{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T09:41:44Z","timestamp":1770284504308,"version":"3.49.0"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,9,5]],"date-time":"2018-09-05T00:00:00Z","timestamp":1536105600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100003967","name":"Iran\u2019s National Elites Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003967","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s10664-018-9648-z","type":"journal-article","created":{"date-parts":[[2018,9,5]],"date-time":"2018-09-05T00:19:09Z","timestamp":1536106749000},"page":"1538-1573","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Cross-project code clones in GitHub"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7567-6991","authenticated-orcid":false,"given":"Mohammad","family":"Gharehyazie","sequence":"first","affiliation":[]},{"given":"Baishakhi","family":"Ray","sequence":"additional","affiliation":[]},{"given":"Mehdi","family":"Keshani","sequence":"additional","affiliation":[]},{"given":"Masoumeh Soleimani","family":"Zavosht","sequence":"additional","affiliation":[]},{"given":"Abbas","family":"Heydarnoori","sequence":"additional","affiliation":[]},{"given":"Vladimir","family":"Filkov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,5]]},"reference":[{"key":"9648_CR1","unstructured":"Al-Ekram R, Kapser C, Holt R, Godfrey M (2005) Cloning by accident: an empirical study of source code cloning across software systems. In: 2005 international symposium on Empirical software engineering. IEEE, pp 10\u2013pp"},{"key":"9648_CR2","doi-asserted-by":"crossref","unstructured":"Bajracharya S, Ngo T, Linstead E, Dou Y, Rigor P, Baldi P, Lopes C (2006) Sourcerer: a search engine for open source code supporting structure-based search. In: Companion to the 21st ACM SIGPLAN symposium on object-oriented programming systems, languages, and applications. ACM, pp 681\u2013682","DOI":"10.1145\/1176617.1176671"},{"key":"9648_CR3","doi-asserted-by":"crossref","unstructured":"Barr ET, Brun Y, Devanbu P, Harman M, Sarro F (2014) The plastic surgery hypothesis. In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering. ACM, pp 306\u2013317","DOI":"10.1145\/2635868.2635898"},{"key":"9648_CR4","unstructured":"Bogdan V, Posnett D, Ray B, Brand Mvd, Filkov AS, Premkumar D, Filkov V (2015) Gender and tenure diversity in github teams. CHI \u201915 ACM"},{"key":"9648_CR5","doi-asserted-by":"crossref","unstructured":"Dabbish L, Stuart C, Tsay J, Herbsleb J (2012) Social coding in github: transparency and collaboration in an open software repository. In: Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work. ACM, pp 1277\u20131286","DOI":"10.1145\/2145204.2145396"},{"key":"9648_CR6","doi-asserted-by":"crossref","unstructured":"Duala-Ekoko E, Robillard MP (2008) Clonetracker: tool support for code clone management. In: Proceedings of the 30th international conference on Software engineering. ACM, pp 843\u2013846","DOI":"10.1145\/1368088.1368218"},{"key":"9648_CR7","doi-asserted-by":"crossref","unstructured":"Gabel M, Su Z (2010) A study of the uniqueness of source code. In: Proceedings of the eighteenth ACM SIGSOFT international symposium on Foundations of software engineering. ACM, pp 147\u2013156","DOI":"10.1145\/1882291.1882315"},{"issue":"5","key":"9648_CR8","doi-asserted-by":"publisher","first-page":"1318","DOI":"10.1007\/s10664-014-9332-x","volume":"20","author":"M Gharehyazie","year":"2015","unstructured":"Gharehyazie M, Posnett D, Vasilescu B, Filkov V (2015) Developer initiation and social interactions in oss: a case study of the apache software foundation. Empir Softw Eng 20(5):1318\u20131353","journal-title":"Empir Softw Eng"},{"key":"9648_CR9","doi-asserted-by":"crossref","unstructured":"Gharehyazie M, Ray B, Filkov V (2017) Some from here, some from there: cross-project code reuse in github. In: Proceedings of the 14th International Conference on Mining Software Repositories. IEEE Press, pp 291\u2013301","DOI":"10.1109\/MSR.2017.15"},{"issue":"1","key":"9648_CR10","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/TSE.2011.104","volume":"38","author":"CL Goues","year":"2012","unstructured":"Goues CL, Nguyen T, Forrest S, Weimer W (2012) Genprog: a generic method for automatic software repair. IEEE Trans Softw Eng 38(1):54\u201372","journal-title":"IEEE Trans Softw Eng"},{"key":"9648_CR11","doi-asserted-by":"crossref","unstructured":"Gousios G (2013) The ghtorent