{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T08:45:28Z","timestamp":1768466728103,"version":"3.49.0"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1109\/iwsc50091.2020.9047640","type":"proceedings-article","created":{"date-parts":[[2020,3,27]],"date-time":"2020-03-27T08:47:26Z","timestamp":1585298846000},"page":"38-44","source":"Crossref","is-referenced-by-count":7,"title":["Clone Detection on Large Scala Codebases"],"prefix":"10.1109","author":[{"given":"Wahidur","family":"Rahman","sequence":"first","affiliation":[]},{"given":"Yisen","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Pu","sequence":"additional","affiliation":[]},{"given":"Jifeng","family":"Xuan","sequence":"additional","affiliation":[]},{"given":"Xiangyang","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Michail","family":"Basios","sequence":"additional","affiliation":[]},{"given":"Leslie","family":"Kanthan","sequence":"additional","affiliation":[]},{"given":"Lingbo","family":"Li","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Baowen","family":"Xu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2739480.2754648"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66299-2_14"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236043"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405284"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2006.18"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.30"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2012.6240495"},{"key":"ref13","article-title":"Accurate and scalable cross-architecture cross-os binary code search with emulation","author":"xue","year":"2018","journal-title":"IEEE TSE"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1808901.1808914"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609665"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9564-7"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970326"},{"key":"ref18","first-page":"542","article-title":"Deep learning similarities from different representations of source code","author":"tufano","year":"2018","journal-title":"2018 IEEE\/ACM 15th MSR"},{"key":"ref19","first-page":"151","article-title":"Semi-supervised recursive autoencoders for predicting sentiment distributions","author":"socher","year":"2011","journal-title":"EMNLP 2011"},{"key":"ref28","article-title":"Mining the use of higher-order functions: An exploratory study on scala programs","author":"xu","year":"0","journal-title":"Proceedings of the National Software Application Conference of China (NASAC 2019)"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5120\/ijca2016908896","article-title":"A survey of software clone detection techniques","volume":"137","author":"sheneamer","year":"2016","journal-title":"IJCA"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2016.62"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1165","DOI":"10.1016\/j.infsof.2013.01.008","article-title":"Software clone detection: A systematic review","author":"rattan","year":"2013","journal-title":"Information and Software Technology"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1999.792593"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/METRIC.2002.1011328"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070547"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884877"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882315"},{"key":"ref9","first-page":"40","article-title":"Using slicing to identify duplication in source code","author":"komondoor","year":"0","journal-title":"Static Analysis Symposium"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.15"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2576451"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236026"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1939"},{"key":"ref24","first-page":"577","article-title":"Compar-ison and evaluation of clone detection tools","volume":"33","author":"bellon","year":"2007","journal-title":"IEEE TSE"},{"key":"ref23","first-page":"131","article-title":"Evaluating clone detection tools with bigclonebench","author":"svajlenko","year":"0","journal-title":"2015 IEEE ICSME"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.54"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2009.02.007"}],"event":{"name":"2020 IEEE 14th International Workshop on Software Clones (IWSC)","location":"London, ON, Canada","start":{"date-parts":[[2020,2,18]]},"end":{"date-parts":[[2020,2,18]]}},"container-title":["2020 IEEE 14th International Workshop on Software Clones (IWSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9040228\/9047628\/09047640.pdf?arnumber=9047640","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:55:29Z","timestamp":1656453329000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9047640\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/iwsc50091.2020.9047640","relation":{},"subject":[],"published":{"date-parts":[[2020,2]]}}}