{"id":"https://openalex.org/W2140606722","doi":"https://doi.org/10.1145/1082983.1083146","title":"Using a clone genealogy extractor for understanding and supporting evolution of code clones","display_name":"Using a clone genealogy extractor for understanding and supporting evolution of code clones","publication_year":2005,"publication_date":"2005-05-17","ids":{"openalex":"https://openalex.org/W2140606722","doi":"https://doi.org/10.1145/1082983.1083146","mag":"2140606722"},"language":"en","primary_location":{"id":"doi:10.1145/1082983.1083146","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1082983.1083146","pdf_url":null,"source":{"id":"https://openalex.org/S186921487","display_name":"ACM SIGSOFT Software Engineering Notes","issn_l":"0163-5948","issn":["0163-5948","1943-5843"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM SIGSOFT Software Engineering Notes","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049451101","display_name":"Miryung Kim","orcid":"https://orcid.org/0000-0003-3802-1512"},"institutions":[{"id":"https://openalex.org/I58610484","display_name":"Seattle University","ror":"https://ror.org/02jqc0m91","country_code":"US","type":"education","lineage":["https://openalex.org/I58610484"]},{"id":"https://openalex.org/I201448701","display_name":"University of Washington","ror":"https://ror.org/00cvxb145","country_code":"US","type":"education","lineage":["https://openalex.org/I201448701"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Miryung Kim","raw_affiliation_strings":["University of Washington, Seattle","University of Washington , Seattle"],"affiliations":[{"raw_affiliation_string":"University of Washington, Seattle","institution_ids":["https://openalex.org/I58610484","https://openalex.org/I201448701"]},{"raw_affiliation_string":"University of Washington , Seattle","institution_ids":["https://openalex.org/I58610484","https://openalex.org/I201448701"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011262764","display_name":"David Notkin","orcid":null},"institutions":[{"id":"https://openalex.org/I201448701","display_name":"University of Washington","ror":"https://ror.org/00cvxb145","country_code":"US","type":"education","lineage":["https://openalex.org/I201448701"]},{"id":"https://openalex.org/I58610484","display_name":"Seattle University","ror":"https://ror.org/02jqc0m91","country_code":"US","type":"education","lineage":["https://openalex.org/I58610484"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"David Notkin","raw_affiliation_strings":["University of Washington, Seattle","University of Washington , Seattle"],"affiliations":[{"raw_affiliation_string":"University of Washington, Seattle","institution_ids":["https://openalex.org/I58610484","https://openalex.org/I201448701"]},{"raw_affiliation_string":"University of Washington , Seattle","institution_ids":["https://openalex.org/I58610484","https://openalex.org/I201448701"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5049451101"],"corresponding_institution_ids":["https://openalex.org/I201448701","https://openalex.org/I58610484"],"apc_list":null,"apc_paid":null,"fwci":15.2677,"has_fulltext":false,"cited_by_count":48,"citation_normalized_percentile":{"value":0.98638172,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"30","issue":"4","first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9837999939918518,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/code-refactoring","display_name":"Code refactoring","score":0.8516075611114502},{"id":"https://openalex.org/keywords/clone","display_name":"clone (Java method)","score":0.7182968854904175},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.6690095067024231},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.6434922814369202},{"id":"https://openalex.org/keywords/code-reuse","display_name":"Code reuse","score":0.615362823009491},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6105509400367737},{"id":"https://openalex.org/keywords/copying","display_name":"Copying","score":0.5904268622398376},{"id":"https://openalex.org/keywords/software-maintenance","display_name":"Software maintenance","score":0.5638801455497742},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.5083121657371521},{"id":"https://openalex.org/keywords/software-evolution","display_name":"Software evolution","score":0.42648953199386597},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3924669027328491},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.3184501528739929},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.2896467447280884},{"id":"https://openalex.org/keywords/biology","display_name":"Biology","score":0.1814800202846527},{"id":"https://openalex.org/keywords/software-construction","display_name":"Software construction","score":0.14431822299957275},{"id":"https://openalex.org/keywords/genetics","display_name":"Genetics","score":0.1266043782234192}],"concepts":[{"id":"https://openalex.org/C152752567","wikidata":"https://www.wikidata.org/wiki/Q116877","display_name":"Code refactoring","level":3,"score":0.8516075611114502},{"id":"https://openalex.org/C81089528","wikidata":"https://www.wikidata.org/wiki/Q5134986","display_name":"clone (Java method)","level":3,"score":0.7182968854904175},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.6690095067024231},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.6434922814369202},{"id":"https://openalex.org/C2778583558","wikidata":"https://www.wikidata.org/wiki/Q771245","display_name":"Code reuse","level":3,"score":0.615362823009491},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6105509400367737},{"id":"https://openalex.org/C2779151265","wikidata":"https://www.wikidata.org/wiki/Q1156791","display_name":"Copying","level":2,"score":0.5904268622398376},{"id":"https://openalex.org/C101317890","wikidata":"https://www.wikidata.org/wiki/Q940053","display_name":"Software maintenance","level":4,"score":0.5638801455497742},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.5083121657371521},{"id":"https://openalex.org/C202105479","wikidata":"https://www.wikidata.org/wiki/Q265013","display_name":"Software evolution","level":5,"score":0.42648953199386597},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3924669027328491},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3184501528739929},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.2896467447280884},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.1814800202846527},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.14431822299957275},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.1266043782234192},{"id":"https://openalex.org/C552990157","wikidata":"https://www.wikidata.org/wiki/Q7430","display_name":"DNA","level":2,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/1082983.1083146","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1082983.1083146","pdf_url":null,"source":{"id":"https://openalex.org/S186921487","display_name":"ACM SIGSOFT Software Engineering Notes","issn_l":"0163-5948","issn":["0163-5948","1943-5843"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM SIGSOFT Software Engineering Notes","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.107.9133","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.107.9133","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.washington.edu/homes/miryung/Publication/msr2005_kimnotkin.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.298.695","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.298.695","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://users.ece.utexas.edu/~miryung/Publications/msr05-clonegenealogyextractor.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1512285202","https://openalex.org/W1567790484","https://openalex.org/W1593203335","https://openalex.org/W1777576722","https://openalex.org/W2063022796","https://openalex.org/W2096491586","https://openalex.org/W2121932026","https://openalex.org/W2128698639","https://openalex.org/W2133961160","https://openalex.org/W2138756793","https://openalex.org/W2143151143","https://openalex.org/W2153887189","https://openalex.org/W2157532207","https://openalex.org/W6683106902"],"related_works":["https://openalex.org/W2186150085","https://openalex.org/W2069073539","https://openalex.org/W2010680342","https://openalex.org/W2104040631","https://openalex.org/W1985559452","https://openalex.org/W2063955337","https://openalex.org/W1966036917","https://openalex.org/W4385255161","https://openalex.org/W2116610783","https://openalex.org/W3098265572"],"abstract_inverted_index":{"Programmers":[0],"often":[1],"create":[2],"similar":[3,19],"code":[4,9,20,33,46,52,71,92,97,112,129,141],"snippets":[5,10],"or":[6,63],"reuse":[7],"existing":[8],"by":[11],"copying":[12],"and":[13,17,35,57],"pasting.":[14],"Code":[15],"clones---syntactically":[16],"semantically":[18],"snippets---can":[21],"cause":[22],"problems":[23],"during":[24],"software":[25],"maintenance":[26,55],"because":[27],"programmers":[28],"may":[29,121],"need":[30],"to":[31],"locate":[32],"clones":[34,47,53,93,142],"change":[36],"them":[37],"consistently.":[38],"In":[39],"this":[40],"work,":[41],"we":[42,80,132],"investigate":[43],"(1)":[44],"how":[45,50],"evolve,":[48],"(2)":[49],"many":[51],"impose":[54],"challenges,":[56],"(3)":[58],"what":[59],"kind":[60],"of":[61,77,91,111],"tool":[62,85,103,135],"engineering":[64],"process":[65],"would":[66],"be":[67,123],"useful":[68],"for":[69,127],"maintaining":[70,140],"clones.Based":[72],"on":[73],"a":[74,82,95],"formal":[75],"definition":[76],"clone":[78,83,101,144],"evolution,":[79],"built":[81],"genealogy":[84,102,145],"that":[86,107,118,137],"automatically":[87],"extracts":[88],"the":[89,124],"history":[90],"from":[94],"source":[96],"repository":[98],"(CVS).":[99],"Our":[100,114],"enables":[104],"several":[105],"analyses":[106],"reveal":[108],"evolutionary":[109],"characteristics":[110],"clones.":[113],"initial":[115],"results":[116],"suggest":[117],"aggressive":[119],"refactoring":[120],"not":[122],"best":[125],"solution":[126],"all":[128],"clones;":[130],"thus,":[131],"propose":[133],"alternative":[134],"solutions":[136],"assist":[138],"in":[139],"using":[143],"information.":[146]},"counts_by_year":[{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":5},{"year":2012,"cited_by_count":3}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
