{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:18:38Z","timestamp":1763468318339},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319351216"},{"type":"electronic","value":"9783319351223"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-35122-3_17","type":"book-chapter","created":{"date-parts":[[2016,5,9]],"date-time":"2016-05-09T12:40:26Z","timestamp":1462797626000},"page":"247-264","source":"Crossref","is-referenced-by-count":9,"title":["Pragmatic Software Reuse in Bioinformatics: How Can Social Network Information Help?"],"prefix":"10.1007","author":[{"given":"Xiaoyu","family":"Jin","sequence":"first","affiliation":[]},{"given":"Charu","family":"Khatwani","sequence":"additional","affiliation":[]},{"given":"Nan","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Wagner","sequence":"additional","affiliation":[]},{"given":"Juha","family":"Savolainen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,10]]},"reference":[{"key":"17_CR1","unstructured":"ImageJ: Image Processing and Analysis in Java. \n                      http:\/\/imagej.nih.gov\/ij\/\n                      \n                    . Accessed March 2016"},{"key":"17_CR2","unstructured":"NIH Big Data to Knowledge. \n                      http:\/\/bd2k.nih.gov\n                      \n                    . Accessed March 2016"},{"key":"17_CR3","unstructured":"Protein Quantification Using ImageJ. \n                      http:\/\/openwetware.org\/wiki\/Protein_Quan tification_Using_ImageJ\n                      \n                    . Accessed March 2016"},{"key":"17_CR4","unstructured":"Software Discovery Index: Request for Comments. \n                      https:\/\/nciphub.org\/resources\/888\/download\/Software_Discovery_Index_Meeting_Report_with_comments.pdf\n                      \n                    . Accessed March 2016"},{"key":"17_CR5","unstructured":"Software Discovery Meeting Report. \n                      https:\/\/nciphub.org\/resources\/885\/supportingdocs\n                      \n                    . Accessed March 2016"},{"key":"17_CR6","unstructured":"SoftwareX: An Elsevier Journal. \n                      http:\/\/www.journals.elsevier.com\/softwarex\/\n                      \n                    . Accessed March 2016"},{"key":"17_CR7","unstructured":"StochKit: Stochastic Simulation Kit. \n                      http:\/\/www.engineering.ucsb.edu\/~cse\/Stoch Kit\/StochKit_whatis.html\n                      \n                    . Accessed March 2016"},{"issue":"1","key":"17_CR8","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MS.2013.3","volume":"30","author":"A Begel","year":"2013","unstructured":"Begel, A., Bosch, J., Storey, M.-A.: Bridging software communities through social networking. IEEE Softw. 30(1), 26\u201328 (2013)","journal-title":"IEEE Softw."},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Begel, A., Khoo, Y., Zimmermann, T., Codebook: discovering and exploiting relationships in software repositories. In: ICSE, pp. 125\u2013134 (2010)","DOI":"10.1145\/1806799.1806821"},{"key":"17_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-68073-4_1","volume-title":"High Confidence Software Reuse in Large Systems","author":"H-J Beyer","year":"2008","unstructured":"Beyer, H.-J., Hein, D., Schitter, C., Knodel, J., Muthig, D., Naab, M.: Introducing architecture-centric reuse into a small development organization. In: Mei, H. (ed.) ICSR 2008. LNCS, vol. 5030, pp. 1\u201313. Springer, Heidelberg (2008)"},{"key":"17_CR11","unstructured":"Bhowmik, T., Niu, N., Wang, W., Cheng, J.-R., Li, L., Cao, X.: Optimal group size for software change tasks: a social information foraging perspective. IEEE Trans. Cybern. (to appear)"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Bird, C., Pattison, D., D\u2019Souza, R., Filkov, V., Devanbu, P.: Latent social structure in open source projects. In: FSE, pp. 24\u201335 (2008)","DOI":"10.1145\/1453101.1453107"},{"issue":"5","key":"17_CR13","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MS.2009.147","volume":"26","author":"J Brandt","year":"2009","unstructured":"Brandt, J., Guo, P., Lewenstein, J., Dontcheva, M., Klemmer, S.: Opportunistic programming: writing code to prototype, ideate, and discover. IEEE Softw. 