{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:20:16Z","timestamp":1740122416685,"version":"3.37.3"},"reference-count":62,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100010909","name":"Young Scientists Fund","doi-asserted-by":"publisher","award":["61902441"],"award-info":[{"award-number":["61902441"]}],"id":[{"id":"10.13039\/501100010909","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1007\/s10664-023-10359-y","type":"journal-article","created":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T07:02:57Z","timestamp":1694588577000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Studying differentiated code to support smart contract update"],"prefix":"10.1007","volume":"28","author":[{"given":"Xiangping","family":"Chen","sequence":"first","affiliation":[]},{"given":"Peiyong","family":"Liao","sequence":"additional","affiliation":[]},{"given":"Queping","family":"Kong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9548-0208","authenticated-orcid":false,"given":"Yuan","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Xiaocong","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,13]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Atzei N, Bartoletti M, Cimoli T (2017) A survey of attacks on ethereum smart contracts (sok). In: Maffei M, Ryan M (eds) Principles of Security and Trust. Springer, Berlin Heidelberg, Berlin, Heidelberg, p 164\u2013186","key":"10359_CR1","DOI":"10.1007\/978-3-662-54455-6_8"},{"unstructured":"Bartoletti M, Carta S, Cimoli T, Saia R (2017) Dissecting Ponzi schemes on Ethereum: identification, analysis, and impact. ArXiv e-prints arXiv:1703.03779","key":"10359_CR2"},{"doi-asserted-by":"crossref","unstructured":"Baxter ID, Yahin A, Moura L, Sant\u2019Anna M, Bier L (1998) Clone detection using abstract syntax trees. In: Proceedings of the International Conference on Software Maintenance, IEEE Computer Society, Washington, DC, USA, ICSM \u201998, p 368 http:\/\/dl.acm.org\/citation.cfm?id=850947.853341","key":"10359_CR3","DOI":"10.1109\/ICSM.1998.738528"},{"doi-asserted-by":"publisher","unstructured":"Chen T, Li X, Luo X, Zhang X (2017) Under-optimized smart contracts devour your money. In: IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER), p 442\u2013446 https:\/\/doi.org\/10.1109\/SANER.2017.7884650","key":"10359_CR4","DOI":"10.1109\/SANER.2017.7884650"},{"key":"10359_CR5","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-72359-4_1","volume-title":"Information Security Practice and Experience","author":"T Chen","year":"2017","unstructured":"Chen T, Li X, Wang Y, Chen J, Li Z, Luo X, Au MH, Zhang X (2017) An adaptive gas cost mechanism for ethereum to defend against under-priced dos attacks. In: Liu JK, Samarati P (eds) Information Security Practice and Experience. Springer International Publishing, Cham, pp 3\u201324"},{"doi-asserted-by":"publisher","unstructured":"Chen T, Zhu Y, Li Z, Chen J, Li X, Luo X, Lin X, Zhange X (2018) Understanding ethereum via graph analysis. In: IEEE Conference on Computer Communications, p 1484\u20131492 https:\/\/doi.org\/10.1109\/INFOCOM.2018.8486401","key":"10359_CR6","DOI":"10.1109\/INFOCOM.2018.8486401"},{"doi-asserted-by":"crossref","unstructured":"Chen T, Li Z, Zhang Y, Luo X, Wang T, Hu T, Xiao X, Wang D, Huang J, Zhang X (2019a) A large-scale empirical study on control flow identification of smart contracts. In: 2019 ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM), p 1\u201311","key":"10359_CR7","DOI":"10.1109\/ESEM.2019.8870156"},{"doi-asserted-by":"crossref","unstructured":"Chen T, Zhang Y, Li Z, Luo X, Wang T, Cao R, Xiao X, Zhang X (2019b) Tokenscope: Automatically detecting inconsistent behaviors of cryptocurrency tokens in ethereum. