{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:52:10Z","timestamp":1759092730470},"reference-count":115,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2015,3,24]],"date-time":"2015-03-24T00:00:00Z","timestamp":1427155200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1007\/s10664-015-9368-6","type":"journal-article","created":{"date-parts":[[2015,3,23]],"date-time":"2015-03-23T07:12:46Z","timestamp":1427094766000},"page":"517-564","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Development nature matters: An empirical study of code clones in JavaScript applications"],"prefix":"10.1007","volume":"21","author":[{"given":"Wai Ting","family":"Cheung","sequence":"first","affiliation":[]},{"given":"Sukyoung","family":"Ryu","sequence":"additional","affiliation":[]},{"given":"Sunghun","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,24]]},"reference":[{"key":"9368_CR1","doi-asserted-by":"crossref","unstructured":"Abd-El-Hafiz SK (2012) A metrics-based data mining approach for software clone detection. In: Proceedings of the 36th annual computer software and applications conference. IEEE, pp 35\u201341","DOI":"10.1109\/COMPSAC.2012.14"},{"key":"9368_CR2","unstructured":"Alexa Internet Inc (2013) Alexa top sites. http:\/\/www.alexa.com\/topsites"},{"key":"9368_CR3","doi-asserted-by":"crossref","unstructured":"Antoniol G, Casazza G, Di Penta M, Merlo E (2001) Modeling clones evolution through time series. In: Proceedings of international conference on software maintenance. IEEE, pp 273\u2013280","DOI":"10.1109\/ICSM.2001.972740"},{"issue":"13","key":"9368_CR4","doi-asserted-by":"crossref","first-page":"755","DOI":"10.1016\/S0950-5849(02)00123-4","volume":"44","author":"G Antoniol","year":"2002","unstructured":"Antoniol G, Villano U, Merlo E, Di Penta M (2002) Analyzing cloning evolution in the Linux kernel. Inf Softw Technol 44(13):755\u2013765","journal-title":"Inf Softw Technol"},{"key":"9368_CR5","doi-asserted-by":"crossref","unstructured":"Aversano L, Cerulo L, Di Penta M (2007) How clones are maintained: an empirical study. In: Proceedings of the 11th European conference on software maintenance and reengineering. IEEE, pp 81\u201390","DOI":"10.1109\/CSMR.2007.26"},{"key":"9368_CR6","doi-asserted-by":"crossref","unstructured":"Bakerm BS (1995) On finding duplication and near-duplication in large software systems. In: Proceedings of the 2nd working conference on reverse engineering. IEEE, pp 86\u201395","DOI":"10.1109\/WCRE.1995.514697"},{"key":"9368_CR7","doi-asserted-by":"crossref","unstructured":"Balazinska M, Merlo E, Dagenais M, Lague B, Kontogiannis K (1999) Measuring clone based reengineering opportunities. In: Proceedings of the 6th international software metrics symposium. IEEE, pp 292\u2013303","DOI":"10.1109\/METRIC.1999.809750"},{"key":"9368_CR8","doi-asserted-by":"crossref","unstructured":"Baxter ID, Yahin A, Moura L, Sant\u2019Anna M, Bier L (1998) Clone detection using abstract syntax trees. In: Proceedings of international conference on software maintenance. IEEE, pp 368\u2013377","DOI":"10.1109\/ICSM.1998.738528"},{"issue":"9","key":"9368_CR9","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1109\/TSE.2007.70725","volume":"33","author":"S Bellon","year":"2007","unstructured":"Bellon S, Koschke R, Antoniol G, Krinke J, Merlo E (2007) Comparison and evaluation of clone detection tools. IEEE Trans Softw Eng 33(9):577\u2013591","journal-title":"IEEE Trans Softw Eng"},{"issue":"6","key":"9368_CR10","doi-asserted-by":"crossref","first-page":"760","DOI":"10.1016\/j.scico.2010.11.010","volume":"77","author":"N Bettenburg","year":"2012","unstructured":"Bettenburg N, Shang W, Ibrahim WM, Adams B, Zou Y, Hassan AE (2012) An empirical study on inconsistent changes to code clones at the release level. Sci Comput Program 77(6):760\u2013776","journal-title":"Sci Comput Program"},{"key":"9368_CR11","doi-asserted-by":"crossref","unstructured":"Blanco L, Dalvi N, Machanavajjhala A (2011) Highly efficient algorithms for structural clustering of large websites. In: Proceedings of the 20th international conference on World wide web. ACM, pp 437\u2013446","DOI":"10.1145\/1963405.1963468"},{"key":"9368_CR12","doi-asserted-by":"crossref","unstructured":"Boldyreff C, Kewish R (2001) Reverse engineering to achieve maintainable WWW sites. In: Proceedings of the 8th