{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T12:26:59Z","timestamp":1649161619789},"reference-count":30,"publisher":"Elsevier BV","issue":"10","license":[{"start":{"date-parts":[[1991,12,1]],"date-time":"1991-12-01T00:00:00Z","timestamp":691545600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Microprocessors and Microsystems"],"published-print":{"date-parts":[[1991,12]]},"DOI":"10.1016\/0141-9331(91)90012-5","type":"journal-article","created":{"date-parts":[[2003,3,15]],"date-time":"2003-03-15T06:33:26Z","timestamp":1047710006000},"page":"531-542","source":"Crossref","is-referenced-by-count":0,"title":["A reverse engineering process for design level document production from ADA code"],"prefix":"10.1016","volume":"15","author":[{"given":"G","family":"Canfora","sequence":"first","affiliation":[]},{"given":"A","family":"Cimitile","sequence":"additional","affiliation":[]},{"given":"U","family":"De Carlini","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0141-9331(91)90012-5_BIB1","series-title":"ADA as a Second Language","author":"Cohen","year":"1986"},{"key":"10.1016\/0141-9331(91)90012-5_BIB2","series-title":"Proc. IEEE Conf. on Software Maintenance","first-page":"91","article-title":"Maintenance and reverse engineering: low level design documents production and improvement","author":"Antonini","year":"1987"},{"key":"10.1016\/0141-9331(91)90012-5_BIB3","series-title":"Proc. IEEE Conf. Software Maintenance","first-page":"13","article-title":"Building and sustaining software maintainability","author":"Osborne","year":"1987"},{"issue":"No 7","key":"10.1016\/0141-9331(91)90012-5_BIB4","doi-asserted-by":"crossref","first-page":"769","DOI":"10.1109\/TSE.1986.6312978","article-title":"Programming in the Large","volume":"Vol SE-12","author":"Ramamoorty","year":"1986","journal-title":"IEEE Trans. Softw. Engng"},{"issue":"No 2","key":"10.1016\/0141-9331(91)90012-5_BIB5","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1147\/sj.282.0294","article-title":"Program understanding challenge for the 1990s","volume":"Vol 28","author":"Corbi","year":"1990","journal-title":"IBM Syst. J."},{"issue":"No 1","key":"10.1016\/0141-9331(91)90012-5_BIB6","volume":"Vol 7","author":"IEEE Software","year":"1990","journal-title":"Maintenance & Reverse Engineering"},{"key":"10.1016\/0141-9331(91)90012-5_BIB7","series-title":"Proc. IEEE Conf. Software Maintenance","first-page":"83","article-title":"A logic based approach to reverse engineering tools production","author":"Canfora","year":"1991"},{"key":"10.1016\/0141-9331(91)90012-5_BIB8","series-title":"Reference Manual for the ADA Programming Language","year":"1983"},{"issue":"No 8","key":"10.1016\/0141-9331(91)90012-5_BIB9","doi-asserted-by":"crossref","first-page":"696","DOI":"10.1145\/27651.27655","article-title":"Designing large real time systems with ADA","volume":"Vol 30","author":"Nielsen","year":"1987","journal-title":"Comm. ACM"},{"issue":"No 6\/3","key":"10.1016\/0141-9331(91)90012-5_BIB10","article-title":"Reverse engineering process, design recovery and structure charts","author":"Benedusi","year":"1990","journal-title":"CNR Technical Report on Project \u2018Sistemi Informatici e Calcolo Parallelo\u2019"},{"key":"10.1016\/0141-9331(91)90012-5_BIB11","series-title":"Structured Analysis","author":"Weinberg","year":"1980"},{"key":"10.1016\/0141-9331(91)90012-5_BIB12","series-title":"Structured Design","author":"Yourdon","year":"1979"},{"key":"10.1016\/0141-9331(91)90012-5_BIB13","series-title":"Structured Analysis and System Specification","author":"De Marco","year":"1978"},{"key":"10.1016\/0141-9331(91)90012-5_BIB14","series-title":"Proc. IEEE Conf. Software Maintenance","first-page":"180","article-title":"A reverse engineering methodology to reconstruct hierarchical data flow diagrams for software maintenance","author":"Benedusi","year":"1989"},{"key":"10.1016\/0141-9331(91)90012-5_BIB15","series-title":"Software Engineering with ADA","author":"Booch","year":"1983"},{"issue":"No 6","key":"10.1016\/0141-9331(91)90012-5_BIB16","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1145\/71327.71333","article-title":"A simplified graphic notation for Ada programs","volume":"Vol 9","author":"Sterne","year":"1989","journal-title":"Ada Lett."