{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:26:25Z","timestamp":1750220785032,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T00:00:00Z","timestamp":1594598400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,13]]},"DOI":"10.1145\/3387904.3389262","type":"proceedings-article","created":{"date-parts":[[2020,9,12]],"date-time":"2020-09-12T20:04:38Z","timestamp":1599941078000},"page":"208-218","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Investigating Near-Miss Micro-Clones in Evolving Software"],"prefix":"10.1145","author":[{"given":"Manishankar","family":"Mondal","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Saskatchewan, Canada"}]},{"given":"Banani","family":"Roy","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Saskatchewan, Canada"}]},{"given":"Chanchal K.","family":"Roy","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Saskatchewan, Canada"}]},{"given":"Kevin A.","family":"Schneider","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Saskatchewan, Canada"}]}],"member":"320","published-online":{"date-parts":[[2020,9,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2007.26"},{"key":"e_1_3_2_1_2_1","first-page":"273","volume-title":"Proc. ICSM","author":"Barbour L.","year":"2011","unstructured":"L. Barbour , F. Khomh , Y. Zou , \" Late Propagation in Software Clones\" , Proc. ICSM , 2011 , pp. 273 -- 282 . L. Barbour, F. Khomh, Y. Zou, \"Late Propagation in Software Clones\", Proc. ICSM, 2011, pp. 273--282."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1597"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2010.11.010"},{"key":"e_1_3_2_1_5_1","first-page":"20","volume-title":"Proc. ESEM","author":"Chatterji D.","year":"2011","unstructured":"D. Chatterji , J. C. Carver , B. Massengil , J. Osiin , N. A Kraft , \" Measuring the Efficacy of Code Clone Information in a Bug Localization Task: An Empirical Study \", Proc. ESEM , 2011 , pp. 20 -- 29 . D. Chatterji, J. C. Carver, B. Massengil, J. Osiin, N. A Kraft, \"Measuring the Efficacy of Code Clone Information in a Bug Localization Task: An Empirical Study\", Proc. ESEM, 2011, pp. 20--29."},{"key":"e_1_3_2_1_6_1","first-page":"219","volume-title":"Proc. ICPC ToolDemo","author":"Cordy J. R.","year":"2011","unstructured":"J. R. Cordy , C. K. Roy , \" The NiCad Clone Detector\" , Proc. ICPC ToolDemo , 2011 , pp. 219 -- 220 . J. R. Cordy, C. K. Roy, \"The NiCad Clone Detector\", Proc. ICPC ToolDemo, 2011, pp. 219--220."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.2307\/1932409"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368218"},{"key":"e_1_3_2_1_10_1","first-page":"158","volume-title":"Proc. ICSE","author":"Duala-Ekoko E.","year":"2007","unstructured":"E. Duala-Ekoko , M. P. Robillard , \" Tracking Code Clones in Evolving Software\" , Proc. ICSE , 2007 , pp. 158 -- 167 . E. Duala-Ekoko, M. P. Robillard, \"Tracking Code Clones in Evolving Software\", Proc. ICSE, 2007, pp. 158--167."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985836"},{"key":"e_1_3_2_1_12_1","first-page":"65","volume-title":"Proc. CSMR","author":"G\u00f6de N.","year":"2011","unstructured":"N. G\u00f6de , J. Harder , \" Clone Stability\" , Proc. CSMR 2011 , pp. 65 -- 74 . N. G\u00f6de, J. Harder, \"Clone Stability\", Proc. CSMR 2011, pp. 65--74."},{"key":"e_1_3_2_1_13_1","first-page":"219","volume-title":"Kaiserslautern","author":"G\u00c3\u016dde N.","year":"2009","unstructured":"N. G\u00c3\u016dde and R. Koschke , \" Incremental Clone Detection,\" 2009 13th European Conference on Software Maintenance and Reengineering , Kaiserslautern , 2009 , pp. 219 -- 228 . N. G\u00c3\u016dde and R. Koschke, \"Incremental Clone Detection,\" 2009 13th European Conference on Software Maintenance and Reengineering, Kaiserslautern, 2009, pp. 219--228."