{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T10:45:01Z","timestamp":1742381101746,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540376576"},{"type":"electronic","value":"9783540376590"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11821946_5","type":"book-chapter","created":{"date-parts":[[2006,8,5]],"date-time":"2006-08-05T06:35:14Z","timestamp":1154759714000},"page":"66-81","source":"Crossref","is-referenced-by-count":2,"title":["Automated Pattern-Based Pointcut Generation"],"prefix":"10.1007","author":[{"given":"Mathieu","family":"Braem","sequence":"first","affiliation":[]},{"given":"Kris","family":"Gybels","sequence":"additional","affiliation":[]},{"given":"Andy","family":"Kellens","sequence":"additional","affiliation":[]},{"given":"Wim","family":"Vanderperren","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"volume-title":"Proc. 2nd Int\u2019 Conf. on Aspect-Oriented Software Development (AOSD-2003)","year":"2001","key":"5_CR1","unstructured":"Ak\u015fit, M. (ed.): Proc. 2nd Int\u2019 Conf. on Aspect-Oriented Software Development (AOSD-2003). ACM Press, New York (2001)"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Binkley, D., Ceccato, M., Harman, M., Ricca, F., Tonella, P.: Automated refactoring of object oriented code into aspects. In: 21st IEEE International Conference on Software Maintenance (ICSM) (2005)","DOI":"10.1109\/ICSM.2005.27"},{"key":"5_CR3","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1109\/ASE.2004.1342754","volume-title":"19th International Conference on Automated Software Engineering","author":"S. Breu","year":"2004","unstructured":"Breu, S., Krinke, J.: Aspect mining using event traces. In: 19th International Conference on Automated Software Engineering, California, pp. 310\u2013315. IEEE Computer Society Press, Los Alamitos (2004)"},{"key":"5_CR4","series-title":"Lecture Notes in Computer Science","volume-title":"ECOOP 2000 - Object-Oriented Programming","author":"J. Brichau","year":"2000","unstructured":"Brichau, J., De Meuter, W., De Volder, K.: Jumping aspects. In: Bertino, E. (ed.) ECOOP 2000. LNCS, vol.\u00a01850. Springer, Heidelberg (2000)"},{"key":"5_CR5","volume-title":"Proceedings of the IEEE International Conference on Software Maintenance (ICSM)","author":"M. Bruntink","year":"2004","unstructured":"Bruntink, M., van Deursen, A., van Engelen, R., Tourw\u00e9, T.: An evaluation of clone detection techniques for identifying crosscutting concerns. In: Proceedings of the IEEE International Conference on Software Maintenance (ICSM). IEEE Computer Society Press, Los Alamitos (2004)"},{"key":"5_CR6","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/WPC.2005.2","volume-title":"Proceedings of the 13th International Workshop on Program Comprehension (IWPC 2005)","author":"M. Ceccato","year":"2005","unstructured":"Ceccato, M., Marin, M., Mens, K., Moonen, L., Tonello, P., Tourw\u00e9, T.: A qualitative comparison of three aspect mining techniques. In: Proceedings of the 13th International Workshop on Program Comprehension (IWPC 2005), pp. 13\u201322. IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"5_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1007\/978-3-540-39815-8_22","volume-title":"Generative Programming and Component Engineering","author":"S. Chiba","year":"2003","unstructured":"Chiba, S., Nishizawa, M.: An Easy-to-Use Toolkit for Efficient Java Bytecode Translators. In: Pfenning, F., Smaragdakis, Y. (eds.) GPCE 2003. LNCS, vol.