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, p 1503\u20131520","key":"10359_CR8","DOI":"10.1145\/3319535.3345664"},{"doi-asserted-by":"publisher","unstructured":"Chen W, Zheng Z, Cui J, Ngai E, Zheng P, Zhou Y (2018) Detecting ponzi schemes on ethereum: Towards healthier blockchain technology. In: Proceedings of the 2018 World Wide Web Conference, International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, Switzerland, WWW \u201918, p 1409\u20131418 https:\/\/doi.org\/10.1145\/3178876.3186046","key":"10359_CR9","DOI":"10.1145\/3178876.3186046"},{"key":"10359_CR10","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1109\/ACCESS.2016.2566339","volume":"4","author":"K Christidis","year":"2016","unstructured":"Christidis K, Devetsikiotis M (2016) Blockchains and smart contracts for the internet of things. IEEE Access 4:2292\u20132303. https:\/\/doi.org\/10.1109\/ACCESS.2016.2566339","journal-title":"IEEE Access"},{"doi-asserted-by":"publisher","unstructured":"Cordy JR (2006) The txl source transformation language. Science of Computer Programming, special Issue on The Fourth Workshop on Language Descriptions, Tools, and Applications (LDTA \u201904) 61(3):190\u2013210 https:\/\/doi.org\/10.1016\/j.scico.2006.04.002, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167642306000669,","key":"10359_CR11","DOI":"10.1016\/j.scico.2006.04.002"},{"doi-asserted-by":"publisher","unstructured":"Cordy JR, Roy CK (2011) The nicad clone detector. In: IEEE 19th International Conference on Program Comprehension, p 219\u2013220 https:\/\/doi.org\/10.1109\/ICPC.2011.26","key":"10359_CR12","DOI":"10.1109\/ICPC.2011.26"},{"doi-asserted-by":"publisher","unstructured":"Dickerson T, Gazzillo P, Herlihy M, Koskinen E (2017) Adding concurrency to smart contracts. In: Proceedings of the ACM Symposium on Principles of Distributed Computing, ACM, New York, NY, USA, PODC \u201917, pp 303\u2013312 https:\/\/doi.org\/10.1145\/3087801.3087835","key":"10359_CR13","DOI":"10.1145\/3087801.3087835"},{"issue":"7","key":"10359_CR14","doi-asserted-by":"publisher","first-page":"1366","DOI":"10.1109\/TKDE.2017.2781227","volume":"30","author":"TTA Dinh","year":"2018","unstructured":"Dinh TTA, Liu R, Zhang M, Chen G, Ooi BC, Wang J (2018) Untangling blockchain: A data processing view of blockchain systems. IEEE Transactions on Knowledge and Data Engineering 30(7):1366\u20131385. https:\/\/doi.org\/10.1109\/TKDE.2017.2781227","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"10359_CR15","doi-asserted-by":"publisher","first-page":"124507","DOI":"10.1109\/ACCESS.2022.3225000","volume":"10","author":"FK Elmay","year":"2022","unstructured":"Elmay FK, Salah K, Jayaraman R, Omar IA (2022) Using nfts and blockchain for traceability and auctioning of shipping containers and cargo in maritime industry. IEEE Access 10:124507\u2013124522. https:\/\/doi.org\/10.1109\/ACCESS.2022.3225000","journal-title":"IEEE Access"},{"doi-asserted-by":"publisher","unstructured":"Feist J, Grieco G, Groce A (2019) Slither: A static analysis framework for smart contracts. In: 2019 IEEE\/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB), p 8\u201315 https:\/\/doi.org\/10.1109\/WETSEB.2019.00008","key":"10359_CR16","DOI":"10.1109\/WETSEB.2019.00008"},{"doi-asserted-by":"publisher","unstructured":"Frantz CK, Nowostawski M (2016) From institutions to code: Towards automated generation of smart contracts. In: 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W), pp 210\u2013215 https:\/\/doi.org\/10.1109\/FAS-W.2016.53","key":"10359_CR17","DOI":"10.1109\/FAS-W.2016.53"},{"doi-asserted-by":"crossref","unstructured":"Gao Z, Jiang L, Xia X, Lo D, Grundy J (2020) Checking smart contracts with structural code embedding. IEEE Transactions on Software Engineering","key":"10359_CR18","DOI":"10.1109\/TSE.2020.2971482"},{"doi-asserted-by":"publisher","unstructured":"Ghaleb A, Pattabiraman K (2020) How effective are smart contract analysis tools? evaluating smart