26(5), 18\u201324 (2009)","journal-title":"IEEE Softw."},{"issue":"3","key":"17_CR14","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1016\/j.ipl.2014.11.007","volume":"115","author":"E Constantinou","year":"2015","unstructured":"Constantinou, E., Naskos, A., Kakarontzas, G., Stamelos, I.: Extracting reusable components: A semi-automated approach for complex structures. Inf. Process. Lett. 115(3), 414\u2013417 (2015)","journal-title":"Inf. Process. Lett."},{"issue":"1","key":"17_CR15","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/MS.2012.172","volume":"30","author":"L Dabbish","year":"2013","unstructured":"Dabbish, L., Stuart, H., Tsay, J., Herbsleb, J.: Leveraging transparency. IEEE Softw. 30(1), 37\u201343 (2013)","journal-title":"IEEE Softw."},{"issue":"6","key":"17_CR16","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/52.469757","volume":"12","author":"D Garlan","year":"1995","unstructured":"Garlan, D., Allen, R., Ockerbloom, J.: Architectural mismatch: why reuse is so hard. IEEE Softw. 12(6), 17\u201326 (1995)","journal-title":"IEEE Softw."},{"issue":"4","key":"17_CR17","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MS.2009.86","volume":"26","author":"D Garlan","year":"2009","unstructured":"Garlan, D., Allen, R., Ockerbloom, J.: Architectural mismatch: why reuse is still so hard. IEEE Softw. 26(4), 66\u201369 (2009)","journal-title":"IEEE Softw."},{"key":"17_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/978-3-540-68073-4_38","volume-title":"High Confidence Software Reuse in Large Systems","author":"H-J Happel","year":"2008","unstructured":"Happel, H.-J., Schuster, T., Szulman, P.: Leveraging source code search for reuse. In: Mei, H. (ed.) ICSR 2008. LNCS, vol. 5030, pp. 360\u2013371. Springer, Heidelberg (2008)"},{"issue":"4","key":"17_CR19","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/2377656.2377657","volume":"21","author":"R Holmes","year":"2012","unstructured":"Holmes, R., Walker, R.: Systematizing pragmatic software reuse. ACM Trans. Softw. Eng. Methodol. 21(4), 20 (2012)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"17_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1007\/11763864_22","volume-title":"Reuse of Off-the-Shelf Components","author":"O Hummel","year":"2006","unstructured":"Hummel, O., Atkinson, C.: Using the web as a reuse repository. In: Morisio, M. (ed.) ICSR 2006. LNCS, vol. 4039, pp. 298\u2013311. Springer, Heidelberg (2006)"},{"issue":"2","key":"17_CR21","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/j.jss.2012.08.041","volume":"86","author":"G Kakarontzas","year":"2013","unstructured":"Kakarontzas, G., Constantinou, E., Ampatzoglou, A., Stamelos, I.: Layer assessment of object-oriented software: A metric facilitating white-box reuse. J. Syst. Softw. 86(2), 349\u2013366 (2013)","journal-title":"J. Syst. Softw."},{"key":"17_CR22","doi-asserted-by":"crossref","unstructured":"Ko, A., DeLine, R., Venolia, G.: Information needs in collocated software development teams. In: ICSE, pp. 344\u2013353 (2007)","DOI":"10.1109\/ICSE.2007.45"},{"issue":"2","key":"17_CR23","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1145\/130844.130856","volume":"24","author":"C Krueger","year":"1992","unstructured":"Krueger, C.: Software reuse. ACM Comput. Surv. 24(2), 131\u2013183 (1992)","journal-title":"ACM Comput. Surv."},{"issue":"4","key":"17_CR24","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1016\/j.infsof.2010.11.009","volume":"53","author":"OAL Lemos","year":"2011","unstructured":"Lemos, O.A.L., Bajracharya, S.K., Ossher, J., Masiero, P.C., Lopes, C.V.: A test-driven approach to code search and its application to the reuse of auxiliary functionality. Inf. Softw. Technol. 53(4), 294\u2013306 (2011)","journal-title":"Inf. Softw. Technol."