\u00a02830, pp. 364\u2013376. Springer, Heidelberg (2003)"},{"key":"5_CR8","first-page":"633","volume-title":"Developing secure applications through aspect-oriented programming","author":"B. Win De","year":"2005","unstructured":"De Win, B., Joosen, W., Piessens, F.: Developing secure applications through aspect-oriented programming, pp. 633\u2013650. Addison-Wesley, Boston (2005)"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"D\u2019Hondt, M., Jonckers, V.: Hybrid aspects for weaving object-oriented functionality and rule-based knowledge. In: Lieberherr [23], pp. 132\u2013140","DOI":"10.1145\/976270.976287"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Douence, R., Fradet, P., S\u00fcdholt, M.: Composition, reuse and interaction analysis of stateful aspects. In: Lieberherr [23], pp. 141\u2013150","DOI":"10.1145\/976270.976288"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Gybels, K., Brichau, J.: Arranging language features for pattern-based crosscuts. In: Ak\u015fit (ed.) [1], pp. 60\u201369","DOI":"10.1145\/643603.643610"},{"key":"5_CR12","unstructured":"Gybels, K., Kellens, A.: An experiment in using inductive logic programming to uncover pointcuts. In: First European Interactive Workshop on Aspects in Software (September 2004)"},{"key":"5_CR13","unstructured":"Hanenberg, S., Oberschulte, C., Unland, R.: Refactoring of aspect-oriented software. In: 4th Annual International Conference on Object-Oriented and Internet-based Technologies, Concepts, and Applications for a Networked World (2003)"},{"key":"5_CR14","unstructured":"Hannemann, J.: The Aspect Mining Tool web site, http:\/\/www.cs.ubc.ca\/labs\/spl\/projects\/amt.html"},{"key":"5_CR15","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1145\/1052898.1052910","volume-title":"Proc. 4rd Int\u2019 Conf. on Aspect-Oriented Software Development AOSD-2005","author":"J. Hannemann","year":"2005","unstructured":"Hannemann, J., Murphy, G., Kiczales, G.: Role-based refactoring of crosscutting concerns. In: Tarr, P. (ed.) Proc. 4rd Int\u2019 Conf. on Aspect-Oriented Software Development AOSD-2005, March, pp. 135\u2013146. ACM Press, New York (2005)"},{"key":"5_CR16","unstructured":"Harrison, W., Ossher, H., Sutton Jr, S.M., Tarr, P.: Concern modeling in the concern manipulation environment. IBM Research Report RC23344, IBM Thomas J. Watson Research Center, Yorktown Heights, NY (September 2004)"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Janzen, D., De Volder, K.: Navigating and querying code without getting lost. In: Ak\u015fit (ed.) [1], pp. 178\u2013187","DOI":"10.1145\/643603.643622"},{"key":"5_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/3-540-45337-7_18","volume-title":"ECOOP 2001 - Object-Oriented Programming","author":"G. Kiczales","year":"2001","unstructured":"Kiczales, G., Hilsdale, E., Hugunin, J., Kersten, M., Palm, J., Griswold, W.G.: An overview of AspectJ. In: Knudsen, J.L. (ed.) ECOOP 2001. LNCS, vol.\u00a02072, pp. 327\u2013353. Springer, Heidelberg (2001)"},{"key":"5_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/BFb0053381","volume-title":"ECOOP \u201997 - Object-Oriented Programming","author":"G. Kiczales","year":"1997","unstructured":"Kiczales, G., Lamping, J., Mendhekar, A., Maeda, C., Lopes, C., Loingtier, J.-M., Irwin, J.: Aspect-oriented programming. In: Aksit, M., Matsuoka, S. (eds.) ECOOP 1997. LNCS, vol.\u00a01241, pp. 220\u2013242. Springer, Heidelberg (1997)"},{"key":"5_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/11531142_9","volume-title":"ECOOP 2005 - Object-Oriented Programming","author":"G. Kiczales","year":"2005","unstructured":"Kiczales, G., Mezini, M.: Separation of concerns with procedures, annotations, advice and pointcuts. In: Black, A.P. (ed.) ECOOP 2005. LNCS, vol.