{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:06:28Z","timestamp":1750309588785,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:00:00Z","timestamp":1729123200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,17]]},"DOI":"10.1145\/3723178.3723206","type":"proceedings-article","created":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T07:16:47Z","timestamp":1749194207000},"page":"207-215","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Evaluating Code Clone Detection and Management: A Comprehensive Comparison among different Techniques and Tools along with some Effective Future Directions"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-3737-7583","authenticated-orcid":false,"given":"Soily Ghosh","family":"Sneha","sequence":"first","affiliation":[{"name":"American International University-Bangladesh, Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-2286-6653","authenticated-orcid":false,"given":"Sadia","family":"Niha","sequence":"additional","affiliation":[{"name":"American International University Bangladesh, Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-8495-1013","authenticated-orcid":false,"given":"Dr. Md. Manzurul","family":"Hasan","sequence":"additional","affiliation":[{"name":"American International University-Bangladesh, Dhaka, Bangladesh"}]}],"member":"320","published-online":{"date-parts":[[2025,6,6]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2000.891457"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738528"},{"key":"e_1_3_3_2_4_2","unstructured":"Shilpa Dang and Shahid\u00a0Ahmad Wani. 2015. Performance evaluation of clone detection tools. International Journal of Science and Research (IJSR) (2015) 1903\u20131906."},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1999.792593"},{"key":"e_1_3_3_2_6_2","unstructured":"Katsuro Inoue. 2002. Ccfinder: a multilinguistic token-based code clone detection system for large scale source code. Annual report of Osaka University: academic achievement 2001 (2002) 22\u201325."},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.30"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-09156-3_35"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"crossref","unstructured":"Harpreet Kaur and Raman Maini. 2017. Performance Evaluation and Comparative Analysis of Code-Clone-Detection Techniques and Tools. International Journal of Software Engineering and Its Applications 11 3 (2017) 31\u201350.","DOI":"10.14257\/ijseia.2017.11.3.04"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"crossref","unstructured":"Shahbaa\u00a0I Khaleel and Ghassan\u00a0Khaleel Al-Khatouni. 2023. A literature review for measuring maintainability of code clone. Indonesian Journal of Electrical Engineering and Computer Science 31 2 (2023) 1118\u20131127.","DOI":"10.11591\/ijeecs.v31.i2.pp1118-1127"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2006.18"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/1094855.1094903"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"crossref","unstructured":"Zhenmin Li Shan Lu Suvda Myagmar and Yuanyuan Zhou. 2006. CP-Miner: Finding copy-paste and related bugs in large-scale software code. IEEE Transactions on software Engineering 32 3 (2006) 176\u2013192.","DOI":"10.1109\/TSE.2006.28"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9534099"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR-WCRE.2014.6747161"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1996.565012"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"crossref","unstructured":"Thilo Mende Rainer Koschke and Felix Beckwermert. 2009. An evaluation of code similarity identification for the grow-and-prune model. Journal of Software Maintenance and Evolution: Research and Practice 21 2 (2009) 143\u2013169.","DOI":"10.1002\/smr.402"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/2245276.2231969"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/METRIC.2002.1011328"},{"key":"e_1_3_3_2_20_2","first-page":"1573","volume-title":"2016 Federated Conference on Computer Science and Information Systems (FedCSIS)","author":"Porub\u00e4n Jaroslav","year":"2016","unstructured":"Jaroslav Porub\u00e4n et\u00a0al. 2016. Preliminary report on empirical study of repeated fragments in internal documentation. In 2016 Federated Conference on Computer Science and Information Systems (FedCSIS). IEEE, 1573\u20131576."},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"crossref","unstructured":"Chaiyong Ragkhitwetsagul and Jens Krinke. 2019. Siamese: scalable and incremental code clone search via multiple code representations. Empirical Software Engineering 24 4 (2019) 2236\u20132284.","DOI":"10.1007\/s10664-019-09697-7"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"crossref","unstructured":"Dhavleesh Rattan Rajesh Bhatia and Maninder Singh. 2013. Software clone detection: A systematic review. Information and Software Technology 55 7 (2013) 1165\u20131199.","DOI":"10.1016\/j.infsof.2013.01.008"},{"key":"e_1_3_3_2_23_2","unstructured":"Chanchal\u00a0Kumar Roy and James\u00a0R Cordy. 2007. A survey on software clone detection research. Queen\u2019s School of computing TR 541 115 (2007) 64\u201368."},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR-WCRE.2014.6747168"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884877"},{"key":"e_1_3_3_2_26_2","unstructured":"Sandro Schulze and Martin Kuhlemann. 2009. Advanced analysis for code clone removal. (2009)."},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"crossref","unstructured":"Abdullah Sheneamer and Jugal Kalita. 2016. A survey of software clone detection techniques. International Journal of Computer Applications 137 10 (2016) 1\u201321.","DOI":"10.5120\/ijca2016908896"},{"key":"e_1_3_3_2_28_2","unstructured":"Jeffrey Svajlenko and Chanchal\u00a0K Roy. 2020. A survey on the evaluation of clone detection performance and benchmarking. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2006.15682 (2020)."},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/VISSOFT.2014.22"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/SYNASC.2005.20"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"crossref","unstructured":"Liguo Yu and Srini Ramaswamy. 2008. Improving modularity by refactoring code clones: A feasibility study on linux. ACM SIGSOFT Software Engineering Notes 33 2 (2008) 1\u20135.","DOI":"10.1145\/1350802.1350816"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"crossref","unstructured":"Morteza Zakeri-Nasrabadi Saeed Parsa Mohammad Ramezani Chanchal Roy and Masoud Ekhtiarzadeh. 2023. A systematic literature review on source code similarity measurement and clone detection: Techniques applications and challenges. Journal of Systems and Software (2023) 111796.","DOI":"10.1016\/j.jss.2023.111796"},{"key":"e_1_3_3_2_33_2","unstructured":"Minhaz\u00a0F Zibran and Chanchal\u00a0K Roy. 2012. The road to software clone management: A survey. Dept. Comput. Sci. Univ. of Saskatchewan Saskatoon SK Tech. Rep 3 (2012)."}],"event":{"name":"ICCA 2024: 3rd International Conference on Computing Advancements","acronym":"ICCA 2024","location":"Dhaka Bangladesh"},"container-title":["Proceedings of the 3rd International Conference on Computing Advancements"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3723178.3723206","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3723178.3723206","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:56:46Z","timestamp":1750298206000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3723178.3723206"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,17]]},"references-count":32,"alternative-id":["10.1145\/3723178.3723206","10.1145\/3723178"],"URL":"https:\/\/doi.org\/10.1145\/3723178.3723206","relation":{},"subject":[],"published":{"date-parts":[[2024,10,17]]},"assertion":[{"value":"2025-06-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}