{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T23:03:05Z","timestamp":1778194985458,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,1,12]],"date-time":"2019-01-12T00:00:00Z","timestamp":1547251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,1,12]]},"DOI":"10.1145\/3312662.3312707","type":"proceedings-article","created":{"date-parts":[[2019,4,17]],"date-time":"2019-04-17T16:30:09Z","timestamp":1555518609000},"page":"9-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Survey on Software Clone Detection Research"],"prefix":"10.1145","author":[{"given":"Hou","family":"Min","sequence":"first","affiliation":[{"name":"College of Computer and Information Engineering, Inner Mongolia Normal University, Hohhot, China"}]},{"given":"Zhang","family":"Li Ping","sequence":"additional","affiliation":[{"name":"College of Computer and Information Engineering, Inner Mongolia Normal University, Hohhot, China"}]}],"member":"320","published-online":{"date-parts":[[2019,1,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1862372.1862390"},{"key":"e_1_3_2_1_2_1","unstructured":"Fowler M. 1999. Refactoring: improving the design of existing code{M}. Addison-Wesley Longman Publishing Co. Inc.   Fowler M. 1999. Refactoring: improving the design of existing code{M}. Addison-Wesley Longman Publishing Co. Inc."},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of Duplication, Redundancy, and Similarity in Software. ISSN 16824405","author":"Giesecke S.","year":"2006"},{"key":"e_1_3_2_1_4_1","volume-title":"International Conference on Software Maintenance. IEEE Computer Society","author":"Mayrand J"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/832308.837142"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2009.02.007"},{"key":"e_1_3_2_1_7_1","volume-title":"Application Research of Computers","year":"2013"},{"key":"e_1_3_2_1_9_1","volume-title":"Proc of the 14th IEEE International Conference on Software Maintenance. Washington DC: IEEE Computer So-ciety","year":"1998"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of Dagstuhl Seminar 06301: Duplication, Redundancy, and Similarity in Software. Dagstuhl(GER):IBFI","author":"Koschke R.","year":"2007"},{"key":"e_1_3_2_1_11_1","volume-title":"Program Comprehension, 2003. 11th IEEE International Workshop on. IEEE","author":"Lakhotia A"},{"issue":"12","key":"e_1_3_2_1_12_1","first-page":"1","article-title":"2014. Software Refactoring Technique for Code Clone Detection of Static and Dynamic Website{J}","volume":"107","author":"Kanagalakshmi K","year":"2014","journal-title":"Foundation of Computer Science"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00126960"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080796"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"issue":"4","key":"e_1_3_2_1_16_1","first-page":"1082","article-title":"2014. Cloning of detection function based on suffix array{J}","volume":"31","author":"Hou Min","year":"2014","journal-title":"Journal of Computer Applications"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2664398.2664420"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/645544.655888"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1115566.1115568"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/645543.655687"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/872023.872542"},{"key":"e_1_3_2_1_22_1","volume-title":"Symposium on Discrete Algorithms","author":"Baker B S","year":"1999"},{"key":"e_1_3_2_1_23_1","volume-title":"Conference of the Centre for Advanced Studies on Collaborative Research, October 24--28","author":"Johnson J H","year":"1993"},{"key":"e_1_3_2_1_24_1","volume-title":"Conference of the Centre for Advanced Studies on Collaborative Research. IBM Press","author":"Cordy J R","year":"2004"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/519621.853389"},{"key":"e_1_3_2_1_26_1","volume-title":"Journal of Software Maintenance & Evolution Research & Practice","author":"Roy C K","year":"2010"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"e_1_3_2_1_28_1","volume-title":"Computing Science & Statistics","author":"Baker B S","year":"1992"},{"key":"e_1_3_2_1_29_1","volume-title":"Nature","author":"Baker B S","year":"1995"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287698"},{"key":"e_1_3_2_1_31_1","volume-title":"Conference on Symposium on Opearting Systems Design & Implementation. 2004: 289--302","author":"Li Z"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.28"},{"issue":"12","key":"e_1_3_2_1_33_1","first-page":"3536","article-title":"2015. Cloning code based on Token edit distance detection{J}","volume":"35","author":"Zhang Jiujie","year":"2015","journal-title":"Journal of Computer Applications"},{"key":"e_1_3_2_1_34_1","first-page":"368","article-title":"1998. Clone detection using abstract syntax trees{C}","volume":"1998","author":"Baxter I D","journal-title":"Icsm. IEEE"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/11767077_6"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368218"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2004.5"},{"key":"e_1_3_2_1_38_1","volume-title":"Static Analysis. Springer Berlin Heidelberg","author":"Komondoor R","year":"2003"},{"key":"e_1_3_2_1_39_1","volume-title":"The