{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T18:01:47Z","timestamp":1649095307505},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,6,30]],"date-time":"2015-06-30T00:00:00Z","timestamp":1435622400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Informatik Spektrum"],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1007\/s00287-015-0910-0","type":"journal-article","created":{"date-parts":[[2015,6,29]],"date-time":"2015-06-29T05:51:57Z","timestamp":1435557117000},"page":"186-193","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Empirische Forschung zu Software-Evolution"],"prefix":"10.1007","volume":"39","author":[{"given":"Barbara","family":"Paech","sequence":"first","affiliation":[]},{"given":"Sven","family":"Apel","sequence":"additional","affiliation":[]},{"given":"Lars","family":"Grunske","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Prehofer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,30]]},"reference":[{"issue":"1","key":"910_CR1","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1145\/291469.291479","volume":"42","author":"D Avison","year":"1999","unstructured":"Avison D, Lau F, Myers MD, Nielsen PA (1999) Action research. Commun ACM 42(1):94\u201397","journal-title":"Commun ACM"},{"key":"910_CR2","unstructured":"Basili VR, Caldiera G, Rombach DH (1944) The Experience Factory. In: Marciniak JJ (ed) Encyclopedia of Software Engineering, vol 1. John Wiley & Sons, Inc., pp 469\u2013476"},{"key":"910_CR3","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-29263-2","volume-title":"Value-based software engineering","author":"S Biffl","year":"2006","unstructured":"Biffl S, Aurum A, Boehm BW, Erdogmus H, Gr\u00fcnbacher P (2006) Value-based software engineering. Springer, New York"},{"key":"910_CR4","unstructured":"Endres A, Rombach DH (2003) A Handbook of Software and Systems Engineering. Empirical Observations, Laws and Theories. Pearson Education Publishing"},{"issue":"5","key":"910_CR5","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1007\/s00287-009-0356-3","volume":"32","author":"G Engels","year":"2009","unstructured":"Engels G, Goedicke M, Goltz U, Rausch A, Reussner R (2009) Design for Future* Legacy-Probleme von morgen vermeidbar? Informatik Spektrum 32(5):393\u2013397","journal-title":"Informatik Spektrum"},{"key":"910_CR6","volume-title":"Frontiers of Software Maintenance","author":"MW Godfrey","year":"2008","unstructured":"Godfrey MW, German DM (2008) The Past, Present, and Future of Software Evolution. In: Frontiers of Software Maintenance. IEEE Computer Society, pp 129\u2013138"},{"issue":"1","key":"910_CR7","doi-asserted-by":"crossref","first-page":"75","DOI":"10.2307\/25148625","volume":"28","author":"AR Hevner","year":"2004","unstructured":"Hevner AR, Ram S, March ST, Park J (2004) Design Science in Information Systems Research. MIS Q 28(1):75\u2013105","journal-title":"MIS Q"},{"issue":"4","key":"910_CR8","doi-asserted-by":"crossref","first-page":"493","DOI":"10.1109\/32.799945","volume":"25","author":"CF Kemerer","year":"1999","unstructured":"Kemerer CF, Slaughter S (1999) An Empirical Approach to Studying Software Evolution. IEEE T Softw Eng 25(4):493\u2013509","journal-title":"IEEE T Softw Eng"},{"issue":"2","key":"910_CR9","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1002\/smr.344","volume":"19","author":"HH Kagdi","year":"2007","unstructured":"Kagdi HH, Collard ML, Maletic JI (2007) A Survey and Taxonomy of Approaches for Mining Software Repositories in the Context of Software Evolution. J Softw Maintenance 19(2):77\u2013131","journal-title":"J Softw Maintenance"},{"issue":"4","key":"910_CR10","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MS.2010.100","volume":"27","author":"T Mens","year":"2010","unstructured":"Mens T, Gueheneuc Y-G, Fern\u00e1ndez-Ramil J, D\u2019Hondt M (2010) Guest Editors\u2019 Introduction: Software Evolution. IEEE Softw 27(4):22\u201325","journal-title":"IEEE Softw"},{"issue":"4","key":"910_CR11","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1109\/TSE.2004.1274044","volume":"30","author":"JW Paulson","year":"2004","unstructured":"Paulson JW, Succi G, Eberlein A (2004) An Empirical Study of Open-Source and Closed-Source Software Products. IEEE T Softw Eng 30(4):246\u2013256","journal-title":"IEEE T Softw Eng"},{"key":"910_CR12","doi-asserted-by":"crossref","DOI":"10.1002\/9781118181034","volume-title":"Case Study Research in Software Engineering. Guidelines and Examples","author":"P Runeson","year":"2012","unstructured":"Runeson P, H\u00f6st M, Rainer A, Regnell B (2012) Case Study Research in Software Engineering. Guidelines and Examples. Wiley, Hoboken, NJ"},{"key":"910_CR13","first-page":"32","volume":"31","author":"WF Tichy","year":"1998","unstructured":"Tichy WF (1998) Should Computer Scientists Experiment More? Computer (Long Beach, CA) 31:32\u201340","journal-title":"Computer (Long Beach, CA)"},{"key":"910_CR14","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-29044-2","volume-title":"Experimentation in Software Engineering","author":"C Wohlin","year":"2012","unstructured":"Wohlin C, Runeson P, H\u00f6st M, Ohlsson MC, Regnell B, Wessl\u00e9n A (2012) Experimentation in Software Engineering. Springer, Berlin New York"}],"container-title":["Informatik-Spektrum"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00287-015-0910-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00287-015-0910-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00287-015-0910-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,27]],"date-time":"2019-08-27T19:53:39Z","timestamp":1566935619000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00287-015-0910-0"}},"subtitle":["Bestandsaufnahme und Vision aus dem DFG-Schwerpunktprogramm Design for Future \u2013 Managed Software Evolution"],"short-title":[],"issued":{"date-parts":[[2015,6,30]]},"references-count":14,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,6]]}},"alternative-id":["910"],"URL":"https:\/\/doi.org\/10.1007\/s00287-015-0910-0","relation":{},"ISSN":["0170-6012","1432-122X"],"issn-type":[{"value":"0170-6012","type":"print"},{"value":"1432-122X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,6,30]]}}}