{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T20:53:34Z","timestamp":1778360014725,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,11,5]],"date-time":"2018-11-05T00:00:00Z","timestamp":1541376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,11,5]]},"DOI":"10.1145\/3278142.3278144","type":"proceedings-article","created":{"date-parts":[[2018,11,5]],"date-time":"2018-11-05T08:11:30Z","timestamp":1541405490000},"page":"30-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Towards a framework for generating program dependence graphs from source code"],"prefix":"10.1145","author":[{"given":"Victor J.","family":"Marin","sequence":"first","affiliation":[{"name":"Rochester Institute of Technology, USA"}]},{"given":"Carlos R.","family":"Rivero","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,11,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2005.37"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2566620"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2259051.2259052"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/375431.375418"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591065"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2614628.2614630"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/24039.24041"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368132"},{"key":"e_1_3_2_1_9_1","unstructured":"Keith Garfield. 2006. A sparse program dependence graph for object-oriented programming languages. Ph.D. Dissertation. Keith Garfield. 2006. A sparse program dependence graph for object-oriented programming languages. Ph.D. Dissertation."},{"key":"e_1_3_2_1_10_1","volume-title":"SE Workshops. 123\u2013138","author":"Graf J\u00fcrgen","year":"2013"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/154183.154268"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2989238.2989241"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Tim A. D. Henderson and Andy Podgurski. 2017. Rethinking dependence clones. In IWSC. 68\u201374. Tim A. D. Henderson and Andy Podgurski. 2017. Rethinking dependence clones. In IWSC. 68\u201374.","DOI":"10.1109\/IWSC.2017.7880512"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/143062.143156"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/77606.77608"},{"key":"e_1_3_2_1_16_1","unstructured":"IBM. 2013. The T.J. Watson Libraries for Analysis (WALA). http:\/\/wala. sourceforge.net. IBM. 2013. The T.J. Watson Libraries for Analysis (WALA). http:\/\/wala. sourceforge.net."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00165-014-0326-7"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/325694.325713"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Raghavan Komondoor and Susan Horwitz. 2001. Using slicing to identify duplication in source code. In SAS. 40\u201356. Raghavan Komondoor and Susan Horwitz. 2001. Using slicing to identify duplication in source code. In SAS. 40\u201356.","DOI":"10.1007\/3-540-47764-0_3"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Jens Krinke. 2001. Identifying similar code with program dependence graphs. In WCRE. 301\u2013309. Jens Krinke. 2001. Identifying similar code with program dependence graphs. In WCRE. 301\u2013309.","DOI":"10.1109\/WCRE.2001.957835"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Jingyue Li and Michael D. Ernst. 2012. CBCD: Cloned buggy code detector. In ICSE. 310\u2013320. Jingyue Li and Michael D. Ernst. 2012. CBCD: Cloned buggy code detector. In ICSE. 310\u2013320.","DOI":"10.1109\/ICSE.2012.6227183"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-35122-3_21"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150522"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Victor J. Marin Tobin Pereira Srinivas Sridharan and Carlos R. Rivero. 2017. Automated personalized feedback in introductory Java programming MOOCs. In ICDE. 1259\u20131270. Victor J. Marin Tobin Pereira Srinivas Sridharan and Carlos R. Rivero. 2017. Automated personalized feedback in introductory Java programming MOOCs. In ICDE. 1259\u20131270.","DOI":"10.1109\/ICDE.2017.169"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3122824"},{"key":"e_1_3_2_1_26_1","unstructured":"Terence Parr. 2013. The definitive ANTLR 4 reference (2nd ed.). Pragmatic Bookshelf. Terence Parr. 2013. The definitive ANTLR 4 reference (2nd ed.). Pragmatic Bookshelf."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2013.57"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623377"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2581377"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950321"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2010.36"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332459"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3122822"},{"key":"e_1_3_2_1_34_1","unstructured":"Raja Vall\u00e9e-Rai Phong Co Etienne Gagnon Laurie J. Hendren Patrick Lam and Vijay Sundaresan. 1999. Soot - A Java bytecode optimization framework. In CASCON. 13. Raja Vall\u00e9e-Rai Phong Co Etienne Gagnon Laurie J. Hendren Patrick Lam and Vijay Sundaresan. 1999. Soot - A Java bytecode optimization framework. In CASCON. 13."},{"key":"e_1_3_2_1_35_1","unstructured":"Danny van Bruggen. 2018. JavaParser for processing Java code. https:\/\/github. com\/javaparser\/. Danny van Bruggen. 2018. JavaParser for processing Java code. https:\/\/github. com\/javaparser\/."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Neil Walkinshaw Marc Roper and Murray Wood. 2003. The Java system dependence graph. In SCAM. 55\u201364. Neil Walkinshaw Marc Roper and Murray Wood. 2003. The Java system dependence graph. In SCAM. 55\u201364.","DOI":"10.1109\/SCAM.2003.1238031"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2006.03.001"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1191799"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516665"},{"key":"e_1_3_2_1_40_1","unstructured":"Jianjun Zhao. 1998. Applying program dependence analysis to Java software. In WSEDS. 162\u2013169. Abstract 1 Introduction 2 Related Work 3 Background 4 Graph Construction 4.1 Language Translation 4.2 Language Interpretation 4.3 Data Dependencies 5 Evaluation 6 Conclusions References Jianjun Zhao. 1998. Applying program dependence analysis to Java software. In WSEDS. 162\u2013169. Abstract 1 Introduction 2 Related Work 3 Background 4 Graph Construction 4.1 Language Translation 4.2 Language Interpretation 4.3 Data Dependencies 5 Evaluation 6 Conclusions References"}],"event":{"name":"ESEC\/FSE '18: 26th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Lake Buena Vista FL USA","acronym":"ESEC\/FSE '18","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 4th ACM SIGSOFT International Workshop on Software Analytics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3278142.3278144","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3278142.3278144","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T23:47:09Z","timestamp":1775260029000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3278142.3278144"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,5]]},"references-count":40,"alternative-id":["10.1145\/3278142.3278144","10.1145\/3278142"],"URL":"https:\/\/doi.org\/10.1145\/3278142.3278144","relation":{},"subject":[],"published":{"date-parts":[[2018,11,5]]},"assertion":[{"value":"2018-11-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}