{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T10:49:12Z","timestamp":1648637352413},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[1995,12,1]],"date-time":"1995-12-01T00:00:00Z","timestamp":817776000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann Software Eng"],"published-print":{"date-parts":[[1995,12]]},"DOI":"10.1007\/bf02249051","type":"journal-article","created":{"date-parts":[[2005,11,15]],"date-time":"2005-11-15T13:14:47Z","timestamp":1132060487000},"page":"179-217","source":"Crossref","is-referenced-by-count":0,"title":["Metrics for assessment of designs and implementations during reengineering of computer-based systems"],"prefix":"10.1007","volume":"1","author":[{"given":"Lonnie R.","family":"Welch","sequence":"first","affiliation":[]},{"given":"Guohui","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Jack","family":"Verhoosel","sequence":"additional","affiliation":[]},{"given":"Judith A.","family":"Haney","sequence":"additional","affiliation":[]},{"given":"Antonio L.","family":"Samuel","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Ng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"BF02249051_CR1","unstructured":"Arango, G.et al. (1985), \u201cMaintenance and Porting of Software by Design Recovery\u201d,Proceedings of the Conference on Software Maintenance, IEEE CS Press, pp. 42\u201349."},{"key":"BF02249051_CR2","unstructured":"AEGIS TACTICAL EXECUTIVE SYSTEM (ATES\/43) USER'S MANUAL, Volume 1 \u2014 System Design Guide, July 1991, p. 3\u20131."},{"key":"BF02249051_CR3","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1109\/2.30731","volume":"22","author":"T.J. Biggerstaff","year":"1989","unstructured":"Biggerstaff, T.J. (1989), \u201cDesign Recovery for Maintenance and Reuse\u201d,IEEE Computer 22, 7.","journal-title":"IEEE Computer"},{"key":"BF02249051_CR4","first-page":"1","volume":"8","author":"C. Castells-Schofield","year":"1990","unstructured":"Castells-Schofield, C. (1990), \u201cEngineering a Language-Independent Approach to Parsing for Analysis and Testing\u201d,Vitro Tech. Journal 8, 1.","journal-title":"Vitro Tech. Journal"},{"key":"BF02249051_CR5","doi-asserted-by":"crossref","unstructured":"Dietrich, S. and F. Calliss (1992), \u201cA Conceptual Design for a Code Analysis Knowledge Base\u201d,Software Maintenance: Research and Practice 4.","DOI":"10.1002\/smr.4360040103"},{"issue":"3","key":"BF02249051_CR6","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1145\/24039.24041","volume":"9","author":"J. Ferrante","year":"1987","unstructured":"Ferrante, J., K.J. Ottenstein, and J.D. Warren (1987), \u201cThe Program Dependence Graph and its Use in Optimization\u201d,ACM Transactions on Programming Languages and Systems 9, 3, 319\u2013349.","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"BF02249051_CR7","first-page":"1","volume":"7","author":"M. Harandii","year":"1990","unstructured":"Harandii, M. and J. Ning (1990), \u201cKnowledge-Based Program Analysis\u201d,IEEE Software 7, 1.","journal-title":"IEEE Software"},{"issue":"2","key":"BF02249051_CR8","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/BF01088804","volume":"7","author":"T.J. Marlowe","year":"1994","unstructured":"Marlowe, T.J., A.D. Stoyenko, S.P. Masticola, and L.R. Welch (1994), \u201cSchedulability \u2014 Analyzable Exception Handling for Responsive Languages\u201d,Journal of Real-Time Systems 7, 2, 183\u2013212.","journal-title":"Journal of Real-Time Systems"},{"key":"BF02249051_CR9","unstructured":"Prywes, N., G. Ingargiola, I. Lee, and M. Lee (1994), \u201cReengineering Concurrent Software into Ada\u201d,Proceedings of the Fourth Systems Reengineering Technology Workshop, Naval Surface Warfare Center, pp. 157\u2013177."