{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T18:05:38Z","timestamp":1770141938485,"version":"3.49.0"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,7,5]],"date-time":"2017-07-05T00:00:00Z","timestamp":1499212800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1007\/s10664-017-9528-y","type":"journal-article","created":{"date-parts":[[2017,7,5]],"date-time":"2017-07-05T01:43:44Z","timestamp":1499219024000},"page":"693-770","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["Is cloned code really stable?"],"prefix":"10.1007","volume":"23","author":[{"given":"Manishankar","family":"Mondal","sequence":"first","affiliation":[]},{"given":"Md Saidur","family":"Rahman","sequence":"additional","affiliation":[]},{"given":"Chanchal K.","family":"Roy","sequence":"additional","affiliation":[]},{"given":"Kevin A.","family":"Schneider","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,5]]},"reference":[{"key":"9528_CR1","doi-asserted-by":"crossref","unstructured":"Aversano L, Cerulo L, Penta MD (2007) How clones are maintained: an empirical study. In: Proc CSMR, pp 81\u201390","DOI":"10.1109\/CSMR.2007.26"},{"key":"9528_CR2","doi-asserted-by":"crossref","unstructured":"Bakota T, Ferenc R, Gyimothy T (2007) Clone smells in software evolution. In: Proc ICSM, pp 24\u201333","DOI":"10.1109\/ICSM.2007.4362615"},{"key":"9528_CR3","doi-asserted-by":"crossref","unstructured":"Barbour L, Khomh F, Zou Y (2011) Late propagation in software clones. In: Proc ICSM, pp 273\u2013282","DOI":"10.1109\/ICSM.2011.6080794"},{"issue":"11","key":"9528_CR4","doi-asserted-by":"crossref","first-page":"1139","DOI":"10.1002\/smr.1597","volume":"25","author":"L Barbour","year":"2013","unstructured":"Barbour L, Khomh F, Zou Y (2013) An empirical study of faults in late propagation clone genealogies. J Softw Evol Process 25(11):1139\u20131165","journal-title":"J Softw Evol Process"},{"key":"9528_CR5","doi-asserted-by":"crossref","unstructured":"Bettenburg N, Shang W, Ibrahim W, Adams B, Zou Y, Hassan A (2009) An empirical study on inconsistent changes to code clones at release level. In: Proc WCRE, pp 85\u201394","DOI":"10.1109\/WCRE.2009.51"},{"key":"9528_CR6","doi-asserted-by":"crossref","unstructured":"Cai D, Kim M (2011) An empirical study of long-lived code clones. In: Proc FASE\/ETAPS, pp 432\u2013446","DOI":"10.1007\/978-3-642-19811-3_30"},{"issue":"4","key":"9528_CR7","doi-asserted-by":"crossref","first-page":"1476","DOI":"10.1007\/s10664-015-9394-4","volume":"21","author":"D Chatterji","year":"2016","unstructured":"Chatterji D, Carver JC, Kraft NA (2016) Code clones and developer behavior: results of two surveys of the clone research community. Empir Softw Eng 21(4):1476\u20131508","journal-title":"Empir Softw Eng"},{"key":"9528_CR8","doi-asserted-by":"crossref","unstructured":"Cordy JR, Roy CK (2011) The NiCad Clone Detector. In: Proc ICPC (Tool Demo Track), pp 219\u2013220","DOI":"10.1109\/ICPC.2011.26"},{"key":"9528_CR9","unstructured":"G\u00f6de N, Harder J (2011) Clone Stability. In: Proc CSMR, pp 65\u201374"},{"key":"9528_CR10","doi-asserted-by":"crossref","unstructured":"G\u00f6de N, Koschke R (2009) Incremental clone detection. In: Proc CSMR, pp 219\u2013228","DOI":"10.1109\/CSMR.2009.20"},{"issue":"2","key":"9528_CR11","first-page":"165","volume":"25","author":"N G\u00f6de","year":"2010","unstructured":"G\u00f6de N, Koschke R (2010) Studying clone evolution using incremental clone detection. JSME 