{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:30:25Z","timestamp":1729621825095,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1109\/iwsc.2013.6613039","type":"proceedings-article","created":{"date-parts":[[2013,10,2]],"date-time":"2013-10-02T22:29:55Z","timestamp":1380752995000},"page":"30-36","source":"Crossref","is-referenced-by-count":10,"title":["Prioritizing code clone detection results for clone management"],"prefix":"10.1109","author":[{"given":"Radhika D.","family":"Venkatasubramanyam","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shrinath","family":"Gupta","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Himanshu Kumar","family":"Singh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2004.1357804"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2004.25"},{"key":"18","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1145\/1095430.1081737","article-title":"An empirical study of code clone genealogies","volume":"30","author":"kim","year":"2005","journal-title":"SIGSOFT Software Eng Notes"},{"journal-title":"Simian","year":"0","key":"15"},{"journal-title":"Code Clone Analysis Environment for Software Maintenance","year":"0","author":"higo","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/METRIC.2002.1011328"},{"journal-title":"Software engineering - Product quality - Part 1 Quality model","year":"2001","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1083142.1083146"},{"key":"12","article-title":"On Software Maintenance Process Improvement Based On Code Clone Analysis","author":"higo","year":"0","journal-title":"Proceedings of the 4th International Conference on Product Focused Software Process Improvement 2002"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1995.514697"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070547"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1997.624264"},{"key":"23","article-title":"A language independent approach for detecting duplicated code","author":"ducasse","year":"0","journal-title":"IEEE Proceedings of the 1999 International Conference on Software Maintenance"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/SEW.2007.71"},{"journal-title":"FXCop","year":"0","key":"25"},{"journal-title":"Gendarme","year":"0","key":"26"},{"journal-title":"NDepend","year":"0","key":"27"},{"journal-title":"Understanding","year":"0","key":"28"},{"journal-title":"Sourcemonitor","year":"0","key":"29"},{"journal-title":"A survey on software clone detection research","year":"2007","author":"roy","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/METRIC.2002.1011326"},{"key":"10","article-title":"Aries: Refactoring Support Environment Based On Code Clone Analysis","author":"kamiya","year":"0","journal-title":"Proceedings of the 8th IASTED International Conference on Software Engineering and Applications Nov 2004"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1808901.1808909"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2006.1"},{"journal-title":"A Scenario Based Approach for Refactoring Duplicated Code in Object Oriented Systems","year":"2001","author":"koni-n'sapu","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1636642.1636648"},{"key":"4","article-title":"Refactoring Support Based On Code Clone Analysis","author":"higo","year":"0","journal-title":"Proceedings of 5th International Conference on Product Focused Software Process Improvement 2004"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1996.565012"}],"event":{"name":"2013 7th International Workshop on Software Clones (IWSC)","start":{"date-parts":[[2013,5,19]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2013,5,19]]}},"container-title":["2013 7th International Workshop on Software Clones (IWSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6596158\/6613028\/06613039.pdf?arnumber=6613039","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T23:02:03Z","timestamp":1498086123000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6613039\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/iwsc.2013.6613039","relation":{},"subject":[],"published":{"date-parts":[[2013,5]]}}}