{"id":"https://openalex.org/W4415746332","doi":"https://doi.org/10.1109/icsme64153.2025.00099","title":"Towards Just-In-Time, Inclusive Clone Refactoring","display_name":"Towards Just-In-Time, Inclusive Clone Refactoring","publication_year":2025,"publication_date":"2025-09-07","ids":{"openalex":"https://openalex.org/W4415746332","doi":"https://doi.org/10.1109/icsme64153.2025.00099"},"language":null,"primary_location":{"id":"doi:10.1109/icsme64153.2025.00099","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsme64153.2025.00099","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Software Maintenance and Evolution (ICSME)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058812722","display_name":"Palash Ranjan Roy","orcid":"https://orcid.org/0000-0001-9470-4233"},"institutions":[{"id":"https://openalex.org/I32625721","display_name":"University of Saskatchewan","ror":"https://ror.org/010x8gc63","country_code":"CA","type":"education","lineage":["https://openalex.org/I32625721"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Palash Roy","raw_affiliation_strings":["University of Saskatchewan,Dept. of Computer Science,Saskatoon,Canada"],"affiliations":[{"raw_affiliation_string":"University of Saskatchewan,Dept. of Computer Science,Saskatoon,Canada","institution_ids":["https://openalex.org/I32625721"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5058812722"],"corresponding_institution_ids":["https://openalex.org/I32625721"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.45104487,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"884","last_page":"886"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.8876000046730042,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.8876000046730042,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.013100000098347664,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10430","display_name":"Software Engineering Techniques and Practices","score":0.012299999594688416,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/code-refactoring","display_name":"Code refactoring","score":0.928600013256073},{"id":"https://openalex.org/keywords/clone","display_name":"clone (Java method)","score":0.670799970626831},{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.5676000118255615},{"id":"https://openalex.org/keywords/bridging","display_name":"Bridging (networking)","score":0.4657999873161316},{"id":"https://openalex.org/keywords/software-maintenance","display_name":"Software maintenance","score":0.4595000147819519},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.4553000032901764},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.453000009059906}],"concepts":[{"id":"https://openalex.org/C152752567","wikidata":"https://www.wikidata.org/wiki/Q116877","display_name":"Code refactoring","level":3,"score":0.928600013256073},{"id":"https://openalex.org/C81089528","wikidata":"https://www.wikidata.org/wiki/Q5134986","display_name":"clone (Java method)","level":3,"score":0.670799970626831},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5800999999046326},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.5676000118255615},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.5663999915122986},{"id":"https://openalex.org/C174348530","wikidata":"https://www.wikidata.org/wiki/Q188635","display_name":"Bridging (networking)","level":2,"score":0.4657999873161316},{"id":"https://openalex.org/C101317890","wikidata":"https://www.wikidata.org/wiki/Q940053","display_name":"Software maintenance","level":4,"score":0.4595000147819519},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.4553000032901764},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.453000009059906},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.421099990606308},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3873000144958496},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.385699987411499},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.37529999017715454},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3662000000476837},{"id":"https://openalex.org/C117447612","wikidata":"https://www.wikidata.org/wiki/Q1412670","display_name":"Software quality","level":4,"score":0.34380000829696655},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.30489999055862427},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.25929999351501465},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.25440001487731934}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icsme64153.2025.00099","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsme64153.2025.00099","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Software Maintenance and Evolution (ICSME)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1967788056","https://openalex.org/W2024671287","https://openalex.org/W2043169794","https://openalex.org/W2059901918","https://openalex.org/W2128802947","https://openalex.org/W2134852596","https://openalex.org/W2137659640","https://openalex.org/W2142608175","https://openalex.org/W2884327322","https://openalex.org/W2976897941","https://openalex.org/W3005420629","https://openalex.org/W3039357523","https://openalex.org/W3188174680","https://openalex.org/W4389544307","https://openalex.org/W4393034946","https://openalex.org/W4399361983","https://openalex.org/W4402671783","https://openalex.org/W4407848641","https://openalex.org/W4411233062","https://openalex.org/W4411552348","https://openalex.org/W4412377058"],"related_works":[],"abstract_inverted_index":{"Code":[0],"clones":[1,20],"are":[2],"a":[3,33],"well-known":[4],"source":[5],"of":[6],"technical":[7],"debt,":[8],"often":[9],"degrading":[10],"software":[11],"maintainability.":[12],"Modern":[13],"AI":[14,117],"coding":[15],"assistants":[16],"can":[17],"unintentionally":[18],"introduce":[19],"or":[21,61],"even":[22],"licenseincompatible":[23],"code,":[24],"posing":[25],"maintenance":[26,121],"and":[27,48,76,95,111,114],"legal":[28],"challenges.":[29],"This":[30],"research":[31],"proposes":[32],"Large":[34],"Language":[35],"Model":[36],"(LLM)-powered":[37],"clone":[38,55,88],"refactoring":[39],"assistant":[40,80],"that":[41],"proactively":[42],"detects":[43],"duplicative":[44],"code":[45,59,109],"during":[46],"development":[47,84],"suggests":[49],"high-level":[50],"refactorings.":[51],"By":[52],"bridging":[53],"traditional":[54],"detection":[56],"with":[57],"LLM-driven":[58],"generation":[60],"transformation,":[62],"the":[63],"approach":[64],"aims":[65],"to":[66,86],"remove":[67],"redundancies":[68],"early":[69],"while":[70],"ensuring":[71],"changes":[72],"remain":[73],"behavior":[74],"preserving":[75],"legally":[77],"compliant.":[78],"The":[79],"will":[81,104],"integrate":[82],"into":[83],"workflows":[85],"prevent":[87],"propagation,":[89],"flag":[90],"potential":[91],"intellectual":[92],"property":[93],"risks,":[94],"incorporate":[96],"developer":[97,112],"feedback":[98],"for":[99],"explainable,":[100],"trustworthy":[101],"operation.":[102],"We":[103],"evaluate":[105],"its":[106],"impact":[107],"on":[108],"quality":[110],"productivity,":[113],"assess":[115],"how":[116],"enhancements":[118],"influence":[119],"long-term":[120],"efforts.":[122]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-31T00:00:00"}
