{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T22:52:55Z","timestamp":1769727175829,"version":"3.49.0"},"reference-count":93,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1109\/saner.2018.8330194","type":"proceedings-article","created":{"date-parts":[[2018,4,6]],"date-time":"2018-04-06T04:41:53Z","timestamp":1522989713000},"page":"26-37","source":"Crossref","is-referenced-by-count":31,"title":["Benchmarks for software clone detection: A ten-year retrospective"],"prefix":"10.1109","author":[{"given":"Chanchal K.","family":"Roy","sequence":"first","affiliation":[]},{"given":"James R.","family":"Cordy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/1370256.1370279"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9419-z"},{"key":"ref71","first-page":"20: 1","article-title":"An empirical assessment of Bellon's clone benchmark","author":"charpentier","year":"2015","journal-title":"EASE"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597133"},{"key":"ref76","first-page":"12","article-title":"CCAligner: a token based large-gap clone detector","author":"wang","year":"2018","journal-title":"ICSE"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2013.6648182"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2009.02.007"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.11.039"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2006.04.002"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2015906324"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.113"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2009.39"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2009.5090048"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2003.1287259"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70720"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.114"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2009.33"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2011.13"},{"key":"ref35","first-page":"35","article-title":"A metrics-based data mining approach for software clone detection","author":"abd-ei-hafiz","year":"2012","journal-title":"COMPSAC"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1808901.1808904"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35893-7_2"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2008.42"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194014500107"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/IWSC.2013.6613033"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2004.1342759"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.54"},{"key":"ref27","first-page":"36","article-title":"Evaluating clone detection tools for use during preventative maintenance","author":"bailey","year":"2002","journal-title":"SCAM"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606693"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.77"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9073-9"},{"key":"ref67","author":"bellon","year":"0","journal-title":"Stefan bellon's clone detector benchmark"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1002\/smr.317"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1995.514697"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70725"},{"key":"ref1","first-page":"115","article-title":"A survey on software clone detection research","author":"roy","year":"2007","journal-title":"Tech Report TR 2007-541"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2006.18"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1996.565012"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.30"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2001.957835"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368132"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1997.624575"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2008.41"},{"key":"ref50","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1145\/1932682.1869475","article-title":"Scalable and systematic detection of buggy inconsistencies in source code","volume":"45","author":"gabel","year":"2010","journal-title":"ACM SIGPLAN Notices"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332459"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR-WCRE.2014.6747168"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194016400106"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.18293\/SEKE2016-150"},{"key":"ref90","author":"svajlenko","year":"0","journal-title":"The BigCloneBench tool page"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39259-7_24"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2011.28"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/IWSC.2013.6613045"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.2903"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.55"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2012.6240477"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491420"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2009.18"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ASPEC.2007.44"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070547"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351701"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2387358.2387360"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882317"},{"key":"ref14","first-page":"175","article-title":"Achieving accuracy and scalability simultaneously in detecting application clones on android markets","author":"chen","year":"2014","journal-title":"ICSE"},{"key":"ref15","first-page":"1","article-title":"Surfacing code in the dark: an instant clone search approach","author":"park","year":"2013","journal-title":"Knowledge and Information Systems"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2014.11"},{"key":"ref16","first-page":"664","article-title":"Spotting working code examples","author":"keivanloo","year":"2014","journal-title":"ICSE"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2016.7503739"},{"key":"ref17","first-page":"109","article-title":"A language independent approach for detecting duplicated code","volume":"1999","author":"ducasse","year":"0","journal-title":"ICSM"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2013.6613857"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597127"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738528"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2013.6613837"},{"key":"ref89","first-page":"596","article-title":"BigCloneEval: A clone detection tool evaluation framework with BigCloneBench","author":"svajlenko","year":"2016","journal-title":"ICSM"},{"key":"ref4","first-page":"83","article-title":"An ethnographic study of copy and paste programming practices in OOPL","author":"kim","year":"2004","journal-title":"ISESE"},{"key":"ref3","first-page":"187","article-title":"An empirical study of code clone genealogies","author":"kim","year":"2005","journal-title":"ESEC\/SIGSOFT"},{"key":"ref6","first-page":"165","article-title":"Near-miss function clones in open source software: an empirical study","volume":"22","author":"roy","year":"2010","journal-title":"Journal of Software: Evolution and Process"},{"key":"ref5","first-page":"21","article-title":"Software clone management towards industrial application (Dagstuhl seminar 12071)","volume":"2","author":"baxter","year":"2012","journal-title":"Dagstuhl Reports"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/1985404.1985411"},{"key":"ref8","author":"fowler","year":"1999","journal-title":"Refactoring Improving the Design of Existing Code"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/IWSC.2013.6613043"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2004.25"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS.2011.36"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884877"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-C.2017.3"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9076-6"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2013.11.027"},{"key":"ref45","first-page":"109","author":"asaduzzaman","year":"2012","journal-title":"Visualization and Analysis of Software Clones"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/IWSC.2013.6613046"},{"key":"ref47","first-page":"362","article-title":"A Large-Scale Study on Repetitiveness, Containment, and Composability of Routines in Open-Source Projects","author":"nguyen","year":"2016","journal-title":"2016 IEEE\/ACM 13th Conference on Mining Software Repositories (MSR)"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2323972"},{"key":"ref41","author":"juergens","year":"2011","journal-title":"Why and How to Control Cloning in Software Artifacts"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9368-6"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.67"}],"event":{"name":"2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER)","location":"Campobasso","start":{"date-parts":[[2018,3,20]]},"end":{"date-parts":[[2018,3,23]]}},"container-title":["2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8326467\/8330182\/08330194.pdf?arnumber=8330194","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T07:42:23Z","timestamp":1643182943000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8330194\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":93,"URL":"https:\/\/doi.org\/10.1109\/saner.2018.8330194","relation":{},"subject":[],"published":{"date-parts":[[2018,3]]}}}