{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,30]],"date-time":"2024-12-30T18:32:35Z","timestamp":1735583555567,"version":"3.28.0"},"reference-count":45,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/vissoft.2015.7332414","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T22:48:00Z","timestamp":1448318880000},"page":"46-55","source":"Crossref","is-referenced-by-count":8,"title":["A survey on goal-oriented visualization of clone data"],"prefix":"10.1109","author":[{"given":"Hamid Abdul","family":"Basit","sequence":"first","affiliation":[]},{"given":"Muhammad","family":"Hammad","sequence":"additional","affiliation":[]},{"given":"Rainer","family":"Koschke","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/VISSOFT.2014.22"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/IWSC.2012.6227877"},{"article-title":"Visualizing and understanding code duplication in large software systems","year":"2006","author":"jiang","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2006.63"},{"article-title":"Continuous quality control of long lived software systems","year":"2009","author":"dei\u00dfenb\u00f6ck","key":"ref31"},{"key":"ref30","first-page":"259","article-title":"Cascaded treemaps: Examining the visibility and stability of structure in treemaps","author":"l\u00fc","year":"2008","journal-title":"Proceedings of Graphics Interface"},{"article-title":"Visualization of graphs and trees for software analysis","year":"2009","author":"holten","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2006.147"},{"key":"ref35","first-page":"32","article-title":"Visualizing textual redundancy in legacy source","author":"johnson","year":"1994","journal-title":"Conference of the Centre for Advanced Studies on Collaborative research"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.76"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ASPEC.2007.16"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1985404.1985421"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/512035.512062"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/smr.579"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2012.42"},{"key":"ref14","article-title":"The software similarity problem in malware analysis","author":"walenstein","year":"2006","journal-title":"Duplication Redundancy and Similarity in Software"},{"key":"ref15","first-page":"37","article-title":"Using code normalization for fighting self-mutating malware","author":"bruschi","year":"2006","journal-title":"Proceedings of the International Symposium on Secure Software Engineering"},{"key":"ref16","first-page":"376","article-title":"Query-based filtering and graphical view generation for clone analysis","author":"zhang","year":"2008","journal-title":"Proceedings of the International Conference on Software Maintenance"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1985404.1985425"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1985404.1985427"},{"key":"ref19","first-page":"31","article-title":"Gemini: Code clone analysis tool","volume":"2","author":"ueda","year":"2002","journal-title":"Proceedings of the International Symposium on Empirical Software Engineering"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2004.25"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR-WCRE.2014.6747168"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2011.25"},{"key":"ref3","article-title":"Survey of research on software clones","author":"koschke","year":"2006","journal-title":"Duplication Redundancy and Similarity in Software"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"1165","DOI":"10.1016\/j.infsof.2013.01.008","article-title":"Software clone detection: A systematic review","volume":"55","author":"rattana","year":"2013","journal-title":"Information and Software Technology"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/VISUAL.1991.175815"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2009.02.007"},{"key":"ref8","article-title":"Ontology alignment using best-match clone detection","author":"geesaman","year":"2013","journal-title":"International Workshop on Software Clones"},{"key":"ref7","article-title":"Software clone management towards industrial application","author":"koschke","year":"2012","journal-title":"Dagstuhl Seminar Software Clone Management Towards Industrial Application"},{"key":"ref2","first-page":"51","article-title":"What do we need to know about clones? deriving information needs from user goals","author":"basit","year":"2015","journal-title":"International Workshop on Software Clones"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1985404.1985412"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/VISSOF.2002.1019792"},{"article-title":"Software evolution visualization","year":"2007","author":"voinea","key":"ref20"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/VISSOF.2011.6069450"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1188835.1188846"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/32.177365"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2004.12.030"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.97"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1232284"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"ref44","first-page":"47","article-title":"Analysis and visualization for clone refactorivlng","author":"zibran","year":"2015","journal-title":"International Workshop on Software Clones"},{"article-title":"Effective clone detection without language barriers","year":"2005","author":"rieger","key":"ref26"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2013.149"},{"key":"ref25","first-page":"31","article-title":"Dotplot patterns: a literal look at pattern languages","volume":"2","author":"helfman","year":"1996","journal-title":"TAPOS"}],"event":{"name":"2015 IEEE 3rd Working Conference on Software Visualization (VISSOFT)","start":{"date-parts":[[2015,9,27]]},"location":"Bremen, Germany","end":{"date-parts":[[2015,9,28]]}},"container-title":["2015 IEEE 3rd Working Conference on Software Visualization (VISSOFT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7321934\/7332403\/07332414.pdf?arnumber=7332414","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T00:14:34Z","timestamp":1498263274000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7332414\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/vissoft.2015.7332414","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}