dataset and tool suite. In: Proceedings of the 10th Working Conference on Mining Software Repositories. IEEE Press, pp 233\u2013236","DOI":"10.1109\/MSR.2013.6624034"},{"key":"9648_CR12","doi-asserted-by":"crossref","unstructured":"Jiang L, Misherghi G, Su Z, Glondu S (2007) Deckard: scalable and accurate tree-based detection of code clones. In: Proceedings of the 29th international conference on Software Engineering. IEEE Computer Society, pp 96\u2013105","DOI":"10.1109\/ICSE.2007.30"},{"key":"9648_CR13","first-page":"485","volume-title":"Proceedings of the 31st International Conference on Software Engineering, ICSE \u201909","author":"E Juergens","year":"2009","unstructured":"Juergens E, Deissenboeck F, Hummel B, Wagner S (2009) Do code clones matter?. In: Proceedings of the 31st International Conference on Software Engineering, ICSE \u201909. IEEE Computer Society, Washington, pp 485\u2013495"},{"issue":"7","key":"9648_CR14","doi-asserted-by":"publisher","first-page":"654","DOI":"10.1109\/TSE.2002.1019480","volume":"28","author":"T Kamiya","year":"2002","unstructured":"Kamiya T, Kusumoto S, Inoue K (2002) Ccfinder: a multilinguistic token-based code clone detection system for large scale source code. IEEE Trans Softw Eng 28 (7):654\u2013670","journal-title":"IEEE Trans Softw Eng"},{"key":"9648_CR15","unstructured":"Kim M, Bergman L, Lau T, Notkin D (2004) An ethnographic study of copy and paste programming practices in oopl. In: 2004 Proceedings of the International Symposium on Empirical Software Engineering, ISESE\u201904. IEEE, pp 83\u201392"},{"key":"9648_CR16","doi-asserted-by":"crossref","unstructured":"Kim M, Sazawal V, Notkin D, Murphy G (2005) An empirical study of code clone genealogies. In: ACM SIGSOFT Software engineering notes, vol 30. ACM, pp 187\u2013196","DOI":"10.1145\/1095430.1081737"},{"key":"9648_CR17","doi-asserted-by":"crossref","unstructured":"Li J, Ernst MD (2012) Cbcd: cloned buggy code detector. In: Proceedings of the 34th International Conference on Software Engineering. IEEE Press, pp 310\u2013320","DOI":"10.1109\/ICSE.2012.6227183"},{"key":"9648_CR18","doi-asserted-by":"crossref","unstructured":"Lv F, Zhang H, Lou J-G, Wang S, Zhang D, Zhao J (2015) Codehow: effective code search based on api understanding and extended boolean model (e). In: 2015 30th IEEE\/ACM International Conference on Automated software engineering (ASE). IEEE, pp 260\u2013270","DOI":"10.1109\/ASE.2015.42"},{"key":"9648_CR19","doi-asserted-by":"crossref","unstructured":"Meng N, Kim M, McKinley KS (2011) Systematic editing: generating program transformations from an example. In: ACM SIGPLAN Notices, vol 46. ACM, pp 329\u2013342","DOI":"10.1145\/1993316.1993537"},{"key":"9648_CR20","doi-asserted-by":"crossref","unstructured":"Meng N, Kim M, McKinley KS (2013) Lase: locating and applying systematic edits by learning from examples. In: Proceedings of the 2013 International Conference on Software Engineering. IEEE Press, pp 502\u2013511","DOI":"10.1109\/ICSE.2013.6606596"},{"key":"9648_CR21","doi-asserted-by":"crossref","unstructured":"Nguyen HA, Nguyen AT, Nguyen TT, Nguyen TN, Rajan H (2013) A study of repetitiveness of code changes in software evolution. In: Proceedings of the 28th International Conference on Automated Software Engineering. ASE","DOI":"10.1109\/ASE.2013.6693078"},{"key":"9648_CR22","doi-asserted-by":"crossref","unstructured":"Ossher J, Sajnani H, Lopes C (2011) File cloning in open source java projects: the good, the bad, and the ugly. In: 2011 27th IEEE International Conference on Software Maintenance (ICSM). IEEE, pp 283\u2013292","DOI":"10.1109\/ICSM.2011.6080795"},{"key":"9648_CR23","doi-asserted-by":"crossref","unstructured":"Ponzanelli L, Bavota G, Di Penta M, Oliveto R, Lanza M (2014) Mining stackoverflow to turn the ide into a self-confident programming prompter. In: Proceedings of the 11th Working Conference on Mining Software Repositories. ACM, pp 102\u2013111","DOI":"10.1145\/2597073.2597077"},{"issue":"7","key":"9648_CR24","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.1016\/j.infsof.2013.01.008","volume":"55","author":"D Rattan","year":"2013","unstructured":"Rattan D, Bhatia R, Singh M (2013) Software clone detection: a systematic review. Inf Softw Technol 55(7):1165\u20131199","journal-title":"Inf Softw Technol"},{"key":"9648_CR25","doi-asserted-by":"crossref","unstructured":"Ray B, Kim M (2012) A case study of cross-system porting in forked