{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T07:36:09Z","timestamp":1753601769252},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/icpc.2016.7503716","type":"proceedings-article","created":{"date-parts":[[2016,7,7]],"date-time":"2016-07-07T17:30:57Z","timestamp":1467912657000},"page":"1-10","source":"Crossref","is-referenced-by-count":6,"title":["Can we find stable alternatives for unstable Eclipse interfaces?"],"prefix":"10.1109","author":[{"given":"Simon","family":"Kawuma","sequence":"first","affiliation":[]},{"given":"John","family":"Businge","sequence":"additional","affiliation":[]},{"given":"Engineer","family":"Bainomugisha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"115","article-title":"A survey on software clone detection research","author":"roy","year":"2007","journal-title":"Queen's Technical Report 541"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"journal-title":"Eclipse project archived download","year":"2013","key":"ref12"},{"journal-title":"Evolving Java-based APIs","year":"2011","author":"des rivi\u00e8res","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2011.26"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1862372.1862389"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1997.624264"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1095430.1081737"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480573"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-015-1573-7"},{"key":"ref4","first-page":"54","author":"businge","year":"2012","journal-title":"Eclipse API Usage The Good and the Bad"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-013-9221-3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2012.10"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405295"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9411-7"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2013.14"},{"journal-title":"How to Use the Eclipse API","year":"2011","author":"des rivi\u00e8res","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1543405.1543429"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2009.02.007"},{"key":"ref20","first-page":"92","article-title":"Identifying clones in the linux kernel","author":"antoniol","year":"2001","journal-title":"IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2002)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(02)00123-4"}],"event":{"name":"2016 IEEE 24th International Conference on Program Comprehension (ICPC)","start":{"date-parts":[[2016,5,16]]},"location":"Austin, TX, USA","end":{"date-parts":[[2016,5,17]]}},"container-title":["2016 IEEE 24th International Conference on Program Comprehension (ICPC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7500162\/7503699\/07503716.pdf?arnumber=7503716","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,28]],"date-time":"2016-09-28T12:16:28Z","timestamp":1475064988000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7503716\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icpc.2016.7503716","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}