{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,30]],"date-time":"2024-12-30T18:32:28Z","timestamp":1735583548648},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/scam.2015.7335412","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T22:49:26Z","timestamp":1448318966000},"page":"161-170","source":"Crossref","is-referenced-by-count":7,"title":["On the comprehension of code clone visualizations: A controlled study using eye tracking"],"prefix":"10.1109","author":[{"given":"Md Sami","family":"Uddin","sequence":"first","affiliation":[]},{"given":"Varun","family":"Gaur","sequence":"additional","affiliation":[]},{"given":"Carl","family":"Gutwin","sequence":"additional","affiliation":[]},{"given":"Chanchal K.","family":"Roy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1985404.1985427"},{"journal-title":"The mind's eye Cognitive and applied aspects of eye movement research 0-444-51020-6 ed","year":"2003","author":"hyona","key":"ref32"},{"key":"ref31","first-page":"16","article-title":"The vision of software clone management: past, present and future","author":"roy","year":"2014","journal-title":"Proc CSMR-18\/WCRE-21 &#x2013; SEW'14"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2421004"},{"year":"0","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/IWSC.2013.6613036"},{"year":"2011","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.97"},{"year":"2011","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/507072.507082"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/2.48797"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/964442.964500"},{"key":"ref16","first-page":"32","article-title":"Visualizing textual redundancy in legacy source","author":"johnson","year":"1994","journal-title":"Proc CASCON '94"},{"key":"ref17","article-title":"Code clone analysis methods for efficient software maintenance","author":"higo","year":"2004","journal-title":"Tech Report of SEL in Osaka University (SEL-Mar-29-2004)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/METRIC.2002.1011326"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2007.10"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1985404.1985425"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2009.5090039"},{"journal-title":"The mythical man-month Essays on software engineering Addison-Wesley Professional 20th anniv ed","year":"1995","author":"brooks","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1117309.1117356"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1353673.1353678"},{"key":"ref5","article-title":"Eye tracking in user experience testing: How to make the most of it","author":"bojko","year":"2005","journal-title":"Proc CUPA"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-3750-4"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1055016"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2004.25"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/97243.97246"},{"key":"ref1","article-title":"A survey on software clone detection research","author":"roy","year":"2007","journal-title":"Technical Report-541 SC"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2007.19"},{"year":"2011","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/IWPSE.2004.1334772"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1056808.1057055"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR-WCRE.2014.6747198"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609582"},{"key":"ref25","first-page":"137","article-title":"Gathering evidence: use of visual security cues in web browsers","author":"whalen","year":"2005","journal-title":"Proc CGI"}],"event":{"name":"2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM)","start":{"date-parts":[[2015,9,27]]},"location":"Bremen, Germany","end":{"date-parts":[[2015,9,28]]}},"container-title":["2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7321933\/7335391\/07335412.pdf?arnumber=7335412","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T22:17:48Z","timestamp":1490393868000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7335412\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/scam.2015.7335412","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}