{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:13:09Z","timestamp":1774368789134,"version":"3.50.1"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,7]]},"DOI":"10.1109\/compsac.2011.69","type":"proceedings-article","created":{"date-parts":[[2011,10,6]],"date-time":"2011-10-06T17:25:23Z","timestamp":1317921923000},"page":"486-491","source":"Crossref","is-referenced-by-count":4,"title":["Reasoning about Global Clones: Scalable Semantic Clone Detection"],"prefix":"10.1109","author":[{"given":"Philipp","family":"Schugerl","sequence":"first","affiliation":[]},{"given":"Juergen","family":"Rilling","sequence":"additional","affiliation":[]},{"given":"Philippe","family":"Charland","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1808901.1808913"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/11497455_32"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.97"},{"key":"ref13","first-page":"36","article-title":"Evaluating clone detection tools for use during preventative maintenance","author":"bailey j","year":"0","journal-title":"Proceedings Second IEEE International Workshop on Source Code Analysis and Manipulation SCAM-02"},{"key":"ref14","first-page":"253","article-title":"Clone detection using abstract syntax suffix trees","author":"falke","year":"0"},{"key":"ref15","first-page":"285","article-title":"Problems creating task-relevant clone detection reference data","author":"jyoti","year":"0","journal-title":"Proc of the 10th Working Conf on Reverse Engineering (WCRE'03)"},{"key":"ref16","author":"kapser","year":"2009","journal-title":"Toward an Understanding of Software Code Cloning as a Development Practice"},{"key":"ref17","first-page":"107","article-title":"MapReduce: simplified data processing on large clusters","author":"ghemawat s","year":"2004","journal-title":"Communications of the ACM"},{"key":"ref18","year":"2011","journal-title":"Apache Hadoop Project"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-11-S12-S1"},{"key":"ref28","author":"bellon","year":"2010","journal-title":"Detection of software clones &#x2014; tool comparison experiment"},{"key":"ref4","article-title":"Scalable Distributed Reasoning using MapReduce","author":"urbani","year":"0","journal-title":"Proceedings of the 8th International Semantic Web Conference (ISWC'09)"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2009.02.007"},{"key":"ref3","first-page":"464","article-title":"A MapReduce Algorithm for EL+","author":"mutharaju","year":"0","journal-title":"Proceeding of 23rd Int Workshop on Description Logics (DL2010)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1999.792593"},{"key":"ref29","year":"2011","journal-title":"Amazon Elastic Computing"},{"key":"ref5","year":"2010","journal-title":"Simian Clone Detection Tool"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"ref7","article-title":"JPlag: Finding plagiarisms among a set of programs","author":"prechelt","year":"2000","journal-title":"Technical Report 2000&#x2013;1 Fakultat fur Informatik"},{"key":"ref2","first-page":"85","article-title":"2010. Quo vadis, clone management?","author":"harder","year":"0","journal-title":"Proceeding of IWSC '10&#x2013;4th International Workshop on Software Clones"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738528"},{"key":"ref1","first-page":"2","article-title":"2010. Clones: What is that smell?","author":"rahman","year":"0","journal-title":"International Working Conference on Mining Software Repositories (MSR)"},{"key":"ref20","author":"berners-lee","year":"2001","journal-title":"The Semantic Web"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882317"},{"key":"ref21","first-page":"287","volume":"4130","author":"baader","year":"0","journal-title":"Reasoner for Life Science Ontologies"},{"key":"ref24","first-page":"40","article-title":"Using Slicing to Identify Duplication in Source Code","author":"komondoor","year":"0","journal-title":"Proceedings of the 8th International Symposium on Static Analysis (SAS '01) Patrick Cousot (Ed )"},{"key":"ref23","first-page":"96","article-title":"DECKARD: Scalable and Accurate Tree-Based Detection of Code Clones","author":"jiang","year":"0","journal-title":"Proceedings of the 29th International Conference on Software Engineering"},{"key":"ref26","article-title":"OWL reasoning with WebPIE: calculating the closure of 100 billion triples","author":"urbani","year":"0","journal-title":"Proceedings of the ESWC '10"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368132"}],"event":{"name":"2011 IEEE 35th Annual Computer Software and Applications Conference - COMPSAC 2011","location":"Munich, Germany","start":{"date-parts":[[2011,7,18]]},"end":{"date-parts":[[2011,7,22]]}},"container-title":["2011 IEEE 35th Annual Computer Software and Applications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6032120\/6032314\/06032385.pdf?arnumber=6032385","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T03:30:44Z","timestamp":1490067044000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6032385\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/compsac.2011.69","relation":{},"subject":[],"published":{"date-parts":[[2011,7]]}}}