25(2):165\u2013192","journal-title":"JSME"},{"key":"9528_CR12","doi-asserted-by":"crossref","unstructured":"G\u00f6de N, Koschke R (2011) Frequency and risks of changes to clones. In: Proc ICSE, pp 311\u2013320","DOI":"10.1145\/1985793.1985836"},{"issue":"10","key":"9528_CR13","doi-asserted-by":"crossref","first-page":"1063","DOI":"10.1002\/smr.1551","volume":"25","author":"J Harder","year":"2013","unstructured":"Harder J, G\u00f6de N (2013) Cloned code: stable code. J Softw Evol Process 25(10):1063\u20131088","journal-title":"J Softw Evol Process"},{"key":"9528_CR14","unstructured":"Higo Y, Kusumoto S (2009) Significant and scalable code clone detection with program dependency graph. In: Proc WCRE, pp 315\u2013316"},{"key":"9528_CR15","doi-asserted-by":"crossref","unstructured":"Hordijk W, Ponisio M, Wieringa R (2009) Harmfulness of code duplication\u2014a structured review of the evidence. In: Proc EASE, pp 88\u201397","DOI":"10.14236\/ewic\/EASE2009.11"},{"key":"9528_CR16","doi-asserted-by":"crossref","unstructured":"Hotta K, Sano Y, Higo Y, Kusumoto S (2010) Is duplicate code more frequently modified than non-duplicate code in software evolution?: an empirical study on open source software. In: Proc EVOL\/IWPSE, pp 73\u201382","DOI":"10.1145\/1862372.1862390"},{"key":"9528_CR17","doi-asserted-by":"crossref","unstructured":"Islam JF, Mondal M, Roy CK (2016) Bug replication in code clones: an empirical study. In: Proc. SANER, pp 68\u201378","DOI":"10.1109\/SANER.2016.78"},{"key":"9528_CR18","doi-asserted-by":"crossref","unstructured":"Jarzabek S, Xu Y (2010) Are clones harmful for maintenance? In: Proc IWSC, pp 73\u201374","DOI":"10.1145\/1808901.1808911"},{"key":"9528_CR19","doi-asserted-by":"crossref","unstructured":"Juergens E, Deissenboeck F, Hummel B, Wagner S (2009) Do code clones matter? In: Proc ICSE, pp 485\u2013495","DOI":"10.1109\/ICSE.2009.5070547"},{"issue":"7","key":"9528_CR20","first-page":"654","volume":"28","author":"T Kamiya","year":"2002","unstructured":"Kamiya T, Kusumoto S, Inoue K (2002) CCFinder: a multilinguistic token-based code clone detection system for large scale source code. TSE 28(7):654\u2013670","journal-title":"TSE"},{"issue":"6","key":"9528_CR21","first-page":"645","volume":"13","author":"C Kapser","year":"2008","unstructured":"Kapser C, Godfrey MW (2008) \u201cCloning considered harmful\u201d considered harmful: patterns of cloning in software. ESE 13(6):645\u2013692","journal-title":"ESE"},{"key":"9528_CR22","doi-asserted-by":"crossref","unstructured":"Kim M, Sazawal V, Notkin D, Murphy GC (2005) An empirical study of code clone genealogies. In: Proc ESEC-FSE, pp 187\u2013196","DOI":"10.1145\/1081706.1081737"},{"key":"9528_CR23","doi-asserted-by":"crossref","unstructured":"Krinke J (2007) A study of consistent and inconsistent changes to code clones. In: Proc WCRE, pp 170\u2013178","DOI":"10.1109\/WCRE.2007.7"},{"key":"9528_CR24","doi-asserted-by":"crossref","unstructured":"Krinke J (2008) Is cloned code more stable than non-cloned code? In: Proc SCAM, pp 57\u201366","DOI":"10.1109\/SCAM.2008.14"},{"key":"9528_CR25","doi-asserted-by":"crossref","unstructured":"Krinke J (2011) Is cloned code older than non-cloned code? In: Proc IWSC, pp 28\u201333","DOI":"10.1145\/1985404.1985410"},{"key":"9528_CR26","unstructured":"Li J, Ernst MD (2011) CBCD: cloned buggy code detector. University of Washington Department of Computer Science and Engineering technical report UW-CSE-11-05-02. Seattle, May 2, 