working conference on reverse engineering. IEEE, pp 249\u2013257","DOI":"10.1109\/WCRE.2001.957829"},{"key":"9368_CR13","unstructured":"Brito e Abreu F (1995) The MOOD metrics set. In: Proceedings of European conference on object-oriented programming, vol 95, p 267"},{"key":"9368_CR14","doi-asserted-by":"crossref","unstructured":"Brixtel R, Fontaine M, Lesner B, Bazin C, Robbes R (2010) Language-independent clone detection applied to plagiarism detection. In: Proceedings of the 10th IEEE working conference on source code analysis and manipulation. IEEE, pp 77\u201386","DOI":"10.1109\/SCAM.2010.19"},{"key":"9368_CR15","unstructured":"Bulychev P, Minea M (2009) An evaluation of duplicate code detection using anti-unification. In: Proceedings of the 3rd international workshop on software clones. Citeseer, pp 22\u201327"},{"key":"9368_CR16","doi-asserted-by":"crossref","unstructured":"Burd E, Bailey J (2002) Evaluating clone detection tools for use during preventative maintenance. In: Proceedings of the 2nd international workshop on source code analysis and manipulation. IEEE, pp 36\u201343","DOI":"10.1109\/SCAM.2002.1134103"},{"key":"9368_CR17","doi-asserted-by":"crossref","unstructured":"Cai D, Kim M (2011) An empirical study of long-lived code clones. Fundamental approaches to software engineering, pp 432\u2013446","DOI":"10.1007\/978-3-642-19811-3_30"},{"key":"9368_CR18","first-page":"3","volume":"3","author":"F Calefato","year":"2004","unstructured":"Calefato F, Lanubile F, Mallardo T (2004) Function clone detection in web applications: a semiautomated approach. J Web Eng 3:3\u201321","journal-title":"J Web Eng"},{"issue":"6","key":"9368_CR19","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1109\/32.295895","volume":"20","author":"SR Chidamber","year":"1994","unstructured":"Chidamber SR, Kemerer CF (1994) A metrics suite for object oriented design. IEEE Trans Softw Eng 20(6):476\u2013493","journal-title":"IEEE Trans Softw Eng"},{"key":"9368_CR20","doi-asserted-by":"crossref","unstructured":"Chugh R, Meister JA, Jhala R, Lerner S (2009) Staged information flow for javascript. In: ACM Sigplan Notices, vol 44. ACM, pp 50\u201362","DOI":"10.1145\/1542476.1542483"},{"key":"9368_CR21","unstructured":"Cordy JR, Dean TR, Synytskyy N (2004) Practical language-independent detection of near-miss clones. In: Proceedings of the 2004 conference of the centre for advanced studies on collaborative research. IBM Press, pp 1\u201312"},{"key":"9368_CR22","doi-asserted-by":"crossref","unstructured":"Datar M, Immorlica N, Indyk P, Mirrokni VS (2004) Locality-sensitive hashing scheme based on p-stable distributions. In: Proceedings of the 12th annual symposium on computational geometry. ACM, pp 253\u2013262","DOI":"10.1145\/997817.997857"},{"key":"9368_CR23","doi-asserted-by":"crossref","unstructured":"De Lucia A, Francese R, Scanniello G, Tortora G (2005) Understanding cloned patterns in web applications. In: Proceedings of the 13th international workshop on program comprehension. IEEE, pp 333\u2013336","DOI":"10.1109\/WPC.2005.42"},{"issue":"5","key":"9368_CR24","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1002\/smr.359","volume":"19","author":"A Lucia De","year":"2007","unstructured":"De Lucia A, Scanniello G, Tortora G (2007) Identifying similar pages in web applications using a competitive clustering algorithm. J Softw Maint Evol Res Pract 19(5):281\u2013296","journal-title":"J Softw Maint Evol Res Pract"},{"issue":"4","key":"9368_CR25","first-page":"346","volume":"8","author":"A Lucia De","year":"2009","unstructured":"De Lucia A, Risi M, Scanniello G, Tortora G (2009) An investigation of clustering algorithms in the identification of similar web pages. J Web Eng 8(4):346\u2013370","journal-title":"J Web Eng"},{"key":"9368_CR26","doi-asserted-by":"crossref","unstructured":"Di Lucca GA, Di Penta M, Fasolino AR (2002) An approach to identify duplicated web pages. In: Proceedings of the 26th annual international computer software and applications conference. IEEE, pp 481\u2013486","DOI":"10.1109\/CMPSAC.2002.1045051"},{"key":"9368_CR27","doi-asserted-by":"crossref","unstructured":"Di Lucca GA, Fasolino AR, Tramontana P (2005) Recovering interaction design patterns in web applications. In: Proceedings of the 9th European conference on software maintenance and reengineering. IEEE, pp 