{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T04:31:42Z","timestamp":1769747502984,"version":"3.49.0"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2009,3,25]],"date-time":"2009-03-25T00:00:00Z","timestamp":1237939200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2010,2]]},"DOI":"10.1007\/s10664-009-9108-x","type":"journal-article","created":{"date-parts":[[2009,3,24]],"date-time":"2009-03-24T06:28:15Z","timestamp":1237876095000},"page":"1-34","source":"Crossref","is-referenced-by-count":136,"title":["An empirical study on the maintenance of source code clones"],"prefix":"10.1007","volume":"15","author":[{"given":"Suresh","family":"Thummalapenta","sequence":"first","affiliation":[]},{"given":"Luigi","family":"Cerulo","sequence":"additional","affiliation":[]},{"given":"Lerina","family":"Aversano","sequence":"additional","affiliation":[]},{"given":"Massimiliano","family":"Di Penta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,3,25]]},"reference":[{"key":"9108_CR1","doi-asserted-by":"crossref","unstructured":"Al-Ekram R, Kasper C, Holt R, Godfrey M (2005) Cloning by accident: an empirical study of source code cloning across software systems. In: International symposium on empirical software engineering (ISESE 2005), pp 376\u2013385","DOI":"10.1109\/ISESE.2005.1541846"},{"issue":"2","key":"9108_CR2","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1002\/smr.4360040203","volume":"4","author":"G Alkhatib","year":"1992","unstructured":"Alkhatib G (1992) The maintenance problem of application software: an empirical analysis. J Softw Maint 4(2):83\u2013104","journal-title":"J Softw Maint"},{"issue":"10","key":"9108_CR3","doi-asserted-by":"crossref","first-page":"970","DOI":"10.1109\/TSE.2002.1041053","volume":"28","author":"G Antoniol","year":"2002","unstructured":"Antoniol G, Canfora G, Casazza G, De Lucia A, Merlo E (2002) Recovering traceability links between code and documentation. IEEE Trans Softw Eng 28(10):970\u2013983","journal-title":"IEEE Trans Softw Eng"},{"key":"9108_CR4","doi-asserted-by":"crossref","first-page":"755","DOI":"10.1016\/S0950-5849(02)00123-4","volume":"44","author":"G Antoniol","year":"2002","unstructured":"Antoniol G, Merlo E, Villano U, Di Penta M (2002) Analyzing cloning evolution in the Linux Kernel. Inf Softw Technol 44:755\u2013765","journal-title":"Inf Softw Technol"},{"key":"9108_CR5","doi-asserted-by":"crossref","unstructured":"Aversano L, Cerulo L, Di Penta M (2007) How clones are maintained: an empirical study. In: 11th European conference on software maintenance and reengineering, software evolution in complex software intensive systems, CSMR 2007, 21\u201323 March 2007, Amsterdam, The Netherlands. IEEE Computer Society, pp 81\u201390","DOI":"10.1109\/CSMR.2007.26"},{"key":"9108_CR6","doi-asserted-by":"crossref","unstructured":"Baker BS (1995) On finding duplication and near-duplication in large software systems. In: Proceedings of the working conference on reverse engineering (WCRE \u201995). IEEE Computer Society, pp 86\u201395","DOI":"10.1109\/WCRE.1995.514697"},{"key":"9108_CR7","doi-asserted-by":"crossref","unstructured":"Bakota T, Ferenc R, Gyim\u00f3thy T (2007) Clone smells in software evolution. In: Proceedings of the international conference on software maintenance (ICSM \u201907). Paris, France. IEEE Computer Society, pp 24\u201333","DOI":"10.1109\/ICSM.2007.4362615"},{"key":"9108_CR8","doi-asserted-by":"crossref","unstructured":"Balazinska M, Merlo E, Dagenais M, Lagu\u00eb B, Kontogiannis K (2000) Advanced clone-analysis to support object-oriented system refactoring. In: Proceedings of the working conference on reverse engineering. IEEE Computer Society, pp 98\u2013107","DOI":"10.1109\/WCRE.2000.891457"},{"key":"9108_CR9","doi-asserted-by":"crossref","unstructured":"Baxter ID, Yahin A, Moura L, Sant\u2019Anna M, Bier L (1998) Clone detection using abstract syntax trees. In: Proceedings of the international conference on software maintenance. IEEE Computer Society, pp 368\u2013377","DOI":"10.1109\/ICSM.1998.738528"},{"issue":"9","key":"9108_CR10","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1109\/TSE.2007.70725","volume":"33","author":"S Bellon","year":"2007","unstructured":"Bellon S, Koschke R, Antoniol G, Krinke J, Merlo E (2007) Comparison and evaluation of clone detection tools. IEEE Trans Softw Eng 33(9):577\u2013591","journal-title":"IEEE