iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1145/2745802.2745821
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T23:42:20Z","timestamp":1725752540682},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,4,27]],"date-time":"2015-04-27T00:00:00Z","timestamp":1430092800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,4,27]]},"DOI":"10.1145\/2745802.2745821","type":"proceedings-article","created":{"date-parts":[[2015,5,1]],"date-time":"2015-05-01T18:13:36Z","timestamp":1430504016000},"page":"1-10","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["An empirical assessment of Bellon's clone benchmark"],"prefix":"10.1145","author":[{"given":"Alan","family":"Charpentier","sequence":"first","affiliation":[{"name":"University of Bordeaux, Talence, France"}]},{"given":"Jean-R\u00e9my","family":"Falleri","sequence":"additional","affiliation":[{"name":"University of Bordeaux, Talence, France"}]},{"given":"David","family":"Lo","sequence":"additional","affiliation":[{"name":"Singapore Management University"}]},{"given":"Laurent","family":"R\u00e9veill\u00e8re","sequence":"additional","affiliation":[{"name":"University of Bordeaux, Talence, France"}]}],"member":"320","published-online":{"date-parts":[[2015,4,27]]},"reference":[{"first-page":"86","volume-title":"Proceedings of the Second Working Conference on Reverse Engineering, WCRE '95","author":"Baker B. S.","key":"e_1_3_2_1_1_1","unstructured":"B. S. Baker . On finding duplication and near-duplication in large software systems . In Proceedings of the Second Working Conference on Reverse Engineering, WCRE '95 , pages 86 --, Washington, DC, USA, 1995. IEEE Computer Society. B. S. Baker. On finding duplication and near-duplication in large software systems. In Proceedings of the Second Working Conference on Reverse Engineering, WCRE '95, pages 86--, Washington, DC, USA, 1995. IEEE Computer Society."},{"first-page":"368","volume-title":"Proceedings of the International Conference on Software Maintenance, ICSM '98","author":"Baxter I. D.","key":"e_1_3_2_1_2_1","unstructured":"I. D. Baxter , A. Yahin , L. Moura , M. Sant'Anna , and L. Bier . Clone detection using abstract syntax trees . In Proceedings of the International Conference on Software Maintenance, ICSM '98 , pages 368 --, Washington, DC, USA, 1998. IEEE Computer Society. I. D. Baxter, A. Yahin, L. Moura, M. Sant'Anna, and L. Bier. Clone detection using abstract syntax trees. In Proceedings of the International Conference on Software Maintenance, ICSM '98, pages 368--, Washington, DC, USA, 1998. IEEE Computer Society."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70725"},{"volume-title":"Ordinal methods for behavioral data analysis","year":"1996","author":"Cliff N.","key":"e_1_3_2_1_4_1","unstructured":"N. Cliff . Ordinal methods for behavioral data analysis . Psychology Press , New- York, USA , Sept. 1996 . N. Cliff. Ordinal methods for behavioral data analysis. Psychology Press, New-York, USA, Sept. 1996."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.v18:1"},{"key":"e_1_3_2_1_6_1","first-page":"1","volume-title":"Bootstrap methods: another look at the jackknife. The annals of Statistics","author":"Efron B.","year":"1979","unstructured":"B. Efron . Bootstrap methods: another look at the jackknife. The annals of Statistics , pages 1 -- 26 , 1979 . B. Efron. Bootstrap methods: another look at the jackknife. The annals of Statistics, pages 1--26, 1979."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2009.20"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.30"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"volume-title":"Subjectivity in clone judgment: Can we ever agree? In R","year":"2007","author":"Kapser C.","key":"e_1_3_2_1_10_1","unstructured":"C. Kapser , P. Anderson , M. Godfrey , R. Koschke , M. Rieger , F. van Rysselberghe , and P. Weisgerber . Subjectivity in clone judgment: Can we ever agree? In R . Koschke, E. Merlo, and A. Walenstein, editors, Duplication, Redundancy , and Similarity in Software, number 06301 in Dagstuhl Seminar Proceedings, Dagstuhl, Germany, 2007 . Internationales Begegnungsund Forschungszentrum f\u00fcr Informatik (IBFI), Schloss Dagstuhl, Germany . C. Kapser, P. Anderson, M. Godfrey, R. Koschke, M. Rieger, F. van Rysselberghe, and P. Weisgerber. Subjectivity in clone judgment: Can we ever agree? In R. Koschke, E. Merlo, and A. Walenstein, editors, Duplication, Redundancy, and Similarity in Software, number 06301 in Dagstuhl Seminar Proceedings, Dagstuhl, Germany, 2007. Internationales Begegnungsund Forschungszentrum f\u00fcr Informatik (IBFI), Schloss Dagstuhl, Germany."