},{"key":"e_1_3_2_1_14_1","first-page":"73","volume-title":"Proc. EVOL\/IWPSE","author":"Hotta K.","year":"2010","unstructured":"K. Hotta , Y. Sano , Y. Higo , S. Kusumoto , \" Is Duplicate Code More Frequently Modified than Non-duplicate Code in Software Evolution? : An Empirical Study on Open Source Software \", Proc. EVOL\/IWPSE , 2010 , pp. 73 -- 82 . K. Hotta, Y. Sano, Y. Higo, S. Kusumoto, \"Is Duplicate Code More Frequently Modified than Non-duplicate Code in Software Evolution?: An Empirical Study on Open Source Software\", Proc. EVOL\/IWPSE, 2010, pp. 73--82."},{"key":"e_1_3_2_1_15_1","first-page":"94","volume-title":"Proc. IWSC","author":"Inoue K.","year":"2012","unstructured":"K. Inoue , Y. Higo , N. Yoshida , E. Choi , S. Kusumoto , K. Kim , W. Park , E. Lee , \" Experience of Finding Inconsistently-Changed Bugs in Code Clones of Mobile Software\" , Proc. IWSC , 2012 , pp. 94 -- 95 . K. Inoue, Y. Higo, N. Yoshida, E. Choi, S. Kusumoto, K. Kim, W. Park, E. Lee, \"Experience of Finding Inconsistently-Changed Bugs in Code Clones of Mobile Software\", Proc. IWSC, 2012, pp. 94--95."},{"key":"e_1_3_2_1_16_1","first-page":"68","volume-title":"Proc. SANER","author":"Islam J. F.","year":"2016","unstructured":"J. F. Islam , M. Mondal , C. K. Roy , \" Bug Replication in Code Clones : An Empirical Study \", Proc. SANER , 2016 , pp. 68 -- 78 . J. F. Islam, M. Mondal, C. K. Roy, \"Bug Replication in Code Clones: An Empirical Study\", Proc. SANER, 2016, pp. 68--78."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287634"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.30"},{"key":"e_1_3_2_1_19_1","first-page":"485","volume-title":"Proc. ICSE","author":"Juergens E.","year":"2009","unstructured":"E. Juergens , F. Deissenboeck , B. Hummel , S. Wagner , \" Do Code Clones Matter?\" , Proc. ICSE , 2009 , pp. 485 -- 495 . E. Juergens, F. Deissenboeck, B. Hummel, S. Wagner, \"Do Code Clones Matter?\", Proc. ICSE, 2009, pp. 485--495."},{"key":"e_1_3_2_1_20_1","volume-title":"Proc. Eclipse Technology Exchange at OOPSLA","author":"Jablonski P.","year":"2007","unstructured":"P. Jablonski , D. Hou , \"CReN : A tool for tracking copy-and-paste code clones and renaming identifiers consistently in the IDE \", Proc. Eclipse Technology Exchange at OOPSLA , 2007 . P. Jablonski, D. Hou, \"CReN: A tool for tracking copy-and-paste code clones and renaming identifiers consistently in the IDE\", Proc. Eclipse Technology Exchange at OOPSLA, 2007."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9076-6"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081737"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2007.7"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2008.14"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985404.1985410"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337260"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1808901.1808910"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2008.4658071"},{"key":"e_1_3_2_1_29_1","unstructured":"Wilcoxon Signed Rank Test. https:\/\/en.wikipedia.org\/wiki\/Wilcoxon_signed-rank_test  Wilcoxon Signed Rank Test. https:\/\/en.wikipedia.org\/wiki\/Wilcoxon_signed-rank_test"},{"key":"e_1_3_2_1_30_1","unstructured":"Wilcoxon Signed Rank Test online calculator. http:\/\/www.socscistatistics.com\/tests\/signedranks\/Default2.aspx  Wilcoxon Signed Rank Test online calculator. http:\/\/www.socscistatistics.com\/tests\/signedranks\/Default2.aspx"},{"key":"e_1_3_2_1_31_1","first-page":"161","volume-title":"Proc. USEMX 2001 Annual Technical Conference","author":"Miller R. C.","year":"2001","unstructured":"R. C. Miller , B. A. Myers . \"Interactive simultaneous editing of multiple text regions \", Proc. USEMX 2001 Annual Technical Conference , 2001 , pp. 161 -- 174 . R. C. Miller, B. A. Myers. \"Interactive simultaneous editing of multiple text regions\", Proc. USEMX 2001 Annual Technical Conference, 2001, pp. 161--174."