{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T22:54:13Z","timestamp":1769727253080,"version":"3.49.0"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,6,13]],"date-time":"2017-06-13T00:00:00Z","timestamp":1497312000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100002790","name":"Canadian Network for Research and Innovation in Machining Technology, Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["RGPIN-2014-04611"],"award-info":[{"award-number":["RGPIN-2014-04611"]}],"id":[{"id":"10.13039\/501100002790","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Software Qual J"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s11219-017-9375-5","type":"journal-article","created":{"date-parts":[[2017,6,12]],"date-time":"2017-06-12T22:44:48Z","timestamp":1497307488000},"page":"1187-1222","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["An investigation of the fault-proneness of clone evolutionary patterns"],"prefix":"10.1007","volume":"26","author":[{"given":"Liliane","family":"Barbour","sequence":"first","affiliation":[]},{"given":"Le","family":"An","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5704-4173","authenticated-orcid":false,"given":"Foutse","family":"Khomh","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Zou","sequence":"additional","affiliation":[]},{"given":"Shaohua","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,13]]},"reference":[{"key":"9375_CR1","volume-title":"Proceedings of the 11th international conference on predictive models and data analytics in software engineering (p. 5). ACM","author":"L An","year":"2015","unstructured":"An, L., & Khomh, F. (2015). An empirical study of crash-inducing commits in mozilla firefox, Proceedings of the 11th international conference on predictive models and data analytics in software engineering (p. 5). ACM."},{"key":"9375_CR2","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1145\/1159733.1159738","volume-title":"Proceedings of the 2006 ACM\/IEEE international symposium on empirical software engineering (ISESE)","author":"E Arisholm","year":"2006","unstructured":"Arisholm, E., & Briand, L. C. (2006). Predicting fault-prone components in a java legacy system, Proceedings of the 2006 ACM\/IEEE international symposium on empirical software engineering (ISESE) (pp. 8\u201317). NY, USA: ACM."},{"key":"9375_CR3","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/CSMR.2007.26","volume-title":"Proceedings of the 11th European conference on software maintenance and reengineering","author":"L Aversano","year":"2007","unstructured":"Aversano, L., Cerulo, L., & Di Penta, M. (2007). How clones are maintained: An empirical study, Proceedings of the 11th European conference on software maintenance and reengineering (pp. 81 \u201390)."},{"key":"9375_CR4","first-page":"273","volume-title":"Proceedings of the 27th IEEE international conference on software maintenance (ICSM)","author":"L Barbour","year":"2011","unstructured":"Barbour, L., Khomh, F., & Zou, Y. (2011). Late propagation in software clones, Proceedings of the 27th IEEE international conference on software maintenance (ICSM) (pp. 273 \u2013282)."},{"key":"9375_CR5","first-page":"1139","volume":"25","author":"L Barbour","year":"2013","unstructured":"Barbour, L., Khomh, F., & Zou, Y. (2013). An empirical study of faults in late propagation clone genealogies. Journal of Software: Evolution and Process, 25, 1139\u20131165.","journal-title":"Journal of Software: Evolution and Process"},{"key":"9375_CR6","first-page":"11","volume-title":"9th international workshop on principles of software evolution (IWPSE)","author":"A Bernstein","year":"2007","unstructured":"Bernstein, A., Ekanayake, J., & Pinzger, M. (2007). Improving defect prediction using temporal features and non linear models, 9th international workshop on principles of software evolution (IWPSE) (pp. 11\u201318). NY, USA: ACM."},{"key":"9375_CR7","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1109\/32.748920","volume":"25","author":"LC Briand","year":"1999","unstructured":"Briand, L. C., Daly, J. W., & W\u00fcst, J. K. (1999). A unified framework for coupling measurement in object-oriented systems. IEEE Transaction Software Engineering, 25, 91\u2013121.","journal-title":"IEEE Transaction Software Engineering"},{"key":"9375_CR8","doi-asserted-by":"crossref","first-page":"864","DOI":"10.1109\/TSE.2009.42","volume":"35","author":"M Cataldo","year":"2009","unstructured":"Cataldo, M., Mockus, A., Roberts, J. A., & Herbsleb, J. D. (2009). Software dependencies, work dependencies, and their impact on failures. IEEE Transaction Software Engineering, 35, 864\u2013878.","journal-title":"IEEE Transaction Software Engineering"},{"key":"9375_CR9","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1109\/32.295895","volume":"20","author":"SR Chidamber","year":"1994","unstructured":"Chidamber, S. R., & Kemerer, C. F. (1994). A metrics suite for object oriented design. IEEE Transaction Software Engineering, 20, 476\u2013493.","journal-title":"IEEE Transaction Software Engineering"},{"key":"9375_CR10","unstructured":"Corley, C. S. (2016). whatthepatch - Python\u2019s third party patch parsing library. Online; Accessed August 29th, 2016 https:\/\/pypi.python.org\/pypi\/whatthepatch ."