{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:35:55Z","timestamp":1743075355368,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642243950"},{"type":"electronic","value":"9783642243967"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24396-7_21","type":"book-chapter","created":{"date-parts":[[2011,9,14]],"date-time":"2011-09-14T01:34:51Z","timestamp":1315964091000},"page":"268-281","source":"Crossref","is-referenced-by-count":0,"title":["Refactoring ActionScript for Improving Application Execution Time"],"prefix":"10.1007","author":[{"given":"Ming","family":"Ying","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"James","family":"Miller","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"21_CR1","unstructured":"Load Testing 2.0 for Web 2.0: Simplifying Performance Validation for Rich Internet Applications, http:\/\/www.webbuyersguide.com\/resource\/white-paper\/9794\/Load-Testing-20-for-Web-20-Simplifying-Performance-Validation-for-Rich-Internet-Applications"},{"key":"21_CR2","unstructured":"Flash Player penetration, http:\/\/www.adobe.com\/products\/player_census\/flashplayer\/"},{"issue":"1","key":"21_CR3","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.csi.2007.11.006","volume":"31","author":"G. Buyukozkan","year":"2009","unstructured":"Buyukozkan, G.: Determining the mobile commerce user requirements using an analytic approach. Computer Standards and Interfaces\u00a031(1), 144\u2013152 (2009)","journal-title":"Computer Standards and Interfaces"},{"key":"21_CR4","unstructured":"Resource management strategies in Flash Player 9, http:\/\/www.adobe.com\/devnet\/flashplayer\/articles\/resource_management.html"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Card, S.K., Robertson, G.G., Mackinlay, J.D.: The information visualizer, an information workspace. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 1991), pp. 181\u2013188 (1991)","DOI":"10.1145\/108844.108874"},{"key":"21_CR6","volume-title":"Essential ActionScript 3.0 (Essential)","author":"C. Moock","year":"2007","unstructured":"Moock, C.: Essential ActionScript 3.0 (Essential). Reilly Media, Inc., Sebastopol (2007)"},{"key":"21_CR7","unstructured":"ActionScript 3.0 and AVM2:Performance Tuning, http:\/\/www.onflex.org\/ACDS\/AS3TuningInsideAVM2JIT.pdf"},{"key":"21_CR8","first-page":"184","volume-title":"8th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","author":"J. Bergeron","year":"1999","unstructured":"Bergeron, J., Debbabi, M., Erhioui, M.M., Ktari, B.: Static Analysis of Binary Code to Isolate Malicious Behaviors. In: 8th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 184\u2013189. IEEE Computer Society, Los Alamitos (1999)"},{"key":"21_CR9","first-page":"377","volume-title":"24th Int. Conf. Information Technology Interfaces ITI","author":"D. Babic","year":"2002","unstructured":"Babic, D., Rakamaric, Z.: Bytecode Optimization. In: 24th Int. Conf. Information Technology Interfaces ITI, pp. 377\u2013383. SRCE University Computing Centre, Zagreb (2002)"},{"key":"21_CR10","unstructured":"The Java HotSpotTM Client and Server Virtual Machines, http:\/\/java.sun.com\/j2se\/1.3\/docs\/guide\/performance\/hotspot.html"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Dig, D., Marrero, J., Ernst, M.D.: Refactoring Sequential Java Code for Concurrency via Concurrent Libraries. Technical report, MIT (2008)","DOI":"10.1109\/ICSE.2009.5070539"},{"key":"21_CR12","unstructured":"Murphy-Hill, E.: Programmer-Friendly Refactoring Tools. Thesis proposal (2007)"},{"key":"21_CR13","first-page":"65","volume-title":"31st Annual IEEE International Computer Software and Applications Conference","author":"K. Srivisut","year":"2007","unstructured":"Srivisut, K., Muenchaisri, P.: Defining and Detecting Bad Smells of Aspect-Oriented Software. In: 31st Annual IEEE International Computer Software and Applications Conference, vol.\u00a01, pp. 65\u201370. IEEE Computer Society, Los Alamitos (2007)"},{"key":"21_CR14","first-page":"180","volume-title":"1st IEEE International Conference on Software Testing, Verification, and Validation","author":"N. Ubayashi","year":"2008","unstructured":"Ubayashi, N., Piao, J., Shinotsuka, S., Tamai, T.: Contract-Based Verification for Aspect-Oriented Refactoring. In: 1st IEEE International Conference on Software Testing, Verification, and Validation, pp. 180\u2013189. IEEE Computer Society, Los Alamitos (2008)"},{"key":"21_CR15","unstructured":"Jim\u2019s Flash Bestiary, http:\/\/www.krazydad.com\/bestiary\/"},{"key":"21_CR16","unstructured":"9ria forum, http:\/\/flash.9ria.com\/"},{"key":"21_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/978-3-540-77010-7_39","volume-title":"Web Information Systems Engineering \u2013 WISE 2007 Workshops","author":"L. Olsina","year":"2007","unstructured":"Olsina, L., Rossi, G., Garrido, A., Distante, D., Canfora, G.: Incremental quality improvement in web applications using web model refactoring. In: Weske, M., Hacid, M.-S., Godart, C. (eds.) WISE Workshops 2007. LNCS, vol.\u00a04832, pp. 411\u2013422. Springer, Heidelberg (2007)"},{"issue":"2","key":"21_CR18","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MC.2009.57","volume":"42","author":"K. Beyls","year":"2009","unstructured":"Beyls, K., D\u2019Hollander, E.H.: Refactoring for Data Locality. IEEE Computer\u00a042(2), 62\u201371 (2009)","journal-title":"IEEE Computer"}],"container-title":["Lecture Notes in Computer Science","Web Information Systems Engineering \u2013 WISE 2010 Workshops"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24396-7_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,15]],"date-time":"2019-06-15T09:36:57Z","timestamp":1560591417000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24396-7_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642243950","9783642243967"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24396-7_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}