{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:00:46Z","timestamp":1750309246598,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,15]],"date-time":"2024-04-15T00:00:00Z","timestamp":1713139200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["1633437","1901102","1925615","22120429"],"award-info":[{"award-number":["1633437","1901102","1925615","22120429"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,15]]},"DOI":"10.1145\/3643991.3644868","type":"proceedings-article","created":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T13:05:13Z","timestamp":1719925513000},"page":"42-47","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Dataset: Copy-based Reuse in Open Source Software"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4408-1183","authenticated-orcid":false,"given":"Mahmoud","family":"Jahanshahi","sequence":"first","affiliation":[{"name":"The University of Tennessee, Knoxville, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7987-7598","authenticated-orcid":false,"given":"Audris","family":"Mockus","sequence":"additional","affiliation":[{"name":"The University of Tennessee, Knoxville, United States of America"},{"name":"Vilnius University, Vilnius, Lithuania"}]}],"member":"320","published-online":{"date-parts":[[2024,7,2]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Muhammad Waseem Anwar, Farooque Azam, and Bilal Maqbool.","author":"Ain Qurat Ul","year":"2019","unstructured":"Qurat Ul Ain, Wasi Haider Butt, Muhammad Waseem Anwar, Farooque Azam, and Bilal Maqbool. 2019. A systematic review on code clone detection. IEEE access 7 (2019), 86121--86144."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2017.7884629"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3329781.3344149"},{"key":"e_1_3_2_1_4_1","volume-title":"2010 ACM\/IEEE 32nd International Conference on Software Engineering","volume":"1","author":"Penta Massimiliano Di","year":"2010","unstructured":"Massimiliano Di Penta, Daniel M German, Yann-Ga\u00ebl Gu\u00e9h\u00e9neuc, and Giuliano Antoniol. 2010. An exploratory study of the evolution of software licensing. In 2010 ACM\/IEEE 32nd International Conference on Software Engineering, Vol. 1. IEEE, 145--154."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2019.8667977"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.31"},{"key":"e_1_3_2_1_7_1","volume-title":"Escaping the Time Pit: Pitfalls and Guidelines for Using Time-Based Git Data. In 2021 IEEE\/ACM 18th International Conference on Mining Software Repositories (MSR).","author":"Flint Samuel W.","year":"2021","unstructured":"Samuel W. Flint, Jigyasa Chauhan, and Robert Dyer. 2021. Escaping the Time Pit: Pitfalls and Guidelines for Using Time-Based Git Data. In 2021 IEEE\/ACM 18th International Conference on Mining Software Repositories (MSR)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(00)00121-7"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3379597.3387500"},{"key":"e_1_3_2_1_10_1","volume-title":"2009 6th IEEE International Working Conference on Mining Software Repositories. IEEE, 81--90","author":"German Daniel M","year":"2009","unstructured":"Daniel M German, Massimiliano Di Penta, Yann-Gael Gueheneuc, and Giuliano Antoniol. 2009. Code siblings: Technical and legal implications of copying code between applications. In 2009 6th IEEE International Working Conference on Mining Software Repositories. IEEE, 81--90."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070520"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.15"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-018-9648-z"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2014.10.008"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110653"},{"key":"e_1_3_2_1_16_1","volume-title":"Georg Von Krogh, and Sebastian Spaeth","author":"Haefliger Stefan","year":"2008","unstructured":"Stefan Haefliger, Georg Von Krogh, and Sebastian Spaeth. 2008. Code reuse in open source software. Management science 54, 1 (2008), 180--193."},{"key":"e_1_3_2_1_17_1","volume-title":"International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, 62--81","author":"Hanna Steve","year":"2012","unstructured":"Steve Hanna, Ling Huang, Edward Wu, Saung Li, Charles Chen, and Dawn Song. 2012. Juxtapp: A scalable system for detecting code reuse among android applications. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, 62--81."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion52605.2021.00084"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00076"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21347-2_16"},{"key":"e_1_3_2_1_21_1","volume-title":"OSS 2021, Virtual Event, May 12--13, 2021, Proceedings 17","author":"Inoue Katsuro","year":"2021","unstructured":"Katsuro Inoue, Yuya Miyamoto, Daniel M German, and Takashi Ishio. 2021. Finding code-clone snippets in large source-code collection by CCgrep. In Open Source Systems: 17th IFIP WG 2.13 International Conference, OSS 2021, Virtual Event, May 12--13, 2021, Proceedings 17. Springer, 28--41."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2013.6624047"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.30"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070547"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2014.17"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/130844.130856"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.28"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133908"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR52588.2021.00086"},{"key":"e_1_3_2_1_30_1","volume-title":"2018 IEEE\/ACM 40th International Conference on Software Engineering: Companion (ICSE-Companion). IEEE, 458--459","author":"Ma Yuxing","year":"2018","unstructured":"Yuxing Ma. 2018. Constructing supply chains in open source software. In 2018 IEEE\/ACM 40th International Conference on Software Engineering: Companion (ICSE-Companion). IEEE, 458--459."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00031"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-020-09905-9"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/FLOSS.2007.10"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3379597.3387499"},{"key":"e_1_3_2_1_35_1","unstructured":"Landon Curt Noll. 2012. Fowler\/noll\/vo (fnv) hash. Accessed Jan (2012)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2010.5463346"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.29.296"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510216"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1060.0554"},{"key":"e_1_3_2_1_40_1","volume-title":"Comparison and evaluation of code clone detection techniques and tools: A qualitative approach. Science of computer programming 74, 7","author":"Roy Chanchal K","year":"2009","unstructured":"Chanchal K Roy, James R Cordy, and Rainer Koschke. 2009. Comparison and evaluation of code clone detection techniques and tools: A qualitative approach. Science of computer programming 74, 7 (2009), 470--495."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.1998.693351"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00248"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWSC.2013.6613037"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970326"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-7051(02)00031-X"}],"event":{"name":"MSR '24: 21st International Conference on Mining Software Repositories","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Lisbon Portugal","acronym":"MSR '24"},"container-title":["Proceedings of the 21st International Conference on Mining Software Repositories"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3643991.3644868","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3643991.3644868","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3643991.3644868","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:56:44Z","timestamp":1750291004000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3643991.3644868"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,15]]},"references-count":45,"alternative-id":["10.1145\/3643991.3644868","10.1145\/3643991"],"URL":"https:\/\/doi.org\/10.1145\/3643991.3644868","relation":{},"subject":[],"published":{"date-parts":[[2024,4,15]]},"assertion":[{"value":"2024-07-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}