{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:53Z","timestamp":1750221113074,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,1,12]],"date-time":"2019-01-12T00:00:00Z","timestamp":1547251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100011002","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61462071"],"award-info":[{"award-number":["61462071"]}],"id":[{"id":"10.13039\/501100011002","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Inner Mongolia Education Department funded project","award":["NJZY17049"],"award-info":[{"award-number":["NJZY17049"]}]},{"name":"Inner Mongolia Normal University Research Fund Project","award":["2016ZRYB003"],"award-info":[{"award-number":["2016ZRYB003"]}]},{"name":"Inner Mongolia Natural Science Foundation","award":["2018MS06009"],"award-info":[{"award-number":["2018MS06009"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,1,12]]},"DOI":"10.1145\/3312662.3312709","type":"proceedings-article","created":{"date-parts":[[2019,4,17]],"date-time":"2019-04-17T16:30:09Z","timestamp":1555518609000},"page":"39-44","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A Method for Identifying and Recommending Reconstructed Clones"],"prefix":"10.1145","author":[{"given":"She","family":"Rongrong","sequence":"first","affiliation":[{"name":"Software engineering, Inter mongolia, Inner Mongolia Normal University School of Computer and Information Engineering, Inner Mongolia Hohhot"}]},{"given":"Zhang","family":"Liping","sequence":"additional","affiliation":[{"name":"Software engineering, Inter mongolia, Inner Mongolia Normal University School of Computer and Information Engineering, Inner Mongolia Hohhot"}]},{"given":"Zhao","family":"Fengrong","sequence":"additional","affiliation":[{"name":"Software engineering, Inter mongolia, Inner Mongolia Normal University School of Computer and Information Engineering, Inner Mongolia Hohhot"}]}],"member":"320","published-online":{"date-parts":[[2019,1,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1779593.1779596"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287698"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368218"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"APDAN M AKTAS M 2014. YIGITi M. On the Structural Code Clone Detection Problem: A Survey and Software Metric Based Approach{M}\/\/ Computational Science and Its Applications -- ICCSA 2014. Springer International Publishing 492--507.  APDAN M AKTAS M 2014. YIGITi M. On the Structural Code Clone Detection Problem: A Survey and Software Metric Based Approach{M}\/\/ Computational Science and Its Applications -- ICCSA 2014. Springer International Publishing 492--507.","DOI":"10.1007\/978-3-319-09156-3_35"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"CUOMO A SANTONE A VILLANO U. 2012. A novel approach based on formal methods for clone detection{C}\/\/ Proceedings of the 2012 International Workshop on Software Clones. Piscataway NJ: IEEE 8--14.   CUOMO A SANTONE A VILLANO U. 2012. A novel approach based on formal methods for clone detection{C}\/\/ Proceedings of the 2012 International Workshop on Software Clones. Piscataway NJ: IEEE 8--14.","DOI":"10.1109\/IWSC.2012.6227879"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/2011138.2011140"},{"key":"e_1_3_2_1_7_1","unstructured":"SHI Q Q ZHANG L P YIN L L etal2013. Detecting clone code based on suffix array {J}. Computer Engineering 123--127.  SHI Q Q ZHANG L P YIN L L et al.2013. Detecting clone code based on suffix array {J}. Computer Engineering 123--127."},{"key":"e_1_3_2_1_8_1","article-title":"Clone code detection based on Token edit distance {J}","author":"WANG C H","year":"2015","journal-title":"Journal of Computer Applications, 3536--3543"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080794"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080796"},{"key":"e_1_3_2_1_12_1","article-title":"A clonal group mapping method based on improved vector space model{J}","volume":"2016","author":"CHEN","year":"2016","journal-title":"Journal of Computer Applications"},{"key":"e_1_3_2_1_13_1","unstructured":"Journal of Computer Applications 481--486. 2017 Software multi-version clonal group mapping method based on LDA and DBSCAN{J}"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081737"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080796"},{"key":"e_1_3_2_1_16_1","unstructured":"ZHANG Jiu-jie YAN WANG Chun-hui ZHANG Li-ping LIU Dong-sheng.2016. Evolutionary pattern recognition and pedigree construction based on inter-version cloning mapping{J}. Journal of Computer Applications 2021--2030.  ZHANG Jiu-jie YAN WANG Chun-hui ZHANG Li-ping LIU Dong-sheng.2016. Evolutionary pattern recognition and pedigree construction based on inter-version cloning mapping{J}. Journal of Computer Applications 2021--2030."},{"issue":"5","key":"e_1_3_2_1_17_1","first-page":"47","article-title":"Evolutionary Trace Construction and Pattern Recognition of Clone Code Based on Graph Model{J}","volume":"43","year":"2017","journal-title":"Computer Engineering"},{"key":"e_1_3_2_1_18_1","unstructured":"OPDYKE W F. 1992. Refactoring Object Frame Works {M}.Illinois: University of Illinois at Urban-Champaign 18--35.  OPDYKE W F. 1992. Refactoring Object Frame Works {M}.Illinois: University of Illinois at Urban-Champaign 18--35."},{"key":"e_1_3_2_1_19_1","unstructured":"Bian Xinxin. Research on Process Extraction Method of Reconfigurable Clone Code {D}. Harbin: Harbin Institute of Technology. 2014.  Bian Xinxin. Research on Process Extraction Method of Reconfigurable Clone Code {D}. Harbin: Harbin Institute of Technology. 2014."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Bakota T. 2011. Tracking the Evolution of Code Clones{C}\/\/The 37th international conference on Current trends in theory and practice of computer science. Novy' Smokovec Slovakia: Springer 86--98.   Bakota T. 2011. Tracking the Evolution of Code Clones{C}\/\/The 37th international conference on Current trends in theory and practice of computer science. Novy' Smokovec Slovakia: Springer 86--98.","DOI":"10.1007\/978-3-642-18381-2_7"},{"volume-title":"International Conference on Software Analysis, Evolution and Reengineering. IEEE, 484--488","year":"2015","author":"A.","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","unstructured":"Liu Dongrui Liu Dongsheng Zhang Liping Hou Min Wang Chunhui. 2017. Prediction of cloned code quality based on Bayesian network{J}.Computer Science 165--168.  Liu Dongrui Liu Dongsheng Zhang Liping Hou Min Wang Chunhui. 2017. Prediction of cloned code quality based on Bayesian network{J}.Computer Science 165--168."},{"key":"e_1_3_2_1_23_1","article-title":"Method for recommending clone reconstruction based on decision tree{J}","author":"SHE","year":"2018","journal-title":"Journal of Computer Applications, (7)."}],"event":{"name":"ICMSS 2019: 2019 3rd International Conference on Management Engineering, Software Engineering and Service Sciences","sponsor":["China University of Geosciences"],"location":"Wuhan China","acronym":"ICMSS 2019"},"container-title":["Proceedings of the 2019 3rd International Conference on Management Engineering, Software Engineering and Service Sciences"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3312662.3312709","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3312662.3312709","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:00Z","timestamp":1750208520000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3312662.3312709"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,12]]},"references-count":22,"alternative-id":["10.1145\/3312662.3312709","10.1145\/3312662"],"URL":"https:\/\/doi.org\/10.1145\/3312662.3312709","relation":{},"subject":[],"published":{"date-parts":[[2019,1,12]]},"assertion":[{"value":"2019-01-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}