{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T01:42:03Z","timestamp":1769737323551,"version":"3.49.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,11]]},"DOI":"10.1109\/ase.2013.6693107","type":"proceedings-article","created":{"date-parts":[[2014,1,6]],"date-time":"2014-01-06T12:07:25Z","timestamp":1389010045000},"page":"497-507","source":"Crossref","is-referenced-by-count":11,"title":["Towards contextual and on-demand code clone management by continuous monitoring"],"prefix":"10.1109","author":[{"given":"Gang","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xin","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Zhenchang","family":"Xing","sequence":"additional","affiliation":[]},{"family":"Shihai Jiang","sequence":"additional","affiliation":[]},{"family":"Hai Wang","sequence":"additional","affiliation":[]},{"given":"Wenyun","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2012.06.011"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1096-908X(199907\/08)11:4<223::AID-SMR194>3.3.CO;2-4"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2004.1342759"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/METRIC.2002.1011326"},{"key":"16","first-page":"376","article-title":"Querybased filtering and graphical view generation for clone analysis","author":"zhang","year":"2008","journal-title":"International Conference on Software Maintenance"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368132"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.71"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2008.41"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.30"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/IWSC.2012.6227869"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.90"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405284"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.97"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.16"},{"key":"25","first-page":"21","article-title":"Software clone management towards industrial application (dagstuhl seminar 12071)","volume":"2","author":"koschke","year":"2012","journal-title":"Dagstuhl Reports"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1002\/spe.1031"},{"key":"27","first-page":"397","article-title":"Active refinement of clone anomaly reports","author":"lo","year":"2012","journal-title":"International Conference on Software Engineering"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351701"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2004.35"},{"key":"3","first-page":"187","article-title":"An empirical study of code clone genealogies","author":"kim","year":"2005","journal-title":"ESEC\/FSE'05 - Proceedings of the Joint 10th European Software Engineering Conference (ESEC) and 13th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-13)"},{"key":"2","first-page":"411","article-title":"Relation of code clones and change couplings","volume":"3922","author":"geiger","year":"2006","journal-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1002\/smr.317"},{"key":"1","article-title":"A survey on software clone detection research","author":"roy","year":"2007","journal-title":"Technical Report 2007-541 Queens University"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1145\/1767751.1767754"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738528"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1996.565012"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/BF00126960"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2006.1"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2001.957835"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"}],"event":{"name":"2013 IEEE\/ACM 28th International Conference on Automated Software Engineering (ASE)","location":"Silicon Valley, CA, USA","start":{"date-parts":[[2013,11,11]]},"end":{"date-parts":[[2013,11,15]]}},"container-title":["2013 28th IEEE\/ACM International Conference on Automated Software Engineering (ASE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6684409\/6693054\/06693107.pdf?arnumber=6693107","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T20:01:08Z","timestamp":1490212868000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6693107\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/ase.2013.6693107","relation":{},"subject":[],"published":{"date-parts":[[2013,11]]}}}