366\u2013374","DOI":"10.1109\/CSMR.2005.47"},{"key":"9368_CR28","unstructured":"Ducasse S, Nierstrasz O, Rieger M (2004) Lightweight detection of duplicated code\u2013a language-independent approach. Institute for Applied Mathematics and Computer Science. University of Berne"},{"issue":"1","key":"9368_CR29","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1002\/smr.317","volume":"18","author":"S Ducasse","year":"2006","unstructured":"Ducasse S, Nierstrasz O, Rieger M (2006) On the effectiveness of clone detection by string matching. J Softw Maint Evol Res Pract 18(1):37\u201358","journal-title":"J Softw Maint Evol Res Pract"},{"issue":"6","key":"9368_CR30","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1007\/s10664-008-9073-9","volume":"13","author":"R Falke","year":"2008","unstructured":"Falke R, Frenzel P, Koschke R (2008) Empirical evaluation of clone detection using syntax suffix trees. Empir Softw Eng 13(6):601\u2013643","journal-title":"Empir Softw Eng"},{"key":"9368_CR31","unstructured":"Finifter M, Weinberger J, Barth A (2010) Preventing capability leaks in secure javascript subsets. In: NDSS"},{"key":"9368_CR32","volume-title":"Refactoring: improving the design of existing code","author":"M Fowler","year":"1999","unstructured":"Fowler M, Beck K (1999) Refactoring: improving the design of existing code. Addison-Wesley, Reading"},{"key":"9368_CR33","unstructured":"GitHub Inc (2013) JavaScript Projects in GitHub. https:\/\/github.com\/trending?l=javascript"},{"key":"9368_CR34","doi-asserted-by":"crossref","unstructured":"Guarnieri S, Pistoia M, Tripp O, Dolby J, Teilhet S, Berg R (2011) Saving the world wide web from vulnerable JavaScript. In: Proceedings of the 20th international symposium on software testing and analysis","DOI":"10.1145\/2001420.2001442"},{"key":"9368_CR35","unstructured":"Harris S (2013) Simian\u2013similarity analyser. http:\/\/www.harukizaemon.com\/simian\/index.html"},{"key":"9368_CR36","doi-asserted-by":"crossref","unstructured":"Hegedu\u030bs P, Bakota T, Ill\u00e9s L, Lad\u00e1nyi G, Ferenc R, Gyim\u00f3thy T (2011) Source code metrics and maintainability: a case study. In: Software engineering, business continuity, and education. Springer, Berlin Heidelberg New York, pp 272\u2013284","DOI":"10.1007\/978-3-642-27207-3_28"},{"key":"9368_CR37","doi-asserted-by":"crossref","unstructured":"Hill R, Rideout J (2004) Automatic method completion. In: Proceedings of the 19th international conference on automated software engineering. IEEE, pp 228\u2013235","DOI":"10.1109\/ASE.2004.1342740"},{"key":"9368_CR38","doi-asserted-by":"crossref","unstructured":"Hotta K, Sano Y, Higo Y, Kusumoto S (2010) Is duplicate code more frequently modified than non-duplicate code in software evolution?: an empirical study on open source software. In: Proceedings of the joint ERCIM workshop on software evolution and international workshop on principles of software evolution, pp 73\u201382","DOI":"10.1145\/1862372.1862390"},{"key":"9368_CR39","unstructured":"Islam M, Islam M, Halim T (2011) A study of code cloning in server pages of web applications developed using classic asp. net and asp. net mvc framework. In: Proceedings of the 14th international conference on computer and information technology. IEEE, pp 497\u2013502"},{"key":"9368_CR40","doi-asserted-by":"crossref","unstructured":"Jang J, Agrawal A, Brumley D (2012) ReDeBug: finding unpatched code clones in entire os distributions. In: Proceedings of symposium on security and privacy. IEEE, pp 48\u201362","DOI":"10.1109\/SP.2012.13"},{"key":"9368_CR41","doi-asserted-by":"crossref","unstructured":"Jiang L, Misherghi G, Su Z, Glondu S (2007a) Deckard: scalable and accurate tree-based detection of code clones. In: Proceedings of the 29th international conference on software engineering. IEEE, pp 96\u2013105","DOI":"10.1109\/ICSE.2007.30"},{"key":"9368_CR42","doi-asserted-by":"crossref","unstructured":"Jiang L, Su Z, Chiu E (2007b) Context-based detection of clone-related bugs. In: Proceedings of the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on the foundations of software engineering. ACM, pp 55\u201364","DOI":"10.1145\/1287624.1287634"},{"key":"9368_CR43","unstructured":"Jones MC (2011) Remix and reuse of source code in software production. PhD thesis, Citeseer"},{"key":"9368_CR44","doi-asserted-by":"crossref","unstructured":"Juergens