{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T09:25:35Z","timestamp":1725787535843},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,5]]},"DOI":"10.1109\/icpc.2009.5090048","type":"proceedings-article","created":{"date-parts":[[2009,6,28]],"date-time":"2009-06-28T22:22:27Z","timestamp":1246227747000},"page":"233-237","source":"Crossref","is-referenced-by-count":15,"title":["Vector space analysis of software clones"],"prefix":"10.1109","author":[{"given":"Scott","family":"Grant","sequence":"first","affiliation":[]},{"given":"James R.","family":"Cordy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Understanding Complex Datasets Data Mining with Matrix Decompositions","year":"2007","author":"skillicorn","key":"17","doi-asserted-by":"crossref","DOI":"10.1201\/9781584888338"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2008.54"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2008.42"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2005.33"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2004.10"},{"journal-title":"3rd International Workshop on Software Clones","year":"2009","author":"koschke","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.28"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/0165-1684(94)90029-9"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022990829563"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70725"},{"journal-title":"Duplication Redundancy and Similarity in Software","article-title":"survey of research on software clones","year":"2007","author":"koschke","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1002\/0471221317"},{"key":"6","first-page":"23","article-title":"topic detection using independent component analysis","author":"grant","year":"2008","journal-title":"LACTS 2008"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2008.49"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9"},{"key":"9","first-page":"540","article-title":"signal detection using ica: application to chat room topic spotting","author":"kolenda","year":"2001","journal-title":"ICA 2001"},{"year":"0","key":"8"}],"event":{"name":"2009 IEEE 17th International Conference on Program Comprehension (ICPC)","start":{"date-parts":[[2009,5,17]]},"location":"Vancouver, BC, Canada","end":{"date-parts":[[2009,5,19]]}},"container-title":["2009 IEEE 17th International Conference on Program Comprehension"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5073941\/5090011\/05090048.pdf?arnumber=5090048","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T17:23:37Z","timestamp":1497806617000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5090048\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,5]]},"references-count":17,"URL":"http:\/\/dx.doi.org\/10.1109\/icpc.2009.5090048","relation":{},"subject":[],"published":{"date-parts":[[2009,5]]}}}