A. Schneider, Investigating context adaptation bugs in code clones, in ICSME, pp. 157\u2013168 (2019)","DOI":"10.1109\/ICSME.2019.00026"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"M.\u00a0Mondal, B.\u00a0Roy, C.K. Roy, K.A. Schneider, Associating code clones with association rules for change impact analysis, in SANER, pp. 93\u2013103 (2020)","DOI":"10.1109\/SANER48275.2020.9054846"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"M.\u00a0Mondal, B.\u00a0Roy, C.K. Roy, K.A. Schneider, Investigating near-miss micro-clones in evolving software, in ICPC, p.\u00a011 (2020)","DOI":"10.1145\/3387904.3389262"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"M.\u00a0Mondal, C.K. Roy, M.S. Rahman, R.K. Saha, J.\u00a0Krinke, K.A. Schneider, Comparative stability of cloned and non-cloned code: an empirical study, in Proceedings of the 27th Annual ACM Symposium on Applied Computing (SAC\u201912), pp. 1227\u20131234 (2012)","DOI":"10.1145\/2245276.2231969"},{"issue":"4","key":"3_CR15","first-page":"445","volume":"95","author":"M Mondal","year":"2013","unstructured":"M. Mondal, C.K. Roy, K.A. Schneider, An insight into the dispersion of changes in cloned and non-cloned code: a genealogy based empirical study. Sci. Comput. Program. J. 95(4), 445\u2013468 (2013)","journal-title":"Sci. Comput. Program. J."},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"M.\u00a0Mondal, C.K. Roy, K.A. Schneider, Automatic identification of important clones for refactoring and tracking, in Proceedings of the IEEE 14th International Working Conference on Source Code Analysis and Manipulation (SCAM\u201914), pp. 11\u201320 (2014)","DOI":"10.1109\/SCAM.2014.11"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"M.\u00a0Mondal, C.K. Roy, K.A. Schneider, Automatic ranking of clones for refactoring through mining association rules, in Proceedings of the IEEE Conference on Software Maintenance, Reengineering and Reverse Engineering (CSMR-WCRE\u201914), Software Evolution Week, pp. 114\u2013123 (2014)","DOI":"10.1109\/CSMR-WCRE.2014.6747161"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"M.\u00a0Mondal, C.K. Roy, K.A. Schneider, A fine-grained analysis on the evolutionary coupling of cloned code, in Proceedings of the 30th IEEE International Conference on Software Maintenance and Evolution (ICSME\u201914), pp. 51\u201360 (2014)","DOI":"10.1109\/ICSME.2014.27"},{"key":"3_CR19","unstructured":"M.\u00a0Mondal, C.K. Roy, K.A. Schneider, Late propagation in near-miss clones: an empirical study, in Proceedings of the 8th International Workshop on Software Clones (IWSC\u201914), pp. 1\u201315 (2014)"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"M.\u00a0Mondal, C.K. Roy, K.A. Schneider, Prediction and ranking of co-change candidates for clones, in Proceedings of the 11th Working Conference on Mining Software (MSR\u201914), pp. 32\u201341 (2014)","DOI":"10.1145\/2597073.2597104"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"M.\u00a0Mondal, C.K. Roy, K.A. Schneider, A comparative study on the bug-proneness of different types of code clones, in Proceedings of the 31st IEEE International Conference on Software Maintenance and Evolution (ICSME\u201915), pp. 91\u2013100 (2015)","DOI":"10.1109\/ICSM.2015.7332455"},{"key":"3_CR22","unstructured":"M.\u00a0Mondal, C.K. Roy, K.A. Schneider, An empirical study on change recommendation, in Proceedings of the 25th Annual International Conference on Computer Science and Software Engineering (CASCON\u201915), pp. 141\u2013150 (2015)"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"M.\u00a0Mondal, C.K. Roy, K.A. Schneider, SPCP-Miner: a tool for mining code clones that are important for refactoring or tracking, in Proceedings of the 22nd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER\u201915), pp. 482\u2013486 (2015)","DOI":"10.1109\/SANER.2015.7081861"},{"issue":"4","key":"3_CR24","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1007\/s11219-016-9305-y","volume":"24","author":"M Mondal","year":"2016","unstructured":"M. Mondal, C.K. Roy, K.A. Schneider, A comparative study on the intensity and harmfulness of late propagation in near-miss code clones. Softw. Qual. J. 24(4), 883\u2013915 (2016)","journal-title":"Softw. Qual. J."},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"M.