E, Deissenboeck F, Hummel B (2009a) CloneDetective\u2013a workbench for clone detection research. In: Proceedings of the 31st international conference on software engineering. IEEE, pp 603\u2013606","DOI":"10.1109\/ICSE.2009.5070566"},{"key":"9368_CR45","doi-asserted-by":"crossref","unstructured":"Juergens E, Deissenboeck F, Hummel B, Wagner S (2009b) Do code clones matter?. In: Proceedings of the 31st international conference on software engineering. IEEE Computer Society, pp 485\u2013495","DOI":"10.1109\/ICSE.2009.5070547"},{"key":"9368_CR46","doi-asserted-by":"crossref","unstructured":"Kamei Y, Sato H, Monden A, Kawaguchi S, Uwano H, Nagura M, Matsumoto Ki, Ubayashi N (2011) An empirical study of fault prediction with code clone metrics. In: Proceedings of the joint conference of the 21th international workshop on software measurement and the 6th international conference on software process and product measurement. IEEE, pp 55\u201361","DOI":"10.1109\/IWSM-MENSURA.2011.12"},{"issue":"7","key":"9368_CR47","doi-asserted-by":"crossref","first-page":"654","DOI":"10.1109\/TSE.2002.1019480","volume":"28","author":"T Kamiya","year":"2002","unstructured":"Kamiya T, Kusumoto S, Inoue K (2002) CCFinder: a multilinguistic token-based code clone detection system for large scale source code. IEEE Trans Softw Eng 28 (7):654\u2013670","journal-title":"IEEE Trans Softw Eng"},{"key":"9368_CR48","unstructured":"Kapser C, Godfrey M (2003) Toward a taxonomy of clones in source code: a case study. In: Proceedings of the conference on evolution of large scale industrial software architectures, pp 67\u201378"},{"issue":"6","key":"9368_CR49","doi-asserted-by":"crossref","first-page":"645","DOI":"10.1007\/s10664-008-9076-6","volume":"13","author":"CJ Kapser","year":"2008","unstructured":"Kapser CJ, Godfrey MW (2008) \u201cCloning Considered harmful\u201d considered harmful: patterns of cloning in software. Empir Softw Eng 13(6):645\u2013692","journal-title":"Empir Softw Eng"},{"key":"9368_CR50","unstructured":"Kienle HM, M\u00fcller HA, Weber A (2003) In the web of generated \u201cclones\u201d (position paper)"},{"key":"9368_CR51","doi-asserted-by":"crossref","unstructured":"Kim H, Jung Y, Kim S, Yi K (2011) Mecc: memory comparison-based clone detector. In: Proceedings of the 33rd international conference on software engineering. IEEE, pp 301\u2013310","DOI":"10.1145\/1985793.1985835"},{"issue":"5","key":"9368_CR52","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1145\/1095430.1081737","volume":"30","author":"M Kim","year":"2005","unstructured":"Kim M, Sazawal V, Notkin D, Murphy G (2005) An empirical study of code clone genealogies. ACM SIGSOFT Softw Eng Notes 30(5):187\u2013196","journal-title":"ACM SIGSOFT Softw Eng Notes"},{"key":"9368_CR53","doi-asserted-by":"crossref","unstructured":"Kontogiannis K (1997) Evaluation experiments on the detection of programming patterns using software metrics. In: Proceedings of the 4th working conference on reverse engineering. IEEE, pp 44\u201354","DOI":"10.1109\/WCRE.1997.624575"},{"issue":"1-2","key":"9368_CR54","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/BF00126960","volume":"3","author":"K Kontogiannis","year":"1996","unstructured":"Kontogiannis K, DeMori R, Merlo E, Galler M, Bernstein M (1996) Pattern matching for clone and concept detection. Autom Softw Eng 3(1-2):77\u2013108","journal-title":"Autom Softw Eng"},{"key":"9368_CR55","unstructured":"Koschke R (2007) Survey of research on software clones. Duplication, redundancy, and similarity in software. http:\/\/drops.dagstuhl.de\/volltexte\/2007\/962\/"},{"key":"9368_CR56","doi-asserted-by":"crossref","unstructured":"Koschke R, Falke R, Frenzel P (2006) Clone detection using abstract syntax suffix trees. In: Proceedings of the 13th working conference on reverse engineering. IEEE, pp 253\u2013262","DOI":"10.1109\/WCRE.2006.18"},{"key":"9368_CR57","unstructured":"Koschke R, Baxter ID, Conradt M, Cordy JR (2012) Software clone management towards industrial application (dagstuhl seminar 12071). Dagstuhl Reports 2(2)"},{"issue":"1","key":"9368_CR58","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/s10479-010-0704-3","volume":"197","author":"G Kou","year":"2012","unstructured":"Kou G, Lou C (2012) Multiple factor hierarchical clustering algorithm for large scale web page and search