{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T15:46:31Z","timestamp":1776095191725,"version":"3.50.1"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/icsm.2015.7332461","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T22:44:11Z","timestamp":1448318651000},"page":"151-160","source":"Crossref","is-referenced-by-count":58,"title":["Forked and integrated variants in an open-source firmware project"],"prefix":"10.1109","author":[{"given":"Stefan","family":"Stanciulescu","sequence":"first","affiliation":[]},{"given":"Sandro","family":"Schulze","sequence":"additional","affiliation":[]},{"given":"Andrzej","family":"Wasowski","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"A Survey on Software Clone Detection Research","volume":"115","author":"roy","year":"2007","journal-title":"Technical Report No 2007&#x2013;54 School of Computing Queen's University"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1095430.1081737"},{"key":"ref31","article-title":"An Ethnographic Study of Copy and Paste Programming Practices in OOPL","author":"kim","year":"2004","journal-title":"Proceedings of the International Symposium on Empirical Software Engineering"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227097"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.55"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.74"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568260"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591126"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.61"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1995.514697"},{"key":"ref13","article-title":"A Language Independent Approach for Detecting Duplicated Code","author":"ducasse","year":"1999","journal-title":"ICSM"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.13"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2652524.2652546"},{"key":"ref16","article-title":"Homesteading the Noosphere","author":"raymond","year":"1999","journal-title":"The Cathedral and the Bazaar"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2491627.2491644"},{"key":"ref18","article-title":"The C Programming Language","author":"kernighan","year":"1988","journal-title":"Prentice Hall Professional Technical Reference"},{"key":"ref19","article-title":"megaAVR-8 bit family of microcontrollers","year":"0"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606686"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2006.1"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/jossp.2011070101","article-title":"To Fork or Not to Fork: Fork Motivations in SourceForge Projects","volume":"3","author":"mikkonen","year":"2011","journal-title":"Int J Open Source Software and Processes"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2008.4493311"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2003.1199203"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/smr.327"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-33442-9_1","article-title":"A Comprehensive Study of Software Forks: Dates, Reasons and Outcomes","author":"robles","year":"2012","journal-title":"International Conference on Open Source Systems Long-Term Sustainability"},{"key":"ref8","article-title":"Code forking in open-source software: a requirements perspective","volume":"abs 1004 2889","author":"ernst","year":"2010","journal-title":"CoRR"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2013.13"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/smr.402"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33442-9_21"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.530"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11653-2_19"},{"key":"ref22","author":"czarnecki","year":"2000","journal-title":"Generative Programming Methods Tools and Applications"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37521-7"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.34"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-28901-1"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2658761.2658766"},{"key":"ref25","article-title":"Annotations as maintenance tasks in similarity management","author":"schmorleiz","year":"2015","journal-title":"submitted for publication 11 pages"}],"event":{"name":"2015 IEEE International Conference on Software Maintenance and Evolution (ICSME)","location":"Bremen, Germany","start":{"date-parts":[[2015,9,29]]},"end":{"date-parts":[[2015,10,1]]}},"container-title":["2015 IEEE International Conference on Software Maintenance and Evolution (ICSME)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7321954\/7332440\/07332461.pdf?arnumber=7332461","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T00:14:04Z","timestamp":1498263244000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7332461\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/icsm.2015.7332461","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}