{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T23:03:07Z","timestamp":1778194987155,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3540250.3549112","type":"proceedings-article","created":{"date-parts":[[2022,11,9]],"date-time":"2022-11-09T20:46:22Z","timestamp":1668026782000},"page":"646-658","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["PaReco: patched clones and missed patches among the divergent variants of a software family"],"prefix":"10.1145","author":[{"given":"Poedjadevie Kadjel","family":"Ramkisoen","sequence":"first","affiliation":[{"name":"University of Antwerp, Belgium \/ Flanders Make, Belgium"}]},{"given":"John","family":"Businge","sequence":"additional","affiliation":[{"name":"University of Antwerp, Belgium \/ Flanders Make, Belgium \/ University of Nevada at Las Vegas, USA"}]},{"given":"Brent","family":"van Bladel","sequence":"additional","affiliation":[{"name":"University of Antwerp, Belgium \/ Flanders Make, Belgium"}]},{"given":"Alexandre","family":"Decan","sequence":"additional","affiliation":[{"name":"University of Mons, Belgium \/ F.R.S.-FNRS, Belgium"}]},{"given":"Serge","family":"Demeyer","sequence":"additional","affiliation":[{"name":"University of Antwerp, Belgium \/ Flanders Make, Belgium"}]},{"given":"Coen","family":"De Roover","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Brussel, Belgium"}]},{"given":"Foutse","family":"Khomh","sequence":"additional","affiliation":[{"name":"Polytechnique Montr\u00e9al, Canada"}]}],"member":"320","published-online":{"date-parts":[[2022,11,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"\"\". 2022. \"Sample Size Calculator\". https:\/\/www.calculator.net\/sample-sizecalculator.html.  \t\t\t\t  \"\". 2022. \"Sample Size Calculator\". https:\/\/www.calculator.net\/sample-sizecalculator.html."},{"key":"e_1_3_2_1_2_1","unstructured":"annonymous. 2022. \"Online Appendix\". https:\/\/figshare.com\/s\/ 4952174de6c21fa9874f.  \t\t\t\t  annonymous. 2022. \"Online Appendix\". https:\/\/figshare.com\/s\/ 4952174de6c21fa9874f."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882308"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468531"},{"key":"e_1_3_2_1_5_1","unstructured":"Bluebrain. 2022. Blue Brain Project. https:\/\/portal.bluebrain.epfl.ch.  \t\t\t\t  Bluebrain. 2022. Blue Brain Project. https:\/\/portal.bluebrain.epfl.ch."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14808-8_2"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP48549.2020.00012"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER53432.2022.00105"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3127005.3127009"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2019.8668018"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2019.8667998"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2018.00072"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-021-10078-2"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2013.14"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2012.10"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-013-9221-3"},{"key":"e_1_3_2_1_17_1","volume-title":"Version Control with Subversion","author":"Michael Pilato Brian W.","unstructured":"Brian W. Fitzpatrick C. Michael Pilato , Ben Collins-Sussman . 2008. Version Control with Subversion . Addison-Wesley . 864 pages. Brian W. Fitzpatrick C. Michael Pilato, Ben Collins-Sussman. 2008. Version Control with Subversion. Addison-Wesley. 864 pages."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-018-9665-y"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Scott Chacon and Ben Straub. 2014. \"Git Tools-Rewriting History\". https:\/\/gitscm.com\/book\/en\/v2\/Git-Tools-Rewriting-History.  \t\t\t\t  Scott Chacon and Ben Straub. 2014. \"Git Tools-Rewriting History\". https:\/\/gitscm.com\/book\/en\/v2\/Git-Tools-Rewriting-History.","DOI":"10.1007\/978-1-4842-0076-6_7"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9589-y"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3112204"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2013.13"},{"key":"e_1_3_2_1_23_1","unstructured":"The Python Software Foundation. 2022. diflib-Helpers for computing deltas. https:\/\/docs.python.org\/3\/library\/diflib.html.  \t\t\t\t  The Python Software Foundation. 2022. diflib-Helpers for computing deltas. https:\/\/docs.python.org\/3\/library\/diflib.html."},{"key":"e_1_3_2_1_24_1","unstructured":"GitHub. 2021. \"Online Appendix\". http:\/\/www.gnu.org\/software\/difutils\/manual\/html_node\/Hunks.html.  \t\t\t\t  GitHub. 2021. \"Online Appendix\". http:\/\/www.gnu.org\/software\/difutils\/manual\/html_node\/Hunks.html."},{"key":"e_1_3_2_1_25_1","volume-title":"Open Source Systems: Towards Robust Practices","author":"Gonzalez-Barahona Jesus M.","unstructured":"Jesus M. Gonzalez-Barahona , Paul Sherwood , Gregorio Robles , and Daniel Izquierdo . 2017. Technical Lag in Software Compilations: Measuring How Outdated a Software Deployment Is . In Open Source Systems: Towards Robust Practices , Federico Balaguer, Roberto Di Cosmo, Alejandra Garrido, Fabio Kon, Gregorio Robles, and Stefano Zacchiroli (Eds.). Springer International Publishing , 182-192. Jesus M. Gonzalez-Barahona, Paul Sherwood, Gregorio Robles, and Daniel Izquierdo. 2017. Technical Lag in Software Compilations: Measuring How Outdated a Software Deployment Is. In Open Source Systems: Towards Robust Practices, Federico Balaguer, Roberto Di Cosmo, Alejandra Garrido, Fabio Kon, Gregorio Robles, and Stefano Zacchiroli (Eds.). Springer International Publishing, 182-192."