{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:21:59Z","timestamp":1729657319188,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1109\/iwsc.2015.7069888","type":"proceedings-article","created":{"date-parts":[[2017,3,7]],"date-time":"2017-03-07T20:22:35Z","timestamp":1488918155000},"page":"40-46","source":"Crossref","is-referenced-by-count":3,"title":["Tool support for managing method clones"],"prefix":"10.1109","author":[{"given":"Hamid Abdul","family":"Basit","sequence":"first","affiliation":[]},{"given":"Hassan Shahid","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Fahad","family":"Hamid","sequence":"additional","affiliation":[]},{"given":"Irtza","family":"Suhail","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"220","article-title":"Aspect oriented programming","volume":"1241","author":"kiczales","year":"1997","journal-title":"ECOOP"},{"key":"17","doi-asserted-by":"crossref","first-page":"701","DOI":"10.1145\/253228.253839","article-title":"Configuring designs for reuse","author":"karhinen","year":"1997","journal-title":"Proc International Conference on Software Engineering"},{"journal-title":"Refactoring to Patterns","year":"2004","author":"kerievsky","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1002\/smr.333"},{"key":"16","first-page":"63","article-title":"An algorithm for detecting and removing clones in java code","author":"juillerat","year":"2006","journal-title":"SeTra"},{"journal-title":"Refactoring Improving the Design of Existing Code","year":"1999","author":"fowler","key":"13"},{"key":"14","first-page":"220","article-title":"Refactoring support based on code clone analysis","author":"higo","year":"2004","journal-title":"PROFES (LNCS 3009)"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2003.1199203"},{"key":"12","first-page":"16","article-title":"Configuring Software for Reuse with VCL","volume":"26 27","author":"daniel","year":"2013","journal-title":"Proc 13th Symposium on Programming Languages and Software Tools"},{"key":"21","first-page":"93","article-title":"Method level detection and removal of code clones in C and Java programs using refactoring","author":"kodhai","year":"2010","journal-title":"IJJCET"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR-WCRE.2014.6747160"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1002\/spe.1031"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/1094855.1094963"},{"key":"24","first-page":"192","article-title":"Source code enhancement using reduction of duplicated code","author":"nasehi","year":"2007","journal-title":"IASTED"},{"key":"25","first-page":"327","article-title":"Traits: Composable units of behaviour","author":"scharli","year":"2003","journal-title":"ECOOP 2743 of LNCS"},{"key":"26","first-page":"1","article-title":"Advanced analysis for code clone removal","author":"schulze","year":"2009","journal-title":"WSR"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/1636642.1636648"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1006\/jmbi.1998.1689"},{"journal-title":"The Road to Software Clone Management A Survey","year":"2012","author":"zibran","key":"29"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2000.891457"},{"key":"2","first-page":"49","article-title":"A program for identifying duplicated code","volume":"24","author":"baker","year":"1992","journal-title":"Computing Science and Statistics"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738528"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.16"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2012.0058"},{"key":"7","first-page":"109","article-title":"An empirical study on limits of clone unification using generics","author":"basit","year":"2005","journal-title":"Proc 17th Int Conference on Software Engineering and Knowledge Engineering"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405283"},{"journal-title":"Framing Software Reuse-lessons from Real World","year":"1997","author":"bassett","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1999.806971"},{"key":"9","first-page":"513","article-title":"Efficient token based clone detection with flexible tokenization","author":"basit","year":"2007","journal-title":"Short Paper in Proc 11th European Software Engineering Conference and 15th ACM SIGSOFT International Symposium on the Foundations of Software Engineering"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062537"}],"event":{"name":"2015 IEEE 9th International Workshop on Software Clones (IWSC)","start":{"date-parts":[[2015,3,6]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2015,3,6]]}},"container-title":["2015 IEEE 9th International Workshop on Software Clones (IWSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7066214\/7069879\/07069888.pdf?arnumber=7069888","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T16:20:28Z","timestamp":1602692428000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7069888"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/iwsc.2015.7069888","relation":{},"subject":[],"published":{"date-parts":[[2015,3]]}}}