{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T13:26:58Z","timestamp":1730294818761,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,9]]},"DOI":"10.1109\/scam.2009.20","type":"proceedings-article","created":{"date-parts":[[2009,10,7]],"date-time":"2009-10-07T16:03:18Z","timestamp":1254931398000},"page":"109-118","source":"Crossref","is-referenced-by-count":9,"title":["Maintaining Fine-Grained Code Metadata Regardless of Moving, Copying and Merging"],"prefix":"10.1109","author":[{"given":"Christian R.","family":"Prause","sequence":"first","affiliation":[{"name":"Schloss Birlinghoven, Fraunhofer FIT, St. Augustin, Germany"}]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2006.41"},{"key":"22","article-title":"practical language-independent detection of near-miss clones","author":"cordy","year":"2004","journal-title":"Proceedings of the 2004 Conference of the Centre for Advanced Studies on Collaborative Research"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287698"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/1370099.1370104"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2007.18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1999.792593"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v10i2.1207"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1370750.1370766"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70731"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327494"},{"journal-title":"Modern Information Retrieval","year":"1999","author":"baeza-yates","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1083142.1083143"},{"key":"3","first-page":"707","article-title":"binary codes capable of correcting deletions, insertions, and reversals","volume":"10","author":"levenshtein","year":"1966","journal-title":"Soviet Physics-Doklady"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1137983.1138000"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.28"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1370750.1370780"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/321796.321811"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2007.14"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1370750.1370773"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1370750.1370777"},{"journal-title":"Code Reading - The Open Source Perspective","year":"2003","author":"spinellis","key":"4"},{"key":"9","article-title":"a change-aware development environment by recording editing operations of source code","author":"takayuki","year":"2008","journal-title":"International working conference on Mining Software Repositories"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2007.7"}],"event":{"name":"2009 Ninth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM)","start":{"date-parts":[[2009,9,20]]},"location":"Edmonton, AB, Canada","end":{"date-parts":[[2009,9,21]]}},"container-title":["2009 Ninth IEEE International Working Conference on Source Code Analysis and Manipulation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5279860\/5279861\/05279957.pdf?arnumber=5279957","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,7]],"date-time":"2021-06-07T16:05:53Z","timestamp":1623081953000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/5279957\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,9]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/scam.2009.20","relation":{},"subject":[],"published":{"date-parts":[[2009,9]]}}}