{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T18:10:18Z","timestamp":1769105418145,"version":"3.49.0"},"reference-count":146,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,2]]},"DOI":"10.1109\/csmr-wcre.2014.6747168","type":"proceedings-article","created":{"date-parts":[[2014,3,7]],"date-time":"2014-03-07T16:03:45Z","timestamp":1394208225000},"page":"18-33","source":"Crossref","is-referenced-by-count":81,"title":["The vision of software clone management: Past, present, and future (Keynote paper)"],"prefix":"10.1109","author":[{"given":"Chanchal K.","family":"Roy","sequence":"first","affiliation":[]},{"given":"Minhaz F.","family":"Zibran","sequence":"additional","affiliation":[]},{"given":"Rainer","family":"Koschke","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"35","author":"fowler","year":"1999","journal-title":"Refactoring Improving the Design of Existing Code"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2009.53"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9073-9"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2012.58"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985836"},{"key":"37","first-page":"1","article-title":"Generic modelling of code clones","author":"giesecke","year":"2007","journal-title":"DRSS"},{"key":"38","author":"giesecke","year":"2011","journal-title":"Dupman-Eclipse Duplication Management Framework"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1145\/1808901.1808917"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1109\/IWSC.2013.6613034"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1109\/32.859533"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1002\/smr.520"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2003.1199203"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2011.25"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/1985404.1985426"},{"key":"25","first-page":"1","article-title":"Practical languageindependent detection of near-miss clones","author":"cordy","year":"2004","journal-title":"CASCON"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2421004"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/1808901.1808913"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2009.5306336"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368172"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1985404.1985425"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2012.50"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.76"},{"key":"30","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/1767751.1767754","article-title":"Clone region descriptors repre-senting and tracking duplication in source code","volume":"20","author":"duala-ekoko","year":"2010","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/METRIC.1999.809750"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2007.4362615"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1999.792593"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1995.514697"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2013.13"},{"key":"4","author":"bahtiyar","year":"2010","journal-title":"JClone Syntax Tree Based Clone Detection for Java"},{"key":"9","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1145\/1095430.1081733","article-title":"Detecting higher-level similarity patterns in programs","volume":"30","author":"basit","year":"2005","journal-title":"SIGSOFT Softw Eng Notes"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1597"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/IWSC.2013.6613036"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1143997.1144312"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/IWSC.2012.6227860"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70725"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2010.11.010"},{"key":"13","first-page":"21","article-title":"Software clone management towards industrial application (dagstuhl seminar 12071)","volume":"2","author":"baxter","year":"2012","journal-title":"Dagstuhl Reports"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.16"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062537"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738528"},{"key":"21","article-title":"Beyond clone detection","author":"chiu","year":"2007","journal-title":"Course Project Report"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2013.6671286"},{"key":"109","doi-asserted-by":"publisher","DOI":"10.1145\/1985404.1985421"},{"key":"108","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2010.32"},{"key":"107","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2009.02.007"},{"key":"106","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2009.18"},{"key":"105","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2008.41"},{"key":"104","article-title":"A survey on software clone detection research","author":"roy","year":"2007","journal-title":"Tech Report TR 2007-541"},{"key":"103","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2004.25"},{"key":"102","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2013.01.008"},{"key":"99","doi-asserted-by":"publisher","DOI":"10.1002\/smr.579"},{"key":"101","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606694"},{"key":"100","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070528"},{"key":"98","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.90"},{"key":"97","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2009.5306283"},{"key":"96","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.71"},{"key":"95","first-page":"1","article-title":"Clone management for evolving software","volume":"1","author":"nguyen","year":"2011","journal-title":"IEEE Trans on Softw Engg"},{"key":"94","first-page":"192","article-title":"Source code enhancement using reduction of duplicated code","author":"nasehi","year":"2007","journal-title":"IASTED"},{"key":"93","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR-WCRE.2014.6747161"},{"key":"92","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2013.11.027"},{"key":"91","doi-asserted-by":"publisher","DOI":"10.1145\/2387358.2387360"},{"key":"90","doi-asserted-by":"publisher","DOI":"10.1145\/2245276.2231969"},{"key":"10","first-page":"109","article-title":"An empirical study on limits of clone unification using generics","author":"basit","year":"2005","journal-title":"SEKE"},{"key":"88","article-title":"Evaluating the benefits of clone detection in the software maintenance activities in large scale systems","author":"mayrand","year":"1996","journal-title":"WESS"},{"key":"89","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1996.565012"},{"key":"116","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227097"},{"key":"117","doi-asserted-by":"publisher","DOI":"10.1145\/1842752.1842805"},{"key":"79","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1997.624575"},{"key":"114","first-page":"1","article-title":"Advanced analysis for code clone removal","author":"schulze","year":"2009","journal-title":"WSR"},{"key":"78","first-page":"40","article-title":"Using slicing to identify duplication in source code","author":"komondoor","year":"2001","journal-title":"SAS"},{"key":"115","doi-asserted-by":"publisher","DOI":"10.1145\/1636642.1636648"},{"key":"77","first-page":"187","article-title":"An