{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:16:05Z","timestamp":1750306565509,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,17]],"date-time":"2014-11-17T00:00:00Z","timestamp":1416182400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002855","name":"Ministry of Science and Technology of the People's Republic of China","doi-asserted-by":"publisher","award":["Grant No. 2011CB302604","Grant No. 2013AA01A213"],"award-info":[{"award-number":["Grant No. 2011CB302604","Grant No. 2013AA01A213"]}],"id":[{"id":"10.13039\/501100002855","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["Grant No. 61033006, U1201252"],"award-info":[{"award-number":["Grant No. 61033006, U1201252"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,17]]},"DOI":"10.1145\/2677832.2677833","type":"proceedings-article","created":{"date-parts":[[2014,11,11]],"date-time":"2014-11-11T13:40:05Z","timestamp":1415713205000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Bug localization via searching crowd-contributed code"],"prefix":"10.1145","author":[{"given":"Qianxiang","family":"Wang","sequence":"first","affiliation":[{"name":"Peking University, China"}]},{"given":"Xuan","family":"Li","sequence":"additional","affiliation":[{"name":"Peking University, China"}]}],"member":"320","published-online":{"date-parts":[[2014,11,17]]},"reference":[{"volume-title":"Proceedings of the 34th International Conference on Software Engineering, ICSE 2012.","author":"Li J.","key":"e_1_3_2_1_1_1","unstructured":"J. Li and M. D. Ernst . CBCD: Cloned Buggy Code Detector . In Proceedings of the 34th International Conference on Software Engineering, ICSE 2012. J. Li and M. D. Ernst. CBCD: Cloned Buggy Code Detector. In Proceedings of the 34th International Conference on Software Engineering, ICSE 2012."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297846.1297897"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287634"},{"key":"e_1_3_2_1_4_1","volume-title":"S. Myagmar and Y.Zhou. CP-Miner: A Tool for Finding Copy-Paste and Related Bugs in Operating System Code. In Symposium on Operating Systems Design and Implementation, OSDI","author":"Li Z.","year":"2004","unstructured":"Z. Li , S. Lu , S. Myagmar and Y.Zhou. CP-Miner: A Tool for Finding Copy-Paste and Related Bugs in Operating System Code. In Symposium on Operating Systems Design and Implementation, OSDI 2004 . Z. Li, S. Lu, S. Myagmar and Y.Zhou. CP-Miner: A Tool for Finding Copy-Paste and Related Bugs in Operating System Code. In Symposium on Operating Systems Design and Implementation, OSDI 2004."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491422"},{"volume-title":"Proceedings of the 18th IEEE International Conference on Automated Software Engineering, ASE 2003.","author":"Renieris M.","key":"e_1_3_2_1_6_1","unstructured":"M. Renieris and S. Reiss . Fault Localization with NearestNeighbor Queries . In Proceedings of the 18th IEEE International Conference on Automated Software Engineering, ASE 2003. M. Renieris and S. Reiss. Fault Localization with NearestNeighbor Queries. In Proceedings of the 18th IEEE International Conference on Automated Software Engineering, ASE 2003."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134324"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081753"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101949"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273467"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070506"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831717"},{"volume-title":"Proceedings of the 34th International Conference on Software Engineering, ICSE 2012.","author":"Gore R.","key":"e_1_3_2_1_13_1","unstructured":"R. Gore and P. F. Reynolds , Jr . Reducing Confounding Bias in Predicate-level Statistical Debugging Metrics . In Proceedings of the 34th International Conference on Software Engineering, ICSE 2012. R. Gore and P. F. Reynolds, Jr. Reducing Confounding Bias in Predicate-level Statistical Debugging Metrics. In Proceedings of the 34th International Conference on Software Engineering, ICSE 2012."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2009.02.007"},{"volume-title":"Proceedings of the 1993 Conference of the Centre for Advanced Studies on Collaborative Research, CASCON 1993.","author":"Johnson J.","key":"e_1_3_2_1_15_1","unstructured":"J. Johnson . Identifying redundancy in source code using fingerprints . In Proceedings of the 1993 Conference of the Centre for Advanced Studies on Collaborative Research, CASCON 1993. J. Johnson. Identifying redundancy in source code using fingerprints. In Proceedings of the 1993 Conference of the Centre for Advanced Studies on Collaborative Research, CASCON 1993."},{"volume-title":"Proceedings of the 1994 Conference of the Centre for Advanced Studies on Collaborative research, CASCON 2004.","author":"Johnson J.","key":"e_1_3_2_1_16_1","unstructured":"J. Johnson . Visualizing textual redundancy in legacy source . In Proceedings of the 1994 Conference of the Centre for Advanced Studies on Collaborative research, CASCON 2004. J. Johnson. Visualizing textual redundancy in legacy source. In Proceedings of the 1994 Conference of the Centre for Advanced Studies on Collaborative research, CASCON 2004."