{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T06:40:02Z","timestamp":1748500802757,"version":"3.41.0"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319211541"},{"type":"electronic","value":"9783319211558"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-21155-8_6","type":"book-chapter","created":{"date-parts":[[2015,7,15]],"date-time":"2015-07-15T03:50:45Z","timestamp":1436932245000},"page":"66-81","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Cost-Effective Industrial Software Rejuvenation Using Domain-Specific Models"],"prefix":"10.1007","author":[{"given":"Arjan J.","family":"Mooij","sequence":"first","affiliation":[]},{"given":"Gernot","family":"Eggen","sequence":"additional","affiliation":[]},{"given":"Jozef","family":"Hooman","sequence":"additional","affiliation":[]},{"given":"Hans","family":"van Wezep","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,16]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Baxter, I.D., Pidgeon, C.W., Mehlich, M.: DMS: Program transformations for practical scalable software evolution. In: Proceedings of ICSE 2004, pp. 625\u2013634. IEEE Computer Society (2004)","DOI":"10.1109\/ICSE.2004.1317484"},{"key":"6_CR2","unstructured":"Bray, T., Paolia, J., Sperberg-McQueen, C.M., Maler, E., Yergeau, F.: Extensible Markup Language (XML) 1.0, 5th edn. W3C recommendation, World Wide Web Consortium (2008). http:\/\/www.w3.org\/TR\/2008\/REC-xml-20081126\/"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"de Groot, J., Nugroho, A., B\u00e4ck, T., Visser, J.: What is the value of your software? In: Managing Technical Debt (MTD 2012), pp. 37\u201344. ACM (2012)","DOI":"10.1109\/MTD.2012.6225998"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/978-3-319-02654-1_6","volume-title":"Software Language Engineering","author":"S Fehrenbach","year":"2013","unstructured":"Fehrenbach, S., Erdweg, S., Ostermann, K.: Software evolution to domain-specific languages. In: Erwig, M., Paige, R.F., Van Wyk, E. (eds.) SLE 2013. LNCS, vol. 8225, pp. 96\u2013116. Springer, Heidelberg (2013)"},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1007\/978-3-540-75209-7_33","volume-title":"Model Driven Engineering Languages and Systems","author":"F Fleurey","year":"2007","unstructured":"Fleurey, F., Breton, E., Baudry, B., Nicolas, A., J\u00e9z\u00e9quel, J.-M.: Model-driven engineering for software migration in a large industrial context. In: Engels, G., Opdyke, B., Schmidt, D.C., Weil, F. (eds.) MODELS 2007. LNCS, vol. 4735, pp. 482\u2013497. Springer, Heidelberg (2007)"},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/978-3-642-30729-4_19","volume-title":"Integrated Formal Methods","author":"J Hooman","year":"2012","unstructured":"Hooman, J., Mooij, A.J., van Wezep, H.: Early fault detection in industry using models at various abstraction levels. In: Derrick, J., Gnesi, S., Latella, D., Treharne, H. (eds.) IFM 2012. LNCS, vol. 7321, pp. 268\u2013282. Springer, Heidelberg (2012)"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Klint, P., Landman, D., Vinju, J.J.: Exploring the limits of domain model recovery. In: Proceedings of ICSM 2013, pp. 120\u2013129. IEEE (2013)","DOI":"10.1109\/ICSM.2013.23"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Mooij, A.J., Hooman, J., Albers, R.: Gaining industrial confidence for the introduction of domain-specific languages. In: Proceedings of IEESD 2013, pp. 662\u2013667. IEEE (2013)","DOI":"10.1109\/COMPSACW.2013.83"},{"key":"6_CR9","unstructured":"Parr, T.: Soapbox: Humans should not have to grok XML. IBM developerWorks, IBM, August 2001. http:\/\/www.ibm.com\/developerworks\/library\/x-sbxml\/"},{"key":"6_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1007\/978-3-642-11266-9_53","volume-title":"SOFSEM 2010: Theory and Practice of Computer Science","author":"P Pirkelbauer","year":"2010","unstructured":"Pirkelbauer, P., Dechev, D., Stroustrup, B.: Source code rejuvenation is not refactoring. In: van Leeuwen, J., Muscholl, A., Peleg, D., Pokorn\u00fd, J., Rumpe, B. (eds.) SOFSEM 2010. LNCS, vol. 5901, pp. 639\u2013650. Springer, Heidelberg (2010)"},{"key":"6_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/11787044_17","volume-title":"Model Driven Architecture \u2013 Foundations and Applications","author":"T Reus","year":"2006","unstructured":"Reus, T., Geers, H., van Deursen, A.: Harvesting software systems for MDA-based reengineering. In: Rensink, A., Warmer, J. (eds.) ECMDA-FA 2006. LNCS, vol. 4066, pp. 213\u2013225. Springer, Heidelberg (2006)"},{"issue":"1","key":"6_CR12","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/52.363168","volume":"12","author":"HM Sneed","year":"1995","unstructured":"Sneed, H.M.: Planning the reengineering of legacy systems. IEEE Softw. 12(1), 24\u201334 (1995)","journal-title":"IEEE Softw."},{"key":"6_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1007\/978-3-642-21455-4_8","volume-title":"Formal Methods for Eternal Networked Software Systems","author":"B Steffen","year":"2011","unstructured":"Steffen, B., Howar, F., Merten, M.: Introduction to active automata learning from a practical perspective. In: Bernardo, M., Issarny, V. (eds.) SFM 2011. LNCS, vol. 6659, pp. 256\u2013296. Springer, Heidelberg (2011)"},{"issue":"4","key":"6_CR14","first-page":"4","volume":"12","author":"J-P Tolvanen","year":"2010","unstructured":"Tolvanen, J.-P.: Domain-specific modeling for full code generation. Softw. Tech News (STN) 12(4), 4\u20137 (2010)","journal-title":"Softw. Tech News (STN)"},{"key":"6_CR15","volume-title":"Reverse Engineering of Object-Oriented Code","author":"P Tonella","year":"2005","unstructured":"Tonella, P., Potrich, A.: Reverse Engineering of Object-Oriented Code. Springer, Heidelberg (2005)"},{"key":"6_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19345-3","volume-title":"Process Mining: Discovery","author":"WMP van der Aalst","year":"2011","unstructured":"van der Aalst, W.M.P.: Process Mining: Discovery. Conformance and Enhancement of Business Processes. Springer, Heidelberg (2011)"},{"key":"6_CR17","unstructured":"van der Aalst, W.M.P., van Hee, K.M.: Workflow Management: Models. MIT Press, Methods and Systems (2004)"},{"issue":"6","key":"6_CR18","doi-asserted-by":"publisher","first-page":"79","DOI":"10.5381\/jot.2009.8.6.c6","volume":"8","author":"M Voelter","year":"2009","unstructured":"Voelter, M.: Best practices for DSLs and model-driven development. J. Object Technol. 8(6), 79\u2013102 (2009)","journal-title":"J. Object Technol."},{"key":"6_CR19","unstructured":"Voelter, M.: DSL Engineering (2013). http:\/\/dslbook.org\/"},{"key":"6_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-05270-6","volume-title":"Model-Driven Software Migration: A Methodology","author":"C Wagner","year":"2014","unstructured":"Wagner, C.: Model-Driven Software Migration: A Methodology. Springer, Heidelberg (2014)"},{"key":"6_CR21","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1109\/MS.2013.65","volume":"31","author":"J Whittle","year":"2014","unstructured":"Whittle, J., Hutchinson, J., Rouncefield, M.: The state of practice in model-driven engineering. IEEE Softw. 31, 79\u201385 (2014)","journal-title":"IEEE Softw."}],"container-title":["Lecture Notes in Computer Science","Theory and Practice of Model Transformations"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-21155-8_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T06:21:26Z","timestamp":1748499686000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-21155-8_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319211541","9783319211558"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-21155-8_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"16 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}