{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T14:23:40Z","timestamp":1761488620816},"reference-count":65,"publisher":"Elsevier","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1992]]},"DOI":"10.1016\/s0065-2458(08)60596-3","type":"book-chapter","created":{"date-parts":[[2011,1,19]],"date-time":"2011-01-19T05:56:15Z","timestamp":1295416575000},"page":"199-254","source":"Crossref","is-referenced-by-count":12,"title":["Reverse Engineering"],"prefix":"10.1016","author":[{"suffix":"II","given":"James H.","family":"Cross","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Elliot J.","family":"Chikofsky","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"suffix":"Jr.","given":"Charles H.","family":"May","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"key":"10.1016\/S0065-2458(08)60596-3_bib1","series-title":"\u201cThe Specification Language Z: Basic Library.\u201d","author":"Abrial","year":"1980"},{"issue":"11","key":"10.1016\/S0065-2458(08)60596-3_bib2","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1109\/TSE.1983.235271","article-title":"Software Function, Lines of Code and Development Effort Prediction: A Software Science Validation","volume":"SE-9","author":"Albrecht","year":"1983","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"3","key":"10.1016\/S0065-2458(08)60596-3_bib3","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/52.2024","article-title":"MicroScope: A Knowledge-Based Programming Environment","volume":"5","author":"O'Ambras","year":"1988","journal-title":"IEEE Software"},{"issue":"2","key":"10.1016\/S0065-2458(08)60596-3_bib4","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/52.23127","article-title":"Design Specifications in Japan: Tree-Structured Charts","volume":"6","author":"Aoyama","year":"1989","journal-title":"IEEE Software"},{"key":"10.1016\/S0065-2458(08)60596-3_bib5","series-title":"\u201cCASE '89: Proceedings of the Third International Workshop on Computer-Aided Software Engineering,\u201d","first-page":"338","article-title":"CASE Methods of Reuse and Reverse Engineering of Ada Software","author":"Arden","year":"1989"},{"issue":"4","key":"10.1016\/S0065-2458(08)60596-3_bib6","doi-asserted-by":"crossref","first-page":"607","DOI":"10.1109\/5.24146","article-title":"Software Restructuring.","volume":"77","author":"Arnold","year":"1989","journal-title":"Proc. IEEE"},{"issue":"13","key":"10.1016\/S0065-2458(08)60596-3_bib7","first-page":"49","article-title":"A CASE for Reverse Engineering","volume":"34","author":"Bachman","year":"1988","journal-title":"Datamation"},{"key":"10.1016\/S0065-2458(08)60596-3_bib8","series-title":"\u201cProgramming in Ada,\u201d","author":"Barnes","year":"1984"},{"issue":"1","key":"10.1016\/S0065-2458(08)60596-3_bib9","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/52.43045","article-title":"Viewing Maintenance as Reuse-Oriented Software Development","volume":"7","author":"Basili","year":"1990","journal-title":"IEEE Software"},{"issue":"7","key":"10.1016\/S0065-2458(08)60596-3_bib10","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/2.30731","article-title":"Design Recovery for Maintenance and Reuse","volume":"22","author":"Biggerstaff","year":"1989","journal-title":"IEEE Computer"},{"issue":"2","key":"10.1016\/S0065-2458(08)60596-3_bib11","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1145\/71647.71648","article-title":"Reuse, Software Concepts, Descriptive Methods and the Practitioner Project","volume":"14","author":"Boldyreff","year":"1989","journal-title":"Softw. Eng. Notes"},{"key":"10.1016\/S0065-2458(08)60596-3_bib12","series-title":"\u201cObject Oriented Design,\u201d","author":"Booch","year":"1991"},{"issue":"4","key":"10.1016\/S0065-2458(08)60596-3_bib13","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/MC.1987.1663532","article-title":"No Silver Bullet: Essence and Accidents of Software Engineering","volume":"20","author":"Brooks","year":"1987","journal-title":"IEEE Computer"},{"key":"10.1016\/S0065-2458(08)60596-3_bib14","unstructured":"E.J. Chikofsky Application of an Information Systems Analysis and Design Tool to the Maintenance Effort. \u201cProceedings of IFIP TC Working Conference on System Description Methodologies,\u201d 1983 North-Holland Amsterdam 503 