Trans Softw Eng"},{"key":"9108_CR11","doi-asserted-by":"crossref","unstructured":"Bouktif S, Antoniol G, Merlo E (2006) A feedback based quality assessment to support open source software evolution: the GRASS case study. In: 22nd IEEE international conference on software maintenance (ICSM 2006), 24\u201327 September 2006, Philadelphia, Pennsylvania, USA. IEEE Computer Society, pp 155\u2013165","DOI":"10.1109\/ICSM.2006.5"},{"key":"9108_CR12","doi-asserted-by":"crossref","unstructured":"Bouktif S, Gueheneuc Y-G, Antoniol G (2006) Extracting change-patterns from cvs repositories. In: WCRE \u201906: proceedings of the 13th working conference on reverse engineering (WCRE 2006). IEEE Computer Society, pp 221\u2013230","DOI":"10.1109\/WCRE.2006.27"},{"key":"9108_CR13","doi-asserted-by":"crossref","unstructured":"Canfora G, Cerulo L, Di Penta M (2007) Identifying changed source code lines from version repositories. In: Proceedings of the fourth international workshop on mining software repositories, MSR 2007 (ICSE Workshop), Minneapolis, MN, USA, 19\u201320 May 2007. IEEE Computer Society, p 14","DOI":"10.1109\/MSR.2007.14"},{"key":"9108_CR14","doi-asserted-by":"crossref","unstructured":"Casazza G, Antoniol G, Villano U, Merlo E, Di\u00a0Penta M (2001) Identifying clones in the Linux Kernel. In Proceedings of the international workshop on source code analysis and manipulation. IEEE Computer Society, pp 90\u201397","DOI":"10.1109\/SCAM.2001.972670"},{"key":"9108_CR15","doi-asserted-by":"crossref","unstructured":"Cordy JR (2003) Comprehending reality\u2014practical barriers to industrial adoption of software maintenance automation. In: 11th international workshop on program comprehension (IWPC 2003), 10\u201311 May 2003, Portland, Oregon, USA. IEEE Computer Society, pp 196\u2013206","DOI":"10.1109\/WPC.2003.1199203"},{"key":"9108_CR16","doi-asserted-by":"crossref","unstructured":"Duala-Ekoko E, Robillard MP (2007) Tracking code clones in evolving software. In: ICSE \u201907: proceedings of the 29th international conference on software engineering, Minneapolis, MN, USA. IEEE Computer Society, pp 158\u2013167","DOI":"10.1109\/ICSE.2007.90"},{"key":"9108_CR17","doi-asserted-by":"crossref","unstructured":"Fischer M, Pinzger M, Gall H (2003) Populating a release history database from version control and bug tracking systems. In: ICSM \u201903: proceedings of 19th IEEE international conference on software maintenance, Amsterdam, Netherlands. IEEE Computer Society, pp 23\u201332","DOI":"10.1109\/ICSM.2003.1235403"},{"key":"9108_CR18","first-page":"321","volume-title":"30th international conference on software engineering (ICSE 2008), Leipzig, Germany, 10\u201318 May 2008","author":"M Gabel","year":"2008","unstructured":"Gabel M, Jiang L, Su Z (2008) Scalable detection of semantic clones. In: 30th international conference on software engineering (ICSE 2008), Leipzig, Germany, 10\u201318 May 2008. ACM, New York, pp 321\u2013330"},{"key":"9108_CR19","doi-asserted-by":"crossref","unstructured":"Gall H, Hajek K, Jazayeri M (1998) Detection of logical coupling based on product release history. In: Proceedings of the international conference on software maintenance, pp 190\u2013197","DOI":"10.1109\/ICSM.1998.738508"},{"key":"9108_CR20","doi-asserted-by":"crossref","unstructured":"Gall H, Jazayeri M, Krajewski J (2003) CVS release history data for detecting logical couplings. In: IWPSE \u201903: proceedings of the 6th international workshop on principles of software evolution. IEEE Computer Society, p 13","DOI":"10.1109\/IWPSE.2003.1231205"},{"key":"9108_CR21","series-title":"Lecture notes in computer science, vol. 3922, Vienna, Austria","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1007\/11693017_31","volume-title":"Proceedings of the 9th international conference of funtamental approaches to software engineering (FASE)","author":"R Geiger","year":"2006","unstructured":"Geiger R, Fluri B, Gall HC, Pinzger M (2006) Relation of code clones and change couplings. In: Proceedings of the 9th international conference of funtamental approaches to software engineering (FASE). Lecture notes in computer science, vol. 3922, Vienna, Austria. Springer, New York, pp 411\u2013425"},{"key":"9108_CR22","unstructured":"Godfrey MW, Tu Q (2000) Evolution in open source software:a case study. In: Proceedings of the 2000 international