},{"key":"9375_CR11","unstructured":"Dmitrienko, A., Molenberghs, G., Chuang-Stein, C., & Offen, W. (2005). Analysis of clinical trials using SAS: a practical guide. SAS Institute."},{"key":"9375_CR12","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1016\/S0164-1212(00)00086-8","volume":"56","author":"K El Emam","year":"2001","unstructured":"El Emam, K., Melo, W., & Machado, J. C. (2001). The prediction of faulty classes using object-oriented design metrics. Journal of Systems and Software, 56, 63\u201375.","journal-title":"Journal of Systems and Software"},{"key":"9375_CR13","volume-title":"2003. ICSM 2003. Proceedings of the international conference on software maintenance (pp. 23\u201332). IEEE","author":"M Fischer","year":"2003","unstructured":"Fischer, M., Pinzger, M., & Gall, H. (2003). Populating a release history database from version control and bug tracking systems, 2003. ICSM 2003. Proceedings of the international conference on software maintenance (pp. 23\u201332). IEEE."},{"key":"9375_CR14","unstructured":"Fowler, M. (2009). Refactoring: improving the design of existing code. Pearson Education India."},{"key":"9375_CR15","volume-title":"Proceedings of the 15th European conference on software maintenance and reengineering","author":"N G\u00f6de","year":"2011","unstructured":"G\u00f6de, N., & Harder, J. (2011). Clone stability, Proceedings of the 15th European conference on software maintenance and reengineering."},{"key":"9375_CR16","first-page":"311","volume-title":"Proceedings of the 33rd international conference on software engineering (ICSE), ACM","author":"N G\u00f6de","year":"2011","unstructured":"G\u00f6de, N., & Koschke, R. (2011). Frequency and risks of changes to clones, Proceedings of the 33rd international conference on software engineering (ICSE), ACM (pp. 311\u2013320)."},{"key":"9375_CR17","volume-title":"Proceedings of the 5th international workshop on software clones (pp. 14\u201320). ACM","author":"N G\u00f6de","year":"2011","unstructured":"G\u00f6de, N., & Harder, J. (2011). Oops!... I changed it again, Proceedings of the 5th international workshop on software clones (pp. 14\u201320). ACM."},{"key":"9375_CR18","doi-asserted-by":"crossref","unstructured":"Gode, N., & Koschke, R. (2009). Incremental clone detection. In 13th European conference on software maintenance and reengineering, 2009. CSMR\u201909 (pp. 219\u2013228). IEEE.","DOI":"10.1109\/CSMR.2009.20"},{"key":"9375_CR19","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1109\/32.859533","volume":"26","author":"TL Graves","year":"2000","unstructured":"Graves, T. L., Karr, A. F., Marron, J. S., & Siy, H. (2000). Predicting fault incidence using software change history. IEEE Transactions on Software Engineering, 26, 653\u2013661.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"9375_CR20","volume-title":"Proceedings of the 31st international conference on software engineering (ICSE)","author":"AE Hassan","year":"2009","unstructured":"Hassan, A. E. (2009). Predicting faults using the complexity of code changes, Proceedings of the 31st international conference on software engineering (ICSE)."},{"key":"9375_CR21","unstructured":"Harrell, F. E. (2013). Regression modeling strategies: with applications to linear models, logistic regression, and survival analysis. Springer Science and Business Media."},{"key":"9375_CR22","volume-title":"Proceedings of the 31st international conference on software engineering (pp. 485\u2013495). IEEE Computer Society","author":"E Juergens","year":"2009","unstructured":"Juergens, E., Deissenboeck, F., Hummel, B., & Wagner, S. (2009). Do code clones matter?, Proceedings of the 31st international conference on software engineering (pp. 485\u2013495). IEEE Computer Society."},{"key":"9375_CR23","doi-asserted-by":"crossref","first-page":"654","DOI":"10.1109\/TSE.2002.1019480","volume":"28","author":"T Kamiya","year":"2002","unstructured":"Kamiya, T., Kusumoto, S., & Inoue, K. (2002). Ccfinder: a multilinguistic token-based code clone detection system for large scale source code. IEEE Transactions on Software Engineering, 28, 654\u2013670.