{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T19:27:36Z","timestamp":1769628456496,"version":"3.49.0"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2016,1,22]],"date-time":"2016-01-22T00:00:00Z","timestamp":1453420800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Software Qual J"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1007\/s11219-016-9305-y","type":"journal-article","created":{"date-parts":[[2016,1,22]],"date-time":"2016-01-22T13:22:12Z","timestamp":1453468932000},"page":"883-915","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A comparative study on the intensity and harmfulness of late propagation in near-miss code clones"],"prefix":"10.1007","volume":"24","author":[{"given":"Manishankar","family":"Mondal","sequence":"first","affiliation":[]},{"given":"Chanchal K.","family":"Roy","sequence":"additional","affiliation":[]},{"given":"Kevin A.","family":"Schneider","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,22]]},"reference":[{"key":"9305_CR1","doi-asserted-by":"crossref","unstructured":"Aversano, L., Cerulo, L., & Penta, M. D. (2007). How clones are maintained: An empirical study. In CSMR (pp.\u00a081\u201390). IEEE Computer Society.","DOI":"10.1109\/CSMR.2007.26"},{"key":"9305_CR2","doi-asserted-by":"crossref","unstructured":"Bazrafshan, S. (2012). Evolution of near-miss clones. In SCAM (pp.\u00a074\u201383).","DOI":"10.1109\/SCAM.2012.18"},{"key":"9305_CR3","first-page":"1139","volume":"25","author":"L Barbour","year":"2013","unstructured":"Barbour, L., Khomh, F., & Zou, Y. (2013). An empirical study of faults in late propagation clone genealogies. Software: Evolution and Process, 25, 1139\u20131165.","journal-title":"Software: Evolution and Process"},{"key":"9305_CR4","doi-asserted-by":"crossref","unstructured":"Cordy, J. R., & Roy, C. K. (2011). The NiCad clone detector. In Tool demo track (pp. 219\u2013220). ICPC","DOI":"10.1109\/ICPC.2011.26"},{"key":"9305_CR5","doi-asserted-by":"crossref","first-page":"720","DOI":"10.1109\/TSE.2009.17","volume":"35","author":"M D\u2019Ambros","year":"2009","unstructured":"D\u2019Ambros, M., Lanza, M., & Lungu, M. (2009). Visualizing co-change information with the evolution radar. IEEE Transactions on Software Engineering, 35, 720\u2013735.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"9305_CR6","doi-asserted-by":"crossref","unstructured":"Duala-Ekoko, E., & Robillard, M.P. (2007). Tracking code clones in evolving software. In ICSE (pp.\u00a0158\u2013167).","DOI":"10.1109\/ICSE.2007.90"},{"key":"9305_CR7","doi-asserted-by":"crossref","unstructured":"Duala-Ekoko, E., & Robillard, M.P. (2008). Clonetracker: Tool support for code clone management. In ICSE (pp.\u00a0843\u2013846).","DOI":"10.1145\/1368088.1368218"},{"key":"9305_CR10","doi-asserted-by":"crossref","unstructured":"G\u00f6de, N., & Harder, J. (2011). Clone stability. In CSMR (pp.\u00a065\u201374).","DOI":"10.1109\/CSMR.2011.11"},{"key":"9305_CR11","doi-asserted-by":"crossref","unstructured":"G\u00f6de, N., & Koschke, R. (2011). Frequency and risks of changes to clones. In ICSE (pp.\u00a0311\u2013320).","DOI":"10.1145\/1985793.1985836"},{"key":"9305_CR12","doi-asserted-by":"crossref","first-page":"645","DOI":"10.1007\/s10664-008-9076-6","volume":"13","author":"C Kapser","year":"2008","unstructured":"Kapser, C., & Godfrey, M. W. (2008). \u201cCloning considered harmful\u201d considered harmful: Patterns of cloning in software. Empirical Software Engineering, 13, 645\u2013692.","journal-title":"Empirical Software Engineering"},{"key":"9305_CR13","doi-asserted-by":"crossref","unstructured":"Krinke, J. (2007). A study of consistent and inconsistent changes to code clones. In WCRE (pp.