{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:09:23Z","timestamp":1750219763332,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T00:00:00Z","timestamp":1701302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["No. 226-2022-0006"],"award-info":[{"award-number":["No. 226-2022-0006"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Natural Science Foundation of China","award":["No. 62141222 and No. 62202419"],"award-info":[{"award-number":["No. 62141222 and No. 62202419"]}]},{"name":"Ningbo Natural Science Foundation","award":["No. 2022J184"],"award-info":[{"award-number":["No. 2022J184"]}]},{"name":"ARC Laureate Fellowship","award":["FL190100035"],"award-info":[{"award-number":["FL190100035"]}]},{"DOI":"10.13039\/501100001381","name":"National Research Foundation Singapore","doi-asserted-by":"publisher","award":[""],"award-info":[{"award-number":[""]}],"id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3611643.3613883","type":"proceedings-article","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T23:14:38Z","timestamp":1701386078000},"page":"1832-1843","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["C\u00b3: Code Clone-Based Identification of Duplicated Components"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6248-6734","authenticated-orcid":false,"given":"Yanming","family":"Yang","sequence":"first","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5335-0261","authenticated-orcid":false,"given":"Ying","family":"Zou","sequence":"additional","affiliation":[{"name":"Queen's University, Kingston, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0093-3292","authenticated-orcid":false,"given":"Xing","family":"Hu","sequence":"additional","affiliation":[{"name":"Zhejiang University, Ningbo, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4367-7201","authenticated-orcid":false,"given":"David","family":"Lo","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2906-0598","authenticated-orcid":false,"given":"Chao","family":"Ni","sequence":"additional","affiliation":[{"name":"Zhejiang University, Ningbo, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4928-7076","authenticated-orcid":false,"given":"John","family":"Grundy","sequence":"additional","affiliation":[{"name":"Monash University, Victoria, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6302-3256","authenticated-orcid":false,"given":"Xin","family":"Xia","sequence":"additional","affiliation":[{"name":"Huawei, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2023,11,30]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2023. https:\/\/github.com\/alienjun\/AJWaveRefresh\/blob\/master\/AJWaveRefresh\/AJWaveRefreshHeader.m"},{"key":"e_1_3_2_2_2_1","unstructured":"2023. https:\/\/github.com\/GentleForYou\/ShoppingDetailsDemo\/blob\/ae415c1456e35c297772be8b92980e5f67242aad\/ShoppingDetailsDemo\/MJDIYAutoFooter.m"},{"key":"e_1_3_2_2_3_1","unstructured":"2023. https:\/\/github.com\/torvalds\/linux\/tree\/master\/arch\/arm\/include\/asm\/vdso"},{"key":"e_1_3_2_2_4_1","unstructured":"2023. https:\/\/cmake.org"},{"key":"e_1_3_2_2_5_1","unstructured":"2023. https:\/\/en.wikipedia.org\/wiki\/Louvain_method"},{"key":"e_1_3_2_2_6_1","unstructured":"2023. https:\/\/en.wikipedia.org\/wiki\/Girvan%E2%80%93Newman_algorithm"},{"key":"e_1_3_2_2_7_1","unstructured":"2023. https:\/\/networkx.org\/documentation\/stable\/reference\/algorithms\/generated\/networkx.algorithms.community.modularity_max.greedy_modularity_communities.html"},{"key":"e_1_3_2_2_8_1","unstructured":"2023. Component-based software engineering. https:\/\/en.wikipedia.org\/wiki\/Component-based_software_engineering"},{"key":"e_1_3_2_2_9_1","unstructured":"2023. Example vdso in Linux. https:\/\/github.com\/torvalds\/linux\/tree\/master\/arch\/arm64\/include\/asm\/vdso"},{"key":"e_1_3_2_2_10_1","unstructured":"2023. Example vdso in Linux. https:\/\/github.com\/torvalds\/linux\/tree\/master\/arch\/arm\/include\/asm\/vdso"},{"key":"e_1_3_2_2_11_1","unstructured":"2023. Reinventing the wheel. https:\/\/en.wikipedia.org\/wiki\/Reinventing_the_wheel"},{"key":"e_1_3_2_2_12_1","unstructured":"2023. what-counts-as-reinventing-the-wheel. https:\/\/softwareengineering.stackexchange.com\/questions\/55378\/what-counts-as-reinventing-the-wheel"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2918202"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1002\/SPE.2759"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWSC.2012.6227873"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387904.3389271"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1995.514697"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1295014.1295029"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738528"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1002\/SYS.20129"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2011.26"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1999.792593"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397362"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.18653\/V1"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.physrep.2009.11.002"},{"key":"e_1_3_2_2_28_1","volume-title":"GraphCodeBERT: Pre-training Code Representations with Data Flow. In 9th International Conference on Learning Representations, ICLR 2021","author":"Guo Daya","year":"2021","unstructured":"Daya Guo, Shuo Ren, Shuai Lu, Zhangyin Feng, Duyu Tang, Shujie Liu, Long Zhou, Nan Duan, Alexey Svyatkovskiy, Shengyu Fu, Michele Tufano, Shao Kun Deng, Colin B. Clement, Dawn Drain, Neel Sundaresan, Jian Yin, Daxin Jiang, and Ming Zhou. 2021. GraphCodeBERT: Pre-training Code Representations with Data Flow. In 9th International Conference on Learning Representations, ICLR 2021, Virtual Event, Austria, May 3-7, 2021. OpenReview.net. https:\/\/openreview.net\/forum?id=jLoC4ez43PZ"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-4600-1_3"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3556927"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.30"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1994.336783"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47764-0_3"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2001.957835"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1094855.1094903"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786871"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2001.989796"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380407"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3312662.3312707"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00099"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196398.3196438"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/S10664-017-9535-Z"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00078"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/J.JSS.2020.110657"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2008.54"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2008.41"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/J.SCICO.2009.02.007"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1137983.1138000"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.05.080"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236026"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884877"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","unstructured":"Abdullah Sheneamer and Jugal Kalita. 2015. Code clone detection using coarse and fine-grained hybrid approaches. In 2015 IEEE seventh international conference on intelligent computing and information systems (ICICIS). 472\u2013480. https:\/\/doi.org\/10.1109\/IntelCIS.2015.7397263 10.1109\/IntelCIS.2015.7397263","DOI":"10.1109\/IntelCIS.2015.7397263"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2016908896"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.07.509"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2016.7503720"},{"key":"e_1_3_2_2_57_1","volume-title":"Roy","author":"Svajlenko Jeffrey","year":"2020","unstructured":"Jeffrey Svajlenko and Chanchal K. Roy. 2020. A Survey on the Evaluation of Clone Detection Performance and Benchmarking. CoRR, abs\/2006.15682 (2020), arXiv:2006.15682. arxiv:2006.15682"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970326"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416562"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503509"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3505243"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2019.00021"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00086"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","unstructured":"Liang-Jie Zhang and Jia Zhang. 2010. SOA reference architecture. In Web Services Research for Emerging Applications: Discoveries and Trends. IGI Global 1\u201315. https:\/\/doi.org\/10.4018\/978-1-61520-684-1.ch001 10.4018\/978-1-61520-684-1.ch001","DOI":"10.4018\/978-1-61520-684-1.ch001"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3016006"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236068"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416541"}],"event":{"name":"ESEC\/FSE '23: 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"San Francisco CA USA","acronym":"ESEC\/FSE '23"},"container-title":["Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3613883","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3611643.3613883","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:10Z","timestamp":1750178230000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3613883"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,30]]},"references-count":67,"alternative-id":["10.1145\/3611643.3613883","10.1145\/3611643"],"URL":"https:\/\/doi.org\/10.1145\/3611643.3613883","relation":{},"subject":[],"published":{"date-parts":[[2023,11,30]]},"assertion":[{"value":"2023-11-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}