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"9375_CR24","first-page":"19","volume-title":"Proceedings of the 13th working conference on reverse engineering","author":"C Kapser","year":"2006","unstructured":"Kapser, C., & Godfrey, M. W. (2006). Cloning considered harmful considered harmful, Proceedings of the 13th working conference on reverse engineering (pp. 19\u201328). DC, USA: IEEE Computer Society."},{"key":"9375_CR25","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1109\/ISSRE.1996.558896","volume-title":"Proceedings of the 7th international symposium on software reliability engineering. ISSRE \u201996","author":"TM Khoshgoftaar","year":"1996","unstructured":"Khoshgoftaar, T. M., Allen, E. B., Goel, N., Nandi, A., & McMullan, J. (1996). Detection of software modules with high debug code churn in a very large legacy system, Proceedings of the 7th international symposium on software reliability engineering. ISSRE \u201996 (pp. 364\u2013371). DC, USA: IEEE Computer Society."},{"key":"9375_CR26","first-page":"187","volume-title":"Proceedings of the 10th European software engineering conference held jointly with 13th ACM SIGSOFT international symposium on foundations of software engineering. ESEC\/FSE-13","author":"M Kim","year":"2005","unstructured":"Kim, M., Sazawal, V., Notkin, D., & Murphy, G. (2005). An empirical study of code clone genealogies, Proceedings of the 10th European software engineering conference held jointly with 13th ACM SIGSOFT international symposium on foundations of software engineering. ESEC\/FSE-13 (pp. 187\u2013196). NY, USA: ACM."},{"key":"9375_CR27","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1109\/WCRE.2007.7","volume":"0","author":"J Krinke","year":"2007","unstructured":"Krinke, J. (2007). A study of consistent and inconsistent changes to code clones. Proceedings of the 14th Working Conference on Reverse Engineering, 0, 170\u2013178.","journal-title":"Proceedings of the 14th Working Conference on Reverse Engineering"},{"key":"9375_CR28","volume-title":"2015 IEEE international conference on software maintenance and evolution (ICSME) (pp. 111\u2013120). IEEE","author":"O Kononenko","year":"2015","unstructured":"Kononenko, O., Baysal, O., Guerrouj, L., Cao, Y., & Godfrey, M. W. (2015). Investigating code review quality: Do people and participation matter? 2015 IEEE international conference on software maintenance and evolution (ICSME) (pp. 111\u2013120). IEEE."},{"key":"9375_CR29","unstructured":"Kutner, M., Nachtsheim, C., & Neter, J. (2004). Applied linear regression models. 4th International Edition McGraw-Hill\/Irwin."},{"key":"9375_CR30","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1109\/WPC.2003.1199215","volume-title":"2003. 11th IEEE international workshop on program comprehension","author":"A Lakhotia","year":"2003","unstructured":"Lakhotia, A., Li, J., Walenstein, A., & Yang, Y. (2003). Towards a clone detection benchmark suite and results archive, 2003. 11th IEEE international workshop on program comprehension (pp. 285\u2013 286)."},{"key":"9375_CR31","unstructured":"McIntosh, S., Kamei, Y., Adams, B., & Hassan, A. E. (2015). An empirical study of the impact of modern code review practices on software quality. Empirical Software Engineering. To appear."},{"key":"9375_CR32","doi-asserted-by":"crossref","unstructured":"Mondal, M., Roy, C. K., & Schneider, K. A. (2016). A comparative study on the intensity and harmfulness of late propagation in near-miss code clones. Software Quality Journal (pp. 1\u201333).","DOI":"10.1007\/s11219-016-9305-y"},{"key":"9375_CR33","first-page":"181","volume-title":"Proceedings of the international conference on software engineering","author":"R Moser","year":"2008","unstructured":"Moser, R., Pedrycz, W., & Succi, G. (2008). A comparative analysis of the efficiency of change metrics and static code attributes for defect prediction, Proceedings of the international conference on software engineering (pp. 181\u2013190). NY, USA: ACM."},{"key":"9375_CR34","first-page":"284","volume-title":"Proceedings of the 27th international conference on software engineering (ICSE)","author":"N Nagappan","year":"2005","unstructured":"Nagappan, N., & Ball, T. (2005). Use of relative code churn measures to predict system defect density, Proceedings of the 27th international conference on software engineering (ICSE) (pp. 284\u2013292). NY, USA: ACM."},{"key":"9375_CR35","doi-asserted-by":"crossref","unstructured":"Nagappan, N., Ball, T., & Zeller, A. (2006). Mining metrics to predict component failures. In Proceedings of the 28th international conference on software engineering (ICSE) (pp. 452\u2013461). NY, USA: ACM.","DOI":"10.1145\/1134285.1134349"},{"key":"9375_CR36","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1007\/s10664-011-9195-3","volume":"17","author":"F Rahman","year":"2012","unstructured":"Rahman, F., Bird, C., & Devanbu, P. (2012). Clones: What is that smell? Empirical Software Engineering, 17, 503\u2013530.","journal-title":"Empirical Software Engineering"},{"key":"9375_CR37","unstructured":"Rogerson, P. A. (2010). Statistical methods for geography: a student\u2019s guide. Sage Publications."