{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:46:35Z","timestamp":1755999995728,"version":"3.37.3"},"reference-count":35,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902108"],"award-info":[{"award-number":["61902108"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Scientific Research Foundation of Hebei Educational Department","award":["ZD2019093"],"award-info":[{"award-number":["ZD2019093"]}]},{"DOI":"10.13039\/501100003787","name":"Natural Science Foundation of Hebei Province","doi-asserted-by":"publisher","award":["F2019208305"],"award-info":[{"award-number":["F2019208305"]}],"id":[{"id":"10.13039\/501100003787","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3120414","type":"journal-article","created":{"date-parts":[[2021,10,15]],"date-time":"2021-10-15T23:44:30Z","timestamp":1634341470000},"page":"149287-149301","source":"Crossref","is-referenced-by-count":2,"title":["Consistency Validation Method for Java Fine-Grained Lock Refactoring"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8641-2660","authenticated-orcid":false,"given":"Yang","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Information Science and Engineering, Hebei University of Science and Technology, Shijiazhuang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9799-0711","authenticated-orcid":false,"given":"Chunxia","family":"Li","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Hebei University of Science and Technology, Shijiazhuang, China"}]},{"given":"Yu","family":"Bai","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Hebei University of Science and Technology, Shijiazhuang, China"}]}],"member":"263","reference":[{"year":"2020","journal-title":"Freedom","key":"ref33"},{"year":"2020","journal-title":"RxJava","key":"ref32"},{"year":"2020","journal-title":"FOP","key":"ref31"},{"year":"2020","journal-title":"Xalan","key":"ref30"},{"year":"2020","journal-title":"Mina","key":"ref35"},{"year":"2020","journal-title":"ANTLR","key":"ref34"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/AST.2017.9"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/KSE.2017.8119442"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/SBES.2014.21"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1016\/j.infsof.2021.106675"},{"key":"ref14","first-page":"22","article-title":"Consistency detection method for concurrent code refactoring","volume":"44","author":"zhang","year":"2020","journal-title":"Journal of Hebei Normal University"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/1985793.1985804"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/ICSME.2014.58"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/2931037.2931070"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.3390\/app10010413"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/ICST.2008.36"},{"year":"2020","journal-title":"SPECjbb2005","key":"ref28"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.3390\/app10228005"},{"year":"2020","journal-title":"Cassandra","key":"ref27"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/MS.2015.145"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/SANER.2017.7884683"},{"year":"2020","journal-title":"Jgroups","key":"ref29"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/ICSE.2009.5070537"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/MS.2010.63"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TSE.2012.19"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/2635868.2661674"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1016\/j.scico.2013.11.001"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1145\/3395363.3404368"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/DSN.2009.5270355"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1007\/s10766-017-0548-4"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/SCAM.2006.16"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1007\/978-3-642-14107-2_11"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1145\/2851553.2851559"},{"year":"2020","journal-title":"HsqlDB","key":"ref26"},{"year":"0","journal-title":"T J Watson Libraries for Analysis (WALA)","key":"ref25"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09576065.pdf?arnumber=9576065","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,8]],"date-time":"2022-09-08T20:51:13Z","timestamp":1662670273000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9576065\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3120414","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2021]]}}}