engine clickstream data. Ann Oper Res 197(1):123\u2013134","journal-title":"Ann Oper Res"},{"key":"9368_CR59","doi-asserted-by":"crossref","unstructured":"Kozlov D, Koskinen J, Sakkinen M, Markkula J (2010) Exploratory analysis of the relations between code cloning and open source software quality. In: Proceedings of the 7th international conference on the quality of information and communications technology. IEEE, pp 358\u2013363","DOI":"10.1109\/QUATIC.2010.94"},{"key":"9368_CR60","doi-asserted-by":"crossref","unstructured":"Krinke J (2007) A study of consistent and inconsistent changes to code clones. In: Proceedings of the 14th working conference on reverse engineering. IEEE, pp 170\u2013178","DOI":"10.1109\/WCRE.2007.7"},{"key":"9368_CR61","doi-asserted-by":"crossref","unstructured":"Krinke J (2008) Is cloned code more stable than non-cloned code?. In: Proceedings of the 8th international working conference on source code analysis and manipulation. IEEE, pp 57\u201366","DOI":"10.1109\/SCAM.2008.14"},{"key":"9368_CR62","doi-asserted-by":"crossref","unstructured":"Krinke J (2011) Is cloned code older than non-cloned code?. In: Proceedings of the 5th international workshop on software clones. ACM, pp 28\u201333","DOI":"10.1145\/1985404.1985410"},{"key":"9368_CR63","doi-asserted-by":"crossref","unstructured":"Lague B, Proulx D, Mayrand J, Merlo E, Hudepohl J (1997) Assessing the benefits of incorporating function clone detection in a development process. In: Proceedings of the international conference on software maintenance, vol 97","DOI":"10.1109\/ICSM.1997.624264"},{"key":"9368_CR64","doi-asserted-by":"crossref","unstructured":"Lanubile F, Mallardo T (2003) Finding function clones in web applications. In: Proceedings of the 7th European conference on software maintenance and reengineering. IEEE, pp 379\u2013386","DOI":"10.1109\/CSMR.2003.1192447"},{"key":"9368_CR65","unstructured":"Lee H, Won S, Jin J, Cho J, Ryu S (2012) SAFE: Formal specification and implementation of a scalable analysis framework for ECMAScript. In: Proceedings of the 19th international workshop on foundations of object-oriented languages"},{"key":"9368_CR66","doi-asserted-by":"crossref","unstructured":"Li C, Sun J, Chen H (2014) An improved method for tree-based clone detection in web applications. In: Proceedings of the 4th international conference on digital information and communication technology and it\u2019s applications. IEEE, pp 363\u2013367","DOI":"10.1109\/DICTAP.2014.6821712"},{"key":"9368_CR67","doi-asserted-by":"crossref","unstructured":"Li J, Ernst MD (2012) Cbcd: cloned buggy code detector. In: Proceedings of the 2012 international conference on software engineering. IEEE Press, pp 310\u2013320","DOI":"10.1109\/ICSE.2012.6227183"},{"key":"9368_CR68","doi-asserted-by":"crossref","unstructured":"Livieri S, Higo Y, Matsushita M, Inoue K (2007) Analysis of the linux kernel evolution using code clone coverage. In: Proceedings of the 4th international workshop on mining software repositories. IEEE, pp 22\u201322","DOI":"10.1109\/MSR.2007.1"},{"key":"9368_CR69","doi-asserted-by":"crossref","unstructured":"Lozano A, Wermelinger M, Nuseibeh B (2008) Evaluating the relation between changeability decay and the characteristics of clones and methods. In: Proceedings of the 23rd international conference on automated software engineering-workshops. IEEE, pp 100\u2013109","DOI":"10.1109\/ASEW.2008.4686327"},{"key":"9368_CR70","doi-asserted-by":"crossref","unstructured":"Martin D, Cordy JR (2011) Analyzing web service similarity using contextual clones. In: Proceedings of the 5th international workshop on software clones. ACM, pp 41\u201346","DOI":"10.1145\/1985404.1985412"},{"key":"9368_CR71","doi-asserted-by":"crossref","unstructured":"Martinsen JK, Grahn H, Isberg A (2011) A comparative evaluation of javascript execution behavior. In: Web engineering. Springer, Berlin Heidelberg New York, pp 399\u2013402","DOI":"10.1007\/978-3-642-22233-7_35"},{"key":"9368_CR72","doi-asserted-by":"crossref","unstructured":"Mayrand J, Leblanc C, Merlo EM (1996) Experiment on the automatic detection of function clones in a software system using metrics. In: Proceedings of international conference on software maintenance. IEEE, pp 244\u2013253","DOI":"10.1109\/ICSM.1996.565012"},{"key":"9368_CR73","doi-asserted-by":"crossref","unstructured":"Merlo