empirical study of code clone genealogies","author":"kim","year":"2005","journal-title":"FSE"},{"key":"112","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2013.6624021"},{"key":"113","doi-asserted-by":"publisher","DOI":"10.1145\/1985404.1985422"},{"key":"110","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080796"},{"key":"111","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.79"},{"key":"118","doi-asserted-by":"publisher","DOI":"10.1109\/IWSC.2013.6613037"},{"key":"119","doi-asserted-by":"publisher","DOI":"10.1109\/IWSC.2013.6613033"},{"key":"82","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR-WCRE.2014.6747160"},{"key":"83","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1997.624264"},{"key":"80","first-page":"1","article-title":"Survey of research on software clones","author":"koschke","year":"2006","journal-title":"DRSS"},{"key":"81","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2008.14"},{"key":"86","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2006.32"},{"key":"87","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.97"},{"key":"84","doi-asserted-by":"publisher","DOI":"10.1145\/1094855.1094903"},{"key":"85","doi-asserted-by":"publisher","DOI":"10.1002\/spe.1031"},{"key":"125","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2004.35"},{"key":"67","author":"kapser","year":"2009","journal-title":"Towards an Understanding of Software Code Cloning as a Development Practice"},{"key":"126","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2011.12"},{"key":"66","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"127","doi-asserted-by":"publisher","DOI":"10.1109\/METRIC.2002.1011326"},{"key":"69","doi-asserted-by":"publisher","DOI":"10.1109\/IWPSE.2004.1334772"},{"key":"128","doi-asserted-by":"publisher","DOI":"10.1109\/IWSC.2013.6613039"},{"key":"68","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9076-6"},{"key":"121","doi-asserted-by":"publisher","DOI":"10.1145\/1185448.1185597"},{"key":"122","doi-asserted-by":"publisher","DOI":"10.1145\/1639950.1640030"},{"key":"123","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2012.06.011"},{"key":"124","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321738"},{"key":"129","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491420"},{"key":"70","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2005.52"},{"key":"120","author":"tairas","year":"2013","journal-title":"Code Clones Literature"},{"key":"71","doi-asserted-by":"publisher","DOI":"10.1002\/smr.327"},{"key":"72","doi-asserted-by":"publisher","DOI":"10.1109\/IWSC.2012.6227870"},{"key":"73","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2009.36"},{"key":"74","article-title":"SeByte scalable clone and similarity search for bytecode","author":"keivanloo","year":"2013","journal-title":"Science of Comp Prog"},{"key":"75","author":"kerievsky","year":"2004","journal-title":"Refactoring to Patterns"},{"key":"76","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985835"},{"key":"134","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2013.6671285"},{"key":"135","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2013.6613848"},{"key":"132","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2013.6624022"},{"key":"133","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR-WCRE.2014.6747229"},{"key":"59","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1994.336783"},{"key":"138","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693107"},{"key":"58","first-page":"467","article-title":"Visualizing clone cohesion and coupling","author":"jiang","year":"2006","journal-title":"APSEC"},{"key":"139","first-page":"376","article-title":"Query-based filtering and graphical view generation for clone analysis","author":"zhang","year":"2008","journal-title":"ICSM"},{"key":"57","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2007.19"},{"key":"136","doi-asserted-by":"publisher","DOI":"10.1109\/METRICS.2005.36"},{"key":"56","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.30"},{"key":"137","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405284"},{"key":"55","doi-asserted-by":"publisher","DOI":"10.1002\/smr.333"},{"key":"64","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070566"},{"key":"65","doi-asserted-by":"publisher","DOI":"10.1145\/1810295.1810308"},{"key":"62","doi-asserted-by":"publisher","DOI":"10.1145\/1985404.1985419"},{"key":"63","article-title":"How much is a clone","author":"juergens","year":"2010","journal-title":"SQM"},{"key":"131","author":"weckerle","year":"2008","journal-title":"Cpc An Eclipse Framework for Automated Clone Life Cycle Tracking and Update Anomaly Detection"},{"key":"60","first-page":"32","article-title":"Visualizing textual redundancy in legacy source","author":"johnson","year":"1994","journal-title":"CASCON"},{"key":"130","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351701"},{"key":"61","first-page":"16","article-title":"Navigating the textual redundancy web in legacy source","author":"johnson","year":"1996","journal-title":"CASCON"},{"key":"143","doi-asserted-by":"publisher","DOI":"10.1145\/2245276.2231970"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2011.11"},{"key":"144","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2012.0058"},{"key":"48","first-page":"220","article-title":"Refactoring support based on code clone analysis","author":"higo","year":"2004","journal-title":"PROFES"},{"key":"145","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS.2011.36"},{"key":"146","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480573"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1551"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1145\/1985404.1985427"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2009.39"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606575"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2009.5090049"},{"key":"52","doi-asserted-by":"publisher","DOI":"10.1145\/1723028.1723051"},{"key":"53","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609665"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.1145\/1328279.1328283"},{"key":"140","doi-asserted-by":"publisher","DOI":"10.1145\/1985404.1985423"},{"key":"142","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2011.45"},{"key":"141","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2011.21"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1145\/1862372.1862390"}],"event":{"name":"2014 Software Evolution Week - IEEE Conference on Software Maintenance, Reengineering and Reverse Engineering (CSMR-WCRE)","location":"Antwerp, Belgium","start":{"date-parts":[[2014,2,3]]},"end":{"date-parts":[[2014,2,6]]}},"container-title":["2014 Software Evolution Week - IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering (CSMR-WCRE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6736725\/6747152\/06747168.pdf?arnumber=6747168","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T05:14:03Z","timestamp":1498108443000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6747168\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2]]},"references-count":146,"URL":"https:\/\/doi.org\/10.1109\/csmr-wcre.2014.6747168","relation":{},"subject":[],"published":{"date-parts":[[2014,2]]}}}