{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T03:43:57Z","timestamp":1760586237163},"reference-count":31,"publisher":"Elsevier BV","issue":"6","license":[{"start":{"date-parts":[[2001,5,1]],"date-time":"2001-05-01T00:00:00Z","timestamp":988675200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information and Software Technology"],"published-print":{"date-parts":[[2001,5]]},"DOI":"10.1016\/s0950-5849(01)00149-5","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T11:14:57Z","timestamp":1027595697000},"page":"401-412","source":"Crossref","is-referenced-by-count":22,"title":["Decomposing legacy systems into objects: an eclectic approach"],"prefix":"10.1016","volume":"43","author":[{"given":"G.","family":"Canfora","sequence":"first","affiliation":[]},{"given":"A.","family":"Cimitile","sequence":"additional","affiliation":[]},{"given":"A.","family":"De Lucia","sequence":"additional","affiliation":[]},{"given":"G.A.","family":"Di Lucca","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0950-5849(01)00149-5_BIB1","series-title":"A greedy approach to object identification in imperative code","author":"Achee","year":"1994"},{"key":"10.1016\/S0950-5849(01)00149-5_BIB2","series-title":"Migrating legacy systems to the Web: an experience report","author":"Aversano","year":"2001"},{"key":"10.1016\/S0950-5849(01)00149-5_BIB3","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1016\/0164-1212(92)90053-M","article-title":"Reverse engineering processes, design document production, and structure charts","volume":"19","author":"Benedusi","year":"1992","journal-title":"The Journal of Systems and Software"},{"key":"10.1016\/S0950-5849(01)00149-5_BIB4","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1002\/smr.4360050103","article-title":"Reverse-engineering COBOL via formal methods","volume":"5","author":"Breuer","year":"1993","journal-title":"Journal of Software Maintenance: Research and Practice"},{"key":"10.1016\/S0950-5849(01)00149-5_BIB5","first-page":"24","article-title":"An improved algorithm for identifying reusable objects in code","volume":"26","author":"Canfora","year":"1996","journal-title":"Software \u2014 Practice and Experiences"},{"issue":"1","key":"10.1016\/S0950-5849(01)00149-5_BIB6","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1142\/S0218194099000036","article-title":"An incremental object-oriented migration strategy for RPG legacy systems","volume":"9","author":"Canfora","year":"1999","journal-title":"International Journal of Software Engineering and Knowledge Engineering"},{"issue":"9","key":"10.1016\/S0950-5849(01)00149-5_BIB7","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1109\/32.713328","article-title":"An extensible system for source code analysis","volume":"24","author":"Canfora","year":"1998","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/S0950-5849(01)00149-5_BIB8","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/S0164-1212(98)10057-2","article-title":"Identifying objects in legacy systems using design metrics","volume":"44","author":"Cimitile","year":"1999","journal-title":"The Journal of Systems and Software"},{"key":"10.1016\/S0950-5849(01)00149-5_BIB9","series-title":"GENOA \u2014 a customizable, language- and front-end independent code analyzer","author":"Devanbu","year":"1992"},{"key":"10.1016\/S0950-5849(01)00149-5_BIB10","series-title":"Automating the detection of reusable parts in existing software","author":"Dunn","year":"1993"},{"key":"10.1016\/S0950-5849(01)00149-5_BIB11","series-title":"REP \u2013 chaRacterising and Exploiting Process components: results of experimentation","author":"Fusaro","year":"1998"},{"key":"10.1016\/S0950-5849(01)00149-5_BIB12","series-title":"Finding objects in procedural programs: an alternative approach","author":"Gall","year":"1995"},{"issue":"8","key":"10.1016\/S0950-5849(01)00149-5_BIB13","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1109\/TSE.1985.232524","article-title":"System structure analysis: clustering with data bindings","volume":"SE-11","author":"Hutchens","year":"1985","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/S0950-5849(01)00149-5_BIB14","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1016\/0164-1212(95)00098-4","article-title":"A unified framework for expressing software subsystem classification techniques","volume":"36","author":"Lakothia","year":"1997","journal-title":"The Journal of Systems and Software"},{"key":"10.1016\/S0950-5849(01)00149-5_BIB15","unstructured":"I. Lemke, G. Sander, VCG: a visualization tool for Compiler Graphs, The COMPARE Consortium, 1993, available from: ftp.es.uni-se.de (134.96.254.254):\/pub\/graphics\/cdg\/."