{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T23:22:36Z","timestamp":1771024956032,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2014,10,22]],"date-time":"2014-10-22T00:00:00Z","timestamp":1413936000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1007\/s11704-014-3430-1","type":"journal-article","created":{"date-parts":[[2014,10,22]],"date-time":"2014-10-22T10:09:40Z","timestamp":1413972580000},"page":"996-1011","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Detection of semantically similar code"],"prefix":"10.1007","volume":"8","author":[{"given":"Tiantian","family":"Wang","sequence":"first","affiliation":[]},{"given":"Kechao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiaohong","family":"Su","sequence":"additional","affiliation":[]},{"given":"Peijun","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,22]]},"reference":[{"issue":"6","key":"3430_CR1","doi-asserted-by":"crossref","first-page":"760","DOI":"10.1016\/j.scico.2010.11.010","volume":"77","author":"N Bettenburg","year":"2012","unstructured":"Bettenburg N, Shang W Y, Ibrahim W, Adams B, Zou Y, Hassan A E. An empirical study on inconsistent changes to code clones at the release level. Science of Computer Programming, 2012, 77(6): 760\u2013776","journal-title":"Science of Computer Programming"},{"issue":"1","key":"3430_CR2","volume":"20","year":"2010","unstructured":"Duala-Ekoko E, Robillard M P. Clone region descriptors: representing and tracking duplication in source code. ACM Transactions on Software Engineering and Methodology, 2010, 20(1): Article No. 3","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"3430_CR3","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1109\/WCRE.2007.7","volume-title":"Proceedings of the 14th Working Conference on Reverse Engineering","author":"J Krinke","year":"2007","unstructured":"Krinke J. A study of consistent and inconsistent changes to code clones. In: Proceedings of the 14th Working Conference on Reverse Engineering. 2007, 170\u2013178"},{"issue":"5","key":"3430_CR4","doi-asserted-by":"crossref","first-page":"1008","DOI":"10.1109\/TSE.2011.90","volume":"38","author":"H A Nguyen","year":"2012","unstructured":"Nguyen H A, Nguyen T T, Pham N H, Al-Kofahi J, Nguyen T N. Clone management for evolving software. IEEE Transactions on Software Engineering, 2012, 38(5): 1008\u20131026","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"1","key":"3430_CR5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10664-009-9108-x","volume":"15","author":"S Thummalapenta","year":"2010","unstructured":"Thummalapenta S, Cerulo L, Aversano L, Penta M D. An empirical study on the maintenance of source code clones. Empirical Software Engineering, 2010, 15(1): 1\u201334","journal-title":"Empirical Software Engineering"},{"issue":"10","key":"3430_CR6","doi-asserted-by":"crossref","first-page":"804","DOI":"10.1109\/TSE.2005.114","volume":"31","author":"M Bruntink","year":"2005","unstructured":"Bruntink M, Van Deursen A, Van Engelen R, Tourwe T. On the use of clone detection for identifying crosscutting concern code. IEEE Transactions on Software Engineering, 2005, 31(10): 804\u2013818","journal-title":"IEEE Transactions on Software Engineering"},{"key":"3430_CR7","first-page":"310","volume-title":"Proceedings of the 34th International Conference on Software Engineering","author":"J Li","year":"2012","unstructured":"Li J, Ernst M D. CBCD: cloned buggy code detector. In: Proceedings of the 34th International Conference on Software Engineering. 2012, 310\u2013320"},{"issue":"3","key":"3430_CR8","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1109\/TSE.2006.28","volume":"32","author":"Z Li","year":"2006","unstructured":"Li Z, Lu S, Myagmar S, Zhou Y. CP-Miner: finding copy-paste and related bugs in large-scale software code. IEEE Transactions on Software Engineering, 2006, 32(3): 176\u2013192","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"4\u20135","key":"3430_CR9","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1007\/s10664-011-9195-3","volume":"17","author":"F Rahman","year":"2012","unstructured":"Rahman F, Bird C, Devanbu P. Clones: what is that smell?. Empirical Software Engineering, 2012, 17(4\u20135): 503\u2013530","journal-title":"Empirical Software Engineering"},{"issue":"7","key":"3430_CR10","doi-asserted-by":"crossref","first-page":"470","DOI":"10.1016\/j.scico.2009.02.007","volume":"74","author":"C K Roy","year":"2009","unstructured":"Roy C K, Cordy J R, Koschke