{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:25:55Z","timestamp":1742912755997,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030057664"},{"type":"electronic","value":"9783030057671"}],"license":[{"start":{"date-parts":[[2018,12,11]],"date-time":"2018-12-11T00:00:00Z","timestamp":1544486400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-05767-1_9","type":"book-chapter","created":{"date-parts":[[2018,12,10]],"date-time":"2018-12-10T16:53:33Z","timestamp":1544460813000},"page":"125-148","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Benefits and Drawbacks of Representing and Analyzing Source Code and Software Engineering Artifacts with Graph Databases"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9903-6107","authenticated-orcid":false,"given":"Rudolf","family":"Ramler","sequence":"first","affiliation":[]},{"given":"Georg","family":"Buchgeher","sequence":"additional","affiliation":[]},{"given":"Claus","family":"Klammer","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Pfeiffer","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Salomon","sequence":"additional","affiliation":[]},{"given":"Hannes","family":"Thaller","sequence":"additional","affiliation":[]},{"given":"Lukas","family":"Linsbauer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,11]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Alves, T.L., Hage, J., Rademaker, P.: A comparative study of code query technologies. In: 11th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM) 2011, pp. 145\u2013154. IEEE (2011)","DOI":"10.1109\/SCAM.2011.14"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Angerer, F., Pr\u00e4hofer, H., Ramler, R., Grillenberger, F.: Points-to analysis of IEC 61131\u20133 programs: Implementation and application. In: IEEE 18th Conference on Emerging Technologies & Factory Automation (ETFA) 2013, pp. 1\u20138. IEEE (2013)","DOI":"10.1109\/ETFA.2013.6648062"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Angles, R.: A comparison of current graph database models. In: IEEE 28th International Conference on Data Engineering Workshops (ICDEW) 2012. pp. 171\u2013177. IEEE (2012)","DOI":"10.1109\/ICDEW.2012.31"},{"issue":"1","key":"9_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1322432.1322433","volume":"40","author":"R Angles","year":"2008","unstructured":"Angles, R., Gutierrez, C.: Survey of graph database models. ACM Comput. Surv. (CSUR) 40(1), 1 (2008)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Buchgeher, G., Ernstbrunner, C., Ramler, R., Lusser, M.: Towards tool-support for test case selection in manual regression testing. In: IEEE Sixth International Conference on Software Testing, Verification and Validation Workshops (ICSTW) 2013, pp. 74\u201379. IEEE (2013)","DOI":"10.1109\/ICSTW.2013.16"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Buchgeher, G., Weinreich, R., Huber, H.: A platform for the automated provisioning of architecture information for large-scale service-oriented software systems. In: European Conference on Software Architecture. Springer (2018) (to appear)","DOI":"10.1007\/978-3-030-00761-4_14"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Fleck, G., Kirchmayr, W., Moser, M., Nocke, L., Pichler, J., Tober, R., Witlatschil, M.: Experience report on building ASTM based tools for multi-language reverse engineering. In:IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER) 2016, vol. 1, pp. 683\u2013687. IEEE (2016)","DOI":"10.1109\/SANER.2016.33"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Goonetilleke, O., Meibusch, D., Barham, B.: Graph data management of evolving dependency graphs for multi-versioned codebases. In: IEEE International Conference on Software Maintenance and Evolution (ICSME) 2017, pp. 574\u2013583. IEEE (2017)","DOI":"10.1109\/ICSME.2017.54"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Hawes, N., Barham, B., Cifuentes, C.: Frapp\u00e9: Querying the Linux kernel dependency graph. In: Proceedings of the GRADES 2015, p. 4. ACM (2015)","DOI":"10.1145\/2764947.2764951"},{"key":"9_CR10","volume-title":"Gradle Dependency Management","author":"HK Ikkink","year":"2015","unstructured":"Ikkink, H.K.: Gradle Dependency Management. Packt Publishing, Birmingham (2015)"},{"key":"9_CR11","series-title":"Concepts and Programming Languages, Requirements for Programming Systems Decision-making Aids","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12015-2","volume-title":"IEC 61131\u20133: Programming Industrial Automation Systems","author":"KH John","year":"2010","unstructured":"John, K.H., Tiegelkamp, M.: IEC 61131\u20133: Programming Industrial Automation Systems. Concepts and Programming Languages, Requirements for Programming Systems Decision-making Aids. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-12015-2"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Juergens, E., Hummel, B., Deissenboeck, F., Feilkas, M., Schlogel, C., Wubbeke, A.: Regression test selection of manual system tests in practice. In: 15th European Conference on Software Maintenance and Reengineering, pp. 309\u2013312, March 2011","DOI":"10.1109\/CSMR.2011.44"},{"issue":"5","key":"9_CR13","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MS.2009.117","volume":"27","author":"L Passos","year":"2010","unstructured":"Passos, L., Terra, R., Valente, M.T., Diniz, R., das Mendonca, N.C.: Static architecture-conformance checking: an illustrative overview. IEEE Softw. 