{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,25]],"date-time":"2023-10-25T18:58:55Z","timestamp":1698260335621},"reference-count":38,"publisher":"Elsevier BV","issue":"1-2","license":[{"start":{"date-parts":[[1993,2,1]],"date-time":"1993-02-01T00:00:00Z","timestamp":728524800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Sciences"],"published-print":{"date-parts":[[1993,2]]},"DOI":"10.1016\/0020-0255(93)90026-i","type":"journal-article","created":{"date-parts":[[2003,6,30]],"date-time":"2003-06-30T17:28:37Z","timestamp":1056994117000},"page":"155-189","source":"Crossref","is-referenced-by-count":6,"title":["A reverse engineering model for C programs"],"prefix":"10.1016","volume":"68","author":[{"given":"K.","family":"Heisler","sequence":"first","affiliation":[]},{"given":"Y.","family":"Kasho","sequence":"additional","affiliation":[]},{"given":"W.T.","family":"Tsai","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0020-0255(93)90026-I_BIB1","series-title":"MicroScope: A Knowledge-Based Programming Environment","author":"Ambras","year":"1988"},{"key":"10.1016\/0020-0255(93)90026-I_BIB2","series-title":"Proceedings of the Conference on Software Maintenance","article-title":"Maintenance and reverse engineering: low-level design documents production and improvement","author":"Antonini","year":"1987"},{"key":"10.1016\/0020-0255(93)90026-I_BIB3","series-title":"Proceedings of the Conference on Software Maintenance","article-title":"Maintenance and porting of software by design recovery","author":"Arango","year":"1985"},{"key":"10.1016\/0020-0255(93)90026-I_BIB4","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1109\/69.43401","article-title":"A personal chronicle: creating better information systems, with some guiding principles","volume":"1","author":"Bachman","year":"1989","journal-title":"IEEE Trans. Knowledge Data Engrg."},{"key":"10.1016\/0020-0255(93)90026-I_BIB5","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/2.30731","article-title":"Design RECOVERY for maintenance and reuse","volume":"22","author":"Biggerstaff","year":"1989","journal-title":"IEEE Comput."},{"key":"10.1016\/0020-0255(93)90026-I_BIB6","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/MC.1987.1663532","article-title":"No silver bullet","volume":"20","author":"Brooks","year":"1987","journal-title":"IEEE Comput. Mag."},{"key":"10.1016\/0020-0255(93)90026-I_BIB7","series-title":"Proceedings of the Conference on Software Maintenance\u20141988","article-title":"Software maintenance life cycle","author":"Chapin","year":"1988"},{"key":"10.1016\/0020-0255(93)90026-I_BIB8","series-title":"Proceedings of the IEEE COMPSAC","article-title":"The C information abstractor","author":"Chen","year":"1986"},{"key":"10.1016\/0020-0255(93)90026-I_BIB9","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1109\/32.48940","article-title":"The C information abstraction system","volume":"16","author":"Chen","year":"1990","journal-title":"IEEE Trans Software Engrg."},{"key":"10.1016\/0020-0255(93)90026-I_BIB10","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1002\/smr.4360020103","article-title":"A model for assembly program maintenance","volume":"2","author":"Chen","year":"1990","journal-title":"Software Maintenance"},{"key":"10.1016\/0020-0255(93)90026-I_BIB11","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1109\/52.43044","article-title":"Reverse engineering and design recovery","volume":"7","author":"Chikofsky","year":"1990","journal-title":"IEEE Software"},{"key":"10.1016\/0020-0255(93)90026-I_BIB12","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/52.43051","article-title":"Extracting and restructuring the design of large systems","volume":"7","author":"Choi","year":"1990","journal-title":"IEEE Software"},{"key":"10.1016\/0020-0255(93)90026-I_BIB13","doi-asserted-by":"crossref","DOI":"10.1109\/HICSS.1988.11843","article-title":"An environment for understanding programs","author":"Cleveland","year":"1988"},{"key":"10.1016\/0020-0255(93)90026-I_BIB14","series-title":"Proceedings of the IEEE Software Maintenance","article-title":"A user interface for an environment to support program understanding","author":"Cleveland","year":"1988"},{"key":"10.1016\/0020-0255(93)90026-I_BIB15","series-title":"Proceedings of the IEEE Software Maintenance","article-title":"A practical software maintenance environment","author":"Collofello","year":"1988"},{"key":"10.1016\/0020-0255(93)90026-I_BIB16","series-title":"Proceedings of the IEEE Software Engineering","article-title":"Object-oriented development environment","author":"Ganti","year":"1990"},{"key":"10.1016\/0020-0255(93)90026-I_BIB17","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/52.43052","article-title":"Knowledge-based program analysis","volume":"7","author":"Harandi","year":"1990","journal-title":"IEEE Software"},{"key":"10.1016\/0020-0255(93)90026-I_BIB18","first-page":"40","article-title":"Everything is in the names for coming \u201ccapture\u201d tools","volume":"9","author":"Hazzah","year":"1989","journal-title":"Software Mag."},{"key":"10.1016\/0020-0255(93)90026-I_BIB19","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1109\/TSE.1985.232210","article-title":"PROUST: knowledge-based program understanding","volume":"SE-11","author":"Johnson","year":"1985","journal-title":"IEEE Trans. Software Engrg."