R. Comparison and evaluation of code clone detection techniques and tools: a qualitative approach. Science of Computer Programming, 2009, 74(7): 470\u2013495","journal-title":"Science of Computer Programming"},{"issue":"2","key":"3430_CR11","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1080\/10618600.1993.10474605","volume":"2","author":"K W Church","year":"1993","unstructured":"Church K W, Helfman J I. Dotplot: a program for exploring self-similarity in millions of lines of text and code. Journal of Computational and Graphical Statistics, 1993, 2(2): 153\u2013174","journal-title":"Journal of Computational and Graphical Statistics"},{"key":"3430_CR12","first-page":"109","volume-title":"Proceedings of the IEEE International Conference on Software Maintenance","author":"S Ducasse","year":"1999","unstructured":"Ducasse S, Rieger M, Demeyer S. A language independent approach for detecting duplicated code. In: Proceedings of the IEEE International Conference on Software Maintenance. 1999, 109\u2013118"},{"key":"3430_CR13","first-page":"1","volume-title":"Proceedings of the 1994 Usenix Winter Technical Conference","author":"U Manber","year":"1994","unstructured":"Manber U. Finding similar files in a large file system. In: Proceedings of the 1994 Usenix Winter Technical Conference. 1994, 1\u201310"},{"key":"3430_CR14","first-page":"172","volume-title":"Proceedings of the 16th IEEE International Conference on Program Comprehension","author":"C K Roy","year":"2008","unstructured":"Roy C K, Cordy J R. NICAD: accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization. In: Proceedings of the 16th IEEE International Conference on Program Comprehension. 2008, 172\u2013181"},{"key":"3430_CR15","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/WCRE.1995.514697","volume-title":"Proceedings of the 2nd Working Conference on Reverse Engineering","author":"B S Baker","year":"1995","unstructured":"Baker B S. On finding duplication and near-duplication in large software systems. In: Proceedings of the 2nd Working Conference on Reverse Engineering. 1995, 86\u201395"},{"issue":"9","key":"3430_CR16","doi-asserted-by":"crossref","first-page":"608","DOI":"10.1109\/TSE.2007.70720","volume":"33","author":"B S Baker","year":"2007","unstructured":"Baker B S. Finding clones with dup: analysis of an experiment. IEEE Transactions on Software Engineering, 2007, 33(9): 608\u2013621","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"7","key":"3430_CR17","doi-asserted-by":"crossref","first-page":"654","DOI":"10.1109\/TSE.2002.1019480","volume":"28","author":"T Kamiya","year":"2002","unstructured":"Kamiya T, Kusumoto S, Inoue K. CCFinder: a multilinguistic token-based code clone detection system for large scale source code. IEEE Transactions on Software Engineering, 2002, 28(7): 654\u2013670","journal-title":"IEEE Transactions on Software Engineering"},{"key":"3430_CR18","first-page":"106","volume-title":"Proceedings of the 29th International Conference on Software Engineering","author":"S Livieri","year":"2007","unstructured":"Livieri S, Higo Y, Matushita M, Inoue K. Very-large scale code clone analysis and visualization of open source programs using distributed CCFinder: D-CCFinder. In: Proceedings of the 29th International Conference on Software Engineering. 2007, 106\u2013115"},{"key":"3430_CR19","first-page":"327","volume-title":"Proceedings of the 9th Asia-Pacific Software Engineering Conference","author":"Y Ueda","year":"2002","unstructured":"Ueda Y, Kamiya T, Kusumoto S, Inoue K. On detection of gapped code clones using gap locations. In: Proceedings of the 9th Asia-Pacific Software Engineering Conference. 2002, 327\u2013336"},{"issue":"9","key":"3430_CR20","doi-asserted-by":"crossref","first-page":"985","DOI":"10.1016\/j.infsof.2006.10.005","volume":"49","author":"Y Higo","year":"2007","unstructured":"Higo Y, Kamiya T, Kusumoto S, Inoue K. Method and implementation for investigating code clones in a software system. Information and Software Technology, 2007, 49(9): 985\u2013998","journal-title":"Information and Software Technology"},{"key":"3430_CR21","first-page":"368","volume-title":"Proceedings of the International Conference on Software Maintenance","author":"I D Baxter","year":"1998","unstructured":"Baxter I D, Yahin A, Moura L, Sant\u2019Anna M, Bier L. Clone detection using abstract syntax trees. In: Proceedings of the International Conference on Software Maintenance. 