{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:45:30Z","timestamp":1775054730054,"version":"3.50.1"},"reference-count":45,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1109\/vl\/hcc50065.2020.9127202","type":"proceedings-article","created":{"date-parts":[[2020,7,16]],"date-time":"2020-07-16T20:20:56Z","timestamp":1594930856000},"page":"1-9","source":"Crossref","is-referenced-by-count":39,"title":["Code Duplication and Reuse in Jupyter Notebooks"],"prefix":"10.1109","author":[{"given":"Andreas P.","family":"Koenzen","sequence":"first","affiliation":[]},{"given":"Neil A.","family":"Ernst","sequence":"additional","affiliation":[]},{"given":"Margaret-Anne D.","family":"Storey","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","year":"0","journal-title":"Netflix&#x2019;s metaflow"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332446"},{"key":"ref33","year":"0","journal-title":"Jupyter notebook diff and merge tools"},{"key":"ref32","year":"0","journal-title":"Verdant"},{"key":"ref31","year":"0","journal-title":"jupyterlab-git extension"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518944"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300500"},{"key":"ref36","year":"0","journal-title":"Apple timemachine"},{"key":"ref35","year":"0","journal-title":"Nextjournal"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2018.8506576"},{"key":"ref10","article-title":"Survey of research on software clones","author":"koschke","year":"2007","journal-title":"Duplication Redundancy and Similarity in Software Ser Dagstuhl Seminar Proceedings"},{"key":"ref40","year":"0","journal-title":"AWS Step Functions"},{"key":"ref11","first-page":"1","article-title":"Software analysis by code clones in open source software","volume":"xlv","author":"uchida","year":"2005","journal-title":"Journal of Computer Information Systems"},{"key":"ref12","year":"0","journal-title":"Google colab"},{"key":"ref13","year":"0","journal-title":"Google Cloud Platform"},{"key":"ref14","year":"0","journal-title":"Microsoft azure notebooks"},{"key":"ref15","year":"0","journal-title":"Databricks"},{"key":"ref16","year":"0","journal-title":"nteractions"},{"key":"ref17","year":"0","journal-title":"Apache Zeppelin"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070547"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10664-009-9108-x","article-title":"An empirical study on the maintenance of source code clones","volume":"15","author":"thummalapenta","year":"2009","journal-title":"Empirical Software Engineering"},{"key":"ref28","first-page":"707","article-title":"Binary codes capable of correcting deletions, insertions, and reversals","volume":"10","author":"levenshtein","year":"1966","journal-title":"Soviet Physics Doklady"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1370847.1370848"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173606"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2017.8103446"},{"key":"ref6","author":"fowler","year":"2018","journal-title":"Refactoring Improving the Design of Existing Code"},{"key":"ref29","article-title":"Tracking code clones in evolving software","author":"duala-ekoko","year":"0"},{"key":"ref5","article-title":"A survey on software clone detection research","volume":"115","author":"roy","year":"2007","journal-title":"School of Computing TR 2007-541"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pcbi.1007007"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173748"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2012.219"},{"key":"ref9","article-title":"A largescale study about quality and reproducibility of jupyter notebooks","author":"pimentel","year":"0","journal-title":"2019 IEEE\/ACM 16th International Conference on Mining Software Repositories (MSR)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1038\/d41586-018-07196-1"},{"key":"ref20","article-title":"Better code, better sharing:on the need of analyzing jupyter notebooks","author":"wang","year":"2019"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-018-9655-0"},{"key":"ref22","year":"0","journal-title":"Papermill"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025626"},{"key":"ref42","first-page":"645","article-title":"cloning considered harmful","volume":"13","author":"kapser","year":"2008","journal-title":"Considered Harmful Patterns of Cloning in Software Empirical Software Engineering"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376729"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2007.421"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2018.8506555"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70725"},{"key":"ref26","article-title":"Design and use of computational notebooks","author":"rule","year":"2018","journal-title":"Ph D Dissertation"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2593882.2593887"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2017.8103490"}],"event":{"name":"2020 IEEE Symposium on Visual Languages and Human-Centric Computing (VL\/HCC)","location":"Dunedin, New Zealand","start":{"date-parts":[[2020,8,10]]},"end":{"date-parts":[[2020,8,14]]}},"container-title":["2020 IEEE Symposium on Visual Languages and Human-Centric Computing (VL\/HCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9124617\/9127195\/09127202.pdf?arnumber=9127202","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T15:17:44Z","timestamp":1656602264000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9127202\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/vl\/hcc50065.2020.9127202","relation":{},"subject":[],"published":{"date-parts":[[2020,8]]}}}