E, Antoniol G, Di Penta M, Rollo VF (2004) Linear complexity object-oriented similarity for clone detection and software evolution analyses. In: Proceedings of the 20th international conference on software maintenance. IEEE, pp 412\u2013416","DOI":"10.1109\/ICSM.2004.1357826"},{"key":"9368_CR74","doi-asserted-by":"crossref","unstructured":"Merlo E, Dagenais M, Bachand P, Sormani J, Gradara S, Antoniol G (2002) Investigating large software system evolution: the Linux kernel. In: Proceedings of the 26th annual international computer software and applications conference. IEEE, pp 421\u2013426","DOI":"10.1109\/CMPSAC.2002.1045038"},{"key":"9368_CR75","doi-asserted-by":"crossref","unstructured":"Mondal M, Roy CK, Rahman MS, Saha RK, Krinke J, Schneider KA (2012) Comparative stability of cloned and non-cloned code: an empirical study. In: Proceedings of the 27th annual symposium on applied computing. ACM, pp 1227\u20131234","DOI":"10.1145\/2245276.2231969"},{"key":"9368_CR76","doi-asserted-by":"crossref","unstructured":"Monden A, Nakae D, Kamiya T, Sato S, Matsumoto K (2002) Software quality analysis by code clones in industrial legacy software. In: Proceedings of the 8th symposium on software metrics. IEEE, pp 87\u201394","DOI":"10.1109\/METRIC.2002.1011328"},{"key":"9368_CR77","doi-asserted-by":"crossref","unstructured":"Muhammad T, Zibran MF, Yamamoto Y, Roy CK (2013) Near-miss clone patterns in web applications: an empirical study with industrial systems. In: Canadian conference on electrical and computer engineering","DOI":"10.1109\/CCECE.2013.6567821"},{"key":"9368_CR78","doi-asserted-by":"crossref","unstructured":"Negara N, Tsantalis N, Stroulia E (2013) Feature detection in ajax-enabled web applications. In: Proceedings of the 17th European conference on software maintenance and reengineering. IEEE, pp 154\u2013163","DOI":"10.1109\/CSMR.2013.25"},{"key":"9368_CR79","doi-asserted-by":"crossref","unstructured":"Nikiforakis N, Invernizzi L, Kapravelos A, Van Acker S, Joosen W, Kruegel C, Piessens F, Vigna G (2012) You are what you include: large-scale evaluation of remote javascript inclusions. In: Proceedings of the 2012 ACM conference on computer and communications security. ACM, pp 736\u2013747","DOI":"10.1145\/2382196.2382274"},{"key":"9368_CR80","doi-asserted-by":"crossref","unstructured":"Ocariza F, Pattabiraman K, Zorn B (2011) Javascript errors in the wild: an empirical study. In: Proceedings of the 22nd international symposium on software reliability engineering. IEEE, pp 100\u2013109","DOI":"10.1109\/ISSRE.2011.28"},{"key":"9368_CR81","doi-asserted-by":"crossref","unstructured":"Patenaude JF, Merlo E, Dagenais M, Lagu\u00eb B (1999) Extending software quality assessment techniques to Java systems. In: Proceedings of the 7th international workshop on program comprehension. IEEE, pp 49\u201356","DOI":"10.1109\/WPC.1999.777743"},{"key":"9368_CR82","unstructured":"PLRG@KAIST (2012) SAFE: Scalable Analysis Framework for ECMAScript. http:\/\/plrg.kaist.ac.kr\/redmine\/projects\/jsf\/repository"},{"key":"9368_CR83","unstructured":"PMD (2013) PMD\u2019s copy\/paste detector. http:\/\/pmd.sourceforge.net\/pmd-5.0.5\/cpd-usage.html"},{"issue":"4-5","key":"9368_CR84","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1007\/s10664-011-9195-3","volume":"17","author":"F Rahman","year":"2012","unstructured":"Rahman F, Bird C, Devanbu P (2012) Clones: what is that smell Empir Softw Eng 17(4-5):503\u2013530","journal-title":"Empir Softw Eng"},{"key":"9368_CR85","doi-asserted-by":"crossref","unstructured":"Rajapakse D, Jarzabek S (2005) An investigation of cloning in web applications. Web Engineering pp 252\u2013262","DOI":"10.1145\/1062745.1062800"},{"key":"9368_CR86","doi-asserted-by":"crossref","unstructured":"Rajapakse DC, Jarzabek S (2007) Using server pages to unify clones in web applications: a trade-off analysis. In: Proceedings of the 29th international conference on software engineering. IEEE, pp 116\u2013 126","DOI":"10.1109\/ICSE.2007.95"},{"key":"9368_CR87","doi-asserted-by":"crossref","unstructured":"Ramage D, Heymann P, Manning CD, Garcia-Molina H (2009) Clustering the tagged web. In: Proceedings of the 2nd ACM international conference on web search and data mining. ACM, pp 54\u201363","DOI":"10.1145\/1498759.1498809"},{"key":"9368_CR88","unstructured":"Ratanaworabhan