{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:11:48Z","timestamp":1771701108883,"version":"3.50.1"},"publisher-location":"Dordrecht","reference-count":17,"publisher":"Springer Netherlands","isbn-type":[{"value":"9789048136599","type":"print"},{"value":"9789048136605","type":"electronic"}],"license":[{"start":{"date-parts":[[2009,12,15]],"date-time":"2009-12-15T00:00:00Z","timestamp":1260835200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2009,12,15]],"date-time":"2009-12-15T00:00:00Z","timestamp":1260835200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-90-481-3660-5_67","type":"book-chapter","created":{"date-parts":[[2010,2,12]],"date-time":"2010-02-12T15:11:46Z","timestamp":1265987506000},"page":"389-394","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Analysis of Ten Reverse Engineering Tools"],"prefix":"10.1007","author":[{"given":"Jussi","family":"Koskinen","sequence":"first","affiliation":[]},{"given":"Tero","family":"Lehmonen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,12,15]]},"reference":[{"key":"67_CR90","unstructured":"R. Seacord, D. Plakosh, and G. Lewis, Modernizing Legacy Systems: Software Technologies, Engineering Processes, and Business Practices. Addison-Wesley, 2003."},{"key":"67_CR91","doi-asserted-by":"crossref","unstructured":"M.M. Lehman, D.E. Perry, and J.F. Ramil, \"Implications of evolution metrics on software maintenance\", Proc. Int. Conf. Softw. Maint. (ICSM 1998). IEEE Computer Society, 1998, pp. 208-217.","DOI":"10.1109\/ICSM.1998.738510"},{"issue":"1","key":"67_CR92","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/52.43044","volume":"7","author":"E.J. Chikofsky","year":"1990","unstructured":"[3] E.J. Chikofsky, and J.H. Cross, II, \"Reverse engineering and design recovery: a taxonomy\", IEEE Sw., vol. 7, number 1, pp. 13-17, 1990.","journal-title":"IEEE Sw."},{"issue":"5","key":"67_CR93","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1049\/sej.1995.0023","volume":"10","author":"A. von Mayrhauser","year":"1995","unstructured":"[4] A. von Mayrhauser, and A.M. Vans, \"Industrial experience with an integrated code comprehension model\", Software Engineering Journal, vol. 10, number 5, pp. 171-182, 1995.","journal-title":"Software Engineering Journal"},{"issue":"3","key":"67_CR94","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1002\/smr.292","volume":"16","author":"J. Koskinen","year":"2004","unstructured":"[5] J. Koskinen, A. Salminen, and J. Paakki, \"Hypertext support for the information needs of software maintainers\", Journal of Softw. Maint. Evol., vol. 16, number 3, pp. 187-215, 2004.","journal-title":"Journal of Softw. Maint. Evol."},{"key":"67_CR95","unstructured":"J. Koskinen, and A. Salminen, \"Supporting impact analysis in HyperSoft and other maintenance tools\", Proc. 2nd IASTED Int. Conf. Softw. Eng. (SE 2005). Anaheim, CA: Acta Press, 2005, pp. 187-192."},{"issue":"2","key":"67_CR96","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1002\/smr.244","volume":"14","author":"J. Koskinen","year":"2002","unstructured":"[7] J. Koskinen, \"Experimental evaluation of hypertext access structures\", Journal of Softw. Maint. Evol., vol. 14, number 2, pp. 83-108, 2002.","journal-title":"Journal of Softw. Maint. Evol."},{"key":"67_CR97","doi-asserted-by":"crossref","unstructured":"J. Koskinen, \"Evaluation framework of hypertext access for program comprehension support\", Innovative Techniq. Instruction Techn., E-learning, E-assessment, and Education. Springer, 2008, pp. 235-240.","DOI":"10.1007\/978-1-4020-8739-4_42"},{"issue":"7","key":"67_CR98","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1093\/comjnl\/39.7.577","volume":"39","author":"J. Paakki","year":"1996","unstructured":"[9] J. Paakki, A. Salminen, and J. Koskinen, \"Automated hypertext support for software maintenance\", The Computer Journal, vol. 39, number 7, pp. 577-597, 1996.","journal-title":"The Computer Journal"},{"issue":"4","key":"67_CR99","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1109\/TSE.1984.5010248","volume":"10","author":"M. Weiser","year":"1982","unstructured":"[10] M. Weiser, \"Program slicing\", IEEE Transactions on Software Engineering, vol 10, number 4, pp. 352-357, 1982.","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"3","key":"67_CR100","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1109\/32.489080","volume":"22","author":"S. Paul","year":"1996","unstructured":"[11] S. Paul, and A. Prakash, \"A query algebra for program databases\", IEEE Transactions on Software Engineering, vol. 22, number 3, pp. 202-217, 1996.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"67_CR101","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1002\/(SICI)1096-908X(199809\/10)10:5<305::AID-SMR175>3.0.CO;2-7","volume":"10","author":"B. Bellay","year":"1998","unstructured":"[12] B. Bellay, and H. Gall, \"An evaluation of reverse engineering tool capabilities\", Journal of Softw. Maint., vol. 10, pp. 305-331, 1998.","journal-title":"Journal of Softw. Maint."},{"key":"67_CR102","doi-asserted-by":"crossref","unstructured":"M.A. Storey, K. Wong, and H. Muller, \"How do program understanding tools affect how programmers understand programs?\", Proc. 4th Working Conf. Reverse Engineering (WCRE 1997). IEEE Computer Society, 1997, pp. 12-21.","DOI":"10.1109\/WCRE.1997.624572"},{"key":"67_CR103","doi-asserted-by":"crossref","unstructured":"M. Armstrong, and C. Trudeau, \"Evaluating architectural extractors\", Proc. Fifth Working Conf. Reverse Engineering (WCRE 1998). IEEE Computer Society, 1998, pp. 30-39.","DOI":"10.1109\/WCRE.1998.723173"},{"key":"67_CR104","doi-asserted-by":"crossref","unstructured":"M. Storey, and H. M\u00fcller, \"Manipulating and documenting software structures using SHriMP views\", Proc. 11th Int. Conf. Softw. Maint. (ICSM 1995). IEEE Computer Society, 1995, pp. 275-284.","DOI":"10.1109\/ICSM.1995.526549"},{"key":"67_CR105","doi-asserted-by":"crossref","unstructured":"G.C. Gannod, and B.H.C. Cheng, \"A framework for classifying and comparing software reverse engineering and design recovery techniques\", Proc. Sixth Working Conf. Reverse Engineering (WCRE 1999). IEEE Computer Society, 1999, pp. 77-88.","DOI":"10.1109\/WCRE.1999.806949"},{"issue":"2","key":"67_CR106","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1145\/279310.279314","volume":"7","author":"G. Murphy","year":"1998","unstructured":"[17] G. Murphy, D. Notkin, W. Griswold, and E. Lan, \"An empirical study of static call graph extractors\", ACM Transact. Softw. Eng. Meth., vol. 7, number 2, pp. 158-191, 1998.","journal-title":"ACM Transact. Softw. Eng. Meth."}],"container-title":["Advanced Techniques in Computing Sciences and Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-90-481-3660-5_67","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,18]],"date-time":"2025-02-18T11:34:38Z","timestamp":1739878478000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-90-481-3660-5_67"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12,15]]},"ISBN":["9789048136599","9789048136605"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-90-481-3660-5_67","relation":{},"subject":[],"published":{"date-parts":[[2009,12,15]]},"assertion":[{"value":"15 December 2009","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}