conference on software maintenance, pp 131\u2013142"},{"key":"9108_CR23","unstructured":"Godfrey MW, Svetinovic D, Tu Q (2000) Evolution, growth, and cloning in Linux: a case study. In: CASCON workshop on detecting duplicated and near duplicated structures in largs software systems: methods and applications"},{"key":"9108_CR24","doi-asserted-by":"crossref","unstructured":"Jiang L, Misherghi G, Su Z, Glondu S (2007) DECKARD: scalable and accurate tree-based detection of code clones. In: 29th international conference on software engineering (ICSE 2007), Minneapolis, MN, USA, 20\u201326 May 2007. IEEE Computer Society, pp 96\u2013105","DOI":"10.1109\/ICSE.2007.30"},{"issue":"7","key":"9108_CR25","doi-asserted-by":"crossref","first-page":"654","DOI":"10.1109\/TSE.2002.1019480","volume":"28","author":"T Kamiya","year":"2002","unstructured":"Kamiya T, Kusumoto S, Inoue K (2002) CCFinder: a multilinguistic token-based code clone detection system for large scale source code. IEEE Trans Softw Eng 28(7):654\u2013670","journal-title":"IEEE Trans Softw Eng"},{"key":"9108_CR26","doi-asserted-by":"crossref","unstructured":"Kapser C, Godfrey MW (2004) Aiding comprehension of cloning through categorization. In: 7th international workshop on principles of software evolution (IWPSE 2004), 6\u20137 September 2004, Kyoto, Japan. IEEE Computer Society, pp 85\u201394","DOI":"10.1109\/IWPSE.2004.1334772"},{"key":"9108_CR27","doi-asserted-by":"crossref","unstructured":"Kapser C, Godfrey MW (2005) Improved tool support for the investigation of duplication in software. In: 21st IEEE international conference on software maintenance (ICSM 2005), 25\u201330 September 2005, Budapest, Hungary. IEEE Computer Society, pp 305\u2013314","DOI":"10.1109\/ICSM.2005.52"},{"key":"9108_CR28","doi-asserted-by":"crossref","unstructured":"Kapser C, Godfrey MW (2006) \u2018Cloning considered harmful\u2019 considered harmful. In: Proceedings of the 2006 working conference on reverse engineering, Benevento, Italy. IEEE Computer Society, pp 19\u201328","DOI":"10.1109\/WCRE.2006.1"},{"key":"9108_CR29","volume-title":"Duplication, redundancy, and similarity in software, Dagstuhl seminar proceedings","author":"C Kapser","year":"2007","unstructured":"Kapser C, Anderson P, Godfrey M, Koschke R, Rieger M, van Rysselberghe F, Wei\u00dfgerber P (2007) Subjectivity in clone judgment: can we ever agree? In: Duplication, redundancy, and similarity in software, Dagstuhl seminar proceedings. Internationales Begegnungs-und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany"},{"key":"9108_CR30","first-page":"187","volume-title":"Proceedings of the European software engineering conference and the ACM symposium on the foundations of software engineering, Lisbon, Portugal","author":"M Kim","year":"2005","unstructured":"Kim M, Sazawal V, Notkin D, Murphy G (2005) An empirical study of code clone genealogies. In: Proceedings of the European software engineering conference and the ACM symposium on the foundations of software engineering, Lisbon, Portugal. ACM, New York, pp 187\u2013196"},{"key":"9108_CR31","doi-asserted-by":"crossref","unstructured":"Krinke J (2001) Identifying similar code with program dependence graphs. In: Proceedings of the working conference on reverse engineering, Stuttgart, Germany, pp 301\u2013309","DOI":"10.1109\/WCRE.2001.957835"},{"key":"9108_CR32","doi-asserted-by":"crossref","unstructured":"Krinke J (2007) A study of consistent and inconsistent changes to code clones. In: 14th working conference on reverse engineering (WCRE 2007), 28\u201331 October 2007, Vancouver, BC, Canada, Los Alamitos, CA, USA. IEEE Computer Society, pp 170\u2013178","DOI":"10.1109\/WCRE.2007.7"},{"key":"9108_CR33","first-page":"707","volume":"10","author":"VI Levenshtein","year":"1966","unstructured":"Levenshtein VI (1966) Binary codes capable of correcting deletions, insertions, and reversals. Sov Phys Dokl (10):707\u2013710","journal-title":"Sov Phys Dokl"},{"issue":"3","key":"9108_CR34","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1109\/TSE.2006.28","volume":"32","author":"Z Li","year":"2006","unstructured":"Li Z, Lu S, Myagmar S, Zhou Y (2006) Copy-paste and related bugs in large-scale software code. IEEE Trans Softw Eng 32(3):176\u2013192","journal-title":"IEEE Trans Softw Eng"},{"key":"9108_CR35","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/1294948.1294957","volume-title":"IWPSE \u201907: ninth international workshop on principles of software evolution, New York, NY, USA","author":"A Lozano","year":"2007","unstructured":"Lozano A, Wermelinger M, Nuseibeh B (2007a) Assessing the impact of bad smells using historical information. In: IWPSE \u201907: ninth international workshop on principles of software evolution, New York, NY, USA. ACM, New York, pp 31\u201334"},{"key":"9108_CR36","doi-asserted-by":"crossref","unstructured":"Lozano A, Wermelinger M, Nuseibeh B (2007b) Evaluating the harmfulness of cloning: a change based experiment. In: Proceedings of the fourth international workshop on mining software repositories, MSR 2007 (ICSE Workshop), Minneapolis, MN, USA, 19\u201320 May 2007. IEEE Computer Society, p 18","DOI":"10.1109\/MSR.2007.8"},{"key":"9108_CR37","doi-asserted-by":"crossref","unstructured":"Marcus A, Maletic J (2003) Recovering documentation-to-source-code traceability links using latent semantic indexing. In: Proceedings of the 25th international conference on software engineering (ICSE), Portland, OR, USA. IEEE Computer Society, pp 124\u2013135","DOI":"10.1109\/ICSE.2003.1201194"},{"key":"9108_CR38","doi-asserted-by":"crossref","unstructured":"Mayrand J, Leblanc C, Merlo E (1996) Experiment on the automatic detection of function clones in a software system using metrics. In: Proceedings of the international conference on software maintenance, Monterey, CA. IEEE Computer Society, pp 244\u2013253","DOI":"10.1109\/ICSM.1996.565012"},{"key":"9108_CR39","doi-asserted-by":"crossref","unstructured":"Mockus A, Votta LG (2000) Identifying reasons for software changes using historic databases. In: Proceedings of the international conference on software maintenance. IEEE Computer Society","DOI":"10.1109\/ICSM.2000.883028"},{"key":"9108_CR40","first-page":"74","volume-title":"22nd IEEE\/ACM international conference on automated software engineering (ASE 2007), 5\u20139 November 2007, Atlanta, Georgia, USA","author":"SP Reiss","year":"2007","unstructured":"Reiss SP (2007) Automatic code stylizing. In: 22nd IEEE\/ACM international conference on automated software engineering (ASE 2007), 5\u20139 November 2007, Atlanta, Georgia, USA. ACM, New York, pp 74\u201383"},{"key":"9108_CR41","doi-asserted-by":"crossref","unstructured":"Ueda Y, Kamiya T, Kusumoto S, Inoue K (2002) Gemini: maintenance support environment based on code clone analysis. In: 8th IEEE international software metrics symposium (METRICS 2002), 4\u20137 June 2002, Ottawa, Canada. IEEE Computer Society, pp 67\u201376","DOI":"10.1109\/METRIC.2002.1011326"},{"key":"9108_CR42","doi-asserted-by":"crossref","unstructured":"van Emden E, Moonen L (2002) Java quality assurance by detecting code smells. In: 9th working conference on reverse engineering (WCRE 2002), 28 October\u20131 November 2002, Richmond, VA, USA. IEEE Computer Society, pp 97\u2013107","DOI":"10.1109\/WCRE.2002.1173068"},{"key":"9108_CR43","doi-asserted-by":"crossref","unstructured":"Xie Y, Engler DR (2002) Using redundancies to find errors. In: Proceedings of the 10th ACM SIGSOFT international symposium on foundations of software engineering, pp 51\u201360","DOI":"10.1145\/587051.587060"},{"key":"9108_CR44","volume-title":"Case study research: design and methods","author":"RK Yin","year":"2002","unstructured":"Yin RK (2002) Case study research: design and methods, 3rd edn. Sage, London","edition":"3"},{"key":"9108_CR45","doi-asserted-by":"crossref","unstructured":"Zimmermann T, Weisgerber P, Diehl S, Zeller A (2004) Mining version histories to guide software changes. In: ICSE \u201904: proceedings of the 26th international conference on software engineering, pp 563\u2013572","DOI":"10.1109\/ICSE.2004.1317478"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-009-9108-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-009-9108-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-009-9108-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T17:15:09Z","timestamp":1559236509000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-009-9108-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3,25]]},"references-count":45,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2010,2]]}},"alternative-id":["9108"],"URL":"https:\/\/doi.org\/10.1007\/s10664-009-9108-x","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,3,25]]}}}