{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T09:45:53Z","timestamp":1748857553481},"reference-count":12,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[1998,12,1]],"date-time":"1998-12-01T00:00:00Z","timestamp":912470400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Systems and Software"],"published-print":{"date-parts":[[1998,12]]},"DOI":"10.1016\/s0164-1212(98)10049-3","type":"journal-article","created":{"date-parts":[[2003,4,5]],"date-time":"2003-04-05T02:09:52Z","timestamp":1049508592000},"page":"121-134","source":"Crossref","is-referenced-by-count":7,"title":["A method for the identification of reusable units through the reengineering of legacy code"],"prefix":"10.1016","volume":"44","author":[{"given":"Elizabeth","family":"Burd","sequence":"first","affiliation":[]},{"given":"Malcolm","family":"Munro","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0164-1212(98)10049-3_BIB1","doi-asserted-by":"crossref","unstructured":"Biggerstaff, T.J., Perlis, A.J., 1989. Software Reusability; Concepts and Models, vol. 1. ACM Press (Assoc. Comput. Machinery), New York","DOI":"10.1145\/73103"},{"key":"10.1016\/S0164-1212(98)10049-3_BIB2","doi-asserted-by":"crossref","unstructured":"Canfora, G., Cimitile, A., Visaggio, G., 1995. Assessing modularization and code scavenging techniques. Journal of Software Maintenance 7 (5), 317\u2013331","DOI":"10.1002\/smr.4360070504"},{"key":"10.1016\/S0164-1212(98)10049-3_BIB3","doi-asserted-by":"crossref","unstructured":"Cimitile, A., Visaggio, G., 1995. Software salvaging and the call dominance tree. Journal of Systems and Software 28 (2), 117\u2013128","DOI":"10.1016\/0164-1212(94)00049-S"},{"key":"10.1016\/S0164-1212(98)10049-3_BIB4","unstructured":"De Lucia, A., 1995. Identifying Reusable Functions in Code Using Specification Driven Techniques. M.Sc. Thesis, University of Durham"},{"key":"10.1016\/S0164-1212(98)10049-3_BIB5","unstructured":"Edwards, H., Munro, M., West, R., 1995. The RECAST Method for Reverse Engineering, CCTA, NCC. Blackwell, Oxford"},{"key":"10.1016\/S0164-1212(98)10049-3_BIB6","unstructured":"Everitt, B.S., 1993. Cluster Analysis. Edward Arnold, Paris"},{"key":"10.1016\/S0164-1212(98)10049-3_BIB7","unstructured":"Freeman, P. (Ed.), 1987. Tutorial on Software Reusability. IEEE Computer Soc. Press, New York"},{"key":"10.1016\/S0164-1212(98)10049-3_BIB8","unstructured":"Hetch, M.S., 1977. Flow Analysis of Computer Programs. North-Holland, Amsterdam"},{"key":"10.1016\/S0164-1212(98)10049-3_BIB9","unstructured":"Lientz, B.P., Swanson, B.E., 1980. Software Maintenance Management. Addison-Wesley, Reading, MA"},{"key":"10.1016\/S0164-1212(98)10049-3_BIB10","unstructured":"Tortorella, M.E., 1994. Identification of Abstract Data Types in Code. M.Sc. Thesis, University of Durham"},{"key":"10.1016\/S0164-1212(98)10049-3_BIB11","doi-asserted-by":"crossref","unstructured":"Tracz, W., 1988. Tutorial on Software Reuse: Emerging Technologies. IEEE Computer Soc. Press, New York","DOI":"10.1145\/43857.43859"},{"key":"10.1016\/S0164-1212(98)10049-3_BIB12","doi-asserted-by":"crossref","unstructured":"Weiser, M., 1982. Programmers use slices when debugging. Communications of the ACM 25 (7), 446\u2013452","DOI":"10.1145\/358557.358577"}],"container-title":["Journal of Systems and Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121298100493?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121298100493?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T00:01:58Z","timestamp":1620432118000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0164121298100493"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,12]]},"references-count":12,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1998,12]]}},"alternative-id":["S0164121298100493"],"URL":"https:\/\/doi.org\/10.1016\/s0164-1212(98)10049-3","relation":{},"ISSN":["0164-1212"],"issn-type":[{"value":"0164-1212","type":"print"}],"subject":[],"published":{"date-parts":[[1998,12]]}}}