514"},{"key":"10.1016\/S0065-2458(08)60596-3_bib15","first-page":"62","article-title":"The Database as a Business Road Map","author":"Chikofsky","year":"1990","journal-title":"Database Programming and Design"},{"key":"10.1016\/S0065-2458(08)60596-3_bib16","first-page":"1991","article-title":"Realizing Design Recovery with CASE Environments","author":"Chikofsky","year":"1991","journal-title":"Software Engineering: Tools, Techniques, Practice"},{"issue":"1","key":"10.1016\/S0065-2458(08)60596-3_bib17","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1109\/52.43044","article-title":"Reverse Engineering and Design Recovery: A Taxonomy","volume":"7","author":"Chikofsky","year":"1990","journal-title":"IEEE Software"},{"issue":"1","key":"10.1016\/S0065-2458(08)60596-3_bib18","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/52.43051","article-title":"Extracting and Restructuring the Design of Large Systems","volume":"7","author":"Choi","year":"1990","journal-title":"IEEE Software"},{"issue":"2","key":"10.1016\/S0065-2458(08)60596-3_bib19","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1147\/sj.282.0324","article-title":"A Program Understanding Support Environment","volume":"28","author":"Cleveland","year":"1989","journal-title":"IBM Syst. J."},{"issue":"2","key":"10.1016\/S0065-2458(08)60596-3_bib20","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1147\/sj.282.0294","article-title":"Program Understanding: Challenge for the 1990s","volume":"28","author":"Corbi","year":"1989","journal-title":"IBM Syst. J."},{"key":"10.1016\/S0065-2458(08)60596-3_bib21","first-page":"62","author":"Cross","year":"1990","journal-title":"Grasp\/Ada Uses Control Structure. In Oman"},{"issue":"5","key":"10.1016\/S0065-2458(08)60596-3_bib22","first-page":"26","article-title":"Control Structure Diagrams for Ada.","volume":"9","author":"Cross","year":"1990","journal-title":"J. Pascal, Ada & Modula-2"},{"key":"10.1016\/S0065-2458(08)60596-3_bib23","series-title":"\u201cStructured Analysis and System Specification.\u201d","author":"DeMarco","year":"1979"},{"key":"10.1016\/S0065-2458(08)60596-3_bib24","article-title":"Synopsis of Information Processing Systems\u2013Esprit II Projects and Exploratory Actions.","volume":"4 of 8","author":"Esprit","year":"1990","journal-title":"Directorate General XIII\u2013Commission of the European Communities."},{"key":"10.1016\/S0065-2458(08)60596-3_bib25","series-title":"\u201cCASE '89: Proceedings of the Third International Workshop on Computer-Aided Software Engineering,\u201d supplementary, volume","first-page":"341","article-title":"A CASE Tool for the Software Reengineering of Data Structures","author":"Faghihi","year":"1989"},{"key":"10.1016\/S0065-2458(08)60596-3_bib26","first-page":"64","author":"Gallagher","year":"1990","journal-title":"Surgeon's Assistant Limits Side Effects, in Oman"},{"key":"10.1016\/S0065-2458(08)60596-3_bib27","year":"1989","journal-title":"\u201cApplication Reengineering.\u201d Guide Publication GPP-208, Chicago."},{"key":"10.1016\/S0065-2458(08)60596-3_bib28","series-title":"\u201cElements of Software Science.\u201d","author":"Halstead","year":"1977"},{"issue":"1","key":"10.1016\/S0065-2458(08)60596-3_bib29","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/52.43052","article-title":"Knowledge-Based Program Analysis","volume":"7","author":"Harandi","year":"1990","journal-title":"IEEE Software"},{"key":"10.1016\/S0065-2458(08)60596-3_bib30","first-page":"61","author":"Harband","year":"1990","journal-title":"Seela Aids Maintenance with Code-Block Focus. In Oman"},{"issue":"1","key":"10.1016\/S0065-2458(08)60596-3_bib31","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/52.43050","article-title":"Using Function Abstraction to Understand Program Behavior","volume":"7","author":"Hausler","year":"1990","journal-title":"IEEE Software"},{"key":"10.1016\/S0065-2458(08)60596-3_bib32","series-title":"\u201cSoftware Engineering Standards.\u201d","first-page":"1987","article-title":"IEEE Standard Glossary of Software Engineering Terminology. ANSI\/IEEE Std 729\u20131983. Approved IEEE Standards Board, Sept. 23, 1982. Approved American National Standards Institute, Aug. 9, 1983.","year":"1983"},{"key":"10.1016\/S0065-2458(08)60596-3_bib33","series-title":"\u201cProceedings of Symposium on Application and Assessment of Automated Tools for Software Development.