projects. In: Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering. ACM, p 53","DOI":"10.1145\/2393596.2393659"},{"key":"9648_CR26","doi-asserted-by":"crossref","unstructured":"Ray B, Nagappan M, Bird C, Nagappan N, Zimmermann T (2014) The uniqueness of changes: characteristics and applications. Technical report, Microsoft Research Technical Report","DOI":"10.1109\/MSR.2015.11"},{"key":"9648_CR27","doi-asserted-by":"crossref","unstructured":"Ray B, Posnett D, Filkov V, Devanbu P (2014) A large scale study of programming languages and code quality in github. In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering. ACM, pp 155\u2013165","DOI":"10.1145\/2635868.2635922"},{"key":"9648_CR28","doi-asserted-by":"crossref","unstructured":"Reiss SP (2009) Semantics-based code search. In: Proceedings of the 31st International Conference on Software Engineering. IEEE Computer Society, pp 243\u2013253","DOI":"10.1109\/ICSE.2009.5070525"},{"issue":"7","key":"9648_CR29","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1016\/j.scico.2009.02.007","volume":"74","author":"CK Roy","year":"2009","unstructured":"Roy CK, Cordy JR, Koschke R (2009) Comparison and evaluation of code clone detection techniques and tools: a qualitative approach. Sci Comput Program 74 (7):470\u2013495","journal-title":"Sci Comput Program"},{"key":"9648_CR30","doi-asserted-by":"crossref","unstructured":"Sajnani H, Saini V, Svajlenko J, Roy CK, Lopes CV (2016) Sourcerercc: scaling code clone detection to big-code. In: 2016 IEEE\/ACM 38th International Conference on Software Engineering (ICSE). IEEE, pp 1157\u20131168","DOI":"10.1145\/2884781.2884877"},{"key":"9648_CR31","doi-asserted-by":"crossref","unstructured":"Scacchi W (2010) Collaboration practices and affordances in free\/open source software development. In: Collaborative software engineering. Springer, pp 307\u2013327","DOI":"10.1007\/978-3-642-10294-3_15"},{"key":"9648_CR32","doi-asserted-by":"crossref","unstructured":"Sim SE, Clarke CL, Holt RC (1998) Archetypal source code searches: a survey of software developers and maintainers. In: 1998 Proceedings of the 6th international workshop on Program comprehension, IWPC\u201998. IEEE, pp 180\u2013187","DOI":"10.1109\/WPC.1998.693351"},{"key":"9648_CR33","unstructured":"Su F-H, Bell J, Harvey K, Sethumadhavan S, Kaiser G, Jebara T (2016) Code relatives: detecting similarly behaving software. In: Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering. ACM, pp 702\u2013714"},{"key":"9648_CR34","doi-asserted-by":"crossref","unstructured":"Thummalapenta S, Xie T (2007) Parseweb: a programmer assistant for reusing open source code on the web. In: Proceedings of the twenty-second IEEE\/ACM international conference on Automated software engineering. ACM, pp 204\u2013213","DOI":"10.1145\/1321631.1321663"},{"key":"9648_CR35","doi-asserted-by":"crossref","unstructured":"Vasilescu B, Blincoe K, Xuan Q, Casalnuovo C, Damian D, Devanbu P, Filkov V (2016) The sky is not the limit: multitasking on GitHub projects. In: International Conference on Software Engineering, ICSE. to appear","DOI":"10.1145\/2884781.2884875"},{"key":"9648_CR36","doi-asserted-by":"crossref","unstructured":"Xuan Q, Okano A, Devanbu P, Filkov V (2014) Focus-shifting patterns of oss developers and their congruence with call graphs. In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering. ACM, pp 401\u2013412","DOI":"10.1145\/2635868.2635914"},{"key":"9648_CR37","doi-asserted-by":"crossref","unstructured":"Zhang H, Jain A, Khandelwal G, Kaushik C, Ge S, Hu W (2016) Bing developer assistant: improving developer productivity by recommending sample code. In: Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering. ACM, pp 956\u2013961","DOI":"10.1145\/2950290.2983955"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-018-9648-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-018-9648-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-018-9648-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T20:46:02Z","timestamp":1569012362000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-018-9648-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,5]]},"references-count":37,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["9648"],"URL":"https:\/\/doi.org\/10.1007\/s10664-018-9648-z","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9,5]]},"assertion":[{"value":"5 September 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}