1998, 368\u2013377"},{"key":"3430_CR22","first-page":"253","volume-title":"Proceedings of the 13th Working Conference on Reverse Engineering","author":"R Koschke","year":"2006","unstructured":"Koschke R, Falke R, Frenzel P. Clone detection using abstract syntax suffix trees. In: Proceedings of the 13th Working Conference on Reverse Engineering. 2006, 253\u2013262"},{"key":"3430_CR23","volume-title":"JPlag: finding plagiarisms among a set of programs","author":"L Prechelt","year":"2000","unstructured":"Prechelt L, Malpohl G, Philippsen M. JPlag: finding plagiarisms among a set of programs. Technical Report, Department of Informatics, University of Karlsruhe. 2000"},{"key":"3430_CR24","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1109\/SCAM.2004.6","volume-title":"Proceedings of the 4th IEEE International Workshop on Source Code Analysis and Manipulation","author":"V Wahler","year":"2004","unstructured":"Wahler V, Seipel D, Wolff J, Fischer G. Clone detection in source code by frequent itemset techniques. In: Proceedings of the 4th IEEE International Workshop on Source Code Analysis and Manipulation. 2004, 128\u2013135"},{"key":"3430_CR25","first-page":"292","volume-title":"Proceedings of the 6th International Software Metrics Symposium","author":"M Balazinska","year":"1999","unstructured":"Balazinska M, Merlo E, Dagenais M, Lague B, Kontogiannis K. Measuring clone based reengineering opportunities. In: Proceedings of the 6th International Software Metrics Symposium. 1999, 292\u2013303"},{"issue":"3\u20134","key":"3430_CR26","first-page":"219","volume":"1","author":"N Davey","year":"1995","unstructured":"Davey N, Barson P, Field S, Frank R, Tansley D. The development of a software clone detector. International Journal of Applied Software Technology, 1995, 1(3\u20134), 219\u2013236","journal-title":"International Journal of Applied Software Technology"},{"issue":"1\u20132","key":"3430_CR27","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/BF00126960","volume":"3","author":"K A Kontogiannis","year":"1996","unstructured":"Kontogiannis K A, DeMori R, Merlo E, Galler M, Bernstein M. Pattern matching for clone and concept detection. Automated Software Engineering, 1996, 3(1\u20132): 77\u2013108","journal-title":"Automated Software Engineering"},{"key":"3430_CR28","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1109\/ICSM.1996.565012","volume-title":"Proceedings of the International Conference on Software Maintenance","author":"J Mayrand","year":"1996","unstructured":"Mayrand J, Leblanc C, Merlo E M. Experiment on the automatic detection of function clones in a software system using metrics. In: Proceedings of the International Conference on Software Maintenance. 1996, 244\u2013253"},{"key":"3430_CR29","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/WPC.1999.777743","volume-title":"Proceedings of the 7th International Workshop on Program Comprehension","author":"J F Patenaude","year":"1999","unstructured":"Patenaude J F, Merlo E, Dagenais M, Lague B. Extending software quality assessment techniques to java systems. In: Proceedings of the 7th International Workshop on Program Comprehension. 1999, 49\u201356"},{"key":"3430_CR30","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1145\/872757.872770","volume-title":"Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data","author":"S Schleimer","year":"2003","unstructured":"Schleimer S, Wilkerson D S, Aiken A. Winnowing: local algorithms for document fingerprinting. In: Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data. 2003, 76\u201385"},{"key":"3430_CR31","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1007\/3-540-47764-0_3","volume":"2126","author":"R Komondoor","year":"2001","unstructured":"Komondoor R, Horwitz S. Using slicing to identify duplication in source code. Lecture Notes in Computer Science, 2001, 2126: 40\u201356","journal-title":"Lecture Notes in Computer Science"},{"key":"3430_CR32","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1109\/WCRE.2001.957835","volume-title":"Proceedings of the 8th Working Conference on Reverse Engineering","author":"J Krinke","year":"2001","unstructured":"Krinke J. Identifying similar code with program dependence graphs. In: Proceedings of the 8th Working Conference on Reverse Engineering. 2001, 301\u2013309"},{"key":"3430_CR33","doi-asserted-by":"crossref","first-page":"872","DOI":"10.1145\/1150402.1150522","volume-title":"Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"C Liu","year":"2006","unstructured":"Liu C, Chen C, Han J, Yu P S. GPlag: detection of software plagiarism by program dependence graph analysis. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 2006, 872\u2013881"},{"key":"3430_CR34","first-page":"638","volume-title":"Proceeding of the IEEE International Conference on Information Reuse and Integration","author":"W Qu","year":"2007","unstructured":"Qu W, Jiang M, Jia Y. Software reuse detection using an integrated space-logic domain model. In: Proceeding of the IEEE International Conference on Information Reuse and Integration. 2007, 638\u2013643"},{"key":"3430_CR35","first-page":"321","volume-title":"Proceedings of the 30th International Conference on Software Engineering","author":"M Gabel","year":"2008","unstructured":"Gabel M, Jiang L, Su Z. Scalable detection of semantic clones. In: Proceedings of the 30th International Conference on Software Engineering. 2008, 321\u2013330"},{"issue":"3","key":"3430_CR36","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1145\/24039.24041","volume":"9","author":"J Ferrante","year":"1987","unstructured":"Ferrante J, Ottenstein K J, Warren J D. The program dependence graph and its use in optimization. ACM Transactions on Programming Languages and Systems, 1987, 9(3): 319\u2013349","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"3430_CR37","volume-title":"The Multi-Procedure Equivalence Theorem","author":"D Binkley","year":"1989","unstructured":"Binkley, D, Horwitz, S, Reps, T. The Multi-Procedure Equivalence Theorem. CS Technical Reports, Computer Sciences Department, University of Wisconsin-Madison. 1989"},{"issue":"2","key":"3430_CR38","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1080\/10618600.1993.10474605","volume":"2","author":"K W Church","year":"1993","unstructured":"Church K W, Helfman J I. Dotplot: a program for exploring self-similarity in millions of lines of text and code. Journal of Computational and Graphical Statistics, 1993, 2(2): 153\u2013174","journal-title":"Journal of Computational and Graphical Statistics"},{"key":"3430_CR39","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1145\/73560.73573","volume-title":"Proceedings of the 15th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages","author":"S Horwitz","year":"1988","unstructured":"Horwitz S, Prins J, Reps T. On the adequacy of program dependence graphs for representing programs. In: Proceedings of the 15th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. 1988, 146\u2013157"},{"issue":"4","key":"3430_CR40","doi-asserted-by":"crossref","first-page":"360","DOI":"10.1109\/TSE.2003.1191799","volume":"29","author":"S Xu","year":"2003","unstructured":"Xu S, San Chee Y. Transformation-based diagnosis of student programs for programming tutoring systems. IEEE Transactions on Software Engineering, 2003, 29(4): 360\u2013384","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"3","key":"3430_CR41","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1109\/32.126773","volume":"18","author":"Z Ammarguellat","year":"1992","unstructured":"Ammarguellat Z. A control-flow normalization algorithm and its complexity. IEEE Transactions on Software Engineering, 1992, 18(3): 237\u2013251","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"2","key":"3430_CR42","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1093\/comjnl\/21.2.161","volume":"21","author":"M H Williams","year":"1978","unstructured":"Williams M H, Ossher H L. Conversion of unstructured flow diagrams to structured form. The Computer Journal, 1978, 21(2): 161\u2013167","journal-title":"The Computer Journal"},{"issue":"7","key":"3430_CR43","first-page":"739","volume":"21","author":"W Yang","year":"1991","unstructured":"Yang W. Identifying syntactic differences between two programs. Software: Practice and Experience, 1991, 21(7): 739\u2013755","journal-title":"Software: Practice and Experience"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-014-3430-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11704-014-3430-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-014-3430-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,4]],"date-time":"2024-06-04T07:20:38Z","timestamp":1717485638000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11704-014-3430-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,22]]},"references-count":43,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["3430"],"URL":"https:\/\/doi.org\/10.1007\/s11704-014-3430-1","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,10,22]]}}}