{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T05:11:29Z","timestamp":1743138689495,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":18,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789048136575"},{"type":"electronic","value":"9789048136582"}],"license":[{"start":{"date-parts":[[2009,12,28]],"date-time":"2009-12-28T00:00:00Z","timestamp":1261958400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2009,12,28]],"date-time":"2009-12-28T00:00:00Z","timestamp":1261958400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-90-481-3658-2_25","type":"book-chapter","created":{"date-parts":[[2010,2,12]],"date-time":"2010-02-12T16:28:26Z","timestamp":1265992106000},"page":"141-146","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Path from a Legacy System to GUI System"],"prefix":"10.1007","author":[{"given":"Atif Farid","family":"Mohammad","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,12,28]]},"reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"Chia-Chu Chiang; Leveraging software reengineering systems for heterogeneous distributed computing environments. Software Maintenance, 2000. Proceedings. International Conference on 11-14 Oct. 2000 Page(s):254 \u2013 261","DOI":"10.1109\/ICSM.2000.883057"},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"Zhou, S.; Yang, H.; Luker, P.; He, X.; A useful approach to developing reverse engineering metrics. Computer Software and Applications Conference, 1999. COMPSAC \u201899. Proceedings. The Twenty-Third Annual International 27-29 Oct. 1999 Page(s):320 \u2013 321","DOI":"10.1109\/CMPSAC.1999.812728"},{"key":"25_CR3","doi-asserted-by":"crossref","unstructured":"Swafford, D.; Elman, D.; Aiken, P.; Merhout, J.;Experiences reverse engineering manually. Software Maintenance and Reengineering, 2000. Proceedings of the Fourth European 29 Feb.-3 March 2000 Page(s):189 \u2013 197","DOI":"10.1109\/CSMR.2000.827327"},{"key":"25_CR4","unstructured":"Estadale, J. and Zuylen, H.J. 1993. Views, Representations and Development Methods. The REDO Compendium: Reverse Engineering for Sofrware Maintenance, 93- 109."},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Baxter, I.D.; Mehlich, M.; Reverse engineering is reverse forward engineering. Reverse Engineering, 1997. Proceedings of the Fourth Working Conference on 6-8 Oct. 1997 Page(s):104 \u2013 113","DOI":"10.1109\/WCRE.1997.624581"},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"J. T. C. Teng, V. Grover, and K. D. Fiedler, \u201cBusiness process reengineering: Charting a strategic path for the information age,\u201d California Management Review, Spring, pp. 9-31, 1994.","DOI":"10.2307\/41165753"},{"key":"25_CR7","unstructured":"Alfred Chandler, Ting-Peng Liang, Developing Expert Systems for Business Applications, February 1995, Book."},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Saltzman, R. and V. Mehrotra. 2001. A call center uses simulation to drive strategic change. Inferfaces 3137-101.","DOI":"10.1287\/inte.31.3.87.9632"},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"He Shu-guang; Li Li; Qi Er-shi; Study on the Continuous Quality Improvement of Telecommunication Call Centers Based on Data Mining Service Systems and Service Management, 2007 International Conference on 9-11 June 2007 Page(s):1 \u2013 5","DOI":"10.1109\/ICSSSM.2007.4280171"},{"key":"25_CR10","unstructured":"Green, L.V., P.J. Kolesar, and W. Whitt, Coping with Time-Varying Demand when Setting Staffing Requirements for a Service System. 2005, Columbia University. p. 58."},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"K. Furst, W. W. Lang, and D. E. Nolle, \u201cInternet banking: Developments and prospects,\u201d in Economic and Policy Analysis\u2014Working Paper 2000-9, 2000.","DOI":"10.2139\/ssrn.1988503"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"S.P. Savino, \u201cWAP: Wireless Application Protocol\u2014Wireless Wave of the Future,\u201d Proc. Portland Int\u2019l Conf. Management of Eng. and Technology, pp. 178-179, 2001.","DOI":"10.1109\/PICMET.2001.951902"},{"issue":"3","key":"25_CR13","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/S0164-1212(98)10057-2","volume":"44","author":"A. Cimitile","year":"1999","unstructured":"A. Cimitile, A. De Lucia, G. A. Di Lucca, and A. R. Fasolino. Identifying objects in legacy systems using design metrics. Journal of Systems and Software, 44(3):199\u2013211, 1999.","journal-title":"Journal of Systems and Software"},{"key":"25_CR14","unstructured":"Yijun Yu, Yiqiao Wang, John Mylopoulos, Sotirios Liaskos, Alexei Lapouchnian, Julio Cesar Sampaio do Prado Leite: Reverse Engineering Goal Models from Legacy Code, RE 05: Proceedings of the 13th IEEE International Conference on Requirements Engineering"},{"key":"25_CR15","unstructured":"Chikofsky, E.J.: Learning From Past Trial and Error: Some History of Reverse Engineering to Requirements, presentation slide in RETR Workshop at WCRE,05"},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"Zigman, Franklin and Mark Wilson, \u201cIntegrating Reengineering, Reuse and Specificaton Tool Environments to Enable Reverse Engineering\u201d, Proceedings of the Second Working Conference on Reverse Engineering, Toronto, Canada, July 1995, pp. 78-84.","DOI":"10.1109\/WCRE.1995.514696"},{"key":"25_CR17","unstructured":"R. S. Arnold, Software Reengineering, IEEE Computer Society, 1994."},{"key":"25_CR18","doi-asserted-by":"crossref","unstructured":"Chia-Chu Chiang; Software Stability in Software Reengineering. Information Reuse and Integration, 2007. IRI 2007. IEEE International Conference on 13-15 Aug. 2007 Page(s):719 \u2013 723","DOI":"10.1109\/IRI.2007.4296705"}],"container-title":["Innovations and Advances in Computer Sciences and Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-90-481-3658-2_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,18]],"date-time":"2025-02-18T11:39:43Z","timestamp":1739878783000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-90-481-3658-2_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12,28]]},"ISBN":["9789048136575","9789048136582"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-90-481-3658-2_25","relation":{},"subject":[],"published":{"date-parts":[[2009,12,28]]},"assertion":[{"value":"28 December 2009","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}