\u201d","article-title":"Problem Statement Language\/Problem Statement Analyzer (PSL\/PSA)","author":"Johnson","year":"1983"},{"issue":"1","key":"10.1016\/S0065-2458(08)60596-3_bib34","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/0004-3702(90)90094-G","article-title":"Understanding and Debugging Novice Programs","volume":"42","author":"Johnson","year":"1990","journal-title":"Artif. Intell."},{"key":"10.1016\/S0065-2458(08)60596-3_bib35","series-title":"\u201cSystematic Software Development Using VDM.\u201d","author":"Jones","year":"1986"},{"key":"10.1016\/S0065-2458(08)60596-3_bib36","series-title":"\u201cCASE '89: Proceedings of the Third International Workshop on Computer-Aided Software Engineering,\u201d","first-page":"221","article-title":"Maintenance, Validation, and Documentation of Software Systems: 'REDO'\u2013ESPRIT P2487.","author":"Khabaza","year":"1989"},{"key":"10.1016\/S0065-2458(08)60596-3_bib37","doi-asserted-by":"crossref","unstructured":"W. Kozaczynski J.Q. Ning SRE: A Knowiedge-Based Environment for Large-Scale Software Re-engineering Activities \u201cProceedings of the Eleventh International Conference on Software Engineering,\u201d 1989 IEEE Computer Society Press Washington, DC 113 122","DOI":"10.1145\/74587.74603"},{"issue":"3","key":"10.1016\/S0065-2458(08)60596-3_bib38","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MS.1986.233414","article-title":"Delocalized Plans and Program Comprehension.","volume":"3","author":"Letovsky","year":"1986","journal-title":"IEEE Software"},{"issue":"2","key":"10.1016\/S0065-2458(08)60596-3_bib39","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/MS.1985.230345","article-title":"An Overview of Anna, a Specification Language for Ada","volume":"2","author":"von Luckham","year":"1985","journal-title":"IEEE Software"},{"key":"10.1016\/S0065-2458(08)60596-3_bib40","first-page":"62","author":"McCabe","year":"1990","journal-title":"Battle Map, ACT Show Code Structure, Complexity. In Oman"},{"issue":"4","key":"10.1016\/S0065-2458(08)60596-3_bib41","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1109\/TSE.1976.233837","article-title":"A Complexity Measure.","volume":"SE-2","author":"McCabe","year":"1976","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"12","key":"10.1016\/S0065-2458(08)60596-3_bib42","doi-asserted-by":"crossref","first-page":"1415","DOI":"10.1145\/76380.76382","article-title":"Design Complexity Measurement and Testing","volume":"32","author":"McCabe","year":"1989","journal-title":"Commun. ACM"},{"key":"10.1016\/S0065-2458(08)60596-3_bib43","first-page":"60","author":"Novobilski","year":"1990","journal-title":"Objective-C Browser Details Class Structures. In Oman"},{"issue":"3","key":"10.1016\/S0065-2458(08)60596-3_bib44","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1109\/52.55229","article-title":"Maintenance Tools","volume":"7","author":"Oman","year":"1990","journal-title":"IEEE Software"},{"issue":"1","key":"10.1016\/S0065-2458(08)60596-3_bib45","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1109\/52.43048","article-title":"The Book Paradigm for Improved Maintenance","volume":"7","author":"Oman","year":"1990","journal-title":"IEEE Software"},{"issue":"4","key":"10.1016\/S0065-2458(08)60596-3_bib46","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/64.43284","article-title":"Program Recognition","volume":"4","author":"Ourston","year":"1989","journal-title":"IEEE Expert"},{"key":"10.1016\/S0065-2458(08)60596-3_bib47","series-title":"\u201cSoftware Engineering: A Practitioner's Approach,\u201d","author":"Pressman","year":"1987"},{"key":"10.1016\/S0065-2458(08)60596-3_bib48","first-page":"60","author":"Rajlich","year":"1990","journal-title":"Vifor Transforms Code Skeletons to Graphs, in Oman"},{"issue":"2","key":"10.1016\/S0065-2458(08)60596-3_bib49","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1109\/TSMC.1985.6313354","article-title":"On Reverse Engineering","volume":"SMC-15","author":"Rekoff","year":"1985","journal-title":"IEEE Trans. Syst. Man Cybern."