{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:56:48Z","timestamp":1740099408567,"version":"3.37.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030225582"},{"type":"electronic","value":"9783030225599"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-22559-9_10","type":"book-chapter","created":{"date-parts":[[2019,6,29]],"date-time":"2019-06-29T02:33:19Z","timestamp":1561775599000},"page":"215-239","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Crowdsourced Reverse Engineering: Experiences in Applying Crowdsourcing to Concept Assignment"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2761-9009","authenticated-orcid":false,"given":"Sebastian","family":"Heil","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5763-8265","authenticated-orcid":false,"given":"Valentin","family":"Siegert","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6729-2912","authenticated-orcid":false,"given":"Martin","family":"Gaedke","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,29]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1016\/j.scico.2014.09.012","volume":"98","author":"SL Abebe","year":"2015","unstructured":"Abebe, S.L., Tonella, P.: Extraction of domain concepts from the source code. Sci. Comput. Program. 98, 680\u2013706 (2015). \n                    https:\/\/doi.org\/10.1016\/j.scico.2014.09.012","journal-title":"Sci. Comput. Program."},{"issue":"2","key":"10_CR2","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MIC.2013.20","volume":"17","author":"M Allahbakhsh","year":"2013","unstructured":"Allahbakhsh, M., Benatallah, B., Ignjatovic, A., Motahari-Nezhad, H.R., Bertino, E., Dustdar, S.: Quality control in crowdsourcing systems: issues and directions. IEEE Internet Comput. 17(2), 76\u201381 (2013). \n                    https:\/\/doi.org\/10.1109\/MIC.2013.20","journal-title":"IEEE Internet Comput."},{"key":"10_CR3","unstructured":"Arboit, G.: A method for watermarking Java programs via opaque predicates. In: The Fifth International Conference on Electronic Commerce Research (ICECR-5), pp. 102\u2013110 (2002)"},{"key":"10_CR4","unstructured":"Aversano, L., Canfora, G., Cimitile, A., De Lucia, A.: Migrating legacy systems to the web: an experience report. In: Proceedings of the Fifth European Conference on Software Maintenance and Reengineering, pp. 148\u2013157. IEEE Computer Society Press (2001)"},{"issue":"5","key":"10_CR5","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1145\/175290.175300","volume":"37","author":"TJ Biggerstaff","year":"1994","unstructured":"Biggerstaff, T.J., Mitbander, B.G., Webster, D.E.: Program understanding and the concept assignment problem. Commun. ACM 37(5), 72\u201382 (1994). \n                    https:\/\/doi.org\/10.1145\/175290.175300","journal-title":"Commun. ACM"},{"key":"10_CR6","doi-asserted-by":"publisher","unstructured":"Biggerstaff, T., Mitbander, B., Webster, D.: The concept assignment problem in program understanding. In: Proceedings of the 15th International Conference on Software Engineering, ICSE 1993, pp. 482\u2013498. IEEE Computer Society Press (1993). \n                    https:\/\/doi.org\/10.1109\/ICSE.1993.346017","DOI":"10.1109\/ICSE.1993.346017"},{"issue":"2","key":"10_CR7","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/S0164-1212(00)00030-3","volume":"54","author":"G Canfora","year":"2000","unstructured":"Canfora, G., Cimitile, A., De Lucia, A., Di Lucca, G.A.: Decomposing legacy programs: a first step towards migrating to client-server platforms. J. Syst. Softw. 54(2), 99\u2013110 (2000). \n                    https:\/\/doi.org\/10.1016\/S0164-1212(00)00030-3","journal-title":"J. Syst. Softw."},{"issue":"4","key":"10_CR8","doi-asserted-by":"publisher","first-page":"1040","DOI":"10.1007\/s10664-013-9248-x","volume":"19","author":"M Ceccato","year":"2014","unstructured":"Ceccato, M., Di Penta, M., Falcarin, P., Ricca, F., Torchiano, M., Tonella, P.: A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques. Empir. Softw. Eng. 19(4), 1040\u20131074 (2014). \n                    https:\/\/doi.org\/10.1007\/s10664-013-9248-x","journal-title":"Empir. Softw. Eng."