{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:24:10Z","timestamp":1730280250183,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1109\/iwsc50091.2020.9047635","type":"proceedings-article","created":{"date-parts":[[2020,3,27]],"date-time":"2020-03-27T08:47:26Z","timestamp":1585298846000},"page":"64-69","source":"Crossref","is-referenced-by-count":2,"title":["Towards Semantic Clone Detection via Probabilistic Software Modeling"],"prefix":"10.1109","author":[{"given":"Hannes","family":"Thaller","sequence":"first","affiliation":[]},{"given":"Lukas","family":"Linsbauer","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Egyed","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70725"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1165","DOI":"10.1016\/j.infsof.2013.01.008","article-title":"Software clone detection: A systematic review","volume":"55","author":"rattan","year":"2013","journal-title":"Information and Software Technology"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2010.33"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332459"},{"key":"ref14","article-title":"Survey of research on software clones","author":"koschke","year":"2007","journal-title":"Duplication Redundancy and Similarity in Software Ser Dagstuhl Seminar Proceedings"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/SANER.2019.8668015","article-title":"On Precision of Code Clone Detection Tools","author":"farmahinifarahani","year":"2019","journal-title":"2019 IEEE 26th International Conference on Software Analysis Evolution and Reengineering (SANER) IEEE"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IWSC.2018.8327312"},{"journal-title":"Probabilistic Software Modeling A Data-driven Paradigm for Software Analysis","year":"2019","author":"thaller","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2001.957835"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2017.8247574"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2012.38"},{"journal-title":"Refactoring improving the design of existing code ser The Addison-Wesley object technology series","year":"1999","author":"fowler","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572283"},{"journal-title":"Clean code a handbook of agile software craftsmanship","year":"2009","author":"martin","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/502059.502042"},{"journal-title":"The Pragmatic Programmer From Journeyman to Master","year":"2000","author":"hunt","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/11693017_31"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.28"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/METRIC.2002.1011328"},{"key":"ref9","first-page":"115","article-title":"A Survey on Software Clone Detection Research","volume":"115","author":"roy","year":"2007","journal-title":"Queen's Sch Comput TR"},{"key":"ref1","first-page":"244","article-title":"Experiment on the automatic detection of function clones in a software system using metrics","author":"leblanc","year":"1996","journal-title":"Proceedings of International Conference on Software Maintenance ICSM-96"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236026"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/996986505"},{"journal-title":"Density estimation using real nvp","year":"2016","author":"dinh","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368132"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/93542.93574"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.49"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1007\/3-540-47764-0_3","article-title":"Using Slicing to Identify Duplication in Source Code","author":"komondoor","year":"2001","journal-title":"The 4th International Symposium on Static Analysis"}],"event":{"name":"2020 IEEE 14th International Workshop on Software Clones (IWSC)","start":{"date-parts":[[2020,2,18]]},"location":"London, ON, Canada","end":{"date-parts":[[2020,2,18]]}},"container-title":["2020 IEEE 14th International Workshop on Software Clones (IWSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9040228\/9047628\/09047635.pdf?arnumber=9047635","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:55:29Z","timestamp":1656453329000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9047635\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/iwsc50091.2020.9047635","relation":{},"subject":[],"published":{"date-parts":[[2020,2]]}}}