{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:04:54Z","timestamp":1729613094667,"version":"3.28.0"},"reference-count":45,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/etfa.2017.8247574","type":"proceedings-article","created":{"date-parts":[[2018,1,8]],"date-time":"2018-01-08T17:42:04Z","timestamp":1515433324000},"page":"1-8","source":"Crossref","is-referenced-by-count":8,"title":["Exploring code clones in programmable logic controller software"],"prefix":"10.1109","author":[{"given":"Hannes","family":"Thaller","sequence":"first","affiliation":[]},{"given":"Rudolf","family":"Ramler","sequence":"additional","affiliation":[]},{"given":"Josef","family":"Pichler","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Egyed","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s10459-010-9222-y"},{"key":"ref38","first-page":"285","article-title":"Problems creating task-relevant clone detection reference data","volume":"2003 janua","author":"walenstein","year":"2003","journal-title":"Proceedings of 2nd Working Conference on Reverse Engineering WCRE"},{"journal-title":"Is Cloned Code older than Non-Cloned Code?","year":"2011","author":"krinke","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2008.14"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1109\/METRIC.2002.1011328","article-title":"Soft-ware quality analysis by code clones in industrial legacy software","volume":"2002 janua","author":"monden","year":"2002","journal-title":"International Software Metrics Symposium"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2007.8"},{"key":"ref37","first-page":"65","article-title":"Clone stability","author":"g\u00f6de","year":"2011","journal-title":"CSMR '99 Proceedings of the Third European Conference on Software Maintenance and Reengineering"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2010.11.010"},{"key":"ref35","first-page":"13","article-title":"Studying the impact of clones on software defects","author":"selim","year":"2010","journal-title":"Proceedings of 2nd Working Conference on Reverse Engineering WCRE"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1007\/s10664-011-9195-3","article-title":"Clones: What is that smell?","volume":"17","author":"rahman","year":"2012","journal-title":"Empirical Software Engineering"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738528"},{"key":"ref40","first-page":"22","volume":"4","author":"kurdi","year":"2013","journal-title":"Aspect-Oriented Programming"},{"journal-title":"Software clone detection A systematic review","year":"2013","author":"rattan","key":"ref11"},{"journal-title":"Survey of Research on Software Clones","year":"0","author":"koschke","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1999.792593"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2004.25"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1985404.1985425"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/METRIC.2002.1011326"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1188835.1188846"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1083292.1083306"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IWPSE.2004.1334772"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/BF00126960"},{"journal-title":"Antipatterns Refactoring Software Architectures and Projects in Crisis","year":"1998","author":"brown","key":"ref4"},{"journal-title":"CCFinder A Multilinguistic Token-Based Code Clone Detection System for Large Scale Source Code","year":"0","author":"kamiya","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070547"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/FOSM.2008.4659255"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1996.565012"},{"journal-title":"Refactoring improving the design of existing code ser The Addison-Wesley object technology series","year":"1999","author":"fowler","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70725"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.08.026"},{"key":"ref2","first-page":"115","article-title":"A Survey on Software Clone Detection Research","volume":"115","author":"roy","year":"2007","journal-title":"Queen's Sch Comput TR"},{"journal-title":"Simian - Similarity Analyser","year":"2003","author":"harris","key":"ref9"},{"journal-title":"The 2016 Top Programming Languages","year":"2016","author":"cass","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2005.52"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491420"},{"journal-title":"CloneTracker Tool Support for Code Clone Management","year":"0","author":"duala-ekoko","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3182\/20120523-3-RO-2023.00146"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1037\/1082-989X.1.1.30"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISESE.2004.1334896"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.conengprac.2012.09.002"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.61"},{"journal-title":"Multiple Comparisons and Multiple Testes using SAS","year":"2011","author":"westfall","key":"ref44"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1995.514697"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1037\/1040-3590.6.4.284"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9076-6"}],"event":{"name":"2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","start":{"date-parts":[[2017,9,12]]},"location":"Limassol","end":{"date-parts":[[2017,9,15]]}},"container-title":["2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8233358\/8247555\/08247574.pdf?arnumber=8247574","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,9]],"date-time":"2019-10-09T00:11:10Z","timestamp":1570579870000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8247574\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/etfa.2017.8247574","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}