},{"key":"10.1016\/S0950-5849(01)00149-5_BIB16","unstructured":"C. Lindig, The Concept Tool, available from http:\/\/www.cs.tu-bs.de\/softech\/people\/lindig\/."},{"key":"10.1016\/S0950-5849(01)00149-5_BIB17","series-title":"Assessing modular structure of legacy code based on mathematical concept analysis","author":"Lindig","year":"1997"},{"key":"10.1016\/S0950-5849(01)00149-5_BIB18","series-title":"Identifying objects in a conventional procedural language: an example of data design recovery","author":"Liu","year":"1990"},{"key":"10.1016\/S0950-5849(01)00149-5_BIB19","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1002\/smr.4360060503","article-title":"A new approach to finding objects in programs","volume":"6","author":"Livadas","year":"1994","journal-title":"Journal of Software Maintenance: Research and Practice"},{"key":"10.1016\/S0950-5849(01)00149-5_BIB20","unstructured":"D. McFall, G. Sleith, Reverse engineering structured code to an object oriented representation, Proc. of 5th International Conference on Software Engineering and Knowledge Engineering, San Francisco, CA, 1993, pp. 86\u201393."},{"key":"10.1016\/S0950-5849(01)00149-5_BIB21","series-title":"Identification of data cohesive subsystems using data mining techniques","author":"Montes de Oca","year":"1998"},{"key":"10.1016\/S0950-5849(01)00149-5_BIB22","series-title":"Reengineering procedural into object-oriented systems","author":"Newcomb","year":"1995"},{"key":"10.1016\/S0950-5849(01)00149-5_BIB23","first-page":"58","article-title":"Class and object extraction from imperative code","volume":"March\u2013April","author":"Ong","year":"1993","journal-title":"Journal of Object Oriented Programming"},{"key":"10.1016\/S0950-5849(01)00149-5_BIB24","unstructured":"Reasoning Systems, Inc., REFINE\u2122 User's Guide, version 3.0, Palo Alto, CA, 1990."},{"issue":"6","key":"10.1016\/S0950-5849(01)00149-5_BIB25","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1109\/32.824377","article-title":"Identifying modules via concept analysis","volume":"25","author":"Siff","year":"1999","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/S0950-5849(01)00149-5_BIB26","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1002\/smr.4360060502","article-title":"Downsizing large application programs","volume":"6","author":"Sneed","year":"1994","journal-title":"Journal of Software Maintenance: Research and Practice"},{"key":"10.1016\/S0950-5849(01)00149-5_BIB27","series-title":"Extracting object-oriented specification from procedurally oriented programs","author":"Sneed","year":"1995"},{"key":"10.1016\/S0950-5849(01)00149-5_BIB28","series-title":"Identifying objects using cluster and concept analysis","author":"van Deursen","year":"1999"},{"key":"10.1016\/S0950-5849(01)00149-5_BIB29","series-title":"Using clustering algorithms in legacy system remodularization","author":"Wiggerts","year":"1997"},{"key":"10.1016\/S0950-5849(01)00149-5_BIB30","series-title":"Recovering abstract data types and object instances from a conventional procedural language","author":"Yeh","year":"1995"},{"key":"10.1016\/S0950-5849(01)00149-5_BIB31","series-title":"Ordered Sets","article-title":"Restructuring lattice theory: an approach based on hierarchies of concepts","author":"Wille","year":"1981"}],"container-title":["Information and Software Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950584901001495?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950584901001495?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T02:24:04Z","timestamp":1556763844000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0950584901001495"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001,5]]},"references-count":31,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2001,5]]}},"alternative-id":["S0950584901001495"],"URL":"https:\/\/doi.org\/10.1016\/s0950-5849(01)00149-5","relation":{},"ISSN":["0950-5849"],"issn-type":[{"value":"0950-5849","type":"print"}],"subject":[],"published":{"date-parts":[[2001,5]]}}}