{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T16:46:39Z","timestamp":1746290799603},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540254201"},{"type":"electronic","value":"9783540319849"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31984-9_8","type":"book-chapter","created":{"date-parts":[[2010,7,13]],"date-time":"2010-07-13T14:26:18Z","timestamp":1279031178000},"page":"96-110","source":"Crossref","is-referenced-by-count":14,"title":["Improving the Build Architecture of Legacy C\/C++ Software Systems"],"prefix":"10.1007","author":[{"given":"Homayoun","family":"Dayani-Fard","sequence":"first","affiliation":[]},{"given":"Yijun","family":"Yu","sequence":"additional","affiliation":[]},{"given":"John","family":"Mylopoulos","sequence":"additional","affiliation":[]},{"given":"Periklis","family":"Andritsos","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","volume-title":"Documenting Software Architectures: Views and Beyond","author":"P. Clements","year":"2002","unstructured":"Clements, P., Bachmann, F., Bass, L., Garlan, D., Ivers, J., Little, R., Nord, R., Stafford, J.: Documenting Software Architectures: Views and Beyond. Addison-Wesley, Reading (2002)"},{"key":"8_CR2","unstructured":"Selby, R.W., Cusumano, M.A.: Microsoft secrets. Simon and Schuster (1998)"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Andritsos, P., Tzerpos, V.: Software clustering based on information loss minimization. In: 10th Working Conference on Reverse Engineering, pp. 334\u2013344 (2003)","DOI":"10.1109\/WCRE.2003.1287264"},{"key":"8_CR4","unstructured":"Yu, Y., Dayani-Fard, H., Mylopoulos, J.: Removing false code dependencies to speedup software development processes. In: Proceedings of CASCON, pp. 288\u2013297 (2003)"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Tran, J., Godfrey, M., Lee, E., Holt, R.: Architectural repair of open source software. In: IWPC 2000. (2000)","DOI":"10.1109\/WPC.2000.852479"},{"key":"8_CR6","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1109\/32.917525","volume":"27","author":"G.C. Murphy","year":"2001","unstructured":"Murphy, G.C., Notkin, D., Sullivan, K.J.: Software reflexion models: Bridging the gap between design and implementation. IEEE Trans. Software Eng\u00a027, 364\u2013380 (2001)","journal-title":"IEEE Trans. Software Eng"},{"key":"8_CR7","unstructured":"Moolenaar, B.: Vim 6.2 (2003), http:\/\/www.vim.org"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Yu, Y., Dayani-Fard, H., Mylopoulos, J., Andritsos, P.: Reducing build time through precompilations for large-scale software. Technical Report CSRG-504, Department of Computer Science, University of Toronto (2004)","DOI":"10.1109\/ICSM.2005.73"},{"key":"8_CR9","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1109\/32.142871","volume":"18","author":"J. Mylopoulos","year":"1992","unstructured":"Mylopoulos, J., Chung, L., Nixon, B.: Representing and using nonfunctional requirements: A process-oriented approach. IEEE Trans. on Softw. Eng.\u00a018, 483\u2013497 (1992)","journal-title":"IEEE Trans. on Softw. Eng."},{"key":"8_CR10","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/52.469759","volume":"12","author":"P. Kruchten","year":"1995","unstructured":"Kruchten, P.: Architectural blueprints \u2013 the 4+1 view model of software architecture. IEEE Software\u00a012, 42\u201350 (1995)","journal-title":"IEEE Software"},{"key":"8_CR11","volume-title":"Applied software architecture","author":"C. Hofmeister","year":"2000","unstructured":"Hofmeister, C., Nord, R., Soni, D.: Applied software architecture. Addison-Wesley, Reading (2000)"},{"key":"8_CR12","volume-title":"Business Component Factory: A Comprehensive Overview of Component-Based Development for the Enterprise","author":"P. Herzum","year":"1999","unstructured":"Herzum, P., Sims, O.: Business Component Factory: A Comprehensive Overview of Component-Based Development for the Enterprise. John Wiley and Sons, Chichester (1999)"},{"key":"8_CR13","first-page":"26","volume":"1","author":"G.E. Krasner","year":"1988","unstructured":"Krasner, G.E., Pope, S.T.: A cookbook for using the model-view-controller user interface paradigm in smalltalk-80. Journal of Object-Oriented Programming\u00a01, 26\u201349 (1988)","journal-title":"Journal of Object-Oriented Programming"},{"key":"8_CR14","first-page":"508","volume-title":"Proceedings of the 20th ICSE","author":"W. Eixelsberger","year":"1998","unstructured":"Eixelsberger, W., Ogris, M., Gall, H., Bellay, B.: Software architecture recovery of a program family. In: Proceedings of the 20th ICSE, pp. 508\u2013511. IEEE Computer Society Press, Los Alamitos (1998)"},{"key":"8_CR15","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1002\/(SICI)1096-908X(199809\/10)10:5<305::AID-SMR175>3.0.CO;2-7","volume":"10","author":"B. Bellay","year":"1998","unstructured":"Bellay, B., Gall, H.: An evaluation of reverse engineering tool capabilities. Journal of Software Maintenance: Research and Practice\u00a010, 305\u2013332 (1998)","journal-title":"Journal of Software Maintenance: Research and Practice"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Maletic, J., Valluri, N.: Automatic Software Clustering via Latent Semantic Analysis. In: Proceeding of ASE 1999, pp. 251\u2013254 (1999)","DOI":"10.1109\/ASE.1999.802296"},{"key":"8_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2499","DOI":"10.1007\/3-540-45110-2_153","volume-title":"Genetic and Evolutionary Computation - GECCO 2003","author":"B.S. Mitchell","year":"2003","unstructured":"Mitchell, B.S., Mancoridis, S.: Modeling the search landscape of metaheuristic software clustering algorithms. In: Cant\u00fa-Paz, E., Foster, J.A., Deb, K., Davis, L., Roy, R., O\u2019Reilly, U.-M., Beyer, H.-G., Kendall, G., Wilson, S.W., Harman, M., Wegener, J., Dasgupta, D., Potter, M.A., Schultz, A., Dowsland, K.A., Jonoska, N., Miller, J., Standish, R.K. (eds.) GECCO 2003. LNCS, vol.\u00a02724, pp. 2499\u20132510. Springer, Heidelberg (2003)"},{"key":"8_CR18","unstructured":"Mitchell, B.S., Gansner, E.R., Mancoridis, S., Chen, Y.: Bunch: A clustering tool for the recovery and maintenance of software system structures. In: ICSM 1999 (1999)"},{"key":"8_CR19","unstructured":"Borison, E.A.: Program Changes and the Cost of Selective Recompilation. PhD thesis, Carnegie Mellon University (1989)"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Cusumano, M.A., Selby, R.W.: How Microsoft builds software. CACM\u00a040 (1997)","DOI":"10.1145\/255656.255698"}],"container-title":["Lecture Notes in Computer Science","Fundamental Approaches to Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31984-9_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:33:06Z","timestamp":1605760386000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31984-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540254201","9783540319849"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31984-9_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}