{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:22:23Z","timestamp":1743081743778,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031425912"},{"type":"electronic","value":"9783031425929"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-42592-9_19","type":"book-chapter","created":{"date-parts":[[2023,9,7]],"date-time":"2023-09-07T23:04:03Z","timestamp":1694127843000},"page":"283-291","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Automated Reverse Engineering of\u00a0the\u00a0Technology-Induced Software System Structure"],"prefix":"10.1007","author":[{"given":"Yves R.","family":"Kirschner","sequence":"first","affiliation":[]},{"given":"Jan","family":"Keim","sequence":"additional","affiliation":[]},{"given":"Nico","family":"Peter","sequence":"additional","affiliation":[]},{"given":"Anne","family":"Koziolek","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,8]]},"reference":[{"key":"19_CR1","volume-title":"Implementing Domain-specific Languages with Xtext and Xtend","author":"L Bettini","year":"2016","unstructured":"Bettini, L.: Implementing Domain-specific Languages with Xtext and Xtend. Packt Publishing Ltd., Birmingham (2016)"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Bruneliere, H., Cabot, J., Jouault, F., Madiot, F.: MoDisco: a generic and extensible framework for model driven reverse engineering. In: Proceedings of the 25th IEEE\/ACM International Conference on Automated Software Engineering (2010)","DOI":"10.1145\/1858996.1859032"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Cai, Y., Wang, H., Wong, S., Wang, L.: Leveraging design rules to improve software architecture recovery. In: Proceedings of the 9th International ACM Sigsoft Conference on Quality of Software Architectures, QoSA 2013. ACM (2013)","DOI":"10.1145\/2465478.2465480"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Canfora, G., Di Penta, M.: New frontiers of reverse engineering. In: 2007 Future of Software Engineering, FOSE 2007. IEEE Computer Society (2007)","DOI":"10.1109\/FOSE.2007.15"},{"key":"19_CR5","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1145\/1924421.1924451","volume":"54","author":"G Canfora","year":"2011","unstructured":"Canfora, G., Di Penta, M., Cerulo, L.: Achievements and challenges in software reverse engineering. Commun. ACM 54, 142\u2013151 (2011)","journal-title":"Commun. ACM"},{"key":"19_CR6","unstructured":"Favre, J.M.: Foundations of model (driven) (reverse) engineering. In: Language Engineering for Model-Driven Software Development (2005)"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Garcia, J., Ivkovic, I., Medvidovic, N.: A comparative analysis of software architecture recovery techniques. In: ASE 2013 (2013)","DOI":"10.1109\/ASE.2013.6693106"},{"key":"19_CR8","unstructured":"Garz\u00f3n, M.A., Lethbridge, T.C., Aljamaan, H.I., Badreddin, O.: Reverse engineering of object-oriented code into Umple using an incremental and rule-based approach. In: CASCON 2014 (2014)"},{"key":"19_CR9","unstructured":"Kazman, R., Woods, S., Carriere, S.: Requirements for integrating software architecture and reengineering models: CORUM II. In: Proceedings Fifth Working Conference on Reverse Engineering (Cat. No.98TB100261) (1998)"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Pautasso, C., Wilde, E.: RESTful web services: principles, patterns, emerging technologies. In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010. ACM (2010)","DOI":"10.1145\/1772690.1772929"},{"key":"19_CR11","doi-asserted-by":"publisher","first-page":"14516","DOI":"10.1109\/ACCESS.2017.2733518","volume":"5","author":"C Raibulet","year":"2017","unstructured":"Raibulet, C., Fontana, F.A., Zanoni, M.: Model-driven reverse engineering approaches: a systematic literature review. IEEE Access 5, 14516\u201314542 (2017)","journal-title":"IEEE Access"},{"key":"19_CR12","volume-title":"Modeling and Simulating Software Architectures - The Palladio Approach","author":"RH Reussner","year":"2016","unstructured":"Reussner, R.H., Becker, S., Happe, J., Koziolek, A., Koziolek, H.: Modeling and Simulating Software Architectures - The Palladio Approach. MIT Press, Cambridge (2016)"},{"key":"19_CR13","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/6294.977775","volume":"3","author":"J Roy","year":"2001","unstructured":"Roy, J., Ramanujan, A.: Understanding web services. IT Prof. 3, 69\u201373 (2001)","journal-title":"IT Prof."}],"container-title":["Lecture Notes in Computer Science","Software Architecture"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-42592-9_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,7]],"date-time":"2023-09-07T23:08:17Z","timestamp":1694128097000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-42592-9_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031425912","9783031425929"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-42592-9_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"8 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Software Architecture","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Istanbul","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"T\u00fcrkiye","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ecsa2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"71","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}