{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:45:47Z","timestamp":1755837947943,"version":"3.44.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1109\/apsec.2002.1183002","type":"proceedings-article","created":{"date-parts":[[2003,6,26]],"date-time":"2003-06-26T11:35:00Z","timestamp":1056627300000},"page":"327-336","source":"Crossref","is-referenced-by-count":21,"title":["On detection of gapped code clones using gap locations"],"prefix":"10.1109","author":[{"given":"Y.","family":"Ueda","sequence":"first","affiliation":[{"name":"Graduate Sch. of Inf. Sci. & Technol., Osaka Univ., Toyonaka, Japan"}]},{"given":"T.","family":"Kamiya","sequence":"additional","affiliation":[]},{"given":"S.","family":"Kusumoto","sequence":"additional","affiliation":[]},{"given":"K.","family":"Inoue","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"31","article-title":"Dotplot Patterns: a Literal Look at Pattern Languages","volume":"2","author":"helfman","year":"1995","journal-title":"TAPOS"},{"key":"ref11","first-page":"171","article-title":"Identifying Redundancy in Source Code using Fin-gerprints","author":"johnson","year":"1993","journal-title":"Proc CASCON 93"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-47764-0_3","article-title":"Using slicing to identify duplication in source code","author":"komondoor","year":"2001","journal-title":"8th International Symposium on Static Analysis"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2001.957835"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1109\/ICSM.1996.565012","article-title":"Experiment on the Au-tomatic Detection of Function Clones in a Software System Using Metrics","author":"mayland","year":"1996","journal-title":"Proceedings IEEE International Conference on Software Maintenance"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/METRIC.2002.1011328"},{"key":"ref17","first-page":"75","article-title":"Visual Detection of Duplicated Code","author":"rieger","year":"1998","journal-title":"Proc of the ECOOP Workshop on Experiences in Object-oriented Re-engineering"},{"key":"ref18","first-page":"619","article-title":"Maintenance","volume":"1","author":"pigoski","year":"1994","journal-title":"Encyclopedia of Software Engineering"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/METRIC.2002.1011326"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2000.891457"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539793246707"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738528"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/METRIC.1999.809750"},{"journal-title":"Refactoring Improving the Design of Existing Code","year":"1999","author":"fowler","key":"ref8"},{"key":"ref7","first-page":"109","article-title":"A Language Independent Approach for Detecting Duplicated Code","author":"ducasse","year":"1999","journal-title":"Proceedings of the International Conference on Software Maintenance IEEE"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1995.514697"},{"key":"ref1","first-page":"49","article-title":"A Program for Identifying Duplicated Code","volume":"24","author":"baker","year":"1992","journal-title":"Computing Science and Statistics"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511574931"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.1994.465272"}],"event":{"name":"Proceedings Asia-Pacific Software Engineering Conference","start":{"date-parts":[[2002,12,4]]},"location":"Gold Coast, QLD, Australia","end":{"date-parts":[[2002,12,6]]}},"container-title":["Ninth Asia-Pacific Software Engineering Conference, 2002."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8424\/26540\/01183002.pdf?arnumber=1183002","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,18]],"date-time":"2025-08-18T19:39:18Z","timestamp":1755545958000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/1183002\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/apsec.2002.1183002","relation":{},"subject":[],"published":{"date-parts":[[2002]]}}}