{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T21:38:34Z","timestamp":1757540314548,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,27]],"date-time":"2024-10-27T00:00:00Z","timestamp":1729987200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,27]]},"DOI":"10.1145\/3691621.3694957","type":"proceedings-article","created":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T12:18:59Z","timestamp":1729599539000},"page":"239-244","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A Study of Code Clone on Open Source VR Software"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-4010-1920","authenticated-orcid":false,"given":"Wenjie","family":"Huang","sequence":"first","affiliation":[{"name":"Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7410-9146","authenticated-orcid":false,"given":"Jinfu","family":"Chen","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2997-4960","authenticated-orcid":false,"given":"Huashan","family":"Chen","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-1195-3771","authenticated-orcid":false,"given":"Zhenyu","family":"Qi","sequence":"additional","affiliation":[{"name":"University of Arizona, Tucson, Arizona, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-9347-6435","authenticated-orcid":false,"given":"Xiaojia","family":"Yang","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4866-786X","authenticated-orcid":false,"given":"Kebin","family":"Peng","sequence":"additional","affiliation":[{"name":"East Carolina University, Greenville, North Carolina, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5204-8976","authenticated-orcid":false,"given":"Sen","family":"He","sequence":"additional","affiliation":[{"name":"University of Arizona, Tucson, Arizona, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1","volume-title":"Markus Wiedemann, and Dieter Kranzlm\u00fcller. State of the art of virtual reality technology. In 2016 IEEE aerospace conference","author":"Anthes Christoph","year":"2016","unstructured":"Christoph Anthes, Rub\u00e9n Jes\u00fas Garc\u00eda-Hern\u00e1ndez, Markus Wiedemann, and Dieter Kranzlm\u00fcller. State of the art of virtual reality technology. In 2016 IEEE aerospace conference, pages 1--19. IEEE, 2016."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10055-016-0293-9"},{"key":"e_1_3_2_1_3_1","unstructured":"Mordor intelligence report on virtual reality market. https:\/\/www.mordorintelligence.com\/industry-reports\/virtual-reality-market. (Accessed on 08\/09\/2024)."},{"key":"e_1_3_2_1_4_1","volume-title":"The ultimate list","author":"Virtual","year":"2024","unstructured":"Virtual reality statistics: The ultimate list in 2024. https:\/\/academyofanimatedart.com\/virtual-reality-statistics\/. (Accessed on 08\/10\/2024)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639082"},{"key":"e_1_3_2_1_6_1","volume-title":"Security and privacy in virtual reality-a literature survey. arXiv preprint arXiv:2205.00208","author":"Giaretta Alberto","year":"2022","unstructured":"Alberto Giaretta. Security and privacy in virtual reality-a literature survey. arXiv preprint arXiv:2205.00208, 2022."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISESE.2005.1541846"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070547"},{"key":"e_1_3_2_1_9_1","first-page":"843","volume-title":"Proceedings of the 30th international conference on Software engineering","author":"Duala-Ekoko Ekwa","year":"2008","unstructured":"Ekwa Duala-Ekoko and Martin P Robillard. Clonetracker: tool support for code clone management. In Proceedings of the 30th international conference on Software engineering, pages 843--846, 2008."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICICCS48265.2020.9120965"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWSC60764.2023.00009"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2017.9"},{"key":"e_1_3_2_1_13_1","first-page":"152","volume-title":"2016 Management and Innovation Technology International Conference (MITicon)","author":"Solanki Kamna","unstructured":"Kamna Solanki and Sunayna Kumari. Comparative study of software clone detection techniques. In 2016 Management and Innovation Technology International Conference (MITicon), pages MIT-152. IEEE, 2016."},{"key":"e_1_3_2_1_14_1","volume-title":"Ccfinder: A multilinguistic token-based code clone detection system for large scale source code","author":"Kamiya Toshihiro","year":"2002","unstructured":"Toshihiro Kamiya, Shinji Kusumoto, and Katsuro Inoue. Ccfinder: A multilinguistic token-based code clone detection system for large scale source code. IEEE transactions on software engineering, 28(7):654--670, 2002."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970326"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2011.26"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE49046.2020.00019"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598134"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00052"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2017.65"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9512-6"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2018.00048"},{"key":"e_1_3_2_1_23_1","unstructured":"Nicad clone detector. http:\/\/www.txl.ca\/txl-nicaddownload.html. (Accessed on 08\/10\/2024)."}],"event":{"name":"ASEW '24: 39th IEEE\/ACM International Conference on Automated Software Engineering Workshops","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Sacramento CA USA","acronym":"ASEW '24"},"container-title":["Proceedings of the 39th IEEE\/ACM International Conference on Automated Software Engineering Workshops"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3691621.3694957","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:09:40Z","timestamp":1750295380000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3691621.3694957"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,27]]},"references-count":23,"alternative-id":["10.1145\/3691621.3694957","10.1145\/3691621"],"URL":"https:\/\/doi.org\/10.1145\/3691621.3694957","relation":{},"subject":[],"published":{"date-parts":[[2024,10,27]]},"assertion":[{"value":"2024-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}