{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T09:15:44Z","timestamp":1761988544147,"version":"3.41.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2012,9,1]],"date-time":"2012-09-01T00:00:00Z","timestamp":1346457600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2012,9,1]],"date-time":"2012-09-01T00:00:00Z","timestamp":1346457600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1109\/icsm.2012.6405284","type":"proceedings-article","created":{"date-parts":[[2013,1,17]],"date-time":"2013-01-17T20:28:25Z","timestamp":1358454505000},"page":"285-294","source":"Crossref","is-referenced-by-count":24,"title":["Cloning practices: Why developers clone and what can be changed"],"prefix":"10.1109","author":[{"given":"Gang","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Computer Science, Fudan University, Shanghai, China"}]},{"given":"Xin","family":"Peng","sequence":"additional","affiliation":[{"name":"School of Computer Science, Fudan University, Shanghai, China"}]},{"given":"Zhenchang","family":"Xing","sequence":"additional","affiliation":[{"name":"School of Computing, National University of Singapore, Singapore"}]},{"given":"Wenyun","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Computer Science, Fudan University, Shanghai, China"}]}],"member":"263","reference":[{"key":"ref1","article-title":"A survey on software clone detection research","volume-title":"Technical Report No. 2007\u2013541, School of Computing, Queen\u2019s University","author":"Roy","year":"2007"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738528"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2001.957835"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1996.565012"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1995.514697"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2004.25"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/icsm.2008.4658086"},{"key":"ref9","first-page":"222","article-title":"ARIES: Refactoring support environment based on code clone analysis","author":"Higo","year":"2004","journal-title":"SEA"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2004.1342759"},{"key":"ref11","first-page":"19","article-title":"Clones considered harmful","author":"Kapser","year":"2006","journal-title":"considered harmful. WCRE"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/isese.2004.1334896"},{"key":"ref13","article-title":"Effective clone detection without language barriers","volume-title":"Ph.D. Thesis","author":"Rieger","year":"2005"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70725"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2002.1134103"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2011.17"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/smr.416"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2245276.2231969"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2009.51"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-009-9108-x"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1095430.1081737"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19811-3_30"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISESE.2005.1541846"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.16"},{"key":"ref25","article-title":"Questionnaire design, interviewing, and attitude measurement","author":"Oppenheim","year":"2006","journal-title":"Print pub"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1097\/01445442-200205000-00012"}],"event":{"name":"2012 IEEE International Conference on Software Maintenance (ICSM)","start":{"date-parts":[[2012,9,23]]},"location":"Trento, Italy","end":{"date-parts":[[2012,9,28]]}},"container-title":["2012 28th IEEE International Conference on Software Maintenance (ICSM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6384336\/6404866\/06405284.pdf?arnumber=6405284","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T05:41:42Z","timestamp":1747806102000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6405284\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/icsm.2012.6405284","relation":{},"subject":[],"published":{"date-parts":[[2012,9]]}}}