P, Livshits B, Zorn BG (2010) JSMeter: comparing the behavior of JavaScript benchmarks with real web applications. In: Proceedings of the 2010 USENIX conference on Web application development. USENIX Association, pp 3\u20133"},{"key":"9368_CR89","doi-asserted-by":"crossref","unstructured":"Richards G, Hammer C, Burg B, Vitek J (2011) The eval that men do. In: Proceedings of the 25th European conference on object-oriented programming. Springer, Berlin Heidelberg New York, pp 52\u201378","DOI":"10.1007\/978-3-642-22655-7_4"},{"key":"9368_CR90","doi-asserted-by":"crossref","unstructured":"Richards G, Lebresne S, Burg B, Vitek J (2010) An analysis of the dynamic behavior of JavaScript programs. In: Proceedings of the SIGPLAN conference on programming language design and implementation, vol 45. ACM, pp 1\u201312","DOI":"10.1145\/1806596.1806598"},{"key":"9368_CR91","doi-asserted-by":"crossref","unstructured":"Rieger M, Ducasse S, Lanza M (2004) Insights into system-wide code duplication. In: Proceedings of the 11th working conference on reverse engineering. IEEE, pp 100\u2013109","DOI":"10.1109\/WCRE.2004.25"},{"key":"9368_CR92","unstructured":"Roy C, Cordy J (2007) A survey on software clone detection research. Queen\u2019s School of Computing TR 541:115"},{"key":"9368_CR93","doi-asserted-by":"crossref","unstructured":"Roy C, Cordy J (2010a) Are scripting languages really different?. In: Proceedings of the 4th international workshop on software clones. ACM, pp 17\u201324","DOI":"10.1145\/1808901.1808904"},{"issue":"3","key":"9368_CR94","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1002\/smr.416","volume":"22","author":"C Roy","year":"2010","unstructured":"Roy C, Cordy J (2010b) Near-miss function clones in open source software: an empirical study. J Softw Maint Evol Res Pract 22(3):165\u2013189","journal-title":"J Softw Maint Evol Res Pract"},{"key":"9368_CR95","doi-asserted-by":"crossref","unstructured":"Roy CK, Cordy JR (2008) An empirical study of function clones in open source software. In: Proceedings of the 15th working conference on reverse engineering. IEEE, pp 81\u201390","DOI":"10.1109\/WCRE.2008.54"},{"key":"9368_CR96","doi-asserted-by":"crossref","unstructured":"Roy CK, Cordy JR (2009) A mutation\/injection-based automatic framework for evaluating code clone detection tools. In: Proceedings of the international conference on software testing, verification and validation workshops. IEEE, pp 157\u2013166","DOI":"10.1109\/ICSTW.2009.18"},{"issue":"7","key":"9368_CR97","doi-asserted-by":"crossref","first-page":"470","DOI":"10.1016\/j.scico.2009.02.007","volume":"74","author":"CK Roy","year":"2009","unstructured":"Roy CK, Cordy JR, Koschke R (2009) Comparison and evaluation of code clone detection techniques and tools: a qualitative approach. Sci Comput Program 74(7):470\u2013495","journal-title":"Sci Comput Program"},{"key":"9368_CR98","doi-asserted-by":"crossref","unstructured":"Roy CK, Zibran MF, Koschke R (2014) The vision of software clone management: past, present, and future. In: Proceedings of the IEEE CSMR-18\/WCRE-21 software evolution week","DOI":"10.1109\/CSMR-WCRE.2014.6747168"},{"key":"9368_CR99","doi-asserted-by":"crossref","unstructured":"Rysselberghe FV, Demeyer S (2004) Evaluating clone detection techniques from a refactoring perspective. In: Proceedings of the 19th international conference on automated software engineering. IEEE Computer Society, pp 336\u2013339","DOI":"10.1109\/ASE.2004.1342759"},{"key":"9368_CR100","unstructured":"SAFE Corporation (2012) CodeMatch. http:\/\/www.safe-corp.biz\/products_codematch.htm"},{"key":"9368_CR101","doi-asserted-by":"crossref","unstructured":"Saha RK, Roy CK, Schneider KA (2011) An automatic framework for extracting and classifying near-miss clone genealogies. In: Proceedings of the 27th international conference on software maintenance. IEEE, pp 293\u2013302","DOI":"10.1109\/ICSM.2011.6080796"},{"key":"9368_CR102","doi-asserted-by":"crossref","unstructured":"Schleimer S, Wilkerson DS, Aiken A (2003) Winnowing: local algorithms for document fingerprinting. In: Proceedings of the 2003 ACM SIGMOD international conference on management of data. ACM, pp 76\u201385","DOI":"10.1145\/872757.872770"},{"key":"9368_CR103","unstructured":"Selamat A, Wahid N (2007) Code clone detection using string based tree matching