\u00a0170\u2013178).","DOI":"10.1109\/WCRE.2007.7"},{"key":"9305_CR14","doi-asserted-by":"crossref","unstructured":"Krinke, J. (2008). Is cloned code more stable than non-cloned code? In SCAM (pp.\u00a057\u201366).","DOI":"10.1109\/SCAM.2008.14"},{"key":"9305_CR15","doi-asserted-by":"crossref","unstructured":"Kim, M., Sazawal, V., Notkin, D., & Murphy, G.C. (2005). An empirical study of code clone genealogies. In ESEC-FSE (pp.\u00a0187\u2013196).","DOI":"10.1145\/1095430.1081737"},{"key":"9305_CR16","doi-asserted-by":"crossref","unstructured":"Lozano, A., & Wermelinger, M. (2008). Assessing the effect of clones on changeability. In ICSM (pp.\u00a0227\u2013236).","DOI":"10.1109\/ICSM.2008.4658071"},{"key":"9305_CR17","doi-asserted-by":"crossref","unstructured":"Lozano, A., & Wermelinger, M. (2010). Tracking clones\u2019 imprint. In IWSC (pp.\u00a065\u201372).","DOI":"10.1145\/1808901.1808910"},{"key":"9305_CR18","doi-asserted-by":"crossref","unstructured":"Mondal, M., Roy, C. K., Rahman, M. S., Saha, R. K., Krinke, J., & Schneider, K. A. (2012a). Comparative stability of cloned and non-cloned code: an empirical study. In ACM SAC (pp.\u00a01227\u20131234). ACM.","DOI":"10.1145\/2245276.2231969"},{"key":"9305_CR19","unstructured":"Mondal, M., Roy, C. K., & Schneider, K. A. (2012b). Connectivity of co-changed method groups: A case study on open source systems. In CASCON (pp.\u00a0205\u2013219)."},{"key":"9305_CR20","doi-asserted-by":"crossref","unstructured":"Mondal, M., Roy, C. K., & Schneider, K. A. (2012c). Dispersion of changes in cloned and non-cloned code. In IWSC (pp.\u00a029\u201335).","DOI":"10.1109\/IWSC.2012.6227863"},{"issue":"3","key":"9305_CR21","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1145\/2387358.2387360","volume":"12","author":"M Mondal","year":"2012","unstructured":"Mondal, M., Roy, C. K., & Schneider, K. A. (2012d). An empirical study on clone stability. ACM SIGAPP Applied Computing Review, 12(3), 20\u201336.","journal-title":"ACM SIGAPP Applied Computing Review"},{"key":"9305_CR22","doi-asserted-by":"crossref","unstructured":"Mondal, M., Roy, C. K., & Schneider, K. A. (2014a). Automatic identification of important clones for refactoring and tracking. In SCAM, 10 pp (to appear).","DOI":"10.1109\/SCAM.2014.11"},{"key":"9305_CR23","doi-asserted-by":"crossref","unstructured":"Mondal, M., Roy, C. K., & Schneider, K. A. (2014b). Automatic ranking of clones for refactoring through mining association rules. In CSMR-WCRE (pp.\u00a0114\u2013123).","DOI":"10.1109\/CSMR-WCRE.2014.6747161"},{"key":"9305_CR24","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1016\/j.scico.2013.11.027","volume":"95","author":"M Mondal","year":"2014","unstructured":"Mondal, M., Roy, C. K., & Schneider, K. A. (2014c). An insight into the dispersion of changes in cloned and non-cloned code: A genealogy based empirical study. Science of Computer Programming, 95, 445\u2013468.","journal-title":"Science of Computer Programming"},{"key":"9305_CR25","unstructured":"Mondal, M., Roy, C. K., & Schneider, K. A. (2014d). Late propagation in near-miss clones: An empirical study. In IWSC, 17 pp."},{"key":"9305_CR26","doi-asserted-by":"crossref","unstructured":"Mondal, M., Roy, C. K., & Schneider, K. A. (2015). A comparative study on the bug-proneness of different types of code clones. In ICSME (pp.