{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T13:24:59Z","timestamp":1773235499727,"version":"3.50.1"},"reference-count":15,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[2000,10,1]],"date-time":"2000-10-01T00:00:00Z","timestamp":970358400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Systems and Software"],"published-print":{"date-parts":[[2000,10]]},"DOI":"10.1016\/s0164-1212(00)00029-7","type":"journal-article","created":{"date-parts":[[2003,4,5]],"date-time":"2003-04-05T02:09:52Z","timestamp":1049508592000},"page":"87-98","source":"Crossref","is-referenced-by-count":49,"title":["Quantifying the closeness between program components and features"],"prefix":"10.1016","volume":"54","author":[{"given":"W.","family":"Eric Wong","sequence":"first","affiliation":[]},{"given":"Swapna S.","family":"Gokhale","sequence":"additional","affiliation":[]},{"given":"Joseph R.","family":"Horgan","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"6","key":"10.1016\/S0164-1212(00)00029-7_BIB1","doi-asserted-by":"crossref","first-page":"758","DOI":"10.1109\/32.6156","article-title":"The TAME project: towards improvement-oriented software environments","volume":"14","author":"Basili","year":"1988","journal-title":"IEEE Trans. Software Eng."},{"key":"10.1016\/S0164-1212(00)00029-7_BIB2","series-title":"Software Metrics: A Rigorous and Practical Approach","author":"Fenton","year":"1997"},{"key":"10.1016\/S0164-1212(00)00029-7_BIB3","doi-asserted-by":"crossref","unstructured":"Horgan, J.R., et al., 1998. Mining system tests to aid software maintenance. IEEE Comput. 31 (7), 64\u201373","DOI":"10.1109\/2.689678"},{"key":"10.1016\/S0164-1212(00)00029-7_BIB4","doi-asserted-by":"crossref","unstructured":"Horgan, J.R., London, S.A., 1991. Data flow coverage and the C language. In: Proceedings of the Fourth Symposium on Software Testing, Analysis, and Verification. Victoria, British Columbia, Canada, October, pp. 87\u201397","DOI":"10.1145\/120807.120815"},{"key":"10.1016\/S0164-1212(00)00029-7_BIB5","unstructured":"IEEE, 1984. Guide to Software Requirements Specifications. ANSI\/IEEE Std 830\u20131984"},{"key":"10.1016\/S0164-1212(00)00029-7_BIB6","doi-asserted-by":"crossref","unstructured":"Lakhotia, A., Gravley, J.M., 1995. Toward experimental evaluation of subsystem classification recovery techniques. In: Proceedings of the Second Working Conference on Reverse Engineering, Toronto, Canada, July 1995","DOI":"10.1109\/WCRE.1995.514714"},{"key":"10.1016\/S0164-1212(00)00029-7_BIB7","unstructured":"Military Standard, 1988. Defense System Software Development (DOD-STD-2167A), Department of Defense, February"},{"key":"10.1016\/S0164-1212(00)00029-7_BIB8","series-title":"The practical guide to structured systems design","author":"Meilir","year":"1988"},{"key":"10.1016\/S0164-1212(00)00029-7_BIB9","series-title":"Software Engineering: A Practitioner's Approach","author":"Pressman","year":"1997"},{"key":"10.1016\/S0164-1212(00)00029-7_BIB10","series-title":"Performance and Reliability Analysis of Computer Systems: An Example-Based Approach Using the SHARPE Software Package","author":"Sahner","year":"1996"},{"key":"10.1016\/S0164-1212(00)00029-7_BIB11","unstructured":"Schwanke, R., 1991. An intelligent tool for reengineering software modularity. In: Proceedings of the 13th IEEE International Conference on Software Engineering"},{"key":"10.1016\/S0164-1212(00)00029-7_BIB12","unstructured":"\u03c7Suds User's Manual, 1998. Telcordia Technologies, Inc., 1998"},{"key":"10.1016\/S0164-1212(00)00029-7_BIB13","doi-asserted-by":"crossref","unstructured":"Wilde, N., Casey, C., 1996. Early field experience with the software reconnaissance technique for program comprehension. In: Proceedings of the International Conference on Software Maintenance, Monterey, CA, November, pp. 312\u2013318","DOI":"10.1109\/ICSM.1996.565034"},{"issue":"1","key":"10.1016\/S0164-1212(00)00029-7_BIB14","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1002\/smr.4360070105","article-title":"Software reconnaissance mapping program features to code","volume":"7","author":"Wilde","year":"1995","journal-title":"Software Maintenance Res. Practice"},{"key":"10.1016\/S0164-1212(00)00029-7_BIB15","doi-asserted-by":"crossref","unstructured":"Wong, W.E. Gokhale, S.S., Horgan, J.R., Trivedi, K.S., 1999. Locating program features using execution slices. In: Proceedings of the Second IEEE Symposium on Application-Specific Systems and Software Engineering Technology, Richardson, TX, March, pp. 194\u2013203","DOI":"10.1109\/ASSET.1999.756769"}],"container-title":["Journal of Systems and Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121200000297?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121200000297?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,11]],"date-time":"2020-01-11T12:06:59Z","timestamp":1578744419000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0164121200000297"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,10]]},"references-count":15,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2000,10]]}},"alternative-id":["S0164121200000297"],"URL":"https:\/\/doi.org\/10.1016\/s0164-1212(00)00029-7","relation":{},"ISSN":["0164-1212"],"issn-type":[{"value":"0164-1212","type":"print"}],"subject":[],"published":{"date-parts":[[2000,10]]}}}