{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T10:14:09Z","timestamp":1742379249165,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/iwpse.2003.1231219","type":"proceedings-article","created":{"date-parts":[[2004,6,22]],"date-time":"2004-06-22T16:27:43Z","timestamp":1087921663000},"page":"126-130","source":"Crossref","is-referenced-by-count":22,"title":["Reconstruction of successful software evolution using clone detection"],"prefix":"10.1109","author":[{"given":"F.","family":"Van Rysselberghe","sequence":"first","affiliation":[]},{"given":"S.","family":"Demeyer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Program Evolution Processes of Software Change","year":"1985","author":"lehman","key":"ref10"},{"key":"ref11","article-title":"Software evolution","author":"lehman","year":"2001","journal-title":"Proceedings of the International Workshop on Principles of Software Evolution"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1996.565012"},{"journal-title":"The mozilla project &#x2013; mozilla","year":"0","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2002.1021318"},{"journal-title":"Jakarta Project Tomcat","year":"0","key":"ref15"},{"key":"ref4","first-page":"153","article-title":"Dotplot: A program for exploring self-similarity in millions of lines for text and code","volume":"2","author":"church","year":"1993","journal-title":"Journal of American Statistical Association Institue for Mathematical Statistics and Interface Foundations of North America"},{"journal-title":"Software Engineering Economics","year":"1981","author":"boehm","key":"ref3"},{"journal-title":"Refactoring Improving the Design of Existing Code","year":"1999","author":"fowler","key":"ref6"},{"key":"ref5","article-title":"A language independent approach for detecting duplicated code","author":"ducasse","year":"1999","journal-title":"International Conference on Software Maintenance"},{"key":"ref8","article-title":"Identifying redundancy in source code using fingerprints","author":"johnson","year":"1993","journal-title":"CASCON"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/512035.512062"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738528"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1995.514697"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1997.624575"}],"event":{"name":"Sixth International Workshop on Principles of Software Evolution, 2003.","location":"Helsinki, Finland"},"container-title":["Sixth International Workshop on Principles of Software Evolution, 2003. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8710\/27581\/01231219.pdf?arnumber=1231219","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T21:28:10Z","timestamp":1489440490000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1231219\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/iwpse.2003.1231219","relation":{},"subject":[]}}