{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:09:55Z","timestamp":1761620995789,"version":"3.44.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2008,9,1]],"date-time":"2008-09-01T00:00:00Z","timestamp":1220227200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2008,9,1]],"date-time":"2008-09-01T00:00:00Z","timestamp":1220227200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,9]]},"DOI":"10.1109\/icsm.2008.4658086","type":"proceedings-article","created":{"date-parts":[[2008,10,28]],"date-time":"2008-10-28T13:09:40Z","timestamp":1225199380000},"page":"376-385","source":"Crossref","is-referenced-by-count":9,"title":["Query-based filtering and graphical view generation for clone analysis"],"prefix":"10.1109","author":[{"family":"Yali Zhang","sequence":"first","affiliation":[{"name":"Department of Computer Science, School of Computing, National University of Singapore, Singapore"}]},{"given":"Hamid Abdul","family":"Basit","sequence":"additional","affiliation":[{"name":"Department of Computer Science, School of Science and Engineering Lahore University of Management Sciences, Pakistan"}]},{"given":"Stan","family":"Jarzabek","sequence":"additional","affiliation":[{"name":"Department of Computer Science, School of Computing, National University of Singapore, Singapore"}]},{"given":"Dang","family":"Anh","sequence":"additional","affiliation":[{"name":"Department of Computer Science, School of Computing, National University of Singapore, Singapore"}]},{"given":"Melvin","family":"Low","sequence":"additional","affiliation":[{"name":"Department of Computer Science, School of Computing, National University of Singapore, Singapore"}]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2004.25"},{"journal-title":"XVCL (XML-based Variant Configuration Language)","year":"0","key":"22"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.28"},{"key":"23","first-page":"237","article-title":"applying a generative technique for enhanced reuse on j2ee platform","author":"yang","year":"2005","journal-title":"Proc 4th Int Conf on Generative Programming and Component Engineering GPCE'05"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1996.565012"},{"key":"15","first-page":"220","article-title":"aspect-oriented programming","volume":"1241","author":"kiczales","year":"1997","journal-title":"LNCS"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2001.957835"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2005.52"},{"key":"11","first-page":"7","article-title":"navigating the textual redundancy web in legacy source","author":"johnson","year":"1996","journal-title":"Proc Conf of the Centre for Advanced Studies on Collaborative Research CASCON"},{"journal-title":"JFreeChart","year":"0","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/METRIC.2002.1011326"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738528"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1188835.1188846"},{"key":"2","first-page":"156","article-title":"detecting higher-level similarity patterns in programs","author":"basit","year":"2005","journal-title":"Proc ESEC-FSE'05 European Soft Eng Conf and ACM SIGSOFT Symp on the Foundations of Soft Eng"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1995.514697"},{"key":"10","first-page":"9","article-title":"visualizing textual redundancy in legacy source","author":"johnson","year":"1994","journal-title":"Proc Conf of the Centre for Advanced Studies on Collaborative Research CASCON"},{"key":"7","first-page":"237","article-title":"eliminating redundancies with a \"composition with adaptation\" meta-programming technique","author":"jarzabek","year":"2003","journal-title":"Proc ESEC-FSE'03 European Soft Eng Conf and ACM SIGSOFT Symp on the Foundations of Soft Eng"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1999.792593"},{"key":"5","first-page":"391","article-title":"identifying clones in dynamic web sites using similarity thresholds","author":"de lucia","year":"2004","journal-title":"Proc Int Conf on Enterprise Information Systems (ICEIS)"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(98)10027-4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1994.336783"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/32.667879"}],"event":{"name":"2008 IEEE International Conference on Software Maintenance (ICSM)","start":{"date-parts":[[2008,9,28]]},"location":"Beijing, China","end":{"date-parts":[[2008,10,4]]}},"container-title":["2008 IEEE International Conference on Software Maintenance"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4653773\/4658028\/04658086.pdf?arnumber=4658086","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T17:40:42Z","timestamp":1756489242000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4658086\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icsm.2008.4658086","relation":{},"subject":[],"published":{"date-parts":[[2008,9]]}}}