{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T21:56:30Z","timestamp":1761947790855,"version":"build-2065373602"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540695530"},{"type":"electronic","value":"9783540695547"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-69554-7_11","type":"book-chapter","created":{"date-parts":[[2007,5,13]],"date-time":"2007-05-13T08:53:57Z","timestamp":1179046437000},"page":"137-150","source":"Crossref","is-referenced-by-count":6,"title":["Combining Formal Methods and Functional Strategies Regarding the Reverse Engineering of Interactive Applications"],"prefix":"10.1007","author":[{"given":"J. C.","family":"Silva","sequence":"first","affiliation":[]},{"given":"Jos\u00e9 Creissac","family":"Campos","sequence":"additional","affiliation":[]},{"given":"Jo\u00e3o","family":"Saraiva","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"Alves, T., Visser, J.: Metrication of sdf grammars. Technical Report DI-PURe-05.05.01, Departamento de Inform\u00e1tica, Universidade do Minho (2005)"},{"key":"11_CR2","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.ijhcs.2003.08.004","volume":"60","author":"A. Blandford","year":"2004","unstructured":"Blandford, A., Butterworth, R., Curzon, P.: Models of interactive systems: a case study on programmable user modelling. International Journal of Human-Computer Studies\u00a060, 149\u2013200 (2004)","journal-title":"International Journal of Human-Computer Studies"},{"issue":"3-4","key":"11_CR3","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1023\/A:1011265604021","volume":"8","author":"J.C. Campos","year":"2001","unstructured":"Campos, J.C., Harrison, M.D.: Model checking interactor specifications. Automated Software Engineering\u00a08(3-4), 275\u2013310 (2001)","journal-title":"Automated Software Engineering"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/978-3-540-39929-2_12","volume-title":"Interactive Systems. Design, Specification, and Verification","author":"J.C. Campos","year":"2003","unstructured":"Campos, J.C.: Using task knowledge to guide interactor specifications analysis. In: Jorge, J.A., Jardim Nunes, N., Falc\u00e3o e Cunha, J. (eds.) DSV-IS 2003. LNCS, vol.\u00a02844, pp. 171\u2013186. Springer, Heidelberg (2003)"},{"key":"11_CR5","unstructured":"Chen, J., Subramaniam, S.: A gui environment for testing gui-based applications in java. In: Proceedings of the 34th Hawaii International Conferences on System Sciences, January (2001)"},{"key":"11_CR6","series-title":"Springer Computer Science","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1007\/978-3-7091-7491-3_6","volume-title":"Design, Specification and Verification of Interactive Systems \u201996","author":"B. D\u2019Ausbourg","year":"1996","unstructured":"D\u2019Ausbourg, B., Durrieu, G., Roch\u00e9, P.: Deriving a formal model of an interactive system from its UIL description in order to verify and to test its behaviour. In: Bodart, F., Vanderdonckt, J. (eds.) Design, Specification and Verification of Interactive Systems \u201996, 1996. Springer Computer Science, pp. 105\u2013122. Springer, Wien (1996)"},{"issue":"3","key":"11_CR7","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1111\/1467-8659.1230025","volume":"12","author":"D.J. Duke","year":"1993","unstructured":"Duke, D.J., Harrison, M.D.: Abstract interaction objects. Computer Graphics Forum\u00a012(3), 25\u201336 (1993)","journal-title":"Computer Graphics Forum"},{"issue":"4","key":"11_CR8","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1207\/s15327051hci1304_1","volume":"13","author":"D.J. Duke","year":"1998","unstructured":"Duke, D.J., et al.: Syndetic modelling. Human-Computer Interaction\u00a013(4), 337\u2013393 (1998)","journal-title":"Human-Computer Interaction"},{"issue":"1","key":"11_CR9","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/52.363164","volume":"12","author":"E. Merlo","year":"1995","unstructured":"Merlo, E., et al.: Reverse engineering and reengineering of user interfaces. IEEE Software\u00a012(1), 64\u201373 (1995)","journal-title":"IEEE Software"},{"key":"11_CR10","volume-title":"Software Maintenance Management","author":"B.P. Lientz","year":"1980","unstructured":"Lientz, B.P., Swanson, E.B.: Software Maintenance Management. Addison-Wesley, Reading (1980)"},{"key":"11_CR11","volume-title":"Motif Programming Manual, vol.\u00a06A of X Window System Seris","author":"D. Heller","year":"1994","unstructured":"Heller, D., Ferguson, P.M.: Motif Programming Manual, vol.