},{"issue":"4","key":"10_CR9","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1109\/TSE.2008.36","volume":"34","author":"M Eaddy","year":"2008","unstructured":"Eaddy, M., et al.: Do crosscutting concerns cause defects? IEEE Trans. Softw. Eng. 34(4), 497\u2013515 (2008). \n                    https:\/\/doi.org\/10.1109\/TSE.2008.36","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Heil, S., Felix, F., Gaedke, M.: Exploring crowdsourced reverse engineering. In: Proceedings of the 13th International Conference on Evaluation of Novel Approaches to Software Engineering, pp. 147\u2013158. SCITEPRESS - Science and and Technology Publications (2018)","DOI":"10.5220\/0006758401470158"},{"key":"10_CR11","doi-asserted-by":"publisher","unstructured":"Heil, S., Gaedke, M.: AWSM - Agile web migration for SMEs. In: Proceedings of the 11th International Conference on Evaluation of Novel Software Approaches to Software Engineering, pp. 189\u2013194. SCITEPRESS - Science and Technology Publications (2016). \n                    https:\/\/doi.org\/10.5220\/0005869301890194","DOI":"10.5220\/0005869301890194"},{"key":"10_CR12","doi-asserted-by":"publisher","unstructured":"Heil, S., Gaedke, M.: Web migration - a survey considering the SME perspective. In: Proceedings of the 12th International Conference on Evaluation of Novel Approaches to Software Engineering, pp. 255\u2013262. SCITEPRESS - Science and Technology Publications (2017). \n                    https:\/\/doi.org\/10.5220\/0006353502550262","DOI":"10.5220\/0006353502550262"},{"key":"10_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-319-91662-0_6","volume-title":"Web Engineering","author":"S Heil","year":"2018","unstructured":"Heil, S., Siegert, V., Gaedke, M.: ReWaMP: rapid web migration prototyping leveraging webAssembly. In: Mikkonen, T., Klamma, R., Hern\u00e1ndez, J. (eds.) ICWE 2018. LNCS, vol. 10845, pp. 84\u201392. Springer, Cham (2018). \n                    https:\/\/doi.org\/10.1007\/978-3-319-91662-0_6"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Kazman, R., Brien, L.O., Verhoef, C.: Architecture reconstruction guidelines third edition. Technical report, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, November 2003","DOI":"10.21236\/ADA421612"},{"issue":"1","key":"10_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/MS.2016.12","volume":"33","author":"TTD Latoza","year":"2016","unstructured":"Latoza, T.T.D., van der Hoek, A.: Crowdsourcing in software engineering: models, opportunities, and challenges. IEEE Softw. 33(1), 1\u201313 (2016)","journal-title":"IEEE Softw."},{"key":"10_CR16","series-title":"Public Administration and Information Technology","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/978-3-319-12784-2_12","volume-title":"Policy Practice and Digital Science","author":"E Loukis","year":"2015","unstructured":"Loukis, E., Charalabidis, Y.: Active and passive crowdsourcing in government. In: Janssen, M., Wimmer, M.A., Deljoo, A. (eds.) Policy Practice and Digital Science. PAIT, vol. 10, pp. 261\u2013289. Springer, Cham (2015). \n                    https:\/\/doi.org\/10.1007\/978-3-319-12784-2_12"},{"key":"10_CR17","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.jss.2016.09.015","volume":"126","author":"K Mao","year":"2017","unstructured":"Mao, K., Capra, L., Harman, M., Jia, Y.: A survey of the use of crowdsourcing in software engineering. J. Syst. Softw. 126, 57\u201384 (2017). \n                    https:\/\/doi.org\/10.1016\/j.jss.2016.09.015","journal-title":"J. Syst. Softw."},{"key":"10_CR18","doi-asserted-by":"publisher","unstructured":"Marcus, A., Sergeyev, A., Rajlich, V., Maletic, J.I.: An information retrieval approach to concept location in source code. In: 2004 Proceedings of 11th Working Conference on Reverse Engineering, pp. 214\u2013223. IEEE (2004). \n                    https:\/\/doi.org\/10.1109\/WCRE.2004.10","DOI":"10.1109\/WCRE.2004.10"},{"key":"10_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-642-31753-8_3","volume-title":"Web Engineering","author":"M Nebeling","year":"2012","unstructured":"Nebeling, M., Leone, S., Norrie, M.C.: Crowdsourced web engineering and design. In: Brambilla, M., Tokuda, T., Tolksdorf, R. (eds.) ICWE 2012. LNCS, vol. 7387, pp. 31\u201345. Springer, Heidelberg (2012). \n                    https:\/\/doi.org\/10.1007\/978-3-642-31753-8_3"},{"key":"10_CR20","doi-asserted-by":"publisher","unstructured":"Nebeling, M., Speicher, M., Norrie, M.: CrowdAdapt: enabling crowdsourced web page adaptation for individual viewing conditions and preferences. In: Proceedings of the 5th ACM SIGCHI Symposium on Engineering Interactive Computing System, pp. 23\u201332 (2013). \n                    https:\/\/doi.org\/10.1145\/2480296.2480304","DOI":"10.1145\/2480296.2480304"},{"issue":"3","key":"10_CR21","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1016\/j.im.2015.10.005","volume":"53","author":"J Rose","year":"2016","unstructured":"Rose, J., Jones, M., Furneaux, B.: An integrated model of innovation drivers for smaller software firms. Inf. Manag. 