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00076"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3336294.3336304"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.13"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2791060.2791107"},{"key":"e_1_3_2_1_30_1","unstructured":"KadjelRamkisoen. 2022. PaReco. https:\/\/github.com\/KadjelRamkisoen\/PaReco. ( 2022 ).  \t\t\t\t  KadjelRamkisoen. 2022. PaReco. https:\/\/github.com\/KadjelRamkisoen\/PaReco. ( 2022 )."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2014.17"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2016.7503716"},{"key":"e_1_3_2_1_34_1","volume-title":"Bridging the Gap Between Clone-and-Own and Software Product Lines. In 2021 IEEE\/ACM 43rd International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER). 21-25","author":"Kehrer Timo","year":"2021","unstructured":"Timo Kehrer , Thomas Th\u00fcm , Alexander Schulthei\u00df , and Paul Maximilian Bittner . 2021 . Bridging the Gap Between Clone-and-Own and Software Product Lines. In 2021 IEEE\/ACM 43rd International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER). 21-25 . https:\/\/doi.org\/10.1109\/ICSENIER52604. 2021.00013 10.1109\/ICSENIER52604 Timo Kehrer, Thomas Th\u00fcm, Alexander Schulthei\u00df, and Paul Maximilian Bittner. 2021. Bridging the Gap Between Clone-and-Own and Software Product Lines. In 2021 IEEE\/ACM 43rd International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER). 21-25. https:\/\/doi.org\/10.1109\/ICSENIER52604. 2021.00013"},{"key":"e_1_3_2_1_35_1","volume-title":"VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery. In 2017 IEEE Symposium on Security and Privacy, SP 2017-Proceedings","author":"Kim Seulbae","year":"2017","unstructured":"Seulbae Kim , Seunghoon Woo , Heejo Lee , and Hakjoo Oh . 2017 . VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery. In 2017 IEEE Symposium on Security and Privacy, SP 2017-Proceedings . Institute of Electrical and Electronics Engineers Inc. , 595-614. https:\/\/doi.org\/10.1109\/SP. 2017. 62 2017 IEEE Symposium on Security and Privacy, SP 2017 ; Conference date: 22-05-2017 Through 24-05-2017. 10.1109\/SP Seulbae Kim, Seunghoon Woo, Heejo Lee, and Hakjoo Oh. 2017. VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery. In 2017 IEEE Symposium on Security and Privacy, SP 2017-Proceedings. Institute of Electrical and Electronics Engineers Inc., 595-614. https:\/\/doi.org\/10.1109\/SP. 2017. 62 2017 IEEE Symposium on Security and Privacy, SP 2017 ; Conference date: 22-05-2017 Through 24-05-2017."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409684"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934466.2934485"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.28"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3233027.3236396"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00147"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3382026.3431252"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3312662.3312707"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2000.883028"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934466.2962726"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3126905"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3087419"},{"key":"e_1_3_2_1_47_1","volume-title":"Blockchain-Oriented Software Variant Forks: A Preliminary Study. In 5th International Workshop on Blockchain Oriented Software Engineering. https:\/\/doi.org\/10","author":"Rocha Henrique","year":"2022","unstructured":"Henrique Rocha and John Businge . 2022 . Blockchain-Oriented Software Variant Forks: A Preliminary Study. In 5th International Workshop on Blockchain Oriented Software Engineering. https:\/\/doi.org\/10 .48550\/ARXIV.2204.11083 10.48550\/ARXIV.2204.11083 Henrique Rocha and John Businge. 2022. Blockchain-Oriented Software Variant Forks: A Preliminary Study. In 5th International Workshop on Blockchain Oriented Software Engineering. https:\/\/doi.org\/10.48550\/ARXIV.2204.11083"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884877"},{"key":"e_1_3_2_1_49_1","unstructured":"Spack. 2021. \"Online Appendix\". https:\/\/spack.io.  \t\t\t\t  Spack. 2021. \"Online Appendix\". https:\/\/spack.io."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2016.88"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3240732"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338962"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1138474.1138485"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3065872"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380412"}],"event":{"name":"ESEC\/FSE '22: 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Singapore Singapore","acronym":"ESEC\/FSE '22","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","NUS NUS"]},"container-title":["Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3540250.3549112","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3540250.3549112","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:02Z","timestamp":1750182662000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3540250.3549112"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":55,"alternative-id":["10.1145\/3540250.3549112","10.1145\/3540250"],"URL":"https:\/\/doi.org\/10.1145\/3540250.3549112","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}