{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T15:01:51Z","timestamp":1648911711960},"reference-count":33,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[1997,1,1]],"date-time":"1997-01-01T00:00:00Z","timestamp":852076800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information and Software Technology"],"published-print":{"date-parts":[[1997,1]]},"DOI":"10.1016\/s0950-5849(96)01127-5","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T14:22:28Z","timestamp":1027606948000},"page":"65-76","source":"Crossref","is-referenced-by-count":5,"title":["Engineering a library of reusable conceptual components"],"prefix":"10.1016","volume":"39","author":[{"given":"Silvana","family":"Castano","sequence":"first","affiliation":[]},{"given":"Valeria","family":"De Antonellis","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0950-5849(96)01127-5_BIB1","doi-asserted-by":"crossref","DOI":"10.1145\/175290.175292","article-title":"DoD legacy systems \u2014reverse engineering data requirements","volume":"37","author":"Aiken","year":"1994","journal-title":"Comm. ACM"},{"key":"10.1016\/S0950-5849(96)01127-5_BIB2","doi-asserted-by":"crossref","DOI":"10.1145\/130844.130856","article-title":"Software Reuse","volume":"24","author":"Krueger","year":"1992","journal-title":"ACM Computing Surveys"},{"key":"10.1016\/S0950-5849(96)01127-5_BIB3","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1109\/32.391379","article-title":"Reusing software: issues and research directions","volume":"21","author":"Mili","year":"1995","journal-title":"IEEE Trans. on Soft. Eng."},{"key":"10.1016\/S0950-5849(96)01127-5_BIB4","doi-asserted-by":"crossref","DOI":"10.1109\/32.223805","article-title":"Repository evaluation of software reuse","volume":"19","author":"Banker","year":"1993","journal-title":"IEEE Trans. on Soft. Eng."},{"key":"10.1016\/S0950-5849(96)01127-5_BIB5","article-title":"The design and implementation of hierarchical software systems with reusable components","volume":"1","author":"Batory","year":"1992","journal-title":"ACM Trans. on Soft. Eng. and Methodology"},{"key":"10.1016\/S0950-5849(96)01127-5_BIB6","doi-asserted-by":"crossref","DOI":"10.1109\/32.295896","article-title":"Certification of software components","volume":"20","author":"Wohlin","year":"1994","journal-title":"IEEE Trans. on Soft. Eng."},{"key":"10.1016\/S0950-5849(96)01127-5_BIB7","doi-asserted-by":"crossref","DOI":"10.1109\/32.310671","article-title":"An empirical study of representation methods for reusable software components","volume":"20","author":"Frakes","year":"1994","journal-title":"IEEE Trans. on Soft. Eng."},{"key":"10.1016\/S0950-5849(96)01127-5_BIB8","doi-asserted-by":"crossref","DOI":"10.1109\/2.67210","article-title":"Identifying and qualifying reusable software components","volume":"24","author":"Caldiera","year":"1991","journal-title":"IEEE Computer"},{"key":"10.1016\/S0950-5849(96)01127-5_BIB9","doi-asserted-by":"crossref","DOI":"10.1109\/MC.1986.1663146","article-title":"Reusing and interconnecting software components","volume":"19","author":"Goguen","year":"1986","journal-title":"IEEE Computer"},{"key":"10.1016\/S0950-5849(96)01127-5_BIB10","doi-asserted-by":"crossref","DOI":"10.1016\/0164-1212(94)00134-9","article-title":"The REBOOT approach to software reuse","volume":"30","author":"Sindre","year":"1995","journal-title":"Journal of Systems and Software"},{"key":"10.1016\/S0950-5849(96)01127-5_BIB11","series-title":"Proc. of the Workshop on Institutionalizing Software Reuse","article-title":"DARE: Domain Analysis and Reuse Environment","author":"Frakes","year":"1995"},{"key":"10.1016\/S0950-5849(96)01127-5_BIB12","series-title":"Proc. of the Symp. on Software Reusability SSR'95","article-title":"Systematic reuse: a scientific or engineering method?","author":"Prieto-Diaz","year":"1995"},{"key":"10.1016\/S0950-5849(96)01127-5_BIB13","series-title":"Proc. of the 5th Int. Workshop on Software Specification and Design","article-title":"Domain analysis: from art form to engineering discipline","author":"Arango","year":"1989"},{"key":"10.1016\/S0950-5849(96)01127-5_BIB14","doi-asserted-by":"crossref","DOI":"10.1109\/32.83915","article-title":"An information retrieval approach for automatically constructing software libraries","volume":"17","author":"Maarek","year":"1991","journal-title":"IEEE Trans. on Soft. Eng."