{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,25]],"date-time":"2024-08-25T14:46:50Z","timestamp":1724597210957},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,11,28]],"date-time":"2020-11-28T00:00:00Z","timestamp":1606521600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,28]],"date-time":"2020-11-28T00:00:00Z","timestamp":1606521600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,28]],"date-time":"2020-11-28T00:00:00Z","timestamp":1606521600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,28]]},"DOI":"10.1109\/acit50332.2020.9299966","type":"proceedings-article","created":{"date-parts":[[2021,1,4]],"date-time":"2021-01-04T20:37:09Z","timestamp":1609792629000},"source":"Crossref","is-referenced-by-count":2,"title":["Recovery of Mobile Game Design Patterns"],"prefix":"10.1109","author":[{"given":"Maria","family":"Khan","sequence":"first","affiliation":[]},{"given":"Ghulam","family":"Rasool","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"410","article-title":"Games and design patterns","author":"bjork","year":"2005","journal-title":"The Game Design Reader"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.5381\/jot.2009.8.5.a4"},{"key":"ref12","article-title":"Big designs for small devices","author":"hui","year":"2002","journal-title":"JavaWorld com"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100060"},{"key":"ref14","first-page":"94","article-title":"utomatic design pattern detection.&#x201D; Program Comprehension","author":"heuzeroth","year":"2003","journal-title":"2003 11th IEEE International Workshop on IEEE"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-44995-9_19"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1822348.1822359"},{"key":"ref17","article-title":"Towards a Generic Method of Evaluating Game Levels","author":"liapis","year":"2013","journal-title":"AIIDE"},{"key":"ref18","author":"rasool","year":"2010","journal-title":"Customizable feature based design pattern detection integrating multiple techniques"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ASWEC.2005.5"},{"key":"ref4","article-title":"Elements of Reusable Object-Oriented Software","author":"vlissides","year":"1995","journal-title":"Published by Addison Wesley Professional"},{"key":"ref3","year":"0","journal-title":"Enterprise Architect Website"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/3468.823479"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/S0920-5489(02)00096-X"},{"key":"ref8","author":"astahovs","year":"2012","journal-title":"Use of Design Patterns in Mobile Game Development"},{"key":"ref7","year":"0"},{"key":"ref2","article-title":"Design patterns: elements of reusable object-oriented software","author":"gamma","year":"1994","journal-title":"Pearson Education"},{"key":"ref9","article-title":"Big designs for small devices","author":"hui","year":"2002","journal-title":"avaWorld com"},{"key":"ref1","article-title":"Game design patterns for mobile games","author":"davidsson","year":"2004","journal-title":"Project report to Nokia Research Center"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.112"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/VS-GAMES.2015.7295760"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.11.030"},{"key":"ref24","article-title":"Designing mobile games to promote decision-making skills-a pan-european project. In MIPRO 2006","author":"mitchell","year":"0","journal-title":"29th International Convention Conference DE Digital Economy 3rd Alpe Adria Universities Initiative (ALADIN"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1080\/2331186X.2018.1437671"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/6787504"}],"event":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","location":"Giza, Egypt","start":{"date-parts":[[2020,11,28]]},"end":{"date-parts":[[2020,11,30]]}},"container-title":["2020 21st International Arab Conference on Information Technology (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9299884\/9299962\/09299966.pdf?arnumber=9299966","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:41:27Z","timestamp":1656344487000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9299966\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,28]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/acit50332.2020.9299966","relation":{},"subject":[],"published":{"date-parts":[[2020,11,28]]}}}