},{"key":"e_1_3_2_1_32_1","first-page":"120","volume-title":"Proc. ICSM","author":"Mockus A.","year":"2000","unstructured":"A. Mockus , L. G. Votta , \" Identifying Reasons for Software Changes using Historic Databases\" , Proc. ICSM , 2000 , pp. 120 -- 130 . A. Mockus, L. G. Votta, \"Identifying Reasons for Software Changes using Historic Databases\", Proc. ICSM, 2000, pp. 120--130."},{"key":"e_1_3_2_1_33_1","volume-title":"Proc. SANER","author":"Mondal M.","year":"2015","unstructured":"M. Mondal , C. K. Roy , K. A. Schneider , \"SPCP-Miner : A Tool for Mining Code Clones that are Important for Refactoring or Tracking \", Proc. SANER , 2015 , 5pp. (to appear). M. Mondal, C. K. Roy, K. A. Schneider, \"SPCP-Miner: A Tool for Mining Code Clones that are Important for Refactoring or Tracking\", Proc. SANER, 2015, 5pp. (to appear)."},{"key":"e_1_3_2_1_34_1","first-page":"91","volume-title":"Proc. ICSME","author":"Mondal M.","year":"2015","unstructured":"M. Mondal , C. K. Roy , K. A. Schneider , \" A Comparative Study on the Bugproneness of Different Types of Code Clones \", Proc. ICSME , 2015 , pp. 91 -- 100 . M. Mondal, C. K. Roy, K. A. Schneider, \"A Comparative Study on the Bugproneness of Different Types of Code Clones\", Proc. ICSME, 2015, pp. 91--100."},{"key":"e_1_3_2_1_35_1","first-page":"114","volume-title":"Proc. CSMR-WCRE","author":"Mondal M.","year":"2014","unstructured":"M. Mondal , C. K. Roy , K. A. Schneider , \"Automatic Ranking of Clones for Refactoring through Mining Association Rules\" , Proc. CSMR-WCRE , 2014 , pp. 114 -- 123 . M. Mondal, C. K. Roy, K. A. Schneider, \"Automatic Ranking of Clones for Refactoring through Mining Association Rules\", Proc. CSMR-WCRE, 2014, pp. 114--123."},{"key":"e_1_3_2_1_36_1","first-page":"11","volume-title":"Proc. SCAM","author":"Mondal M.","year":"2014","unstructured":"M. Mondal , C. K. Roy , K. A. Schneider , \" Automatic Identification of Important Clones for Refactoring and Tracking\" , Proc. SCAM , 2014 , pp. 11 -- 20 . M. Mondal, C. K. Roy, K. A. Schneider, \"Automatic Identification of Important Clones for Refactoring and Tracking\", Proc. SCAM, 2014, pp. 11--20."},{"key":"e_1_3_2_1_37_1","first-page":"1227","volume-title":"Proc. SAC","author":"Mondal M.","year":"2012","unstructured":"M. Mondal , C. K. Roy , M. S. Rahman , R. K. Saha , J. Krinke , K. A. Schneider , \" Comparative Stability of Cloned and Non-cloned Code : An Empirical Study \", Proc. SAC , 2012 , pp. 1227 -- 1234 . M. Mondal, C. K. Roy, M. S. Rahman, R. K. Saha, J. Krinke, K. A. Schneider, \"Comparative Stability of Cloned and Non-cloned Code: An Empirical Study\", Proc. SAC, 2012, pp. 1227--1234."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2387358.2387360"},{"key":"e_1_3_2_1_39_1","first-page":"50","volume-title":"Evolution and Reengineering (SANER)","author":"Mondal M.","year":"2018","unstructured":"M. Mondal , C. K. Roy and K A. Schneider , \" Micro-clones in evolving software,\" 2018 IEEE 25th International Conference on Software Analysis , Evolution and Reengineering (SANER) , Campobasso , 2018 , pp. 50 -- 60 . M. Mondal, C. K. Roy and K A. Schneider, \"Micro-clones in evolving software,\" 2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER), Campobasso, 2018, pp. 50--60."},{"key":"e_1_3_2_1_40_1","first-page":"227","volume-title":"Proc. ICSME","author":"Mondal M.","year":"2017","unstructured":"M. Mondal , C. K. Roy , K. A. Schneider , \" Bug Propagation through Code Cloning : An Empirical Study \", Proc. ICSME , 2017 , pp. 227 -- 237 . M. Mondal, C. K. Roy, K. A. Schneider, \"Bug Propagation through Code Cloning: An Empirical Study\", Proc. ICSME, 2017, pp. 227--237."