{"id":"https://openalex.org/W4232881974","doi":"https://doi.org/10.1145/1083142.1083146","title":"Using a clone genealogy extractor for understanding and supporting evolution of code clones","display_name":"Using a clone genealogy extractor for understanding and supporting evolution of code clones","publication_year":2005,"publication_date":"2005-01-01","ids":{"openalex":"https://openalex.org/W4232881974","doi":"https://doi.org/10.1145/1083142.1083146"},"language":"en","primary_location":{"id":"doi:10.1145/1083142.1083146","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1083142.1083146","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2005 international workshop on Mining software repositories  - MSR '05","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049451101","display_name":"Miryung Kim","orcid":"https://orcid.org/0000-0003-3802-1512"},"institutions":[{"id":"https://openalex.org/I201448701","display_name":"University of Washington","ror":"https://ror.org/00cvxb145","country_code":"US","type":"education","lineage":["https://openalex.org/I201448701"]},{"id":"https://openalex.org/I58610484","display_name":"Seattle University","ror":"https://ror.org/02jqc0m91","country_code":"US","type":"education","lineage":["https://openalex.org/I58610484"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Miryung Kim","raw_affiliation_strings":["University of Washington, Seattle"],"affiliations":[{"raw_affiliation_string":"University of Washington, Seattle","institution_ids":["https://openalex.org/I58610484","https://openalex.org/I201448701"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011262764","display_name":"David Notkin","orcid":null},"institutions":[{"id":"https://openalex.org/I201448701","display_name":"University of Washington","ror":"https://ror.org/00cvxb145","country_code":"US","type":"education","lineage":["https://openalex.org/I201448701"]},{"id":"https://openalex.org/I58610484","display_name":"Seattle University","ror":"https://ror.org/02jqc0m91","country_code":"US","type":"education","lineage":["https://openalex.org/I58610484"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"David Notkin","raw_affiliation_strings":["University of Washington, Seattle"],"affiliations":[{"raw_affiliation_string":"University of Washington, Seattle","institution_ids":["https://openalex.org/I58610484","https://openalex.org/I201448701"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5049451101"],"corresponding_institution_ids":["https://openalex.org/I201448701","https://openalex.org/I58610484"],"apc_list":null,"apc_paid":null,"fwci":4.8315,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.95301265,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9811000227928162,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11986","display_name":"Scientific Computing and Data Management","score":0.9736999869346619,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/code-refactoring","display_name":"Code refactoring","score":0.8637791872024536},{"id":"https://openalex.org/keywords/clone","display_name":"clone (Java method)","score":0.7536941766738892},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.675365149974823},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.6465140581130981},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6459367275238037},{"id":"https://openalex.org/keywords/copying","display_name":"Copying","score":0.6055195331573486},{"id":"https://openalex.org/keywords/software-maintenance","display_name":"Software maintenance","score":0.574466347694397},{"id":"https://openalex.org/keywords/code-reuse","display_name":"Code reuse","score":0.5683760643005371},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.47752678394317627},{"id":"https://openalex.org/keywords/software-evolution","display_name":"Software evolution","score":0.428202360868454},{"id":"https://openalex.org/keywords/redundant-code","display_name":"Redundant code","score":0.4173932373523712},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3723311424255371},{"id":"https://openalex.org/keywords/code-generation","display_name":"Code generation","score":0.37088513374328613},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.2988203763961792},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.2894217371940613},{"id":"https://openalex.org/keywords/biology","display_name":"Biology","score":0.18064185976982117},{"id":"https://openalex.org/keywords/genetics","display_name":"Genetics","score":0.13830474019050598},{"id":"https://openalex.org/keywords/software-construction","display_name":"Software