contract static analysis tools using bug injection. In: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, Association for Computing Machinery, New York, NY, USA, ISSTA 2020, p 415-427 https:\/\/doi.org\/10.1145\/3395363.3397385","key":"10359_CR19","DOI":"10.1145\/3395363.3397385"},{"doi-asserted-by":"crossref","unstructured":"Grossman S, Abraham I, GolanGueta G, Michalevsky Y, Rinetzky N, Sagiv M, Zohar Y (2018) Online detection of effectively callback free objects with applications to smart contracts. CoRR arxiv:1801.04032","key":"10359_CR20","DOI":"10.1145\/3158136"},{"doi-asserted-by":"publisher","unstructured":"Harris ZS (1981) Distributional Structure, Springer Netherlands, Dordrecht, pp 3\u201322. https:\/\/doi.org\/10.1007\/978-94-009-8467-7-1","key":"10359_CR21","DOI":"10.1007\/978-94-009-8467-7-1"},{"issue":"1","key":"10359_CR22","first-page":"100","volume":"28","author":"JA Hartigan","year":"1979","unstructured":"Hartigan JA, Wong MA (1979) Algorithm as 136: A k-means clustering algorithm. Journal of the Royal Statistical Society 28(1):100\u2013108","journal-title":"Journal of the Royal Statistical Society"},{"doi-asserted-by":"crossref","unstructured":"He N, Wu L, Wang H, Guo Y, Jiang X (2019) Characterizing code clones in the ethereum smart contract ecosystem. arXiv preprint arXiv:1905.00272","key":"10359_CR23","DOI":"10.1007\/978-3-030-51280-4_35"},{"doi-asserted-by":"publisher","unstructured":"He X, Qin B, Zhu Y, Chen X, Liu Y (2018) Spesc: A specification language for smart contracts. In: IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), vol 01, pp 132\u2013137 https:\/\/doi.org\/10.1109\/COMPSAC.2018.00025","key":"10359_CR24","DOI":"10.1109\/COMPSAC.2018.00025"},{"doi-asserted-by":"publisher","unstructured":"Huang Y, Chen X, Liu Z, Luo X, Zheng Z (2017a) Using discriminative feature in software entities for relevance identification of code changes. Journal of Software: Evolution and Process 29(7):e1859. https:\/\/doi.org\/10.1002\/smr.1859","key":"10359_CR25","DOI":"10.1002\/smr.1859"},{"doi-asserted-by":"publisher","unstructured":"Huang Y, Zheng Q, Chen X, Xiong Y, Liu Z, Luo X (2017b) Mining version control system for automatically generating commit comment. In: ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM), pp 414\u2013423 https:\/\/doi.org\/10.1109\/ESEM.2017.56","key":"10359_CR26","DOI":"10.1109\/ESEM.2017.56"},{"doi-asserted-by":"publisher","unstructured":"Huang Y, Jia N, Chen X, Hong K, Zheng Z (2018a) Salient-class location: Help developers understand code change in code review. In: Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ACM, New York, NY, USA, ESEC\/FSE, pp 770\u2013774 https:\/\/doi.org\/10.1145\/3236024.3264841","key":"10359_CR27","DOI":"10.1145\/3236024.3264841"},{"doi-asserted-by":"publisher","unstructured":"Huang Y, Jia N, Zhou Q, Chen X, Xiong Y, Luo X (2018b) Guiding developers to make informative commenting decisions in source code. In: Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, ACM, New York, NY, USA, ICSE \u201918, pp 260\u2013261 https:\/\/doi.org\/10.1145\/3183440.3194960","key":"10359_CR28","DOI":"10.1145\/3183440.3194960"},{"doi-asserted-by":"publisher","unstructured":"Huang Y, Kong Q, Jia N, Chen X, Zheng Z (2019) Recommending differentiated code to support smart contract update. In: IEEE\/ACM 27th International Conference on Program Comprehension (ICPC), pp 260\u2013270 https:\/\/doi.org\/10.1109\/ICPC.2019.00045","key":"10359_CR29","DOI":"10.1109\/ICPC.2019.00045"},{"doi-asserted-by":"publisher","unstructured":"Jiang J, Xiong Y, Zhang H, Gao Q, Chen X (2018) Shaping program repair space with existing patches and similar code. In: Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, ACM, New York, NY, USA, ISSTA, pp 298\u2013309 https:\/\/doi.org\/10.1145\/3213846.3213871","key":"10359_CR30","DOI":"10.1145\/3213846.3213871"},{"doi-asserted-by":"publisher","unstructured":"Juels A, Kosba A, Shi E (2016) The ring of gyges: Investigating the future of criminal smart contracts. