{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T04:05:02Z","timestamp":1759032302060},"reference-count":52,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1109\/saner48275.2020.9054846","type":"proceedings-article","created":{"date-parts":[[2020,4,3]],"date-time":"2020-04-03T03:47:32Z","timestamp":1585885652000},"page":"93-103","source":"Crossref","is-referenced-by-count":14,"title":["Associating Code Clones with Association Rules for Change Impact Analysis"],"prefix":"10.1109","author":[{"given":"Manishankar","family":"Mondal","sequence":"first","affiliation":[]},{"given":"Banani","family":"Roy","sequence":"additional","affiliation":[]},{"given":"Chanchal K.","family":"Roy","sequence":"additional","affiliation":[]},{"given":"Kevin A.","family":"Schneider","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2245276.2231969"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2013.6613853"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330196"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081737"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2006.51"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2015.34"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR-WCRE.2014.6747194"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597104"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR-WCRE.2014.6747161"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2387358.2387360"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1999.792645"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1597"},{"key":"ref29","first-page":"113","article-title":"Detecting Evolutionary Coupling Using Transitive Association Rules","author":"islam","year":"0","journal-title":"Proc SCAM"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2008.4658071"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2013.6624024"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2010.21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2003.1201210"},{"key":"ref21","first-page":"170","article-title":"A study of consistent and inconsistent changes to code clones","author":"krinke","year":"0","journal-title":"Proc WCRE"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.54"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2011.26"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2007.26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1862372.1862390"},{"journal-title":"Effect Size and Interpretation","year":"0","key":"ref50"},{"journal-title":"Wilcoxon Signed Rank Test and Cohen's d effect size calculator","year":"0","key":"ref51"},{"key":"ref52","first-page":"129","article-title":"The case for adaptive change recommendation","author":"pugh","year":"2018","journal-title":"SCAM"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9088-2"},{"key":"ref11","first-page":"469","article-title":"The Conceptual Coupling Metrics for Object-Oriented Systems","author":"poshyvanyk","year":"0","journal-title":"Proc ICSM"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2011.11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070547"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2013.6671306"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2011.47"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2000.827331"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606615"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/METRICS.2005.28"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609732"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IWPSE.2003.1231205"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2009.5306301"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1808901.1808910"},{"key":"ref6","first-page":"1","article-title":"A Survey on Software Clone Detection Research","author":"roy","year":"2007","journal-title":"Technical Report 2007&#x2013;541"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2009.18"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9076-6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR-WCRE.2014.6747168"},{"journal-title":"Wilcoxon Signed-Rank Test","year":"0","key":"ref49"},{"journal-title":"CTAGS","year":"0","key":"ref9"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491420"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.101"},{"journal-title":"Wilcoxon Signed-Rank Test","year":"0","key":"ref48"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2004.1317478"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/170035.170072"},{"journal-title":"Online SVN repository","year":"0","key":"ref41"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2016.7503736"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2008.47"}],"event":{"name":"2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER)","start":{"date-parts":[[2020,2,18]]},"location":"London, ON, Canada","end":{"date-parts":[[2020,2,21]]}},"container-title":["2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9040394\/9054788\/09054846.pdf?arnumber=9054846","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T17:54:59Z","timestamp":1656438899000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9054846\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2]]},"references-count":52,"URL":"https:\/\/doi.org\/10.1109\/saner48275.2020.9054846","relation":{},"subject":[],"published":{"date-parts":[[2020,2]]}}}