{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T10:25:49Z","timestamp":1761992749919,"version":"build-2065373602"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/icpc.2016.7503720","type":"proceedings-article","created":{"date-parts":[[2016,7,7]],"date-time":"2016-07-07T21:30:57Z","timestamp":1467927057000},"page":"1-10","source":"Crossref","is-referenced-by-count":8,"title":["Identifying functionally similar code in complex codebases"],"prefix":"10.1109","author":[{"family":"Fang-Hsiang Su","sequence":"first","affiliation":[]},{"given":"Jonathan","family":"Bell","sequence":"additional","affiliation":[]},{"given":"Gail","family":"Kaiser","sequence":"additional","affiliation":[]},{"given":"Simha","family":"Sethumadhavan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597127"},{"year":"0","key":"ref32"},{"year":"0","key":"ref31"},{"year":"0","key":"ref30"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2660193.2660212"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.77"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786823"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2009.02.007"},{"key":"ref12","first-page":"49","article-title":"A program for identifying duplicated code","author":"baker","year":"1992","journal-title":"Computer Science and Statistics Proc Symp on the Interface"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738528"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.30"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368132"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150522"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2001.957835"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227183"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2001.989796"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1038\/234034a0"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572283"},{"journal-title":"The java-util library","year":"0","key":"ref27"},{"key":"ref3","article-title":"Cp-miner: A tool for finding copy-paste and related bugs in operating system code","author":"li","year":"0","journal-title":"ser OSDI '04"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985835"},{"journal-title":"The Java Virtual Machine Specification Java SE 7 ed","year":"2013","author":"lindholm","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IWSC.2012.6227874"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2012.38"},{"key":"ref7","article-title":"Blanket execution: Dynamic similarity testing for program binaries and components","author":"egele","year":"2014","journal-title":"Proceedings of the 23rd USENIX conference on Security Symposium"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081737"},{"journal-title":"Dynamic Approach to Semantic Code Clone Detection","year":"0","author":"neubauer","key":"ref9"},{"journal-title":"CCFinder A Multilinguistic Token-Based Code Clone Detection System for Large Scale Source Code","year":"2002","author":"kamiya","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227178"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.37"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1286821.1286826"},{"key":"ref24","article-title":"Randoop: Feedback-directed random testing for java","author":"pacheco","year":"0","journal-title":"ser OOPSLA '07"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2009.18"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/32.6194"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595725"}],"event":{"name":"2016 IEEE 24th International Conference on Program Comprehension (ICPC)","start":{"date-parts":[[2016,5,16]]},"location":"Austin, TX, USA","end":{"date-parts":[[2016,5,17]]}},"container-title":["2016 IEEE 24th International Conference on Program Comprehension (ICPC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7500162\/7503699\/07503720.pdf?arnumber=7503720","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,28]],"date-time":"2016-09-28T16:16:33Z","timestamp":1475079393000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7503720\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/icpc.2016.7503720","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}