},{"key":"10.1016\/0141-9331(91)90012-5_BIB17","series-title":"Software Components with ADA","author":"Booch","year":"1987"},{"key":"10.1016\/0141-9331(91)90012-5_BIB18","first-page":"313","article-title":"Formal data flow diagrams","volume":"Vol 1","author":"Fuggetta","year":"1988"},{"issue":"No 1","key":"10.1016\/0141-9331(91)90012-5_BIB19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1093\/comjnl\/32.1.1","article-title":"Towards a formal foundation for DeMarco data flow diagrams","volume":"Vol 32","author":"Tse","year":"1989","journal-title":"Comput. J."},{"issue":"No 2","key":"10.1016\/0141-9331(91)90012-5_BIB20","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TSE.1986.6312936","article-title":"The transformation schema: an extension of the data flow diagram to represent control and timing","volume":"Vol SE-12","author":"Ward","year":"1986","journal-title":"IEEE Trans. Softw. Engng"},{"issue":"No 1","key":"10.1016\/0141-9331(91)90012-5_BIB21","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1145\/43857.43866","article-title":"ESML: an extended system modelling language based on the data flow diagram","volume":"Vol 13","author":"Bruyn","year":"1988","journal-title":"ACM SIGSOFT, Software Engineering Notes"},{"issue":"No 9","key":"10.1016\/0141-9331(91)90012-5_BIB22","doi-asserted-by":"crossref","first-page":"938","DOI":"10.1145\/358234.358262","article-title":"A software design method for real-time systems","volume":"Vol 27","author":"Gomaa","year":"1984","journal-title":"Comm. ACM"},{"issue":"No 4","key":"10.1016\/0141-9331(91)90012-5_BIB23","doi-asserted-by":"crossref","first-page":"424","DOI":"10.1109\/71.80172","article-title":"Design and implementation of a Petri net based toolkit for Ada tasking analysis","volume":"Vol 1","author":"Shatz","year":"1990","journal-title":"IEEE Trans. Parall. Distrib. Syst."},{"key":"10.1016\/0141-9331(91)90012-5_BIB24","series-title":"Proc. 12th Int. Symp. Computer","first-page":"3.7.1","article-title":"A method and a tool for reverse engineering in ADA environment","author":"Canfora","year":"1990"},{"key":"10.1016\/0141-9331(91)90012-5_BIB25","series-title":"Proc. 3th Int. Conf. Software Engineering and Knowledge Engineering SEKE '91","article-title":"Petri nets and reverse engineering in concurrent environment","author":"Canfora","year":"1991"},{"issue":"Nos 1\u20135","key":"10.1016\/0141-9331(91)90012-5_BIB26","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/0165-6074(90)90267-D","article-title":"Reverse engineering and data flow diagrams in ADA environment","volume":"Vol 30","author":"Canfora","year":"1990","journal-title":"Microprocessing Microprog. Euromicro J."},{"issue":"No 8","key":"10.1016\/0141-9331(91)90012-5_BIB27","doi-asserted-by":"crossref","first-page":"1128","DOI":"10.1109\/32.7624","article-title":"An integrated life-cycle model for software maintenance","volume":"Vol 14","author":"Yau","year":"1988","journal-title":"IEEE Trans. Softw. Engng"},{"issue":"No 7","key":"10.1016\/0141-9331(91)90012-5_BIB28","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/2.30731","article-title":"Design recovery for maintenance and reuse","volume":"Vol 22","author":"Biggerstaff","year":"1989","journal-title":"IEEE Comp."},{"key":"10.1016\/0141-9331(91)90012-5_BIB29","series-title":"The UNIX Programming Environment","author":"Kernigham","year":"1984"},{"issue":"No 5","key":"10.1016\/0141-9331(91)90012-5_BIB30","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1145\/69586.69587","article-title":"A general-purpose algorithm for analyzing concurrent programs","volume":"Vol 26","author":"Taylor","year":"1983","journal-title":"Comm. ACM"}],"container-title":["Microprocessors and Microsystems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0141933191900125?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0141933191900125?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,25]],"date-time":"2019-03-25T08:25:50Z","timestamp":1553502350000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0141933191900125"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1991,12]]},"references-count":30,"journal-issue":{"issue":"10","published-print":{"date-parts":[[1991,12]]}},"alternative-id":["0141933191900125"],"URL":"https:\/\/doi.org\/10.1016\/0141-9331(91)90012-5","relation":{},"ISSN":["0141-9331"],"issn-type":[{"value":"0141-9331","type":"print"}],"subject":[],"published":{"date-parts":[[1991,12]]}}}