{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T08:39:18Z","timestamp":1726043958232},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030304454"},{"type":"electronic","value":"9783030304461"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-30446-1_8","type":"book-chapter","created":{"date-parts":[[2019,9,8]],"date-time":"2019-09-08T23:03:18Z","timestamp":1567983798000},"page":"145-161","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Software Evolution with a Typeful Version Control System"],"prefix":"10.1007","author":[{"given":"Lu\u00eds","family":"Carvalho","sequence":"first","affiliation":[]},{"given":"Jo\u00e3o","family":"Costa\u00a0Seco","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,9]]},"reference":[{"unstructured":"Amsden, E., Newton, R., Siek, J.: Editing functional programs without breaking them. In: IFL 2014 (2014)","key":"8_CR1"},{"doi-asserted-by":"crossref","unstructured":"Bennett, K.H., Rajlich, V.T.: Software maintenance and evolution: a roadmap. In: Proceedings of the Conference on the Future of Software Engineering (2000)","key":"8_CR2","DOI":"10.1145\/336512.336534"},{"unstructured":"Cimpanu, C.: Over 100,000 GitHub repos have leaked API or cryptographic keys. \n                      https:\/\/www.zdnet.com\/article\/over-100000-github-repos-have-leaked-api-or-cryptographic-keys\/","key":"8_CR3"},{"unstructured":"Cimpanu, C.: Security flaws in 100+ Jenkins plugins put enterprise networks at risk. \n                      https:\/\/www.zdnet.com\/article\/security-flaws-in-100-jenkins-plugins-put-enterprise-networks-at-risk\/","key":"8_CR4"},{"issue":"1","key":"8_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/32.895984","volume":"27","author":"SG Eick","year":"2001","unstructured":"Eick, S.G., Graves, T.L., Karr, A.F., Marron, J.S., Mockus, A.: Does code decay? assessing the evidence from change management data. IEEE Trans. Softw. Eng. 27(1), 1\u20132 (2001)","journal-title":"IEEE Trans. Softw. Eng."},{"doi-asserted-by":"crossref","unstructured":"Erwig, M., Ren, D.: A rule-based language for programming software updates. In: Proceedings of the 2002 ACM SIGPLAN Workshop on Rule-Based Programming - RULE 2002, Pittsburgh, Pennsylvania (2002)","key":"8_CR6","DOI":"10.1145\/570186.570193"},{"issue":"7","key":"8_CR7","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1109\/32.859533","volume":"26","author":"T Graves","year":"2000","unstructured":"Graves, T., Karr, A., Marron, J., Siy, H.: Predicting fault incidence using software change history. IEEE Trans. Softw. Eng. 26(7), 653\u2013661 (2000)","journal-title":"IEEE Trans. Softw. Eng."},{"doi-asserted-by":"crossref","unstructured":"Hosek, P., Cadar, C.: Safe software updates via multi-version execution. In: 2013 35th International Conference on Software Engineering (ICSE), May 2013","key":"8_CR8","DOI":"10.1109\/ICSE.2013.6606607"},{"issue":"3","key":"8_CR9","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1145\/503502.503505","volume":"23","author":"A Igarashi","year":"2001","unstructured":"Igarashi, A., Pierce, B.C., Wadler, P.: Featherweight Java: a minimal core calculus for Java and GJ. ACM Trans. Program. Lang. Syst. 23(3), 396\u2013450 (2001)","journal-title":"ACM Trans. Program. Lang. Syst."},{"doi-asserted-by":"crossref","unstructured":"Izurieta, C., Bieman, J.M.: How software designs decay: a pilot study of pattern evolution. In: First International Symposium on Empirical Software Engineering and Measurement (ESEM 2007) (2007)","key":"8_CR10","DOI":"10.1109\/ESEM.2007.55"},{"doi-asserted-by":"crossref","unstructured":"Kim, J., Malaiya, Y.K., Ray, I.: Vulnerability discovery in multi-version software systems. In: 10th IEEE High Assurance Systems Engineering Symposium (HASE 2007) (2007)","key":"8_CR11","DOI":"10.1109\/HASE.2007.78"},{"doi-asserted-by":"crossref","unstructured":"Kim, M., Notkin, D.: Program element matching for multi-version program analyses. In: Proceedings of the 2006 International Workshop on Mining Software Repositories - MSR 2006 (2006)","key":"8_CR12","DOI":"10.1145\/1137983.1137999"},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/BFb0017737","volume-title":"Software Process Technology","author":"MM Lehman","year":"1996","unstructured":"Lehman, M.M.: Laws of software evolution revisited. In: Montangero, C. (ed.) EWSPT 1996. LNCS, vol. 1149, pp. 108\u2013124. Springer, Heidelberg (1996). \n                      https:\/\/doi.org\/10.1007\/BFb0017737"},{"key":"8_CR14","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1145\/3290327","volume":"3","author":"C Omar","year":"2019","unstructured":"Omar, C., Voysey, I., Chugh, R., Hammer, M.A.: Live functional programming with typed holes. Proc. ACM Program. Lang. 3, 14 (2019)","journal-title":"Proc. ACM Program. Lang."