},{"key":"BF02249051_CR10","unstructured":"Reasoning Systems, Palo Alto, CA, \u201cRefine Language Tools\u201d (1993)."},{"key":"BF02249051_CR11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/52.43053","volume":"7","author":"C. Rich","year":"1990","unstructured":"Rich, C. and R. Wills (1990), \u201cRecognizing a Program's Design: A Graph-Parsin Approach\u201d,IEEE Software 7, 1.","journal-title":"IEEE Software"},{"key":"BF02249051_CR12","unstructured":"Rossak, W., A.D. Stoyenko, and L.R. Welch (1992), \u201cTHE COMPONENT MANAGER \u2014 A Hybrid Reuse-Tool Supporting Interactive and Automated Retrieval of Software Components\u201d, Technical Report CIS-92-04, New Jersey Institute of Technology."},{"key":"BF02249051_CR13","doi-asserted-by":"crossref","unstructured":"Rubinstein, H., R. Piazza, and S. Roberts (1993), \u201cSeparating Parsing and Analysis in Reverse Engineering Tools\u201d,Proceedings of the Working Conference on Reverse Engineering.","DOI":"10.1109\/WCRE.1993.287773"},{"key":"BF02249051_CR14","unstructured":"Sampson, C.H. (1994), \u201cTranslating CMS-2 to Ada\u201d,Proceedings of the Fourth Systems Reengineering Technology Workshop, Naval Surface Warfare Center, pp. 143\u2013156."},{"key":"BF02249051_CR15","unstructured":"Scott, W.B. (1983), \u201cNavy May Accelerate Missile Defense\u201d,Aviation Week and Space Technology (May 30) 283\u2013284."},{"issue":"2","key":"BF02249051_CR16","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1142\/S0218194093000100","volume":"3","author":"M. Sitaraman","year":"1993","unstructured":"Sitaraman, M., L.R. Welch, and D.E. Harms (1993), \u201cOn Specification of Reusable Software Components\u201d,The International Journal of Software Engineering and Knowledge Engineering 3, 2, pp. 207\u2013229.","journal-title":"The International Journal of Software Engineering and Knowledge Engineering"},{"issue":"3","key":"BF02249051_CR17","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1002\/smr.4360030304","volume":"3","author":"H.M. Sneed","year":"1991","unstructured":"Sneed, H.M. (1991), \u201cEconomics of Software Re-engineering\u201d,Software Maintenance: Research and Practice 3, 3, 163\u2013182.","journal-title":"Software Maintenance: Research and Practice"},{"key":"BF02249051_CR18","doi-asserted-by":"crossref","unstructured":"Steiger, R.A. and L.R. Welch (1993), \u201cReusable Component Retrieval for Real-Time Applications\u201d,Proceedings of the First IEEE Workshop on Real-Time Applications.","DOI":"10.1109\/RTA.1993.263104"},{"key":"BF02249051_CR19","unstructured":"Stein, K.J. (1973), \u201cAEGIS Fleet Defense Nearing Sea Test\u201d,Aviation Week and Space Technology (August 13) 32\u201335."},{"key":"BF02249051_CR20","unstructured":"Stein, K.J. (1975), \u201cAEGIS System Tested Successfully\u201d,Aviation Week and Space Technology (April 7) 36\u201340."},{"key":"BF02249051_CR21","doi-asserted-by":"crossref","unstructured":"Stoyenko, A.D., L.R. Welch, and B.C. Cheng (1994), \u201cResponse Time Prediction in Object-Based, Parallel Embedded Systems\u201d, to appear inEuromicro Journal, Special Issue on Parallel Processing in Embedded Real-Time Systems.","DOI":"10.1016\/0165-6074(94)90081-7"},{"key":"BF02249051_CR22","unstructured":"Verhoosel, J.P.C., L.R. Welch, D.K. Hammer, and A.D. Stoyenko (1994), \u201cAssignment and Pre-Runtime Scheduling of Object-Based, Parallel Real-Time Processes\u201d,Sixth IEEE Symposium on Parallel and Distributed Processing, pp. 638\u2013645."