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889168"},{"key":"e_1_3_2_1_42_1","unstructured":"Online SVN repository: http:\/\/sourceforge.net\/  Online SVN repository: http:\/\/sourceforge.net\/"},{"key":"e_1_3_2_1_43_1","first-page":"1","volume-title":"Technical Report No. 2007--541","author":"Roy C. K.","year":"2007","unstructured":"C. K. Roy , J. R. Cordy , \" A Survey on Software Clone Detection Research\" , Technical Report No. 2007--541 , 2007 , School of Computing Queen's University , pp. 1 -- 115 . C. K. Roy, J. R. Cordy, \"A Survey on Software Clone Detection Research\", Technical Report No. 2007--541, 2007, School of Computing Queen's University, pp. 1--115."},{"key":"e_1_3_2_1_44_1","first-page":"18","volume-title":"Proc. CSMR-WCRE","author":"Roy C. K.","year":"2014","unstructured":"C. K. Roy , M. F. Zibran , R. Koschke , \" The Vision of Software Clone Management : Past, Present, and Future (Keynote paper) \", Proc. CSMR-WCRE , 2014 , pp. 18 -- 33 . C. K. Roy, M. F. Zibran, R. Koschke, \"The Vision of Software Clone Management: Past, Present, and Future (Keynote paper)\", Proc. CSMR-WCRE, 2014, pp. 18--33."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2009.5306301"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2008.41"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2009.02.007"},{"key":"e_1_3_2_1_48_1","first-page":"157","volume-title":"Proc. Mutation","author":"Roy C. K.","year":"2009","unstructured":"C. K. Roy , J. R. Cordy , \" A Mutation \/ Injection-based Automatic Framework for Evaluating Code Clone Detection Tools\" , Proc. Mutation , 2009 , pp. 157 -- 166 . C. K. Roy, J. R. Cordy, \"A Mutation \/ Injection-based Automatic Framework for Evaluating Code Clone Detection Tools\", Proc. Mutation, 2009, pp. 157--166."},{"key":"e_1_3_2_1_49_1","first-page":"87","volume-title":"Proc. SCAM","author":"Saha R. K.","year":"2010","unstructured":"R. K. Saha , M. Asaduzzaman , M. F. Zibran , C. K. Roy , K. A. Schneider , \" Evaluating Code Clone Genealogies at Release Level : An Empirical Study \", Proc. SCAM , 2010 , pp. 87 -- 96 . R. K. Saha, M. Asaduzzaman, M. F. Zibran, C. K. Roy, K. A. Schneider, \"Evaluating Code Clone Genealogies at Release Level: An Empirical Study\", Proc. SCAM, 2010, pp. 87--96."},{"key":"e_1_3_2_1_50_1","first-page":"293","volume-title":"An automatic framework for extracting and classifying near-miss clone genealogies,\" 2011 27th IEEE International Conference on Software Maintenance (ICSM)","author":"Saha R. K.","year":"2011","unstructured":"R. K. Saha , C. K. Roy and K. A. Schneider , \" An automatic framework for extracting and classifying near-miss clone genealogies,\" 2011 27th IEEE International Conference on Software Maintenance (ICSM) , Williamsburg, VI , 2011 , pp. 293 -- 302 . R. K. Saha, C. K. Roy and K. A. Schneider, \"An automatic framework for extracting and classifying near-miss clone genealogies,\" 2011 27th IEEE International Conference on Software Maintenance (ICSM), Williamsburg, VI, 2011, pp. 293--302."},{"issue":"4","key":"e_1_3_2_1_51_1","first-page":"1","article-title":"A method of establishing groups of equal amplitude in plant sociology based on similarity of species and its application to analyses of the vegetation on Danish commons","volume":"5","author":"S\u00f8rensen T.","year":"1948","unstructured":"T. S\u00f8rensen , \" A method of establishing groups of equal amplitude in plant sociology based on similarity of species and its application to analyses of the vegetation on Danish commons \", Kongelige Danske Videnskabernes Selskab , 1948 , 5 ( 4 ): 1 -- 34 . T. S\u00f8rensen, \"A method of establishing groups of equal amplitude in plant sociology based on similarity of species and its application to analyses of the vegetation on Danish commons\", Kongelige Danske Videnskabernes Selskab, 1948, 5(4): 1--34.","journal-title":"Kongelige Danske Videnskabernes Selskab"},{"key":"e_1_3_2_1_52_1","unstructured":"S0renson-Dice coefficient: https:\/\/en.wikipedia.org\/wiki\/S%C3%B8rensen%E2%80%93Dice_coefficient  S0renson-Dice coefficient: https:\/\/en.wikipedia.org\/wiki\/S%C3%B8rensen%E2%80%93Dice_coefficient"},{"key":"e_1_3_2_1_53_1","first-page":"76","volume-title":"Proc. IWSC","author":"Steidl D.","year":"2013","unstructured":"D. Steidl , N. G\u00f6de , \" Feature-Based Detection of Bugs in Clones\" , Proc. IWSC , 2013 , pp. 76 -- 82 . D. Steidl, N. G\u00f6de, \"Feature-Based Detection of Bugs in Clones\", Proc. IWSC, 2013, pp. 76--82."