27(5), 82\u201389 (2010)","journal-title":"IEEE Softw."},{"issue":"9","key":"9_CR14","doi-asserted-by":"publisher","first-page":"1155","DOI":"10.1002\/spe.2346","volume":"46","author":"R Pawlak","year":"2015","unstructured":"Pawlak, R., Monperrus, M., Petitprez, N., Noguera, C., Seinturier, L.: SPOON: A library for implementing analyses and transformations of Java source code. Softw. Pract. Exp. 46(9), 1155\u20131179 (2015)","journal-title":"Softw. Pract. Exp."},{"issue":"1","key":"9_CR15","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/TII.2016.2604760","volume":"13","author":"H Pr\u00e4hofer","year":"2017","unstructured":"Pr\u00e4hofer, H., Angerer, F., Ramler, R., Grillenberger, F.: Static code analysis of iec 61131\u20133 programs: Comprehensive tool support and experiences from large-scale industrial application. IEEE Trans. Ind. Inform. 13(1), 37\u201347 (2017)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Pr\u00e4hofer, H., Angerer, F., Ramler, R., Lacheiner, H., Grillenberger, F.: Opportunities and challenges of static code analysis of iec 61131\u20133 programs. In: IEEE 17th Conference on Emerging Technologies & Factory Automation (ETFA), pp. 1\u20138. IEEE (2012)","DOI":"10.1109\/ETFA.2012.6489535"},{"key":"9_CR17","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-319-49421-0_10","volume-title":"Software Quality. Complexity and Challenges of Software Engineering in Emerging Technologies","author":"R Ramler","year":"2017","unstructured":"Ramler, R., Salomon, C., Buchgeher, G., Lusser, M.: Tool support for change-based regression testing: an industry experience report. In: Winkler, D., Biffl, S., Bergsmann, J. (eds.) SWQD 2017. LNBIP, vol. 269, pp. 133\u2013152. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-49421-0_10"},{"key":"9_CR18","volume-title":"Graph Databases: New Opportunities for Connected Data","author":"I Robinson","year":"2015","unstructured":"Robinson, I., Webber, J., Eifrem, E.: Graph Databases: New Opportunities for Connected Data. O\u2019Reilly. Media Inc., Sebastopol (2015)"},{"key":"9_CR19","series-title":"Guidelines and Examples","doi-asserted-by":"publisher","DOI":"10.1002\/9781118181034","volume-title":"Case Study Research in Software Engineering","author":"P Runeson","year":"2012","unstructured":"Runeson, P., Host, M., Rainer, A., Regnell, B.: Case Study Research in Software Engineering. Guidelines and Examples. Wiley, Hoboken (2012)"},{"key":"9_CR20","unstructured":"Thaller, H.: Probabilistic Software Modeling, Jun 2018. arXiv:1806.08942 [cs]"},{"key":"9_CR21","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.scico.2013.11.010","volume":"97","author":"RG Urma","year":"2015","unstructured":"Urma, R.G., Mycroft, A.: Source-code queries with graph databases-with application to programming language usage and evolution. Sci. Comput. Program. 97, 127\u2013134 (2015)","journal-title":"Sci. Comput. Program."},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Yamaguchi, F., Golde, N., Arp, D., Rieck, K.: Modeling and discovering vulnerabilities with code property graphs. In: IEEE Symposium on Security and Privacy (SP), pp. 590\u2013604. IEEE (2014)","DOI":"10.1109\/SP.2014.44"},{"issue":"2","key":"9_CR23","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1002\/stv.430","volume":"22","author":"S Yoo","year":"2012","unstructured":"Yoo, S., Harman, M.: Regression testing minimization, selection and prioritization: a survey. Softw. Test. Verif. Reliab. 22(2), 67\u2013120 (2012)","journal-title":"Softw. Test. Verif. Reliab."},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Zhang, T., Pan, M., Zhao, J., Yu, Y., Li, X.: An open framework for semantic code queries on heterogeneous repositories. In: International Symposium on Theoretical Aspects of Software Engineering (TASE), pp. 39\u201346. IEEE (2015)","DOI":"10.1109\/TASE.2015.27"}],"container-title":["Lecture Notes in Business Information Processing","Software Quality: The Complexity and Challenges of Software Engineering and Software Quality in the Cloud"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05767-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T14:01:46Z","timestamp":1710338506000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-05767-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,11]]},"ISBN":["9783030057664","9783030057671"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05767-1_9","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2018,12,11]]},"assertion":[{"value":"11 December 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SWQD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Software Quality","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vienna","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 January 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 January 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"swqd2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.software-quality-days.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4-5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2 invited papers are included","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}