},{"key":"BF02249051_CR23","first-page":"1","volume":"8","author":"J.P.C. Verhoosel","year":"1995","unstructured":"Verhoosel, J.P.C., L.R. Welch, D.K. Hammer, and A.D. Stoyenko (1995), \u201cA Model for Scheduling of Object-Based, Hard Real-Time Parallel Processes\u201d,The Journal of Real-Time Systems 8, 1.","journal-title":"The Journal of Real-Time Systems"},{"key":"BF02249051_CR24","doi-asserted-by":"crossref","unstructured":"Welch, L.R. (1992), \u201cAssignment of ADT Modules to Processors\u201d,The 6th IEEE International Parallel Processing Symposium, pp. 72\u201375.","DOI":"10.1109\/IPPS.1992.223069"},{"key":"BF02249051_CR25","unstructured":"Welch, L.R., A.D. Stoyenko, and S. Chen (1993), \u201cAssignment of ADT Modules with Random Neural Networks\u201d,The Hawaii International Conference on System Sciences, pp. II-546\u2013555."},{"key":"BF02249051_CR26","doi-asserted-by":"crossref","unstructured":"Welch, L.R. (1993), \u201cCloning ADT Modules to Increase Parallelism: Rationale and Techniques\u201d,Fifth IEEE Symposium on Parallel and Distributed Computing, pp. 430\u2013437.","DOI":"10.1109\/SPDP.1993.395501"},{"issue":"11","key":"BF02249051_CR27","doi-asserted-by":"crossref","first-page":"1249","DOI":"10.1109\/12.324558","volume":"43","author":"L.R. Welch","year":"1994","unstructured":"Welch, L.R. (1994), \u201cA Parallel Virtual Machine for Programs Composed of Abstract Data Types\u201d,IEEE Transactions on Computers 43, 11, 1249\u20131261.","journal-title":"IEEE Transactions on Computers"},{"key":"BF02249051_CR28","unstructured":"Welch, L.R., A.L. Samuel, M.W. Masters, R.D. Harrison, A.D. Stoyenko, and J. Caruso (1994), \u201cA Framework for Automated Reengineering of Complex Computer Systems\u201d,Proceedings of the 4th Systems Reengineering Technology Workshop, Naval Surface Warfare Center, pp. 44\u201356."},{"key":"BF02249051_CR29","unstructured":"Welch, L.R., J.A. Haney, A.L. Samuel, R.D. Harrison, J. Lynch, M.W. Masters, T. Moffit, B. Ravindran, E. Sam, and W. Wright (1995), \u201cReengineering of Legacy Systems: Toward an Automated Approach\u201d,Proceedings of the 5th Systems Reengineering Technology Workshop, Naval Surface Warfare Center."},{"key":"BF02249051_CR30","unstructured":"Welch, L.R., A.L. Samuel, M.W. Masters, R.D. Harrison, and M. Wilson (1995), \u201cA Framework for Automated Reengineering of Complex Computer Systems\u201d,Journal of Systems and Software (July)."},{"key":"BF02249051_CR31","unstructured":"Welch, L.R., A.D. Stoyenko, and T.J. Marlowe, \u201cResponse Time Prediction for Distributed Periodic Processes Specified in CaRT-Spec\u201d,Control Engineering Practice (in press)."},{"key":"BF02249051_CR32","unstructured":"Xinotech Research Inc., Minneapolis, MN (1992), \u201cThe Xinotech Program Composer 2.0\u201d."},{"key":"BF02249051_CR33","unstructured":"Yu, G. and L.R. Welch (1994), \u201cProgram Dependence Analysis for Concurrency Exploitation in Programs Composed of Abstract Data Type Modules\u201d,Sixth IEEE Symposium on Parallel and Distributed Processing, pp. 66\u201373."}],"container-title":["Annals of Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF02249051.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF02249051\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF02249051","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T23:21:47Z","timestamp":1586560907000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF02249051"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995,12]]},"references-count":33,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1995,12]]}},"alternative-id":["BF02249051"],"URL":"https:\/\/doi.org\/10.1007\/bf02249051","relation":{},"ISSN":["1022-7091","1573-7489"],"issn-type":[{"value":"1022-7091","type":"print"},{"value":"1573-7489","type":"electronic"}],"subject":[],"published":{"date-parts":[[1995,12]]}}}