University of Wisconsin - Madison","author":"Komondoor R V","year":"2010"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/851042.857059"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/832308.837142"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368132"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2011.12"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/645544.655888"},{"key":"e_1_3_2_1_45_1","volume-title":"Working Notes of Workshop on Ai & Software Engineering","author":"Kontogiannis K","year":"1995"},{"key":"e_1_3_2_1_46_1","volume-title":"Journal of Web Engineering","author":"Calefato F","year":"2004"},{"key":"e_1_3_2_1_47_1","volume-title":"Proc of the 17th IEEE International Conference on Program Comprehension. Washington DC: IEEE Computer Society","year":"2009"},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings. of the 16th IEEE Workshop on Empirical Studies of Software Maintenance WESS'99","author":"Lucca G A D","year":"2001"},{"key":"e_1_3_2_1_49_1","unstructured":"DONG Jiaxing XU Chang. 2017. An Efficient Clonal Detection Technique for Functionally Similar Programs{J} Computer Science 2017 44(04): 12--15.  DONG Jiaxing XU Chang. 2017. An Efficient Clonal Detection Technique for Functionally Similar Programs{J} Computer Science 2017 44(04): 12--15."},{"key":"e_1_3_2_1_50_1","volume-title":"International Conference on Contemporary Computing and Informatics. IEEE","author":"Sudhamani M","year":"2017"},{"key":"e_1_3_2_1_51_1","volume-title":"IEEE Seventh International Conference on Intelligent Computing and Information Systems. IEEE","author":"Sheneamer A","year":"2016"},{"key":"e_1_3_2_1_52_1","volume-title":"International Conference on Computing, Communication and Automation. IEEE","author":"Jadon S.","year":"2017"},{"key":"e_1_3_2_1_53_1","volume-title":"Ma Peijun. A 2013","author":"Bian Xinxin","year":"2013"},{"issue":"4","key":"e_1_3_2_1_54_1","first-page":"446","article-title":"2014. Incremental Detection Method Based on Grouping Code Clone{J}","volume":"8","author":"Hai LIN","year":"2014","journal-title":"Computer Science and Technology"},{"issue":"1","key":"e_1_3_2_1_55_1","first-page":"142","article-title":"2014. Repackaging detection of Android application based on code cloning detection technology{J}","volume":"44","author":"Wang Haoyu","year":"2014","journal-title":"Science in China"},{"issue":"2","key":"e_1_3_2_1_56_1","first-page":"348","article-title":"2015. A Software Vulnerability Code Cloning Detection Method Based on Feature Matrix{J}","volume":"2015","author":"Gan Shuiwei","journal-title":"Journal of Software"},{"key":"e_1_3_2_1_57_1","unstructured":"Lague B Proulx D Mayrand J etal 1997. Assessing the Benefits of Incorporating Function Clone Detection in a Development Process{J}. The Korean journal of gastroenterology = Taehan Sohwagi Hakhoe chi 1997 57(2):67--81.  Lague B Proulx D Mayrand J et al. 1997. Assessing the Benefits of Incorporating Function Clone Detection in a Development Process{J}. The Korean journal of gastroenterology = Taehan Sohwagi Hakhoe chi 1997 57(2):67--81."},{"key":"e_1_3_2_1_58_1","volume-title":"Advanced Computing An International Journal","author":"Kodhai E","year":"2013"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095430.1081737"},{"key":"e_1_3_2_1_60_1","volume-title":"International Workshop on Software Clones. IEEE","author":"Goto A"},{"key":"e_1_3_2_1_61_1","volume-title":"IEEE International Conference on Software Engineering. ACM","author":"Meng N"},{"key":"e_1_3_2_1_62_1","volume-title":"Isrn Software Engineering, 2013, 2013","author":"Fontana F A","year":"2013"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.5555\/832303.836911"},{"key":"e_1_3_2_1_64_1","unstructured":"Prechelt L. 2000. Finding Plagiarisms among a Set of Programs with JPlag{J}. J Universal Computer Science 2000 8(11):1016--1038.  Prechelt L. 2000. Finding Plagiarisms among a Set of Programs with JPlag{J}. J Universal Computer Science 2000 8(11):1016--1038."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2011.13"},{"key":"e_1_3_2_1_66_1","volume-title":"International Conference on Software Maintenance, 1997. Proceedings. IEEE","author":"Lague B"}],"event":{"name":"ICMSS 2019: 2019 3rd International Conference on Management Engineering, Software Engineering and Service Sciences","location":"Wuhan China","acronym":"ICMSS 2019","sponsor":["China University of Geosciences"]},"container-title":["Proceedings of the 2019 3rd International Conference on Management Engineering, Software Engineering and Service Sciences"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3312662.3312707","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3312662.3312707","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:00Z","timestamp":1750208520000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3312662.3312707"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,12]]},"references-count":65,"alternative-id":["10.1145\/3312662.3312707","10.1145\/3312662"],"URL":"https:\/\/doi.org\/10.1145\/3312662.3312707","relation":{},"subject":[],"published":{"date-parts":[[2019,1,12]]},"assertion":[{"value":"2019-01-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}