{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T09:41:57Z","timestamp":1743068517086,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319219141"},{"type":"electronic","value":"9783319219158"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-21915-8_15","type":"book-chapter","created":{"date-parts":[[2015,8,17]],"date-time":"2015-08-17T12:50:35Z","timestamp":1439815835000},"page":"228-240","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Code Transformation Pattern Alignments and Induction for ERP Legacy Systems Migration"],"prefix":"10.1007","author":[{"given":"Algirdas","family":"Laukaitis","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,18]]},"reference":[{"issue":"3","key":"15_CR1","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1145\/356914.356918","volume":"15","author":"D Angluin","year":"1983","unstructured":"Angluin, D., Smith, C.H.: Inductive inference: theory and methods. ACM Comput. Surv. 15(3), 237\u2013269 (1983)","journal-title":"ACM Comput. Surv."},{"key":"15_CR2","first-page":"1","volume":"3","author":"LE Baum","year":"1972","unstructured":"Baum, L.E.: An inequality and associated maximization technique in statistical estimation of probabilistic functions of a Markov process. Inequalities 3, 1\u20138 (1972)","journal-title":"Inequalities"},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/3-540-60578-9_14","volume-title":"Software Configuration Management","author":"J Buffenbarger","year":"1995","unstructured":"Buffenbarger, J.: Syntactic software merging. In: Estublier, J. (ed.) ICSE-WS 1993\/1995 and SCM 1993\/1995. LNCS, vol. 1005, pp. 153\u2013172. Springer, Heidelberg (1995)"},{"issue":"B","key":"15_CR4","first-page":"1","volume":"39","author":"AE Dempster","year":"1977","unstructured":"Dempster, A.E., Laird, N.M., Rubin, D.B.: Maximum likelihood from incomplete data via the EM algorithm. J. Roy. Stat. Soc. 39(B), 1\u201338 (1977)","journal-title":"J. Roy. Stat. Soc."},{"unstructured":"Ehrenberg M.: Microsoft Dynamics AX 2012. A New Generation in ERP (2011)","key":"15_CR5"},{"issue":"5","key":"15_CR6","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1016\/S0019-9958(67)91165-5","volume":"10","author":"EM Gold","year":"1967","unstructured":"Gold, E.M.: Language identification in the limit. Inf. Control 10(5), 447\u2013474 (1967)","journal-title":"Inf. Control"},{"issue":"3","key":"15_CR7","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1145\/65979.65980","volume":"11","author":"S Horwitz","year":"1989","unstructured":"Horwitz, S., Prins, J., Reps, T.: Integrating noninterfering versions of programs. ACM Trans. Program. Lang. Syst. 11(3), 345\u2013387 (1989)","journal-title":"ACM Trans. Program. Lang. Syst."},{"unstructured":"Hunt J.W., McIlroy M.D.: An algorithm for diferential file comparison. Computer Science Technical report 41, Bell Laboratories (1975)","key":"15_CR8"},{"issue":"5","key":"15_CR9","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1145\/359581.359603","volume":"20","author":"JW Hunt","year":"1977","unstructured":"Hunt, J.W., Szymanski, T.G.: A fast algorithm for computing longest common subsequences. Commun. ACM 20(5), 350\u2013353 (1977)","journal-title":"Commun. ACM"},{"key":"15_CR10","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-0-585-27477-5_4","volume-title":"Reverse Engineering","author":"KA Kontogiannis","year":"1996","unstructured":"Kontogiannis, K.A., DeMori, R., Merlo, E., Galler, M., Bernstein, M.: Pattern matching for clone and concept detection. In: Wills, L., Newcomb, P. (eds.) Reverse Engineering, pp. 77\u2013108. Kluwer Academic Publishers, Norwell (1996)"},{"key":"15_CR11","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-33308-8_1","volume-title":"Information and Software Technologies","author":"A Laukaitis","year":"2012","unstructured":"Laukaitis, A.: Automation of merging in ERP revision control. In: Skersys, T., Butleris, R., Butkiene, R. (eds.) ICIST 2012. CCIS, vol. 319, pp. 1\u201314. Springer, Heidelberg (2012)"},{"key":"15_CR12","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1007\/978-3-642-41947-8_7","volume-title":"Information and Software Technologies","author":"A Laukaitis","year":"2013","unstructured":"Laukaitis, A.: Automation of upgrade process for enterprise resource planning systems. In: Skersys, T., Butleris, R., Butkiene, R. (eds.) ICIST 2013. CCIS, vol. 403, pp. 70\u201381. Springer, Heidelberg (2013)"},{"key":"15_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/978-3-540-73351-5_17","volume-title":"Natural Language Processing and Information Systems","author":"R Laukaitis","year":"2007","unstructured":"Laukaitis, R., Laukaitis, A.: Natural language processing and the conceptual model self-organizing map. In: Kedad, Z., Lammari, N., M\u00e9tais, E., Meziane, F., Rezgui, Y. (eds.) NLDB 2007. LNCS, vol. 4592, pp. 193\u2013203. Springer, Heidelberg (2007)"},{"doi-asserted-by":"crossref","unstructured":"Laukaitis A., Vasilecas O.: Formal concept analysis and information systems modeling. In: Proceedings of the 2007 International Conference on Computer Systems and Technologies, CompSysTech 2007, vol. 45, pp. 93\u2013104 (2007)","key":"15_CR14","DOI":"10.1145\/1330598.1330618"},{"doi-asserted-by":"crossref","unstructured":"McMillan C., Hariri N., Poshyvanyk D., Cleland-Huang J., Mobasher B.: Recommending source code for use in rapid software prototypes. In: 34th International Conference on Software Engineering (ICSE), pp. 848\u2013858 (2012)","key":"15_CR15","DOI":"10.1109\/ICSE.2012.6227134"},{"unstructured":"Mens T.: A formal foundation for object-oriented software evolution. Ph.D. thesis, Vrije Universiteit Brussel - Faculty of Science - Departement of Computer Science - Programming Technology Lab, August 1999","key":"15_CR16"},{"issue":"5","key":"15_CR17","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1109\/TSE.2002.1000449","volume":"28","author":"T Mens","year":"2002","unstructured":"Mens, T.: A state-of-the-art survey on software merging. IEEE Trans. Softw. Eng. 28(5), 449\u2013462 (2002)","journal-title":"IEEE Trans. Softw. Eng."},{"unstructured":"Microsoft Corporation. Microsoft Dynamics NAV (2012)","key":"15_CR18"},{"issue":"20","key":"15_CR19","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1109\/32.295894","volume":"6","author":"S Paul","year":"1994","unstructured":"Paul, S., Prakash, A.: A framework for source code search using program patterns. IEEE Trans. Softw. Eng. 6(20), 463\u2013475 (1994)","journal-title":"IEEE Trans. Softw. Eng."},{"unstructured":"Roy C.K., Cordy J.R.: A survey on software clone detection research. Technical report. Queens University at Kingston (2007)","key":"15_CR20"},{"issue":"1","key":"15_CR21","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1080\/17517575.2010.512092","volume":"5","author":"S Vaucouleur","year":"2011","unstructured":"Vaucouleur, S.: Code query by example. Enterp. IS 5(1), 99\u2013123 (2011)","journal-title":"Enterp. IS"}],"container-title":["Lecture Notes in Business Information Processing","Perspectives in Business Informatics Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-21915-8_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T08:04:10Z","timestamp":1676966650000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-21915-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319219141","9783319219158"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-21915-8_15","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"18 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}