53(3), 307\u2013323 (2016). \n                    https:\/\/doi.org\/10.1016\/j.im.2015.10.005","journal-title":"Inf. Manag."},{"key":"10_CR22","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/B978-0-12-410464-8.00008-8","volume-title":"Economics-Driven Software Architecture","author":"Benjamin Satzger","year":"2014","unstructured":"Satzger, B., et al.: Toward collaborative software engineering leveraging the crowd. In: Economics-Driven Software Architecture, pp. 159\u2013182. Elsevier (2014). \n                    https:\/\/doi.org\/10.1016\/B978-0-12-410464-8.00008-8"},{"key":"10_CR23","doi-asserted-by":"publisher","unstructured":"Saxe, J., Turner, R., Blokhin, K.: CrowdSource: automated inference of high level malware functionality from low-level symbols using a crowd trained machine learning model. In: 2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE), pp. 68\u201375. IEEE, October 2014. \n                    https:\/\/doi.org\/10.1109\/MALWARE.2014.6999417","DOI":"10.1109\/MALWARE.2014.6999417"},{"key":"10_CR24","doi-asserted-by":"publisher","unstructured":"Shepherd, D., Fry, Z.P., Hill, E., Pollock, L., Vijay-Shanker, K.: Using natural language program analysis to locate and understand action-oriented concerns. In: Proceedings of the 6th International Conference on Aspect-Oriented Software Development - AOSD 2007, p. 212. ACM Press, New York (2007). \n                    https:\/\/doi.org\/10.1145\/1218563.1218587","DOI":"10.1145\/1218563.1218587"},{"key":"10_CR25","doi-asserted-by":"publisher","unstructured":"Stol, K.J., Fitzgerald, B.: Two\u2019s company, three\u2019s a crowd: a case study of crowdsourcing software development. In: Proceedings of the 36th International Conference on Software Engineering - ICSE 2014, pp. 187\u2013198. ACM Press, New York (2014). \n                    https:\/\/doi.org\/10.1145\/2568225.2568249","DOI":"10.1145\/2568225.2568249"},{"key":"10_CR26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-05270-6","volume-title":"Model-Driven Software Migration: A Methodology","author":"C Wagner","year":"2014","unstructured":"Wagner, C.: Model-Driven Software Migration: A Methodology. Springer, Wiesbaden (2014). \n                    https:\/\/doi.org\/10.1007\/978-3-658-05270-6"},{"key":"10_CR27","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0817-7","volume-title":"The Renaissance of Legacy Systems: Method Support for Software-System Evolution","author":"I Warren","year":"2012","unstructured":"Warren, I.: The Renaissance of Legacy Systems: Method Support for Software-System Evolution. Springer, Heidelberg (2012). \n                    https:\/\/doi.org\/10.1007\/978-1-4471-0817-7"},{"key":"10_CR28","doi-asserted-by":"publisher","unstructured":"Weidema, E.R.Q., L\u00f3pez, C., Nayebaziz, S., Spanghero, F., van der Hoek, A.: Toward microtask crowdsourcing software design work. In: Proceedings of the 3rd International Workshop on CrowdSourcing in Software Engineering - CSI-SE 2016, pp. 41\u201344. ACM Press, New York (2016). \n                    https:\/\/doi.org\/10.1145\/2897659.2897664","DOI":"10.1145\/2897659.2897664"}],"container-title":["Communications in Computer and Information Science","Evaluation of Novel Approaches to Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22559-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,29]],"date-time":"2019-06-29T02:36:49Z","timestamp":1561775809000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-22559-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030225582","9783030225599"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22559-9_10","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"29 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ENASE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Evaluation of Novel Approaches to Software Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Funchal","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 March 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 March 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"enase2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.enase.org\/?y=2018","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}