\u00a0Mondal, C.K. Roy, K.A. Schneider, Micro-clones in evolving software, in SANER, pp. 50\u201360 (2018)","DOI":"10.1109\/SANER.2018.8330196"},{"key":"3_CR26","unstructured":"C.K. Roy, J.R. Cordy, A survey on software clone detection research, in Tech Report TR 2007-541, School of Computing, Queens University, Canada, pp. 1\u2013115 (2007)"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"C.K. Roy, J.R. Cordy, NICAD: accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization, in Proceedings of the 16th IEEE International Conference on Program Comprehension (ICPC\u201908), pp. 172\u2013181 (2008)","DOI":"10.1109\/ICPC.2008.41"},{"key":"3_CR28","doi-asserted-by":"crossref","unstructured":"C.K. Roy, J.R. Cordy, Adventuures in NICAD: a ten-year retrospective. In ICPC, p. 19 (2018) (MIP Abstract)","DOI":"10.1145\/3196321.3196325"},{"key":"3_CR29","doi-asserted-by":"crossref","unstructured":"C.K. Roy, J.R. Cordy, Benchmarks for software clone detection: a ten-year retrospective. In SANER, pp. 26\u201337 (2018)","DOI":"10.1109\/SANER.2018.8330194"},{"key":"3_CR30","doi-asserted-by":"crossref","unstructured":"R.K. Saha, C.K. Roy, K.A. Schneider, An automatic framework for extracting and classifying near-miss clone genealogies, in Proceedings of the 27th IEEE International Conference on Software Maintenance (ICSM\u201911), pp. 293\u2013302 (2011)","DOI":"10.1109\/ICSM.2011.6080796"},{"key":"3_CR31","unstructured":"K.A.\u00a0Schneider, M.\u00a0Mondal, C.K.\u00a0Roy, A fine-grained analysis on the inconsistent changes in code clones, in ICSME, pp. 220\u2013231 (2020)"},{"issue":"10","key":"3_CR32","first-page":"1","volume":"137","author":"A Sheneamer","year":"2016","unstructured":"A. Sheneamer, J. Kalita, Article: a survey of software clone detection techniques. Int. J. Comput. Appl. 137(10), 1\u201321 (2016)","journal-title":"Int. J. Comput. Appl."},{"key":"3_CR33","doi-asserted-by":"crossref","unstructured":"J.\u00a0Svajlenko, C.K. Roy, Evaluating modern clone detection tools, in Proceedings of the 2014 IEEE International Conference on Software Maintenance and Evolution (ICSME\u201914), pp. 321\u2013330 (2014)","DOI":"10.1109\/ICSME.2014.54"},{"issue":"11","key":"3_CR34","doi-asserted-by":"publisher","first-page":"1055","DOI":"10.1109\/TSE.2015.2448531","volume":"41","author":"N Tsantalis","year":"2015","unstructured":"N. Tsantalis, D. Mazinanian, G.P. Krishnan, Assessing the refactorability of software clones. IEEE Trans. Softw. Eng. 41(11), 1055\u20131090 (2015)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"3_CR35","doi-asserted-by":"crossref","unstructured":"S.\u00a0Uddin, C.K. Roy, K.A. Schneider, SimCad: an extensible and faster clone detection tool for large scale software systems, in Proceedings of the IEEE 21st International Conference on Program Comprehension (ICPC\u201913), pp. 236\u2013238 (2013)","DOI":"10.1109\/ICPC.2013.6613857"},{"key":"3_CR36","doi-asserted-by":"crossref","unstructured":"S.\u00a0Uddin, C.K. Roy, K.A. Schneider, A.\u00a0Hindle, On the effectiveness of simhash for detecting near-miss clones in large scale software systems, in WCRE, pp. 13\u201322 (2011)","DOI":"10.1109\/WCRE.2011.12"},{"key":"3_CR37","unstructured":"S.\u00a0Uddin, C.K. Roy, K.A. Schneider, A.\u00a0Hindle, Simcad: a ten-year retrospective, in SANER (2021) (oral presentation)"},{"key":"3_CR38","doi-asserted-by":"crossref","unstructured":"T.\u00a0Wang, M.\u00a0Harman, Y.\u00a0Jia, J.\u00a0Krinke, Searching for better configurations: a rigorous approach to clone evaluation, in Proceedings of the 9th Joint Meeting on Foundations of Software Engineering (ESEC\/FSE\u201913), pp. 455\u2013465 (2013)","DOI":"10.1145\/2491411.2491420"}],"updated-by":[{"DOI":"10.1007\/978-981-16-1927-4_17","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T00:00:00Z","timestamp":1633910400000}}],"container-title":["Code Clone Analysis"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-1927-4_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T01:00:03Z","timestamp":1633914003000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-1927-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811619267","9789811619274"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-1927-4_3","relation":{},"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"4 August 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"11 October 2021","order":2,"name":"change_date","label":"Change Date","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Correction","order":3,"name":"change_type","label":"Change Type","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"In the original version of the book, the following belated correction is to be incorporated: In chapter \u201cNiCad: A Modern Clone Detector\u201d, the affiliation \u201cQueen\u2019s University, Belfast, Northern Ireland\u201d of author \u201cJ. R. Cordy\u201d is to be changed to \u201cQueen's University, Kingston, Canada\u201d. The author\u2019s affiliation is corrected in the chapter. The erratum chapter have been updated with the change.","order":4,"name":"change_details","label":"Change Details","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}