},{"key":"e_1_3_2_1_54_1","unstructured":"Strike A Match: http:\/\/www.catalysoft.com\/articles\/strikeamatch.html  Strike A Match: http:\/\/www.catalysoft.com\/articles\/strikeamatch.html"},{"key":"e_1_3_2_1_55_1","first-page":"321","volume-title":"Proc. ICSME","author":"Svajlenko J.","year":"2014","unstructured":"J. Svajlenko , C. K. Roy , \" Evaluating Modern Clone Detection Tools\" , Proc. ICSME , 2014 , pp. 321 -- 330 . J. Svajlenko, C. K. Roy, \"Evaluating Modern Clone Detection Tools\", Proc. ICSME, 2014, pp. 321--330."},{"key":"e_1_3_2_1_56_1","unstructured":"Simian-similarity analyser. http:\/\/www.redhillconsulting.com.au\/products\/simian\/  Simian-similarity analyser. http:\/\/www.redhillconsulting.com.au\/products\/simian\/"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-009-9108-x"},{"key":"e_1_3_2_1_58_1","first-page":"173","volume-title":"Proc. IEEE Symposium on Visual Languages and Human Centric Computing","author":"Toomim M.","year":"2004","unstructured":"M. Toomim , A. Begel , S. L. Graham . \"Managing duplicated code with linked editing \", Proc. IEEE Symposium on Visual Languages and Human Centric Computing , 2004 , pp. 173 -- 180 . M. Toomim, A. Begel, S. L. Graham. \"Managing duplicated code with linked editing\", Proc. IEEE Symposium on Visual Languages and Human Centric Computing, 2004, pp. 173--180."},{"key":"e_1_3_2_1_59_1","first-page":"455","volume-title":"Proc. ESEC\/SIGSOFT FSE","author":"Wang T.","year":"2013","unstructured":"T. Wang , M. Harman , Y. Jia , J. Krinke , \" Searching for Better Configurations : A Rigorous Approach to Clone Evaluation \", Proc. ESEC\/SIGSOFT FSE , 2013 , pp. 455 -- 465 . T. Wang, M. Harman, Y. Jia, J. Krinke, \"Searching for Better Configurations: A Rigorous Approach to Clone Evaluation\", Proc. ESEC\/SIGSOFT FSE, 2013, pp. 455--465."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.5555\/2487085.2487118"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2012.0058"},{"key":"e_1_3_2_1_62_1","first-page":"1123","volume-title":"Conventional Wisdom in Clone Removal: A Genealogy-based Empirical Study\", SAC","author":"Zibran M. F.","year":"2013","unstructured":"M. F. Zibran , R. K. Saha , C. K. Roy , K. A. Schneider\"Evaluating the Conventional Wisdom in Clone Removal: A Genealogy-based Empirical Study\", SAC , 2013 , pp. 1123 -- 1130 . M. F. Zibran, R. K. Saha, C. K. Roy, K. A. Schneider\"Evaluating the Conventional Wisdom in Clone Removal: A Genealogy-based Empirical Study\", SAC, 2013, pp. 1123--1130."}],"event":{"name":"ICPC '20: 28th International Conference on Program Comprehension","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Seoul Republic of Korea","acronym":"ICPC '20"},"container-title":["Proceedings of the 28th International Conference on Program Comprehension"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387904.3389262","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3387904.3389262","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:37Z","timestamp":1750200097000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387904.3389262"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,13]]},"references-count":62,"alternative-id":["10.1145\/3387904.3389262","10.1145\/3387904"],"URL":"https:\/\/doi.org\/10.1145\/3387904.3389262","relation":{},"subject":[],"published":{"date-parts":[[2020,7,13]]},"assertion":[{"value":"2020-09-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}