},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the","author":"Manber U.","year":"1994","unstructured":"U. Manber . Finding similar files in a large file system . In Proceedings of the Winter 1994 Usenix Technical Conference , 1994. U. Manber. Finding similar files in a large file system. In Proceedings of the Winter 1994 Usenix Technical Conference, 1994."},{"volume-title":"Proceedings of the 15th International Conference on Software Maintenance, ICSM 1999.","author":"Ducasse S.","key":"e_1_3_2_1_18_1","unstructured":"S. Ducasse , M. Rieger , and S. Demeyer . A language independent approach for detecting duplicated code . In Proceedings of the 15th International Conference on Software Maintenance, ICSM 1999. S. Ducasse, M. Rieger, and S. Demeyer. A language independent approach for detecting duplicated code. In Proceedings of the 15th International Conference on Software Maintenance, ICSM 1999."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SYNASC.2005.20"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1094855.1094903"},{"volume-title":"Proceedings of the 16th IEEE International Conference on Automated Software Engineering, ASE 2001.","author":"Marcus A.","key":"e_1_3_2_1_22_1","unstructured":"A. Marcus and J. Maletic . Identification of high-level concept clones in source code . In Proceedings of the 16th IEEE International Conference on Automated Software Engineering, ASE 2001. A. Marcus and J. Maletic. Identification of high-level concept clones in source code. In Proceedings of the 16th IEEE International Conference on Automated Software Engineering, ASE 2001."},{"volume-title":"Proceedings of the 2nd Working Conference on Reverse Engineering, WCRE1995","author":"Baker B.","key":"e_1_3_2_1_23_1","unstructured":"B. Baker . On finding duplication and near-duplication in large software systems . In Proceedings of the 2nd Working Conference on Reverse Engineering, WCRE1995 . B. Baker. On finding duplication and near-duplication in large software systems. In Proceedings of the 2nd Working Conference on Reverse Engineering, WCRE1995."},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of Computing Science and Statistics: 24th Symposium on the Interface","volume":"24","author":"Baker B.","year":"1992","unstructured":"B. Baker . A program for identifying duplicated code . In Proceedings of Computing Science and Statistics: 24th Symposium on the Interface , vol. 24 , 1992 . B. Baker. A program for identifying duplicated code. In Proceedings of Computing Science and Statistics: 24th Symposium on the Interface, vol.24, 1992."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"volume-title":"Proceedings of the 14th International Conference on Software Maintenance, ICSM 1998.","author":"Baxter I.","key":"e_1_3_2_1_26_1","unstructured":"I. Baxter , A. Yahin , L. Moura , and M. Anna . Clone detection using abstract syntax trees . In Proceedings of the 14th International Conference on Software Maintenance, ICSM 1998. I. Baxter, A. Yahin, L. Moura, and M. Anna. Clone detection using abstract syntax trees. In Proceedings of the 14th International Conference on Software Maintenance, ICSM 1998."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380210706"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2004.5"},{"volume-title":"Proceedings of the 12th International Conference on Software Maintenance, ICSM 1996.","author":"Mayrand J.","key":"e_1_3_2_1_29_1","unstructured":"J. Mayrand , C. Leblanc , and E. Merlo . Experiment on the automatic detection of function clones in a software system using metrics . In Proceedings of the 12th International Conference on Software Maintenance, ICSM 1996. J. Mayrand, C. Leblanc, and E. Merlo. Experiment on the automatic detection of function clones in a software system using metrics. In Proceedings of the 12th International Conference on Software Maintenance, ICSM 1996."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150522"},{"key":"e_1_3_2_1_31_1","unstructured":"Stack Overflow. http:\/\/stackoverflow.com\/.  Stack Overflow. http:\/\/stackoverflow.com\/."},{"key":"e_1_3_2_1_32_1","unstructured":"Findbugs. http:\/\/findbugs.sourceforge.net\/.  Findbugs. http:\/\/findbugs.sourceforge.net\/."},{"key":"e_1_3_2_1_33_1","unstructured":"Coverity. http:\/\/www.coverity.com\/.  Coverity. http:\/\/www.coverity.com\/."},{"key":"e_1_3_2_1_34_1","unstructured":"Jlint. http:\/\/jlint.sourceforge.net\/.  Jlint. http:\/\/jlint.sourceforge.net\/."},{"key":"e_1_3_2_1_35_1","unstructured":"POJ. http:\/\/poj.org\/.  POJ. http:\/\/poj.org\/."},{"key":"e_1_3_2_1_36_1","unstructured":"Pex4Fun. http:\/\/pex4fun.com\/.  Pex4Fun. http:\/\/pex4fun.com\/."}],"event":{"name":"Internetware '14: The Sixth Asia-Pacific Symposium on Internetware","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Hong Kong China","acronym":"Internetware '14"},"container-title":["Proceedings of the 6th Asia-Pacific Symposium on Internetware on Internetware"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2677832.2677833","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2677832.2677833","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:13:11Z","timestamp":1750227191000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2677832.2677833"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,17]]},"references-count":35,"alternative-id":["10.1145\/2677832.2677833","10.1145\/2677832"],"URL":"https:\/\/doi.org\/10.1145\/2677832.2677833","relation":{},"subject":[],"published":{"date-parts":[[2014,11,17]]},"assertion":[{"value":"2014-11-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}