\u00a091\u2013100).","DOI":"10.1109\/ICSM.2015.7332455"},{"key":"9305_CR27","doi-asserted-by":"crossref","unstructured":"Mockus, A., & Votta, L. G. (2000). Identifying reasons for software changes using historic databases. In ICSM (pp.\u00a0120\u2013130).","DOI":"10.1109\/ICSM.2000.883028"},{"key":"9305_CR31","doi-asserted-by":"crossref","unstructured":"Roy, C. K., & Cordy, J. R. (2008). NICAD: Accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization. In ICPC (pp.\u00a0172\u2013181). IEEE Computer Society.","DOI":"10.1109\/ICPC.2008.41"},{"key":"9305_CR32","doi-asserted-by":"crossref","unstructured":"Roy, C. K., & Cordy, J. R. (2009). A mutation\/injection-based automatic framework for evaluating code clone detection tools. In Mutation (pp.\u00a0157\u2013166).","DOI":"10.1109\/ICSTW.2009.18"},{"key":"9305_CR33","doi-asserted-by":"crossref","first-page":"470","DOI":"10.1016\/j.scico.2009.02.007","volume":"74","author":"CK Roy","year":"2009","unstructured":"Roy, C. K., Cordy, J. R., & Koschke, R. (2009). Comparison and evaluation of code clone detection techniques and tools: A qualitative approach. Science of Computer Programming, 74, 470\u2013495.","journal-title":"Science of Computer Programming"},{"key":"9305_CR34","doi-asserted-by":"crossref","unstructured":"Roy, C. K. (2009). Detection and analysis of near-miss software clones. In ICSM (pp.\u00a0447\u2013450).","DOI":"10.1109\/ICSM.2009.5306301"},{"key":"9305_CR35","doi-asserted-by":"crossref","unstructured":"Svajlenko, J., Roy, C. K. (2014). Evaluating modern clone detection tools. In ICSME (pp.\u00a0321\u2013330).","DOI":"10.1109\/ICSME.2014.54"},{"key":"9305_CR36","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10664-009-9108-x","volume":"15","author":"S Thummalapenta","year":"2009","unstructured":"Thummalapenta, S., Cerulo, L., Aversano, L., & Penta, M. D. (2009). An empirical study on the maintenance of source code clones. Empirical Software Engineering, 15, 1\u201334.","journal-title":"Empirical Software Engineering"},{"key":"9305_CR37","doi-asserted-by":"crossref","unstructured":"Vanya, A., Premraj, R., & Vliet, H. V. (2010). Interactive exploration of co-evolving software entities. In CSMR (pp.\u00a0260\u2013263).","DOI":"10.1109\/CSMR.2010.50"},{"key":"9305_CR38","doi-asserted-by":"crossref","unstructured":"Wang, T., Harman, M., Jia, Y., & Krinke, J. (2013). Searching for better configurations: A rigorous approach to clone evaluation. In ESEC\/SIGSOFT FSE (pp.\u00a0455\u2013465).","DOI":"10.1145\/2491411.2491420"},{"key":"9305_CR39","doi-asserted-by":"crossref","unstructured":"Xie, S., & Khomh, Y. Z. F. (2013). An empirical study of the fault-proneness of clone mutation and clone migration. In MSR (pp.\u00a0149\u2013158).","DOI":"10.1109\/MSR.2013.6624022"}],"container-title":["Software Quality Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-016-9305-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11219-016-9305-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-016-9305-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-016-9305-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T10:10:43Z","timestamp":1559383843000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11219-016-9305-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,22]]},"references-count":34,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["9305"],"URL":"https:\/\/doi.org\/10.1007\/s11219-016-9305-y","relation":{},"ISSN":["0963-9314","1573-1367"],"issn-type":[{"value":"0963-9314","type":"print"},{"value":"1573-1367","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,1,22]]}}}