2011. Revised"},{"key":"9528_CR27","doi-asserted-by":"crossref","unstructured":"Lozano A, Wermelinger M (2008) Assessing the effect of clones on changeability. In: Proc ICSM, pp 227\u2013236","DOI":"10.1109\/ICSM.2008.4658071"},{"key":"9528_CR28","doi-asserted-by":"crossref","unstructured":"Lozano A, Wermelinger M (2010) Tracking clones\u2019 imprint. In: Proc IWSC, pp 65\u201372","DOI":"10.1145\/1808901.1808910"},{"key":"9528_CR29","doi-asserted-by":"crossref","unstructured":"Lozano A, Wermelinger M, Nuseibeh B (2007) Evaluating the harmfulness of cloning: a change based experiment. In: Proc MSR, p 18","DOI":"10.1109\/MSR.2007.8"},{"key":"9528_CR30","doi-asserted-by":"crossref","unstructured":"Mondal M, Rahman MS, Saha RK, Roy CK, Krinke J, Schneider KA (2011) An empirical study of the impacts of clones in software maintenance. In: Proc ICPC student research symposium track, pp 242\u2013245","DOI":"10.1109\/ICPC.2011.14"},{"key":"9528_CR31","doi-asserted-by":"crossref","unstructured":"Mondal M, Roy CK, Rahman S, Saha RK, Krinke J, Schneider K A (2012a) Comparative stability of cloned and non-cloned code: an empirical study. In: Proc SAC, pp 1227\u20131234","DOI":"10.1145\/2245276.2231969"},{"issue":"3","key":"9528_CR32","first-page":"20","volume":"12","author":"M Mondal","year":"2012","unstructured":"Mondal M, Roy CK, Schneider KA (2012b) An empirical study on clone stability. ACR 12(3):20\u201336","journal-title":"ACR"},{"key":"9528_CR33","doi-asserted-by":"crossref","unstructured":"Mondal M, Roy CK, Schneider KA (2012c) Dispersion of changes in cloned and non-cloned code. In: Proc IWSC, pp 29\u201335","DOI":"10.1109\/IWSC.2012.6227863"},{"issue":"4","key":"9528_CR34","first-page":"445","volume":"95","author":"M Mondal","year":"2014","unstructured":"Mondal M, Roy CK, Schneider K (2014a) An insight into the dispersion of changes in cloned and non-cloned code: a genealogy based empirical study. SCP 95(4):445\u2013468","journal-title":"SCP"},{"key":"9528_CR35","first-page":"1","volume":"63","author":"M Mondal","year":"2014","unstructured":"Mondal M, Roy CK, Schneider KA (2014b) Late propagation in near-miss clones: an empirical study. ECEASST 63:1\u201317","journal-title":"ECEASST"},{"key":"9528_CR36","doi-asserted-by":"crossref","unstructured":"Mondal M, Roy CK, Schneider K A (2015) A comparative study on the bug-proneness of different types of code clones. In: Proc ICSME, pp 91\u2013100","DOI":"10.1109\/ICSM.2015.7332455"},{"issue":"4","key":"9528_CR37","doi-asserted-by":"crossref","first-page":"883","DOI":"10.1007\/s11219-016-9305-y","volume":"24","author":"M Mondal","year":"2016","unstructured":"Mondal M, Roy CK, Schneider KA (2016) A comparative study on the intensity and harmfulness of late propagation in near-miss code clone. Softw Qual J 24(4):883\u2013915","journal-title":"Softw Qual J"},{"key":"9528_CR38","doi-asserted-by":"crossref","unstructured":"Rahman F, Bird C, Devanbu P (2010) Clones: what is that smell? In: Proc MSR, pp 72\u201381","DOI":"10.1109\/MSR.2010.5463343"},{"key":"9528_CR39","doi-asserted-by":"crossref","unstructured":"Rahman MS, Roy CK (2014) A change-type based empirical study on the stability of cloned code. In: Proc SCAM, pp 31\u201340","DOI":"10.1109\/SCAM.2014.13"},{"key":"9528_CR40","doi-asserted-by":"crossref","unstructured":"Rahman MS, Aryani A, Roy CK, Perin F (2013) On the relationships between domain-based coupling and code clones: an exploratory study. In: Proc ICSE NIER track, pp 