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, ACM, New York, NY, USA, CCS \u201916, pp 283\u2013295 https:\/\/doi.org\/10.1145\/2976749.2978362","key":"10359_CR31","DOI":"10.1145\/2976749.2978362"},{"doi-asserted-by":"crossref","unstructured":"Kiffer L, Levin D, Mislove A (2018) Analyzing ethereum\u2019s contract topology. In: Proceedings of the Internet Measurement Conference, pp 494\u2013499","key":"10359_CR32","DOI":"10.1145\/3278532.3278575"},{"doi-asserted-by":"publisher","unstructured":"Kosba A, Miller A, Shi E, Wen Z, Papamanthou C (2016) Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In: IEEE Symposium on Security and Privacy (SP), pp 839\u2013858 https:\/\/doi.org\/10.1109\/SP.2016.55","key":"10359_CR33","DOI":"10.1109\/SP.2016.55"},{"unstructured":"Le Q, Mikolov T (2014a) Distributed representations of sentences and documents. In: Proceedings of the 31st International Conference on International Conference on Machine Learning, JMLR.org, ICML\u201914, vol 32 p II-1188-II-1196","key":"10359_CR34"},{"unstructured":"Le Q, Mikolov T (2014b) Distributed representations of sentences and documents. In: Proceedings of the 31st International Conference on International Conference on Machine Learning, JMLR.org, ICML\u201914, vol 32 p II-1188-II-1196","key":"10359_CR35"},{"doi-asserted-by":"crossref","unstructured":"Liu H, Yang Z, Liu C, Jiang Y, Zhao W, Sun J (2018) Eclone: Detect semantic clones in ethereum via symbolic transaction sketch. In: Proceedings of the 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, p 900\u2013903","key":"10359_CR36","DOI":"10.1145\/3236024.3264596"},{"doi-asserted-by":"crossref","unstructured":"Liu H, Yang Z, Jiang Y, Zhao W, Sun J (2019) Enabling clone detection for ethereum via smart contract birthmarks. In: IEEE\/ACM 27th International Conference on Program Comprehension (ICPC), IEEE, p 105\u2013115","key":"10359_CR37","DOI":"10.1109\/ICPC.2019.00024"},{"doi-asserted-by":"publisher","unstructured":"Luu L, Chu DH, Olickel H, Saxena P, Hobor A (2016) Making smart contracts smarter. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, ACM, New York, NY, USA, CCS \u201916, p 254\u2013269 https:\/\/doi.org\/10.1145\/2976749.2978309","key":"10359_CR38","DOI":"10.1145\/2976749.2978309"},{"doi-asserted-by":"publisher","unstructured":"Merkle RC (1980) Protocols for public key cryptosystems. In: IEEE Symposium on Security and Privacy, p 122\u2013122 https:\/\/doi.org\/10.1109\/SP.1980.10006","key":"10359_CR39","DOI":"10.1109\/SP.1980.10006"},{"doi-asserted-by":"publisher","unstructured":"Merlec MM, Lee YK, In HP (2021) Smartbuilder: A block-based visual programming framework for smart contract development. In: IEEE International Conference on Blockchain (Blockchain), pp 90\u201394 https:\/\/doi.org\/10.1109\/Blockchain53845.2021.00023","key":"10359_CR40","DOI":"10.1109\/Blockchain53845.2021.00023"},{"unstructured":"Mikolov T, Sutskever I, Chen K, Corrado G, Dean J (2013) Distributed representations of words and phrases and their compositionality. In: Proceedings of the 26th International Conference on Neural Information Processing Systems, Curran Associates Inc., USA, NIPS\u201913, pp 3111\u20133119. http:\/\/dl.acm.org\/citation.cfm?id=2999792.2999959","key":"10359_CR41"},{"unstructured":"Mueller B (2018) Smashing ethereum smart contracts for fun and real profit. In: in 9th Annual HITB Security Conference (HITBSecConf), p 54","key":"10359_CR42"},{"unstructured":"Nakamoto S (2009) Bitcoin: A peer-to-peer electronic cash system. Cryptography Mailing list at https:\/\/metzdowd.com","key":"10359_CR43"},{"unstructured":"Nick S (2008) The idea of smart contracts (1997). http:\/\/www.fonhumuvanl\/rob\/Courses\/InformationInSpeech\/CDROM\/Literature\/LOTwinterschool2006\/szabobestvwhnet\/idea.html","key":"10359_CR44"},{"key":"10359_CR45","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-21915-8_1","volume-title":"Perspectives in Business Informatics Research","author":"A Norta","year":"2015","unstructured":"Norta A (2015) Creation of smart-contracting collaborations for decentralized autonomous organizations. Perspectives in Business Informatics Research. Springer International Publishing, Cham, pp 3\u201317"},{"issue":"4","key":"10359_CR46","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1016\/j.datak.2011.01.002","volume":"70","author":"J Oliva","year":"2011","unstructured":"Oliva J, Serrano JI, del Castillo MD, Iglesias \u00c1 (2011) Symss: A syntax-based measure for short-text semantic similarity. Data & Knowledge Engineering 70(4):390\u2013405","journal-title":"Data & Knowledge Engineering"},{"issue":"3","key":"10359_CR47","doi-asserted-by":"publisher","first-page":"582","DOI":"10.2307\/2082975","volume":"89","author":"E Ostrom","year":"1995","unstructured":"Ostrom E (1995) A grammar of institutions. American Political Science Review 89(3):582\u2013600","journal-title":"American Political Science Review"},{"key":"10359_CR48","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-319-94478-4_6","volume-title":"Blockchain - ICBC 2018","author":"RM Parizi","year":"2018","unstructured":"Parizi RM, Amritraj Dehghantanha A (2018) Smart contract programming languages on blockchains: An empirical evaluation of usability and security. Blockchain - ICBC 2018. Springer International Publishing, Cham, pp 75\u201391"},{"doi-asserted-by":"publisher","unstructured":"Ren M, Ma F, Yin Z, Fu Y, Li H, Chang W, Jiang Y (2021) Making smart contract development more secure and easier. In: Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Association for Computing Machinery, New York, NY, USA, ESEC\/FSE 2021, p 1360-1370 https:\/\/doi.org\/10.1145\/3468264.3473929","key":"10359_CR49","DOI":"10.1145\/3468264.3473929"},{"doi-asserted-by":"publisher","unstructured":"Roy CK, Cordy JR (2008a) Nicad: Accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization. In: Proceedings of the 16th IEEE International Conference on Program Comprehension, IEEE Computer Society, USA, ICPC \u201908, p 172-181 https:\/\/doi.org\/10.1109\/ICPC.2008.41","key":"10359_CR50","DOI":"10.1109\/ICPC.2008.41"},{"doi-asserted-by":"publisher","unstructured":"Roy CK, Cordy JR (2008b) Nicad: Accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization. In: 16th IEEE International Conference on Program Comprehension, p 172\u2013181 https:\/\/doi.org\/10.1109\/ICPC.2008.41","key":"10359_CR51","DOI":"10.1109\/ICPC.2008.41"},{"issue":"7","key":"10359_CR52","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1016\/j.scico.2009.02.007","volume":"74","author":"CK Roy","year":"2009","unstructured":"Roy CK, Cordy JR, Koschke R (2009) Comparison and evaluation of code clone detection techniques and tools: A qualitative approach. Sci Comput Program 74(7):470\u2013495. https:\/\/doi.org\/10.1016\/j.scico.2009.02.007","journal-title":"Sci Comput Program"},{"doi-asserted-by":"crossref","unstructured":"Sapirshtein A, Sompolinsky Y, Zohar A (2017) Optimal selfish mining strategies in bitcoin. Christ Church, Barbados, vol 9603 LNCS, p 515\u2013532","key":"10359_CR53","DOI":"10.1007\/978-3-662-54970-4_30"},{"unstructured":"Swan M (2015) Blockchain: Blueprint for a New Economy, 1st edn. O\u2019Reilly Media, Inc","key":"10359_CR54"},{"doi-asserted-by":"publisher","unstructured":"Torres CF, Sch\u00fctte J, State R (2018) Osiris: Hunting for integer bugs in ethereum smart contracts. In: Proceedings of the 34th Annual Computer Security Applications Conference, Association for Computing Machinery, New York, NY, USA, ACSAC \u201918, p 664-676 https:\/\/doi.org\/10.1145\/3274694.3274737","key":"10359_CR55","DOI":"10.1145\/3274694.3274737"},{"key":"10359_CR56","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-319-94478-4_2","volume-title":"Blockchain - ICBC 2018","author":"B Wang","year":"2018","unstructured":"Wang B, Chen S, Yao L, Liu B, Xu X, Zhu L (2018) A simulation approach for studying behavior and quality of blockchain networks. Blockchain - ICBC 2018. Springer International Publishing, Cham, pp 18\u201331"},{"doi-asserted-by":"publisher","unstructured":"Wettel R, Marinescu R (2005) Archeology of code duplication: recovering duplication chains from small duplication fragments. In: Seventh International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC\u201905), p 8 https:\/\/doi.org\/10.1109\/SYNASC.2005.20","key":"10359_CR57","DOI":"10.1109\/SYNASC.2005.20"},{"doi-asserted-by":"publisher","unstructured":"Yu L, Tsai W, Li G, Yao Y, Hu C, Deng E (2017) Smart-contract execution with concurrent block building. In: 2017 11th IEEE Symposium on Service-Oriented System Engineering (SOSE), IEEE Computer Society, Los Alamitos, CA, USA, pp 160\u2013167 https:\/\/doi.org\/10.1109\/SOSE.2017.33","key":"10359_CR58","DOI":"10.1109\/SOSE.2017.33"},{"doi-asserted-by":"publisher","unstructured":"Yue R, Gao Z, Meng N, Xiong Y, Wang X, Morgenthaler JD (2018) Automatic clone recommendation for refactoring based on the present and the past. In: IEEE International Conference on Software Maintenance and Evolution (ICSME), pp 115\u2013126 https:\/\/doi.org\/10.1109\/ICSME.2018.00021","key":"10359_CR59","DOI":"10.1109\/ICSME.2018.00021"},{"doi-asserted-by":"publisher","unstructured":"Zheng P, Zheng Z, Luo X, Chen X, Liu X (2018) A detailed and real-time performance monitoring framework for blockchain systems. In: International Conference on Software Engineering Software Engineering in Practice - ICSE-SEIP \u201918, p 134\u2013143 https:\/\/doi.org\/10.1145\/3183519.3183546","key":"10359_CR60","DOI":"10.1145\/3183519.3183546"},{"doi-asserted-by":"publisher","unstructured":"Zheng Z, Xie S, Dai H, Chen X, Wang H (2017) An overview of blockchain technology: Architecture, consensus, and future trends. In: IEEE International Congress on Big Data (BigData Congress), p 557\u2013564 https:\/\/doi.org\/10.1109\/BigDataCongress.2017.85","key":"10359_CR61","DOI":"10.1109\/BigDataCongress.2017.85"},{"doi-asserted-by":"crossref","unstructured":"Zhu J, He P, Fu Q, Zhang H, Lyu MR, Zhang D (2015) Learning to log: Helping developers make informed logging decisions. In: Proceedings of the 37th International Conference on Software Engineering - Volume 1, IEEE Press, Piscataway, NJ, USA, ICSE \u201915, p 415\u2013425. http:\/\/dl.acm.org\/citation.cfm?id=2818754.2818807","key":"10359_CR62","DOI":"10.1109\/ICSE.2015.60"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-023-10359-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-023-10359-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-023-10359-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,4]],"date-time":"2023-10-04T12:21:04Z","timestamp":1696422064000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-023-10359-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9]]},"references-count":62,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["10359"],"URL":"https:\/\/doi.org\/10.1007\/s10664-023-10359-y","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"type":"print","value":"1382-3256"},{"type":"electronic","value":"1573-7616"}],"subject":[],"published":{"date-parts":[[2023,9]]},"assertion":[{"value":"7 June 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 September 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"The authors declared that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Competing Interests"}}],"article-number":"119"}}