\u00a06A of X Window System Seris. O\u2019Reilly & Associates, Sebastopol (1994)"},{"key":"11_CR12","volume-title":"Human Reliability Analysis: Context and Control","author":"E. Hollnagel","year":"1993","unstructured":"Hollnagel, E.: Human Reliability Analysis: Context and Control. Academic Press, London (1993)"},{"key":"11_CR13","unstructured":"Jones, S.P., Hughes, J., Augustsson, L.: et\u00a0al. Report on the Programming Language Haskell 98. Technical report (February 1999)"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Lammel, R., Visser, J.: A strafunski application letter. Technical report, CWI, Vrije Universiteit, Software Improvement Group, Kruislaan, Amsterdam (2003)","DOI":"10.1007\/3-540-36388-2_24"},{"key":"11_CR15","volume-title":"Safeware: System Safety and Computers","author":"N. Leveson","year":"1995","unstructured":"Leveson, N.: Safeware: System Safety and Computers. Addison-Wesley, Reading (1995)"},{"key":"11_CR16","first-page":"235","volume-title":"CHI \u201990 Proceedings","author":"C. Lewis","year":"1990","unstructured":"Lewis, C., et al.: Testing a walkthrough methodology for theory-based design of walk-up-and-use interfaces. In: CHI \u201990 Proceedings, April 1990, pp. 235\u2013242. ACM Press, New York (1990)"},{"key":"11_CR17","volume-title":"IEEE workshop on Source Code Analysis and Manipulation (SCAM 2001)","author":"A. Lucia De","year":"2001","unstructured":"De Lucia, A.: Program slicing: Methods and applications. In: IEEE workshop on Source Code Analysis and Manipulation (SCAM 2001), IEEE Computer Society Press, Los Alamitos (2001)"},{"key":"11_CR18","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-3190-6","volume-title":"Symbolic Model Checking","author":"K.L. McMillan","year":"1993","unstructured":"McMillan, K.L.: Symbolic Model Checking. Kluwer Academic Publishers, Dordrecht (1993)"},{"key":"11_CR19","unstructured":"Memon, A., Banerjee, I., Nagarajan, A.: GUI ripping: Reverse engineering of graphical user interfaces for testing. Technical report, Department of Computer Science and Fraunhofer Center for Experimental Software Engineering, Department of Computer Science University of Maryland, USA (2003)"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Moore, M.M.: Rule-based detection for reverse engineering user interfces. In: Proceedings of the Third Working Conference on Reverse Engineering, Monterey, CA, November, pp. 42\u201348 (1996)","DOI":"10.1109\/WCRE.1996.558844"},{"key":"11_CR21","first-page":"249","volume-title":"CHI \u201990 Proceedings","author":"J. Nielsen","year":"1990","unstructured":"Nielsen, J., Molich, R.: Heuristic evaluation of user interfaces. In: CHI \u201990 Proceedings, April 1990, pp. 249\u2013256. ACM Press, New York (1990)"},{"key":"11_CR22","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4471-0445-2","volume-title":"Model-Based Design and Evaluation of Interactive Applications","author":"F. Patern\u00f2","year":"2000","unstructured":"Patern\u00f2, F.: Model-Based Design and Evaluation of Interactive Applications. Springer, London (2000)"},{"issue":"2","key":"11_CR23","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/S0951-8320(01)00092-8","volume":"75","author":"J. Rushby","year":"2002","unstructured":"Rushby, J.: Using model checking to help discover mode confusions and other automation surprises. Reliability Engineering and System Safety\u00a075(2), 167\u2013177 (2002)","journal-title":"Reliability Engineering and System Safety"},{"key":"11_CR24","unstructured":"ISO\/TC159 Sub-Commitee SC4. Draft International ISO DIS 9241-11 Standard. International Organization for Standardization (September 1994)"},{"key":"11_CR25","unstructured":"Systa, T.: Dynamic reverse engineering of java software. Technical report, University of Tampere, Finland (2001)"},{"issue":"2","key":"11_CR26","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1145\/1005361.1005364","volume":"11","author":"H. Thimbleby","year":"2004","unstructured":"Thimbleby, H.: User interface design with matrix algebra. ACM Transactions on HUman-Computer Interaction\u00a011(2), 181\u2013236 (2004)","journal-title":"ACM Transactions on HUman-Computer Interaction"},{"key":"11_CR27","unstructured":"Tip, F.: A survey of program slicing techniques. Journal of Programming Languages (September 1995)"},{"key":"11_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/b100348","volume-title":"Domain-Specific Program Generation","author":"E. Visser","year":"2004","unstructured":"Visser, E.: Program transformation with Stratego\/XT: Rules, strategies, tools, and systems in StrategoXT-0.9. In: Lengauer, C., et al. (eds.) Domain-Specific Program Generation. LNCS, vol.\u00a03016, Springer, Heidelberg (2004)"},{"key":"11_CR29","unstructured":"Visser, J.: Generic Traversal over Typed Source Code Representations. PhD thesis, University of Amsterdam (February 2003)"}],"container-title":["Lecture Notes in Computer Science","Interactive Systems. Design, Specification, and Verification"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-69554-7_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T06:00:55Z","timestamp":1737007255000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-69554-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540695530","9783540695547"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-69554-7_11","relation":{},"subject":[]}}