},{"key":"9375_CR38","unstructured":"Roy, C. K., & Cordy, J. R. (2007). A survey on software clone detection research. School of Computing TR 2007-541, Queen\u2019s University, 115."},{"key":"9375_CR39","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1109\/ICPC.2008.41","volume-title":"2008. ICPC 2008. The 16th IEEE international conference on program comprehension","author":"C Roy","year":"2008","unstructured":"Roy, C., & Cordy, J. (2008). Nicad: Accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization, 2008. ICPC 2008. The 16th IEEE international conference on program comprehension (pp. 172 \u2013181)."},{"key":"9375_CR40","unstructured":"Sheskin, D. (2007). Handbook of parametric and nonparametric statistical procedures, 4th edn. : Chapman & All."},{"key":"9375_CR41","first-page":"321","volume-title":"Proceedings 30th IEEE international conference on software maintenance and evolution (ICSME), IEEE","author":"J Svajlenko","year":"2014","unstructured":"Svajlenko, J., & Roy, C. K. (2014). Evaluating modern clone detection tools, Proceedings 30th IEEE international conference on software maintenance and evolution (ICSME), IEEE (pp. 321\u2013330)."},{"key":"9375_CR42","volume-title":"ACM sigsoft software engineering notes (Vol. 30, pp. 1\u20135). ACM","author":"J \u015aliwerski","year":"2005","unstructured":"\u015aliwerski, J., Zimmermann, T., & Zeller, A. (2005). When do changes induce fixes? ACM sigsoft software engineering notes (Vol. 30, pp. 1\u20135). ACM."},{"key":"9375_CR43","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10664-009-9108-x","volume":"15","author":"S Thummalapenta","year":"2010","unstructured":"Thummalapenta, S., Cerulo, L., Aversano, L., & Di Penta, M. (2010). An empirical study on the maintenance of source code clones. Empirical Software Engineering, 15, 1\u201334.","journal-title":"Empirical Software Engineering"},{"key":"9375_CR44","unstructured":"Wheeler, D. A. (2016). SLOCCount. http:\/\/www.dwheeler.com\/sloccount\/ (2016) Online."},{"key":"9375_CR45","unstructured":"Wikipedia (2017). C-family programming languages. https:\/\/en.wikipedia.org\/wiki\/List_of_C-family_programmin_languages ."},{"key":"9375_CR46","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1109\/MSR.2013.6624022","volume-title":"Proceedings of the 10th working conference on mining software repositories. MSR \u201913","author":"S Xie","year":"2013","unstructured":"Xie, S., Khomh, F., & Zou, Y. (2013). An empirical study of the fault-proneness of clone mutation and clone migration, Proceedings of the 10th working conference on mining software repositories. MSR \u201913 (pp. 149\u2013158). Piscataway, NJ, USA: IEEE Press."},{"key":"9375_CR47","doi-asserted-by":"crossref","unstructured":"Xie, S., Khomh, F., Zou, Y., & Keivanloo, I. (2014). An empirical study on the fault-proneness of clone migration in clone genealogies, Proceedings of 2014 software evolution week-IEEE conference on software maintenance, reengineering and reverse engineering (CSMR-WCRE) (pp. 94\u2013103). Reengineering and Reverse Engineering (CSMR-WCRE).","DOI":"10.1109\/CSMR-WCRE.2014.6747229"},{"key":"9375_CR48","unstructured":"Yin, R. K. (2002). Case study research: Design and methods, 3rd edn. : SAGE Publications."},{"key":"9375_CR49","volume-title":"Third international workshop on predictor models in software engineering","author":"T Zimmermann","year":"2007","unstructured":"Zimmermann, T., Premraj, R., & Zeller, A. (2007). Predicting defects for eclipse, Third international workshop on predictor models in software engineering."}],"container-title":["Software Quality Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11219-017-9375-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-017-9375-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-017-9375-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T19:51:30Z","timestamp":1569441090000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11219-017-9375-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,13]]},"references-count":49,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["9375"],"URL":"https:\/\/doi.org\/10.1007\/s11219-017-9375-5","relation":{},"ISSN":["0963-9314","1573-1367"],"issn-type":[{"value":"0963-9314","type":"print"},{"value":"1573-1367","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,6,13]]}}}