},{"issue":"1","key":"10.1016\/S0065-2458(08)60596-3_bib50","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/52.43053","article-title":"Recognizing a Program's Design: A Graph-Parsing Approach","volume":"7","author":"Rich","year":"1990","journal-title":"IEEE Software"},{"key":"10.1016\/S0065-2458(08)60596-3_bib51","series-title":"\u201cCASE '89: Proceedings of the Third International Workshop on Computer-Aided Software Engineering,\u201d","first-page":"560","article-title":"Reverse Engineering Technologies for Ada","author":"Rozenblat","year":"1989"},{"issue":"2","key":"10.1016\/S0065-2458(08)60596-3_bib52","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1109\/TSE.1983.236456","article-title":"Syntax-Directed Pretty Printing\u2013A First Step Towards a Syntax-Directed Editor","volume":"SE-9","author":"Rubin","year":"1983","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"1","key":"10.1016\/S0065-2458(08)60596-3_bib53","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/52.43049","article-title":"Recognizing Design Decisions in Programs","volume":"7","author":"Rugaber","year":"1990","journal-title":"IEEE Software"},{"issue":"1","key":"10.1016\/S0065-2458(08)60596-3_bib54","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1109\/52.43054","article-title":"Reverse-Engineering Someone Else's Software: Is It Legal?","volume":"7","author":"Samuelson","year":"1990","journal-title":"IEEE Software"},{"issue":"5","key":"10.1016\/S0065-2458(08)60596-3_bib55","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/52.35587","article-title":"Structured Flowcharts Outperform Pseudocode: An Experimental Comparison","volume":"6","author":"Scanlan","year":"1989","journal-title":"IEEE Software"},{"key":"10.1016\/S0065-2458(08)60596-3_bib56","first-page":"147","article-title":"Discovering, Visualizing, and Controlling Software Structure.","volume":"14","author":"Schwanke","year":"1989"},{"issue":"3","key":"10.1016\/S0065-2458(08)60596-3_bib57","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MS.1987.230396","article-title":"Knowledge-Based Program Debugging Systems","volume":"4","author":"Seviora","year":"1987","journal-title":"IEEE Software"},{"issue":"4","key":"10.1016\/S0065-2458(08)60596-3_bib58","first-page":"4","article-title":"Interpreting Reverse-Engineering Law.","volume":"7","author":"Sibor","year":"1990","journal-title":"IEEE Software"},{"key":"10.1016\/S0065-2458(08)60596-3_bib59","series-title":"\u201cSoftware Engineering,\u201d","author":"Sommerville","year":"1989"},{"key":"10.1016\/S0065-2458(08)60596-3_bib60","series-title":"\u201cCASE '89: Proceedings of the Third International Workshop on Computer-Aided Software Engineering,\u201d","first-page":"51","article-title":"CASE '89\u2013Position Paper on \u201cReverse Engineering,\u201d","author":"Stender","year":"1989"},{"issue":"6","key":"10.1016\/S0065-2458(08)60596-3_bib61","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/52.10001","article-title":"Intelligent Support for Specifications Transformation","volume":"5","author":"Tsai","year":"1988","journal-title":"IEEE Software"},{"key":"10.1016\/S0065-2458(08)60596-3_bib62","first-page":"63","author":"Vanek","year":"1990","journal-title":"Expert Dataflow and Static Analysis Tool, in Oman"},{"key":"10.1016\/S0065-2458(08)60596-3_bib63","first-page":"65","author":"Wilde","year":"1990","journal-title":"Dependency Analysis Tool Set Prototype, in Oman"},{"issue":"3","key":"10.1016\/S0065-2458(08)60596-3_bib64","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1109\/TSE.1987.233166","article-title":"Knowledge Representation of Software Component Interconnection Information for Large-Scale Software Modifications","volume":"SE-13","author":"Yau","year":"1987","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/S0065-2458(08)60596-3_bib65","series-title":"\u201cStructured Design: Fundamentals of a Discipline of Computer Program and Systems Design.\u201d","author":"Yourdon","year":"1979"}],"container-title":["Advances in Computers"],"original-title":[],"deposited":{"date-parts":[[2021,11,17]],"date-time":"2021-11-17T16:33:36Z","timestamp":1637166816000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0065245808605963"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992]]},"references-count":65,"URL":"https:\/\/doi.org\/10.1016\/s0065-2458(08)60596-3","relation":{},"ISSN":["0065-2458"],"issn-type":[{"value":"0065-2458","type":"print"}],"subject":[],"published":{"date-parts":[[1992]]}}}