},{"key":"10.1016\/0020-0255(93)90026-I_BIB20","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/52.2023","article-title":"Intelligent assistance for software development and maintenance","volume":"5","author":"Kaiser","year":"1988","journal-title":"IEEE Software"},{"key":"10.1016\/0020-0255(93)90026-I_BIB21","doi-asserted-by":"crossref","unstructured":"M. Ketabchi, D. Lewis, S. Dasananda, T. Lim, R. Roudsari, K. Shik and J. Tan, Object-oriented database management support for software maintenance and reverse engineering, in Proceedings of the IEEE COMPCON 257\u2013260.","DOI":"10.1109\/CMPCON.1989.301938"},{"key":"10.1016\/0020-0255(93)90026-I_BIB22","series-title":"The C Programming Language","author":"Kernighan","year":"1978"},{"key":"10.1016\/0020-0255(93)90026-I_BIB23","series-title":"The C Programming Language","author":"Kernighan","year":"1988"},{"key":"10.1016\/0020-0255(93)90026-I_BIB24","series-title":"Proceedings of the IEEE 11th International Conference on Software Engineering","article-title":"SRE: a knowledge-based environment for large-scale software re-engineering activities","author":"Kozaczynski","year":"1989"},{"key":"10.1016\/0020-0255(93)90026-I_BIB25","series-title":"Software Engineering, A Practitioner's Approach","author":"Pressman","year":"1987"},{"key":"10.1016\/0020-0255(93)90026-I_BIB26","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/2.86782","article-title":"The programmer's spprentice: a research overview","volume":"21","author":"Rich","year":"1988","journal-title":"IEEE Comput."},{"key":"10.1016\/0020-0255(93)90026-I_BIB27","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/52.43053","article-title":"Recognizing a program's design: a graph-parsing approach","volume":"7","author":"Rich","year":"1990","journal-title":"IEEE Software"},{"key":"10.1016\/0020-0255(93)90026-I_BIB28","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1109\/TSE.1975.6312866","article-title":"The source code control system","volume":"SE-1","author":"Rochkind","year":"1975","journal-title":"IEEE Trans. Software Engrg."},{"key":"10.1016\/0020-0255(93)90026-I_BIB29","series-title":"Proceedings of the IEEE Software Maintenance","article-title":"Inverse transformation of software from code to specification","author":"Sneed","year":"1988"},{"key":"10.1016\/0020-0255(93)90026-I_BIB30","series-title":"Proceedings of the IEEE 6th International Conference on Software Engineering","article-title":"Configuration control for evolutionary software production","author":"Shigo","year":"1982"},{"key":"10.1016\/0020-0255(93)90026-I_BIB31","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1145\/50087.50088","article-title":"Designing documentation to compensate for delocalized plans","volume":"31","author":"Soloway","year":"1988","journal-title":"CACM"},{"key":"10.1016\/0020-0255(93)90026-I_BIB32","series-title":"Proceedings of the International Conference on Software Engineering","article-title":"Design, implementation, and evaluation of a revision control system","author":"Tichy","year":"1982"},{"key":"10.1016\/0020-0255(93)90026-I_BIB33","doi-asserted-by":"crossref","first-page":"1207","DOI":"10.1109\/32.7629","article-title":"Program translation via abstraction and reimplementation","volume":"SE-14","author":"Waters","year":"1988","journal-title":"IEEE Trans. Software Engrg."},{"key":"10.1016\/0020-0255(93)90026-I_BIB34","series-title":"Proceedings of the IEEE Software Maintenance","article-title":"Towards a software maintenance support environment","author":"Wild","year":"1988"},{"key":"10.1016\/0020-0255(93)90026-I_BIB35","doi-asserted-by":"crossref","first-page":"446","DOI":"10.1145\/358557.358577","article-title":"Programmers use slices when debugging","volume":"25","author":"Weiser","year":"1982","journal-title":"CACM"},{"key":"10.1016\/0020-0255(93)90026-I_BIB36","series-title":"Proceedings of the IEEE COMPSAC","article-title":"SOFTDA\u2014a reuse-oriented software design system","author":"Yamamoto","year":"1986"},{"key":"10.1016\/0020-0255(93)90026-I_BIB37","series-title":"Proceedings of the IEEE COMPSAC","article-title":"Ripple effect analysis of software maintenance","author":"Yau","year":"1978"},{"key":"10.1016\/0020-0255(93)90026-I_BIB38","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1109\/TSE.1987.233166","article-title":"Knowledge representation of software component interconnection information for large-scale software modification","volume":"SE-13","author":"Yau","year":"1987","journal-title":"IEEE Trans. Software Engrg."}],"container-title":["Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:002002559390026I?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:002002559390026I?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T13:27:38Z","timestamp":1552915658000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/002002559390026I"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1993,2]]},"references-count":38,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[1993,2]]}},"alternative-id":["002002559390026I"],"URL":"https:\/\/doi.org\/10.1016\/0020-0255(93)90026-i","relation":{},"ISSN":["0020-0255"],"issn-type":[{"value":"0020-0255","type":"print"}],"subject":[],"published":{"date-parts":[[1993,2]]}}}