{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T04:11:57Z","timestamp":1748664717922,"version":"3.41.0"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319249117"},{"type":"electronic","value":"9783319249124"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24912-4_13","type":"book-chapter","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T18:07:30Z","timestamp":1444154850000},"page":"177-192","source":"Crossref","is-referenced-by-count":5,"title":["Generating Software Documentation in Use Case Maps from Filtered Execution Traces"],"prefix":"10.1007","author":[{"given":"Edna","family":"Braun","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Daniel","family":"Amyot","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Timothy C.","family":"Lethbridge","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2015,11,28]]},"reference":[{"key":"13_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1007\/3-540-36573-7_9","volume-title":"Telecommunications and Beyond: The Broader Applicability of SDL and MSC","author":"D Amyot","year":"2003","unstructured":"Amyot, D., Mansurov, N., Mussbacher, G.: Understanding existing software with use case map scenarios. In: Sherratt, E. (ed.) SAM 2002. LNCS, vol. 2599, pp. 124\u2013140. Springer, Heidelberg (2003). http:\/\/dx.doi.org\/10.1007\/3-540-36573-7_9"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Amyot, D., Mussbacher, G.: User requirements notation: the first ten years, the next ten years. JSW 6(5), 747\u2013768 (2011). http:\/\/dx.doi.org\/10.4304\/jsw.6.5.747-768","DOI":"10.4304\/jsw.6.5.747-768"},{"key":"13_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1007\/3-540-48166-4_14","volume-title":"Software Engineering - ESEC\/FSE 1999","author":"T Ball","year":"1999","unstructured":"Ball, T.: The concept of dynamic analysis. In: Wang, J., Lemoine, M. (eds.) ESEC 1999 and ESEC-FSE 1999. LNCS, vol. 1687, p. 216. Springer, Heidelberg (1999). http:\/\/dx.doi.org\/10.1007\/3-540-48166-4_14"},{"key":"13_CR4","unstructured":"Braun, E.: Reverse engineering behavioural models by filtering out utilities from execution traces. Ph.D. thesis, University of Ottawa, Canada (2013). http:\/\/hdl.handle.net\/10393\/26093"},{"issue":"9","key":"13_CR5","doi-asserted-by":"crossref","first-page":"642","DOI":"10.1109\/TSE.2006.96","volume":"32","author":"L Briand","year":"2006","unstructured":"Briand, L., Labiche, Y., Leduc, J.: Toward the reverse engineering of UML sequence diagrams for distributed Java software. IEEE Trans. Softw. Eng. 32(9), 642\u2013663 (2006)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"12","key":"13_CR6","doi-asserted-by":"crossref","first-page":"1131","DOI":"10.1109\/32.738343","volume":"24","author":"R Buhr","year":"1998","unstructured":"Buhr, R.: Use case maps as architectural entities for complex systems. IEEE Trans. Softw. Eng. 24(12), 1131\u20131155 (1998)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"11","key":"13_CR7","doi-asserted-by":"crossref","first-page":"1329","DOI":"10.1109\/TC.2005.186","volume":"54","author":"M Burtscher","year":"2005","unstructured":"Burtscher, M., Ganusov, I., Jackson, S., Ke, J., Ratanaworabhan, P., Sam, N.: The VPC trace-compression algorithms. IEEE Trans. Comput. 54(11), 1329\u20131344 (2005)","journal-title":"IEEE Trans. Comput."},{"issue":"5","key":"13_CR8","doi-asserted-by":"crossref","first-page":"684","DOI":"10.1109\/TSE.2009.28","volume":"35","author":"B Cornelissen","year":"2009","unstructured":"Cornelissen, B., Zaidman, A., van Deursen, A., Moonen, L., Koschke, R.: A systematic survey of program comprehension through dynamic analysis. IEEE Trans. Softw. Eng. 35(5), 684\u2013702 (2009)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Di Lucca, G., Di Penta, M.: Integrating static and dynamic analysis to improve the comprehension of existing web applications. In: Web Site Evolution 2005, (WSE 2005), Seventh IEEE International Symposium, pp. 87\u201394, Sept 2005. http:\/\/dx.doi.org\/10.1109\/WSE.2005.8","DOI":"10.1109\/WSE.2005.8"},{"issue":"1","key":"13_CR10","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1002\/smr.567","volume":"25","author":"B Dit","year":"2013","unstructured":"Dit, B., Revelle, M., Gethers, M., Poshyvanyk, D.: Feature location in source code: a Taxonomy and survey. J. Softw. Evol. Process 25(1), 53\u201395 (2013). http:\/\/dx.doi.org\/10.1002\/smr.567","journal-title":"J. Softw. Evol. Process"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Dugerdil, P., Jossi, S.: Empirical assessment of execution trace segmentation in reverse-engineering. In: ICSOFT 2008, Volume SE\/MUSE\/GSDCA, pp. 20\u201327. INSTICC Press (2008)","DOI":"10.5220\/0001877200200027"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Dugerdil, P., Repond, J.: Automatic generation of abstract views for legacy software comprehension. In: ISEC 2010, pp. 23\u201332. ACM, New York (2010). http:\/\/dx.doi.org\/10.1145\/1730874.1730881","DOI":"10.1145\/1730874.1730881"},{"key":"13_CR13","unstructured":"Eclipse Foundation: Eclipse Test and Performance Tools Platform Project (2011). http:\/\/www.eclipse.org\/tptp\/"},{"issue":"3","key":"13_CR14","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1109\/TSE.2003.1183929","volume":"29","author":"T Eisenbarth","year":"2003","unstructured":"Eisenbarth, T., Koschke, R., Simon, D.: Locating features in source code. IEEE Trans. Softw. Eng. 29(3), 210\u2013224 (2003). http:\/\/dx.doi.org\/10.1109\/TSE.2003.1183929","journal-title":"IEEE Trans. Softw. Eng."