1265\u20131268","DOI":"10.1109\/ICSE.2013.6606694"},{"key":"9528_CR41","doi-asserted-by":"crossref","unstructured":"Roy CK, Cordy JR (2008a) An empirical evaluation of function clones in open source software. In: Proc WCRE, pp 81\u201390","DOI":"10.1109\/WCRE.2008.54"},{"key":"9528_CR42","doi-asserted-by":"crossref","unstructured":"Roy CK, Cordy JR (2008b) NICAD: accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization. In: Proc ICPC, pp 172\u2013181","DOI":"10.1109\/ICPC.2008.41"},{"key":"9528_CR43","doi-asserted-by":"crossref","unstructured":"Roy CK, Cordy JR (2008c) Scenario-based comparison of clone detection techniques. In: Proc ICPC, pp 153\u2013162","DOI":"10.1109\/ICPC.2008.42"},{"key":"9528_CR44","unstructured":"Roy CK, Cordy JR (2009) A mutation\/injection-based automatic framework for evaluating code clone detection tools. In: Proc mutation, pp 157\u2013166"},{"issue":"74","key":"9528_CR45","first-page":"470","volume":"2009","author":"CK Roy","year":"2009","unstructured":"Roy CK, Cordy JR, Koschke R (2009) Comparison and evaluation of code clone detection techniques and tools: a qualitative approach. SCP 2009(74):470\u2013495","journal-title":"SCP"},{"key":"9528_CR46","unstructured":"Roy CK, Zibran MF, Koschke R (2014) The vision of software clone management: past, present and future. In: Proc CSMR-18\/WCRE-21 software evolution week, p 16"},{"key":"9528_CR47","doi-asserted-by":"crossref","unstructured":"Saha RK, Asaduzzaman M, Zibran MF, Roy CK, Schneider KA (2010) Evaluating code clone genealogies at release level: an empirical study. In: Proc SCAM, pp 87\u201396","DOI":"10.1109\/SCAM.2010.32"},{"key":"9528_CR48","doi-asserted-by":"crossref","unstructured":"Saha RK, Roy CK, Schneider KA (2011) An automatic framework for extracting and classifying near-miss clone genealogies. In: Proc ICSM, pp 293\u2013302","DOI":"10.1109\/ICSM.2011.6080796"},{"key":"9528_CR49","doi-asserted-by":"crossref","unstructured":"Selim GMK, Barbour L, Shang W, Adams B, Hassan AE, Zou Y (2010) Studying the impact of clones on software defects. In: Proc WCRE, pp 13\u201321","DOI":"10.1109\/WCRE.2010.11"},{"issue":"1","key":"9528_CR50","first-page":"1","volume":"15","author":"S Thummalapenta","year":"2009","unstructured":"Thummalapenta S, Cerulo L, Aversano L, Penta MD (2009) An empirical study on the maintenance of source code clones. ESE 15(1):1\u201334","journal-title":"ESE"},{"key":"9528_CR51","doi-asserted-by":"crossref","unstructured":"Wang T, Harman M, Jia Y, Krinke J (2013) Searching for better configurations: a rigorous approach to clone evaluation. In: Proc ESEC\/SIGSOFT FSE, pp 455\u2013465","DOI":"10.1145\/2491411.2491420"},{"key":"9528_CR52","doi-asserted-by":"crossref","unstructured":"Wang X, Dang Y, Zhang L, Zhang D, Lan E, Mei H (2012) Can I clone this piece of code here? In: Proc ASE, pp 170\u2013179","DOI":"10.1145\/2351676.2351701"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-017-9528-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-017-9528-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-017-9528-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,11]],"date-time":"2020-10-11T15:04:48Z","timestamp":1602428688000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-017-9528-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,5]]},"references-count":52,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,4]]}},"alternative-id":["9528"],"URL":"https:\/\/doi.org\/10.1007\/s10664-017-9528-y","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,7,5]]}}}