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2006.18"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597127"},{"first-page":"314","volume-title":"Proceedings of the International Conference on Software Maintenance, ICSM '97","author":"Lague B.","key":"e_1_3_2_1_13_1","unstructured":"B. Lague , D. Proulx , J. Mayrand , E. M. Merlo , and J. Hudepohl . Assessing the benefits of incorporating function clone detection in a development process . In Proceedings of the International Conference on Software Maintenance, ICSM '97 , pages 314 --, Washington, DC, USA, 1997. IEEE Computer Society. B. Lague, D. Proulx, J. Mayrand, E. M. Merlo, and J. Hudepohl. Assessing the benefits of incorporating function clone detection in a development process. In Proceedings of the International Conference on Software Maintenance, ICSM '97, pages 314--, Washington, DC, USA, 1997. IEEE Computer Society."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.28"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597133"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2012.21"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2013.6613837"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.90"},{"key":"e_1_3_2_1_19_1","unstructured":"J. Romano J. Kromrey J. Coraggio and J. Skowronek. Appropriate statistics for ordinal level data: Should we really be using t-test and cohen'sd for evaluating group differences on the nsse and other surveys? In annual meeting of the Florida Association of Institutional Research pages 1--3 2006. J. Romano J. Kromrey J. Coraggio and J. Skowronek. Appropriate statistics for ordinal level data: Should we really be using t-test and cohen'sd for evaluating group differences on the nsse and other surveys? In annual meeting of the Florida Association of Institutional Research pages 1--3 2006."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2008.41"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2010.33"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.77"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.54"},{"first-page":"285","volume-title":"Proceedings of the 10th Working Conference on Reverse Engineering, WCRE '03","author":"Walenstein A.","key":"e_1_3_2_1_24_1","unstructured":"A. Walenstein , N. Jyoti , J. Li , Y. Yang , and A. Lakhotia . Problems creating task-relevant clone detection reference data . In Proceedings of the 10th Working Conference on Reverse Engineering, WCRE '03 , pages 285 --, Washington, DC, USA, 2003. IEEE Computer Society. A. Walenstein, N. Jyoti, J. Li, Y. Yang, and A. Lakhotia. Problems creating task-relevant clone detection reference data. In Proceedings of the 10th Working Conference on Reverse Engineering, WCRE '03, pages 285--, Washington, DC, USA, 2003. IEEE Computer Society."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491420"},{"key":"e_1_3_2_1_26_1","first-page":"1","volume-title":"Empirical Software Engineering","author":"Yang J.","year":"2014","unstructured":"J. Yang , K. Hotta , Y. Higo , H. Igaki , and S. Kusumoto . Classification model for code clones based on machine learning . Empirical Software Engineering , pages 1 -- 31 , 2014 . J. Yang, K. Hotta, Y. Higo, H. Igaki, and S. Kusumoto. Classification model for code clones based on machine learning. Empirical Software Engineering, pages 1--31, 2014."}],"event":{"name":"EASE '15: 19th International Conference on Evaluation and Assessment in Software Engineering","sponsor":["NJU Nanjing University"],"location":"Nanjing China","acronym":"EASE '15"},"container-title":["Proceedings of the 19th International Conference on Evaluation and Assessment in Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2745802.2745821","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,14]],"date-time":"2023-01-14T13:04:10Z","timestamp":1673701450000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2745802.2745821"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,27]]},"references-count":26,"alternative-id":["10.1145\/2745802.2745821","10.1145\/2745802"],"URL":"https:\/\/doi.org\/10.1145\/2745802.2745821","relation":{},"subject":[],"published":{"date-parts":[[2015,4,27]]},"assertion":[{"value":"2015-04-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}