\u00a03586, pp. 195\u2013213. Springer, Heidelberg (2005)"},{"key":"5_CR21","unstructured":"Koppen, C., St\u00f6rzer, M.: PCDiff: Attacking the fragile pointcut problem. In: Gybels, K., Hanenberg, S., Herrmann, S., Wloka, J. (eds.) European Interactive Workshop on Aspects in Software (EIWAS) (September 2004)"},{"key":"5_CR22","unstructured":"Laddad, R.: Aspect-oriented refactoring (December 2003)"},{"volume-title":"Proc. 3rd Int\u2019 Conf. on Aspect-Oriented Software Development (AOSD-2004)","year":"2004","key":"5_CR23","unstructured":"Lieberherr, K. (ed.): Proc. 3rd Int\u2019 Conf. on Aspect-Oriented Software Development (AOSD-2004). ACM Press, New York (2004)"},{"key":"5_CR24","volume-title":"Adaptive Object-Oriented Software: the Demeter Method with Propagation Patterns","author":"K.J. Lieberherr","year":"1996","unstructured":"Lieberherr, K.J.: Adaptive Object-Oriented Software: the Demeter Method with Propagation Patterns. PWS Publishing Company, Boston (1996)"},{"key":"5_CR25","unstructured":"Lieberherr, K.J., Palm, J., Sundaram, R.: Expressiveness and complexity of crosscut languages. In: Leavens, G.T., Clifton, C., L\u00e4mmel, R. (eds.) Foundations of Aspect-Oriented Languages (March 2005)"},{"key":"5_CR26","unstructured":"Monteiro, M.P.: Catalogue of refactorings for aspectj. Technical Report UM-DI-GECSD-200401, Universidade Do Minho (2004)"},{"key":"5_CR27","first-page":"281","volume-title":"Inductive Logic Programming","author":"S. Muggleton","year":"1992","unstructured":"Muggleton, S., Feng, C.: Efficient induction in logic programs. In: Muggleton, S. (ed.) Inductive Logic Programming, pp. 281\u2013298. Academic Press, London (1992)"},{"issue":"10","key":"5_CR28","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1145\/383845.383856","volume":"44","author":"H. Ossher","year":"2001","unstructured":"Ossher, H., Tarr, P.: The shape of things to come: Using multi-dimensional separation of concerns with Hyper\/J to (re)shape evolving software. Comm. ACM\u00a044(10), 43\u201350 (2001)","journal-title":"Comm. ACM"},{"issue":"12","key":"5_CR29","doi-asserted-by":"publisher","first-page":"1053","DOI":"10.1145\/361598.361623","volume":"15","author":"D.L. Parnas","year":"1972","unstructured":"Parnas, D.L.: On the criteria to be used in decomposing systems into modules. Comm. ACM\u00a015(12), 1053\u20131058 (1972)","journal-title":"Comm. ACM"},{"issue":"3","key":"5_CR30","first-page":"239","volume":"5","author":"J.R. Quinlan","year":"1990","unstructured":"Quinlan, J.R.: Learning logical definitions from relations. Machine Learning\u00a05(3), 239\u2013266 (1990)","journal-title":"Machine Learning"},{"key":"5_CR31","unstructured":"Quinlan, R.: Qfoil: the reference foil implementation (2005), Home page at: http:\/\/www.rulequest.com\/Personal\/"},{"key":"5_CR32","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1109\/ASE.2003.1240310","volume-title":"Proceedings of Automated Software Engineering (ASE) 2003","author":"M.P. Robillard","year":"2003","unstructured":"Robillard, M.P., Murphy, G.C.: Automatically inferring concern code from program investigation activities. In: Proceedings of Automated Software Engineering (ASE) 2003, pp. 225\u2013235. IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"5_CR33","unstructured":"Vanderperren, W., Suv\u00e9e, D., Jonckers, V.: Combining AOSD and CBSD in PacoSuite through invasive composition adapters and JAsCo. In: Net.ObjectDays 2003, pp. 36\u201350 (September 2003)"}],"container-title":["Lecture Notes in Computer Science","Software Composition"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11821946_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T09:59:33Z","timestamp":1736503173000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11821946_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540376576","9783540376590"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/11821946_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}