},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Hamou-Lhadj, A., Braun, E., Amyot, D., Lethbridge, T.: Recovering behavioral design models from execution traces. In: 9th Software Maintenance and Reengineering (CSMR), pp. 112\u2013121, March 2005. http:\/\/dx.doi.org\/10.1109\/CSMR.2005.46","DOI":"10.1109\/CSMR.2005.46"},{"key":"13_CR16","unstructured":"Hamou-Lhadj, A.: Techniques to simplify the analysis of execution traces for program comprehension. Ph.D. thesis, University of Ottawa, Canada (2006). http:\/\/hdl.handle.net\/10393\/29296"},{"key":"13_CR17","unstructured":"International Telecommunication Union: ITU-T Recommendation Z.151 (10\/12) - User Requirements Notation (URN) - Language Definition (2012). http:\/\/www.itu.int\/rec\/T-REC-Z.151-201210-I"},{"key":"13_CR18","unstructured":"Lee, H.B., Zorn, B.G.: BIT: a tool for instrumenting Java bytecodes. In: USITS 1997, pp. 7\u20137. USENIX Association, Berkeley (1997)"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"von Mayrhauser, A., Vans, A.: Program understanding behavior during adaptation of large scale software. In: IWPC 1998, pp. 164\u2013172, Jun 1998. http:\/\/dx.doi.org\/10.1109\/WPC.1998.693345","DOI":"10.1109\/WPC.1998.693345"},{"issue":"4","key":"13_CR20","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1109\/TSE.1976.233837","volume":"2","author":"TJ McCabe","year":"1976","unstructured":"McCabe, T.J.: A complexity measure. IEEE Trans. Softw. Eng. 2(4), 308\u2013320 (1976)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"13_CR21","doi-asserted-by":"crossref","unstructured":"Mussbacher, G., Amyot, D.: Goal and scenario modeling, analysis, and transformation with jUCMNav. In: Software Engineering - Companion Volume, pp. 431\u2013432, May 2009. http:\/\/dx.doi.org\/10.1109\/ICSE-COMPANION.2009.5071047","DOI":"10.1109\/ICSE-COMPANION.2009.5071047"},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Richner, T., Ducasse, S.: Recovering high-level views of object-oriented applications from static and dynamic information. In: IEEE International Conference on Software Maintenance, pp. 13\u201322 (1999). http:\/\/dx.doi.org\/10.1109\/ICSM.1999.792487","DOI":"10.1109\/ICSM.1999.792487"},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Rilling, J., Seffah, A., Bouthlier, C.: The CONCEPT project - applying source code analysis to reduce information complexity of static and dynamic visualization techniques. In: Visualizing Software for Understanding and Analysis, pp. 90\u201399 (2002). http:\/\/dx.doi.org\/10.1109\/VISSOF.2002.1019798","DOI":"10.1109\/VISSOF.2002.1019798"},{"key":"13_CR24","unstructured":"Sauer, F.: Metrics 1.3.6 (2013). http:\/\/metrics.sourceforge.net\/"},{"key":"13_CR25","unstructured":"Som\u00e9, S.S.: Use Case Editor (UCEd) (2007). http:\/\/www.site.uottawa.ca\/ ssome\/Use_Case_Editor_UCEd.html"},{"key":"13_CR26","doi-asserted-by":"crossref","unstructured":"Syst\u00e4, T.: Understanding the behaviour of Java programs. In: WCRE 2000, pp. 214\u2013223. IEEE CS (2000). http:\/\/dx.doi.org\/10.1109\/WCRE.2000.891472","DOI":"10.1109\/WCRE.2000.891472"},{"key":"13_CR27","doi-asserted-by":"crossref","unstructured":"Syst\u00e4, T., Yu, P., Muller, H.: Analyzing Java software by combining metrics and program visualization. In: 4th Software Maintenance and Reengineering Conference, pp. 199\u2013208, Feb 2000. http:\/\/dx.doi.org\/10.1109\/CSMR.2000.827328","DOI":"10.1109\/CSMR.2000.827328"},{"issue":"5","key":"13_CR28","doi-asserted-by":"crossref","first-page":"474","DOI":"10.1007\/s11741-007-0507-2","volume":"11","author":"Y Wang","year":"2007","unstructured":"Wang, Y., Li, Q., Chen, P., Ren, C.: Dynamic fan-in and fan-out metrics for program comprehension. J. Shanghai Univ. (English Edition) 11(5), 474\u2013479 (2007). http:\/\/dx.doi.org\/10.1007\/s11741-007-0507-2","journal-title":"J. Shanghai Univ. (English Edition)"},{"issue":"1","key":"13_CR29","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1002\/smr.4360070105","volume":"7","author":"N Wilde","year":"1995","unstructured":"Wilde, N., Scully, M.C.: Software reconnaissance: mapping program features to code. J. Softw. Maintenance Res. Pract. 7(1), 49\u201362 (1995)","journal-title":"J. Softw. Maintenance Res. Pract."},{"key":"13_CR30","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-4625-2","volume-title":"Experimentation in Software Engineering: An Introduction","author":"C Wohlin","year":"2000","unstructured":"Wohlin, C., Runeson, P., H\u00f6st, M., Ohlsson, M.C., Regnell, B., Wessl\u00e9n, A.: Experimentation in Software Engineering: An Introduction. Kluwer Academic Publishers, Norwell (2000)"}],"container-title":["Lecture Notes in Computer Science","SDL 2015: Model-Driven Engineering for Smart Cities"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24912-4_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T22:50:37Z","timestamp":1748645437000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24912-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319249117","9783319249124"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24912-4_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}