{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T11:45:51Z","timestamp":1698061551433},"reference-count":21,"publisher":"Elsevier BV","issue":"1-5","license":[{"start":{"date-parts":[[1990,8,1]],"date-time":"1990-08-01T00:00:00Z","timestamp":649468800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Microprocessing and Microprogramming"],"published-print":{"date-parts":[[1990,8]]},"DOI":"10.1016\/0165-6074(90)90267-d","type":"journal-article","created":{"date-parts":[[2003,9,3]],"date-time":"2003-09-03T13:14:48Z","timestamp":1062594888000},"page":"357-364","source":"Crossref","is-referenced-by-count":5,"title":["Reverse engineering and data flow diagrams in ADA environment"],"prefix":"10.1016","volume":"30","author":[{"given":"G.","family":"Canfora","sequence":"first","affiliation":[]},{"given":"A.","family":"Cimitile","sequence":"additional","affiliation":[]},{"given":"U.","family":"De Carlini","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0165-6074(90)90267-D_BIB1","series-title":"Proc. of Conference on Software Maintenance","first-page":"91","article-title":"Maintenance and Reverse Engineering: Low Level Design Documents Production and Improvement","author":"Antonini","year":"1987"},{"issue":"7","key":"10.1016\/0165-6074(90)90267-D_BIB2","doi-asserted-by":"crossref","first-page":"769","DOI":"10.1109\/TSE.1986.6312978","article-title":"Programming in the Large","volume":"SE-12","author":"Ramamoorty","year":"1986","journal-title":"IEEE Trans. on Software Engineering"},{"key":"10.1016\/0165-6074(90)90267-D_BIB3","author":"U.S. Dep. Defence","year":"1983"},{"key":"10.1016\/0165-6074(90)90267-D_BIB4","series-title":"ADA as a Second Language","author":"Cohen","year":"1986"},{"key":"10.1016\/0165-6074(90)90267-D_BIB5","series-title":"Structured Analysis","author":"Weinberg","year":"1980"},{"key":"10.1016\/0165-6074(90)90267-D_BIB6","series-title":"Structured Design","author":"Yourdon","year":"1979"},{"key":"10.1016\/0165-6074(90)90267-D_BIB7","series-title":"Structured Analysis and System Specification","author":"De Marco","year":"1978"},{"issue":"2","key":"10.1016\/0165-6074(90)90267-D_BIB8","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TSE.1986.6312936","article-title":"The Transformation Schema: an Extension of the Data Flow Diagram to represent Control and Timing","volume":"SE-12","author":"Ward","year":"1986","journal-title":"IEEE Trans. on Software Engineering"},{"issue":"1","key":"10.1016\/0165-6074(90)90267-D_BIB9","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1145\/43857.43866","article-title":"ESML: An Extended System Modelling Language Based on the Data Flow Diagram","volume":"13","author":"Bruyn","year":"1988","journal-title":"ACM SIGSOFT, Software Engineering Notes"},{"issue":"9","key":"10.1016\/0165-6074(90)90267-D_BIB10","doi-asserted-by":"crossref","first-page":"938","DOI":"10.1145\/358234.358262","article-title":"A Software Design Method for Real-Time Systems","volume":"27","author":"Gomaa","year":"1984","journal-title":"Comm. of the ACM"},{"key":"10.1016\/0165-6074(90)90267-D_BIB11","first-page":"313","article-title":"Formal Data Flow Diagrams","volume":"vol. 1","author":"Fuggetta","year":"1988"},{"issue":"1","key":"10.1016\/0165-6074(90)90267-D_BIB12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1093\/comjnl\/32.1.1","article-title":"Towards a Formal Foundation for DeMarco Data Flow Diagrams","volume":"32","author":"Tse","year":"1989","journal-title":"The Computer Journal"},{"issue":"8","key":"10.1016\/0165-6074(90)90267-D_BIB13","doi-asserted-by":"crossref","first-page":"1128","DOI":"10.1109\/32.7624","article-title":"An Integrated Life-Cycle Model for Software Maintenance","volume":"14","author":"Yau","year":"1988","journal-title":"IEEE Trans. on Software Engineering"},{"key":"10.1016\/0165-6074(90)90267-D_BIB14","unstructured":"C. Ghezzi, D. Mandrioli, S. Morasca and M. Pezze', \u201cSymbolic Execution of Concurrent Systems using Petri Nets\u201d to appear on Computer Languages."},{"key":"10.1016\/0165-6074(90)90267-D_BIB15","series-title":"Proc. of the IEEE 5th International Workshop on Software Specification and Design","article-title":"A general way to put Time in Petri Nets","author":"Ghezzi","year":"1989"},{"issue":"2","key":"10.1016\/0165-6074(90)90267-D_BIB16","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1109\/TSE.1986.6312948","article-title":"Process-Translatable Petri Nets for the Rapid Prototyping of Process Control Systems","volume":"SE-12","author":"Bruno","year":"1986","journal-title":"IEEE Trans. on Software Engineering"},{"key":"10.1016\/0165-6074(90)90267-D_BIB17","series-title":"The UNIX Programming Environment","author":"Kernigham","year":"1984"},{"key":"10.1016\/0165-6074(90)90267-D_BIB18","series-title":"Proc. of the ACM SIGPLAN Symposium on Language Issues in Programming Environments","first-page":"148","article-title":"PegaSys: A System for Graphical Explanation of Program Designs","author":"Moriconi","year":"1985"},{"key":"10.1016\/0165-6074(90)90267-D_BIB19","series-title":"Proc. of the ACM SIGSOFT\/SIGPLAN Software Engineering Symposium on Practical Software Development Environments","first-page":"30","article-title":"Graphical Program Development with PECAN Program Development Systems","author":"Reiss","year":"1984"},{"issue":"8","key":"10.1016\/0165-6074(90)90267-D_BIB20","doi-asserted-by":"crossref","first-page":"696","DOI":"10.1145\/27651.27655","article-title":"Designing Large Real Time Systems with ADA","volume":"30","author":"Nielsen","year":"1987","journal-title":"Comm. of the ACM"},{"issue":"2","key":"10.1016\/0165-6074(90)90267-D_BIB21","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1147\/sj.282.0294","article-title":"Program Understanding Challenge for the 1990s","volume":"28","author":"Corbi","year":"1990","journal-title":"IBM System Journal"}],"container-title":["Microprocessing and Microprogramming"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:016560749090267D?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:016560749090267D?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,2,25]],"date-time":"2019-02-25T05:20:24Z","timestamp":1551072024000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/016560749090267D"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1990,8]]},"references-count":21,"journal-issue":{"issue":"1-5","published-print":{"date-parts":[[1990,8]]}},"alternative-id":["016560749090267D"],"URL":"https:\/\/doi.org\/10.1016\/0165-6074(90)90267-d","relation":{},"ISSN":["0165-6074"],"issn-type":[{"value":"0165-6074","type":"print"}],"subject":[],"published":{"date-parts":[[1990,8]]}}}