{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T21:26:39Z","timestamp":1764019599940,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,9]]},"DOI":"10.1109\/asew.2008.4686320","type":"proceedings-article","created":{"date-parts":[[2008,12,1]],"date-time":"2008-12-01T21:32:34Z","timestamp":1228167154000},"page":"43-52","source":"Crossref","is-referenced-by-count":6,"title":["Using n-grams to rapidly characterise the evolution of software code"],"prefix":"10.1109","author":[{"given":"Austen","family":"Rainer","sequence":"first","affiliation":[]},{"given":"Peter C.R.","family":"Lane","sequence":"additional","affiliation":[]},{"given":"James A.","family":"Malcolm","sequence":"additional","affiliation":[]},{"given":"Sven-Bodo","family":"Scholz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"an algorithm for differential file comparison","author":"hunt","year":"1976","journal-title":"Computing Science"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/512035.512062"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/IWPSE.2004.1334766"},{"article-title":"experiments in electronic plagiarism detection","year":"2003","author":"lyon","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.28"},{"journal-title":"Human Behavior and the Principle of Least Effort","year":"1949","author":"zipf","key":"13"},{"article-title":"comparing different methods to detect text similarity","year":"2007","author":"bao","key":"14"},{"key":"11","article-title":"a theoretical basis to the automated detection of copying between texts, and its practical implementation in the ferret plagiarism and collusion detector","author":"lyon","year":"2004","journal-title":"JISC conference on plagiarism Prevention practice and policies"},{"journal-title":"Foundations of Statistical Natural Language Processing","year":"2001","author":"manning","key":"12"},{"key":"21","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/3-540-45937-5_16","article-title":"cil: intermediate language and tools for analysis and transformation of c programs","volume":"2304","author":"necula","year":"2002","journal-title":"Lecture Notes in Computer Science"},{"journal-title":"C++ In Action Industrial-Strength Programming Techniques","year":"2001","author":"milewski","key":"3"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1083142.1083143"},{"journal-title":"Refactoring Improving the Design of Existing Code","year":"1999","author":"fowler","key":"2"},{"journal-title":"Test-Driven Development By Example","year":"2003","author":"beck","key":"1"},{"key":"10","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/s10579-007-9020-1","article-title":"copy detection in chinese documents using ferret","volume":"40","author":"bao","year":"2006","journal-title":"Language Resources and Evaluation"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.1007\/11497455_41","article-title":"measuring similarity of large software systems based on source code correspondence","author":"yamamoto","year":"2005","journal-title":"Product Focused Software Process Improvement (PROFES 2005)"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/11790754_5"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1023\/B:INRT.0000009441.78971.be"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpb.2005.11.007"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/SEQUEN.1997.666900"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70725"}],"event":{"name":"2008 23rd IEEE\/ACM International Conference on Automated Software Engineering - Workshops","start":{"date-parts":[[2008,9,15]]},"location":"L'Aquila, Italy","end":{"date-parts":[[2008,9,16]]}},"container-title":["2008 23rd IEEE\/ACM International Conference on Automated Software Engineering - Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4674379\/4686280\/04686320.pdf?arnumber=4686320","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T22:08:49Z","timestamp":1557958129000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4686320\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/asew.2008.4686320","relation":{},"subject":[],"published":{"date-parts":[[2008,9]]}}}