},{"key":"17_CR25","doi-asserted-by":"crossref","unstructured":"Maras, J., S\u0306tula, M., Crnkovi\u0107, I.: Towards specifying pragmatic software reuse. In: ECSAW, Article No. 54 (2015)","DOI":"10.1145\/2797433.2797489"},{"key":"17_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/978-3-540-68073-4_20","volume-title":"High Confidence Software Reuse in Large Systems","author":"N Niu","year":"2008","unstructured":"Niu, N., Easterbrook, S.: Exploiting COTS-based RE methods: An experience report. In: Mei, H. (ed.) ICSR 2008. LNCS, vol. 5030, pp. 212\u2013216. Springer, Heidelberg (2008)"},{"key":"17_CR27","unstructured":"Niu, N., Jin, X., Niu, Z., Cheng, J.-R., Li, L., Kataev, M.: A clustering-based approach to enriching code foraging environment. IEEE Trans. Cybern. (to appear)"},{"key":"17_CR28","doi-asserted-by":"crossref","unstructured":"Niu, N., Mahmoud, A., Bradshaw, G.: Information foraging as a foundation for code navigation. In: ICSE, pp. 816\u2013819 (2011)","DOI":"10.1145\/1985793.1985911"},{"issue":"3","key":"17_CR29","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1109\/JSYST.2013.2260092","volume":"8","author":"N Niu","year":"2014","unstructured":"Niu, N., Savolainen, J., Niu, Z., Jin, M., Cheng, J.-R.: A systems approach to product line requirements reuse. IEEE Syst. J. 8(3), 827\u2013836 (2014)","journal-title":"IEEE Syst. J."},{"issue":"1","key":"17_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1049\/iet-sen.2012.0089","volume":"7","author":"N Niu","year":"2013","unstructured":"Niu, N., Yang, F., Cheng, J.-R., Reddivari, S.: Conflict resolution support for parallel software development. IET Softw. 7(1), 1\u201311 (2013)","journal-title":"IET Softw."},{"issue":"17","key":"17_CR31","doi-asserted-by":"publisher","first-page":"2457","DOI":"10.1093\/bioinformatics\/btr401","volume":"27","author":"K Sanft","year":"2011","unstructured":"Sanft, K., Wu, S., Roh, M., Fu, J., Lim, R., Petzold, L.: StochKit2: software for discrete stochastic simulation of biochemical systems with events. Bioinform. 27(17), 2457\u20132458 (2011)","journal-title":"Bioinform."},{"issue":"6","key":"17_CR32","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/MS.2013.96","volume":"30","author":"J Savolainen","year":"2013","unstructured":"Savolainen, J., Niu, N., Mikkonen, T., Fogdal, T.: Long-term product-line sustainability through planned staged investments. IEEE Softw. 30(6), 63\u201369 (2013)","journal-title":"IEEE Softw."},{"issue":"1","key":"17_CR33","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1111\/j.1432-1033.1968.tb00175.x","volume":"4","author":"E Sel\u2019Kov","year":"1968","unstructured":"Sel\u2019Kov, E.: Self-oscillations in glycolysis. Eur. J. Biochem. 4(1), 79\u201386 (1968)","journal-title":"Eur. J. Biochem."},{"issue":"4","key":"17_CR34","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1109\/TSE.2008.26","volume":"34","author":"J Sillito","year":"2008","unstructured":"Sillito, J., Murphy, G., De Volder, K.: Asking and answering questions during a programming change task. IEEE Trans. Softw. Eng. 34(4), 434\u2013451 (2008)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"17_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-642-38977-1_14","volume-title":"Safe and Secure Software Reuse","author":"Y Zou","year":"2013","unstructured":"Zou, Y., Liu, C., Jin, Y., Xie, B.: Assessing software quality through web comment search and analysis. In: Favaro, J., Morisio, M. (eds.) ICSR 2013. LNCS, vol. 7925, pp. 208\u2013223. Springer, Heidelberg (2013)"}],"container-title":["Lecture Notes in Computer Science","Software Reuse: Bridging with Social-Awareness"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-35122-3_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T03:33:44Z","timestamp":1559446424000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-35122-3_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319351216","9783319351223"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-35122-3_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}