},{"key":"10.1016\/S0950-5849(96)01127-5_BIB15","doi-asserted-by":"crossref","DOI":"10.1145\/103167.103176","article-title":"Implementing faceted classification for software reuse","volume":"34","author":"Prieto-Diaz","year":"1991","journal-title":"Comm. of the ACM"},{"key":"10.1016\/S0950-5849(96)01127-5_BIB16","doi-asserted-by":"crossref","DOI":"10.1145\/129852.129857","article-title":"Exploiting reusable specifications through analogy","volume":"35","author":"Maiden","year":"1992","journal-title":"Comm. ACM"},{"key":"10.1016\/S0950-5849(96)01127-5_BIB17","article-title":"Computing similarity in a reuse library system: an AI-based approach","volume":"1","author":"Ostertag","year":"1992","journal-title":"ACM Trans. on Soft. Eng. and Methodology"},{"key":"10.1016\/S0950-5849(96)01127-5_BIB18","doi-asserted-by":"crossref","DOI":"10.1049\/sej.1988.0024","article-title":"Reuse of formatted requirements specifications","author":"Finkelstein","year":"1988","journal-title":"Soft. Eng. Journal"},{"key":"10.1016\/S0950-5849(96)01127-5_BIB19","series-title":"Proc. of CAiSE '93, Int. Conf. on Advanced Information Systems Engineering","article-title":"Similarity for analogical software reuse: a conceptual modelling approach","author":"Spanoudakis","year":"1993"},{"key":"10.1016\/S0950-5849(96)01127-5_BIB20","series-title":"Proc. of Int. Conf. on Computer Software and Applications","article-title":"Building information systems using generic structures","author":"Grosz","year":"1992"},{"key":"10.1016\/S0950-5849(96)01127-5_BIB21","series-title":"Proc. of ER'92, Int. Conf. on the Entity-Relationship Approach","article-title":"Classifying and reusing conceptual schemas","author":"Castano","year":"1992"},{"key":"10.1016\/S0950-5849(96)01127-5_BIB22","article-title":"The F3 reuse environment for requirements engineering","volume":"19","author":"Castano","year":"1994","journal-title":"ACM SIGSOFT Soft. Eng. Notes"},{"key":"10.1016\/S0950-5849(96)01127-5_BIB23","doi-asserted-by":"crossref","DOI":"10.1016\/0306-4379(94)90045-0","article-title":"Building reusable components through project evolution analysis","volume":"19","author":"De Antonellis","year":"1994","journal-title":"Information Systems"},{"key":"10.1016\/S0950-5849(96)01127-5_BIB24","series-title":"Proc. of SSR'95, ACM SIGSOFT Conf. on Software Reuse","article-title":"Building reusable conceptual components in the public administration domain","author":"Castano","year":"1995"},{"key":"10.1016\/S0950-5849(96)01127-5_BIB25","series-title":"Conceptual Database Design","author":"Batini","year":"1992"},{"key":"10.1016\/S0950-5849(96)01127-5_BIB26","series-title":"Modern Structured Analysis","author":"Yourdon","year":"1989"},{"key":"10.1016\/S0950-5849(96)01127-5_BIB27","series-title":"Proc. of ER '93, 12th Int. Conf. on The Entity-Relationship Approach","article-title":"Reuse of object-oriented requirements specifications","author":"Castano","year":"1993"},{"key":"10.1016\/S0950-5849(96)01127-5_BIB28","series-title":"Proc. of the CRIS'94 IFIP WG 8.1 Int. Conf.","article-title":"A reusability-based comparison of requirement specification methodologies","author":"Castano","year":"1994"},{"key":"10.1016\/S0950-5849(96)01127-5_BIB29","series-title":"Automatic Text Processing \u2014 The Transformation, Analysis and Retrieval of Information by Computer","author":"Salton","year":"1989"},{"key":"10.1016\/S0950-5849(96)01127-5_BIB30","series-title":"Associative Networks","year":"1979"},{"key":"10.1016\/S0950-5849(96)01127-5_BIB31","article-title":"Understanding semantic relationships","volume":"2","author":"Storey","year":"1993","journal-title":"The VLBD Journal"},{"key":"10.1016\/S0950-5849(96)01127-5_BIB32","series-title":"Cluster Analysis","author":"Everitt","year":"1974"},{"key":"10.1016\/S0950-5849(96)01127-5_BIB33","series-title":"A comprehensive analysis of methodologies for database schema integration","author":"Batini","year":"1986"}],"container-title":["Information and Software Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950584996011275?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950584996011275?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,23]],"date-time":"2019-04-23T18:20:25Z","timestamp":1556043625000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0950584996011275"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997,1]]},"references-count":33,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1997,1]]}},"alternative-id":["S0950584996011275"],"URL":"https:\/\/doi.org\/10.1016\/s0950-5849(96)01127-5","relation":{},"ISSN":["0950-5849"],"issn-type":[{"value":"0950-5849","type":"print"}],"subject":[],"published":{"date-parts":[[1997,1]]}}}