{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T10:42:11Z","timestamp":1764240131521},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1109\/saner.2018.8330218","type":"proceedings-article","created":{"date-parts":[[2018,4,6]],"date-time":"2018-04-06T04:41:53Z","timestamp":1522989713000},"page":"300-310","source":"Crossref","is-referenced-by-count":6,"title":["Supporting exploratory code search with differencing and visualization"],"prefix":"10.1109","author":[{"given":"Wenjian","family":"Liu","sequence":"first","affiliation":[]},{"given":"Xin","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Zhenchang","family":"Xing","sequence":"additional","affiliation":[]},{"given":"Junyi","family":"Li","sequence":"additional","affiliation":[]},{"given":"Bing","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Wenyun","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859091"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1148493.1148508"},{"key":"ref31","first-page":"11","article-title":"Automatic generation of suggestions for program investigation","author":"robillard","year":"2005","journal-title":"Proceedings of the 10th European Software Engineering Conference held jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering 2005"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393606"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606622"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1121949.1121979"},{"journal-title":"CodeNuance replication package","year":"0","key":"ref12"},{"key":"ref13","article-title":"A survey on software clone detection research","author":"roy","year":"2007","journal-title":"School of Computing TR 2007-541"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568298"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"520","DOI":"10.1145\/2786805.2786871","article-title":"Clone-based and interactive recommendation for modifying pasted code","author":"lin","year":"2015","journal-title":"Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering - ESEC\/FSE 2015"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"journal-title":"CCFinderX","year":"0","key":"ref17"},{"journal-title":"Apache Lucene","year":"0","key":"ref18"},{"journal-title":"Gallery","year":"0","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597087"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1176617.1176671"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606704"},{"journal-title":"Github","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2522920.2522930"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321663"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.84"},{"journal-title":"Open Hub","year":"0","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.51"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2013.6671289"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2377656.2377660"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518944"},{"journal-title":"Stack Overflow","year":"0","key":"ref20"},{"key":"ref22","first-page":"385","article-title":"SNIFF: A search engine for java using free-form queries","author":"chatterjee","year":"2009","journal-title":"Fundamental Approaches to Software Engineering 12th International Conference FASE 2009 Held as Part of the Joint European Conferences on Theory and Practice of Software ETAPS 2009"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321726"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2581377"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070525"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2014.6883025"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393612"}],"event":{"name":"2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER)","start":{"date-parts":[[2018,3,20]]},"location":"Campobasso","end":{"date-parts":[[2018,3,23]]}},"container-title":["2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8326467\/8330182\/08330218.pdf?arnumber=8330218","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T07:41:58Z","timestamp":1643182918000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8330218\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/saner.2018.8330218","relation":{},"subject":[],"published":{"date-parts":[[2018,3]]}}}