{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T05:49:08Z","timestamp":1775886548605,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","funder":[{"name":"Japan Society for the Promotion of Science","award":["25K03102"],"award-info":[{"award-number":["25K03102"]}]},{"name":"Japan Society for the Promotion of Science","award":["24H00692"],"award-info":[{"award-number":["24H00692"]}]},{"name":"Japan Society for the Promotion of Science","award":["23K24823"],"award-info":[{"award-number":["23K24823"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,24]]},"DOI":"10.1145\/3779657.3779670","type":"proceedings-article","created":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T05:12:49Z","timestamp":1775884369000},"page":"80-87","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Code Clone Refactoring in C# with Lambda Expressions"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-4138-0208","authenticated-orcid":false,"given":"Takuto","family":"Kawamoto","sequence":"first","affiliation":[{"name":"Graduate School of Information Science and Technology, The University of Osaka, Suita, Osaka, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8278-8975","authenticated-orcid":false,"given":"Yoshiki","family":"Higo","sequence":"additional","affiliation":[{"name":"Graduate School of Information Science and Technology, The University of Osaka, Suita, Osaka, Japan"}]}],"member":"320","published-online":{"date-parts":[[2026,4,10]]},"reference":[{"key":"e_1_3_3_2_2_2","unstructured":"2021. Simian. https:\/\/simian.quandarypeak.com\/. Accessed: 5.25.2025."},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/IWoR.2019.00020"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2011.26"},{"key":"e_1_3_3_2_5_2","first-page":"1","volume-title":"Chapter I: Notes on structured programming","author":"Dijkstra E.\u00a0W.","year":"1972","unstructured":"E.\u00a0W. Dijkstra. 1972. Chapter I: Notes on structured programming. Academic Press Ltd., GBR, 1\u201382."},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738528"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"crossref","unstructured":"T.\u00a0Kamiya \u00a0S. Kusumoto and K. Inoue. 2002. CCFinder: A Multilinguistic Token-Based Code Clone Detection System for Large Scale Source Code. IEEE Transaction on Software Engineering vol. 28 no. 7 pp. 654-670 (July 2002). (July 2002).","DOI":"10.1109\/TSE.2002.1019480"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598092"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2008.4658071"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","unstructured":"N.\u00a0Tsantalis \u00a0D. Mazinanian and G.\u00a0P. Krishnan. 2015. Assessing the Refactorability of Software Clones. IEEE Transactions on Software Engineering 41 11 (Nov 2015) 1055\u20131090. 10.1109\/TSE.2015.2448531","DOI":"10.1109\/TSE.2015.2448531"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.14"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","unstructured":"E.\u00a0A. AlOmar M.\u00a0W. Mkaouer and A. Ouni. 2024. Behind the Intent of Extract Method Refactoring: A Systematic Literature Review. IEEE Transactions on Software Engineering 50 4 (2024) 668\u2013694. 10.1109\/TSE.2023.3345800","DOI":"10.1109\/TSE.2023.3345800"},{"key":"e_1_3_3_2_13_2","unstructured":"Oracle. 2014. Java Documentation Lambda Expressions. https:\/\/docs.oracle.com\/javase\/tutorial\/java\/javaOO\/lambdaexpressions.html. Accessed: 2.19.2025."},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","unstructured":"T. Robert and G. Jeff. 2012. Increasing clone maintenance support by unifying clone detection and refactoring activities. Information and Software Technology 54 12 (2012) 1297\u20131307. 10.1016\/j.infsof.2012.06.011Special Section on Software Reliability and Security.","DOI":"10.1016\/j.infsof.2012.06.011"},{"key":"e_1_3_3_2_15_2","unstructured":"C. Roy and J. Cordy. 2007. A Survey on Software Clone Detection Research. School of Computing TR 2007-541 541 115 (01 2007) 3\u20137."},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2014.11"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME46990.2020.00030"}],"event":{"name":"WSSE 2025: 2025 The 7th World Symposium on Software Engineering","location":"Okayama Japan","acronym":"WSSE 2025"},"container-title":["Proceedings of the 2025 7th World Symposium on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3779657.3779670","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T05:13:29Z","timestamp":1775884409000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3779657.3779670"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,24]]},"references-count":16,"alternative-id":["10.1145\/3779657.3779670","10.1145\/3779657"],"URL":"https:\/\/doi.org\/10.1145\/3779657.3779670","relation":{},"subject":[],"published":{"date-parts":[[2025,10,24]]},"assertion":[{"value":"2026-04-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}