{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T02:23:51Z","timestamp":1748917431692,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/scam.2003.1238044","type":"proceedings-article","created":{"date-parts":[[2004,3,2]],"date-time":"2004-03-02T02:26:50Z","timestamp":1078194410000},"page":"183-192","source":"Crossref","is-referenced-by-count":4,"title":["Detection of redundant code using R\/sup 2\/D\/sup 2\/"],"prefix":"10.1109","author":[{"given":"A.M.","family":"Leitao","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1997.624264"},{"journal-title":"Reengenharia de Programas","year":"2001","author":"leit\u00e3o","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1996.565012"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/382222.382462"},{"journal-title":"SNePS-2 1 User's Manual","year":"1995","author":"shapiro","key":"ref14"},{"journal-title":"MYCIN A Rule-based Computer Program for Advising Physicians Regarding Antimicrobial Therapy Selection","year":"1974","author":"shortliffe","key":"ref15"},{"key":"ref16","first-page":"7","article-title":"The leap year problem","volume":"33","author":"van deursen","year":"1998","journal-title":"Centrum voor Wiskunde en Informatica (CWI)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/39.9.741"},{"key":"ref18","first-page":"262","article-title":"Using an integrated toolset for program under-standing","author":"whitney","year":"1995","journal-title":"Proceedings of the CASCON'95"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/134510.134564"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/0360-1315(87)90042-X"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1999.792593"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1994.336783"},{"journal-title":"Design Patterns Elements of Reusable Object-Oriented Software","year":"1996","author":"gamma","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45309-1_25"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2001.919197"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738528"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1995.514697"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2001.957835"},{"volume":"28","journal-title":"SIGCSEB SIGCSE Bulletin (ACM Special Interest Group on Computer Science Education)","year":"1996","key":"ref20"}],"event":{"name":"Third IEEE International Workshop on Source Code Analysis and Manipulation.","acronym":"SCAM-03","location":"Amsterdam, Netherlands"},"container-title":["Proceedings Third IEEE International Workshop on Source Code Analysis and Manipulation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8773\/27776\/01238044.pdf?arnumber=1238044","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T18:01:11Z","timestamp":1489428071000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1238044\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/scam.2003.1238044","relation":{},"subject":[]}}