construction","score":0.12600961327552795},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12398329377174377},{"id":"https://openalex.org/keywords/gene","display_name":"Gene","score":0.07342314720153809}],"concepts":[{"id":"https://openalex.org/C152752567","wikidata":"https://www.wikidata.org/wiki/Q116877","display_name":"Code refactoring","level":3,"score":0.8637791872024536},{"id":"https://openalex.org/C81089528","wikidata":"https://www.wikidata.org/wiki/Q5134986","display_name":"clone (Java method)","level":3,"score":0.7536941766738892},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.675365149974823},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.6465140581130981},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6459367275238037},{"id":"https://openalex.org/C2779151265","wikidata":"https://www.wikidata.org/wiki/Q1156791","display_name":"Copying","level":2,"score":0.6055195331573486},{"id":"https://openalex.org/C101317890","wikidata":"https://www.wikidata.org/wiki/Q940053","display_name":"Software maintenance","level":4,"score":0.574466347694397},{"id":"https://openalex.org/C2778583558","wikidata":"https://www.wikidata.org/wiki/Q771245","display_name":"Code reuse","level":3,"score":0.5683760643005371},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.47752678394317627},{"id":"https://openalex.org/C202105479","wikidata":"https://www.wikidata.org/wiki/Q265013","display_name":"Software evolution","level":5,"score":0.428202360868454},{"id":"https://openalex.org/C151578736","wikidata":"https://www.wikidata.org/wiki/Q1251793","display_name":"Redundant code","level":4,"score":0.4173932373523712},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3723311424255371},{"id":"https://openalex.org/C133162039","wikidata":"https://www.wikidata.org/wiki/Q1061077","display_name":"Code generation","level":3,"score":0.37088513374328613},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.2988203763961792},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.2894217371940613},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.18064185976982117},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.13830474019050598},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.12600961327552795},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12398329377174377},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.07342314720153809},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1083142.1083146","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1083142.1083146","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2005 international workshop on Mining software repositories  - MSR '05","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2186150085","https://openalex.org/W2069073539","https://openalex.org/W2010680342","https://openalex.org/W2104040631","https://openalex.org/W1985559452","https://openalex.org/W2063955337","https://openalex.org/W4385255161","https://openalex.org/W1966036917","https://openalex.org/W2116610783","https://openalex.org/W2605547445"],"abstract_inverted_index":{"Programmers":[0],"often":[1],"create":[2],"similar":[3,19],"code":[4,9,20,33,46,52,71,92,97,112,129,141],"snippets":[5,10],"or":[6,63],"reuse":[7],"existing":[8],"by":[11],"copying":[12],"and":[13,17,35,57],"pasting.":[14],"Code":[15],"clones---syntactically":[16],"semantically":[18],"snippets---can":[21],"cause":[22],"problems":[23],"during":[24],"software":[25],"maintenance":[26,55],"because":[27],"programmers":[28],"may":[29,121],"need":[30],"to":[31],"locate":[32],"clones":[34,47,53,93,142],"change":[36],"them":[37],"consistently.":[38],"In":[39],"this":[40],"work,":[41],"we":[42,80,132],"investigate":[43],"(1)":[44],"how":[45,50],"evolve,":[48],"(2)":[49],"many":[51],"impose":[54],"challenges,":[56],"(3)":[58],"what":[59],"kind":[60],"of":[61,77,91,111],"tool":[62,85,103,135],"engineering":[64],"process":[65],"would":[66],"be":[67,123],"useful":[68],"for":[69,127],"maintaining":[70,140],"clones.Based":[72],"on":[73],"a":[74,82,95],"formal":[75],"definition":[76],"clone":[78,83,101,144],"evolution,":[79],"built":[81],"genealogy":[84,102,145],"that":[86,107,118,137],"automatically":[87],"extracts":[88],"the":[89,124],"history":[90],"from":[94],"source":[96],"repository":[98],"(CVS).":[99],"Our":[100,114],"enables":[104],"several":[105],"analyses":[106],"reveal":[108],"evolutionary":[109],"characteristics":[110],"clones.":[113],"initial":[115],"results":[116],"suggest":[117],"aggressive":[119],"refactoring":[120],"not":[122],"best":[125],"solution":[126],"all":[128],"clones;":[130],"thus,":[131],"propose":[133],"alternative":[134],"solutions":[136],"assist":[138],"in":[139],"using":[143],"information.":[146]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
