{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:58:49Z","timestamp":1775915929915,"version":"3.50.1"},"reference-count":63,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2015,11,1]],"date-time":"2015-11-01T00:00:00Z","timestamp":1446336000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"European Union (European Social Fund\u2014ESF)"},{"name":"Greek national funds through the Operational Program"},{"name":"National Strategic Reference Framework (NSRF)"},{"name":"Thalis\u2014Athens University of Economics"},{"name":"Business\u2014Software Engineering Research Platform"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2015,11,1]]},"DOI":"10.1109\/tse.2015.2448531","type":"journal-article","created":{"date-parts":[[2015,6,22]],"date-time":"2015-06-22T18:38:09Z","timestamp":1434998289000},"page":"1055-1090","source":"Crossref","is-referenced-by-count":76,"title":["Assessing the Refactorability of Software Clones"],"prefix":"10.1109","volume":"41","author":[{"given":"Nikolaos","family":"Tsantalis","sequence":"first","affiliation":[]},{"given":"Davood","family":"Mazinanian","sequence":"additional","affiliation":[]},{"given":"Giri Panamoottil","family":"Krishnan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2008.41"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738528"},{"key":"ref33","author":"gamma","year":"1995","journal-title":"Design Patterns Elements of Reusable Object-Oriented Software"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100129"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568298"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2006.18"},{"key":"ref37","first-page":"96","article-title":"DECKARD: Scalable and accurate tree-based detection of code clones","author":"jiang","year":"0","journal-title":"Proc 29th Int'l Conf Software Eng"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70725"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2012.06.011"},{"key":"ref60","first-page":"601","article-title":"Design and evaluation of an automated aspect mining tool","author":"shepherd","year":"0","journal-title":"Proc Int Conf Softw Eng Res Practice"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2011.12"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150522"},{"key":"ref63","article-title":"Clone removal in Java programs as a process of stepwise unification","author":"speicher","year":"0","journal-title":"Proc 26th Workshop Logic Programm"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/949306.949308"},{"key":"ref27","article-title":"Refactoring object-oriented frameworks","author":"opdyke","year":"1992"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368146"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR-WCRE.2014.6747168"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2009.02.007"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04921-1"},{"key":"ref22","first-page":"40","article-title":"Using slicing to identify duplication in source code","author":"komondoor","year":"0","journal-title":"Proc Int Static Anal Symp"},{"key":"ref21","author":"cormen","year":"2009","journal-title":"Introduction to Algorithms"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380120103"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.7155\/jgaa.00139"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1137\/0215075"},{"key":"ref25","article-title":"An efficient algorithm for similarity analysis of molecules","volume":"2","author":"durand","year":"1999","journal-title":"Chemical Journal on Internet"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/PDSE.1999.779735"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/IWSC.2013.6613038"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2001.957835"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.55"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2014.11"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2012.0058"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/1985404.1985407"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.03.061"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2012.16"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/METRIC.1993.263799"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2010.11"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2387358.2387360"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2009.18"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2013.11.027"},{"key":"ref13","author":"van leeuwen","year":"1994","journal-title":"Handbook of Theoretical Computer Science (Vol A) Algorithms and Complexity"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR-WCRE.2014.6747160"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/178243.178258"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/smr.394"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/24039.24041"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.05.016"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780198528173.001.0001"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/smr.520"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.90"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR-WCRE.2014.6747161"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2011.21"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070547"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2008.4658071"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2699688"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2010.11.010"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.2307\/2685478"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2010.63"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080794"},{"key":"ref47","first-page":"132","article-title":"A multidimensional empirical study on refactoring activity","author":"tsantalis","year":"0","journal-title":"Proc Conf Center for Advanced Studies on Collaborative Research"},{"key":"ref42","author":"g\u00f6de","year":"2011","journal-title":"Clone Evolution"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1810295.1810449"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.19"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287651"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/7323922\/07130676.pdf?arnumber=7130676","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:46:59Z","timestamp":1642006019000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7130676\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,1]]},"references-count":63,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tse.2015.2448531","relation":{},"ISSN":["0098-5589","1939-3520"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,11,1]]}}}