},{"issue":"1","key":"8_CR15","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/3093333.3009900","volume":"52","author":"C Omar","year":"2017","unstructured":"Omar, C., Voysey, I., Hilton, M., Aldrich, J., Hammer, M.A.: Hazelnut: a bidirectionally typed structure editor calculus. ACM SIGPLAN Not. 52(1), 86\u201399 (2017)","journal-title":"ACM SIGPLAN Not."},{"key":"8_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-642-15579-6_6","volume-title":"Software Product Lines: Going Beyond","author":"I Schaefer","year":"2010","unstructured":"Schaefer, I., Bettini, L., Bono, V., Damiani, F., Tanzarella, N.: Delta-oriented programming of software product lines. In: Bosch, J., Lee, J. (eds.) SPLC 2010. LNCS, vol. 6287, pp. 77\u201391. Springer, Heidelberg (2010). \n                      https:\/\/doi.org\/10.1007\/978-3-642-15579-6_6"},{"issue":"6","key":"8_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1543135.1542478","volume":"44","author":"S Subramanian","year":"2009","unstructured":"Subramanian, S., Hicks, M., McKinley, K.S.: Dynamic software updates: a VM-centric approach. SIGPLAN Not. 44(6), 1\u201312 (2009)","journal-title":"SIGPLAN Not."},{"unstructured":"Swanson, E.B.: The dimensions of maintenance. In: Proceedings of the 2nd International Conference on Software Engineering (1976)","key":"8_CR18"},{"unstructured":"Driessen, V.: A successful Git branching model, January 2010. \n                      https:\/\/nvie.com\/posts\/a-successful-git-branching-model\/","key":"8_CR19"},{"unstructured":"Wash, R., Rader, E., Vaniea, K., Rizor, M.: Out of the loop: how automated software updates cause unintended security consequences. In: 10th Symposium On Usable Privacy and Security (\n                      \n                        \n                      \n                      $$\\{$$\n                    SOUPS\n                      \n                        \n                      \n                      $$\\}$$\n                     2014) (2014)","key":"8_CR20"},{"issue":"1","key":"8_CR21","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1006\/inco.1994.1093","volume":"115","author":"AK Wright","year":"1994","unstructured":"Wright, A.K., Felleisen, M.: A syntactic approach to type soundness. Inf. Comput. 115(1), 38\u201394 (1994)","journal-title":"Inf. Comput."},{"issue":"6","key":"8_CR22","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1109\/TSE.2005.72","volume":"31","author":"T Zimmermann","year":"2005","unstructured":"Zimmermann, T., Zeller, A., Weissgerber, P., Diehl, S.: Mining version histories to guide software changes. IEEE Trans. Softw. Eng. 31(6), 429\u2013445 (2005)","journal-title":"IEEE Trans. Softw. Eng."}],"container-title":["Lecture Notes in Computer Science","Software Engineering and Formal Methods"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-30446-1_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,8]],"date-time":"2019-09-08T23:41:06Z","timestamp":1567986066000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-30446-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030304454","9783030304461"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-30446-1_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"9 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEFM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Software Engineering and Formal Methods","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Oslo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Norway","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sefm2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/sefm2019.inria.fr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"89","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}