technique. InTech"},{"key":"9368_CR104","doi-asserted-by":"crossref","unstructured":"Shawky DM, Ali AF (2010) An approach for assessing similarity metrics used in metric-based clone detection techniques. In: Proceedings of the 3rd international conference on computer science and information technology, vol 1. IEEE, pp 580\u2013584","DOI":"10.1109\/ICCSIT.2010.5563834"},{"key":"9368_CR105","doi-asserted-by":"crossref","unstructured":"Stephan M, Alalfi MH, Stevenson A, Cordy JR (2013) Using mutation analysis for a model-clone detector comparison framework. In: Proceedings of the 2013 international conference on software engineering. IEEE Pres, Piscataway, pp 1261\u20131264","DOI":"10.1109\/ICSE.2013.6606693"},{"key":"9368_CR106","doi-asserted-by":"crossref","unstructured":"Stephan M, Alalfi MH, Cordy JR (2014) Towards a taxonomy for simulink model mutations. In: Proceedings of the 7th international conference on software testing, verification and validation workshops. IEEE, pp 206\u2013215","DOI":"10.1109\/ICSTW.2014.17"},{"key":"9368_CR107","doi-asserted-by":"crossref","unstructured":"Svajlenko J, Roy CK, Zibran MF, Cordy JR (2013) A mutation analysis based benchmarking framework for clone detectors. In: Proceedings of short\/tool papers track of the ICSE 7th international workshop on software clones","DOI":"10.1109\/IWSC.2013.6613033"},{"key":"9368_CR108","doi-asserted-by":"crossref","unstructured":"Tairas R, Gray J (2006) Phoenix-based clone detection using suffix trees. In: Proceedings of the 44th annual southeast regional conference. ACM, pp 679\u2013684","DOI":"10.1145\/1185448.1185597"},{"issue":"1","key":"9368_CR109","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10664-009-9108-x","volume":"15","author":"S Thummalapenta","year":"2010","unstructured":"Thummalapenta S, Cerulo L, Aversano L, Di Penta M (2010) An empirical study on the maintenance of source code clones. Empir Softw Eng 15(1):1\u201334","journal-title":"Empir Softw Eng"},{"key":"9368_CR110","unstructured":"Van Welie M, Van der Veer GC (2003) Pattern languages in interaction design: structure and organization. In: Proceedings of interact, vol 3, pp 1\u20135"},{"key":"9368_CR111","doi-asserted-by":"crossref","unstructured":"Wang T, Harman M, Jia Y, Krinke J (2013) Searching for better configurations: a rigorous approach to clone evaluation. In: Proceedings of the 2013 9th joint meeting on foundations of software engineering. ACM, pp 455\u2013465","DOI":"10.1145\/2491411.2491420"},{"key":"9368_CR112","unstructured":"Wikipedia (2015) List of graphical user interface builders and rapid application development tools. http:\/\/en.wikipedia.org\/wiki\/List_of_graphical_user_interface_builders_and_rapid_application_development_tools"},{"key":"9368_CR113","doi-asserted-by":"crossref","unstructured":"Yamanaka Y, Choi E, Yoshida N, Inoue K, Sano T (2013) Applying clone change notification system into an industrial development process. In: Proceedings of the 21st international conference on program comprehension. IEEE, pp 199\u2013206","DOI":"10.1109\/ICPC.2013.6613848"},{"key":"9368_CR114","doi-asserted-by":"crossref","unstructured":"Zibran MF, Roy CK (2012) Ide-based real-time focused search for near-miss clones. In: Proceedings of the 27th annual ACM symposium on applied computing. ACM, pp 1235\u20131242","DOI":"10.1145\/2245276.2231970"},{"key":"9368_CR115","doi-asserted-by":"crossref","unstructured":"Zibran MF, Saha RK, Asaduzzaman M, Roy CK (2011) Analyzing and forecasting near-miss clones in evolving software: an empirical study. In: Proceedings of the 16th international conference on engineering of complex computer systems. IEEE, pp 295\u2013304","DOI":"10.1109\/ICECCS.2011.36"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-015-9368-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-015-9368-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-015-9368-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,7]],"date-time":"2024-06-07T23:42:21Z","timestamp":1717803741000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-015-9368-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3,24]]},"references-count":115,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,4]]}},"alternative-id":["9368"],"URL":"https:\/\/doi.org\/10.1007\/s10664-015-9368-6","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,3,24]]}}}