{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:27:13Z","timestamp":1729628833444,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/cmpsac.2002.1045039","type":"proceedings-article","created":{"date-parts":[[2003,6,25]],"date-time":"2003-06-25T23:45:08Z","timestamp":1056584708000},"page":"427-432","source":"Crossref","is-referenced-by-count":5,"title":["From system comprehension to program comprehension"],"prefix":"10.1109","author":[{"given":"C.","family":"Tjortjis","sequence":"first","affiliation":[]},{"given":"N.","family":"Gold","sequence":"additional","affiliation":[]},{"given":"P.","family":"Layzell","sequence":"additional","affiliation":[]},{"given":"K.","family":"Bennett","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Practical Software Maintenance Best Practices for Managing your Software Investment","year":"1996","author":"pigoski","key":"19"},{"key":"17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/smr.4360040102","article-title":"Intelligent search and acquisition of business knowledge from programs","volume":"4","author":"karakostas","year":"1992","journal-title":"Software Maintenance Research and Practice"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/BF00871692"},{"journal-title":"Algorithms for clustering data","year":"1988","author":"jain","key":"15"},{"journal-title":"Intention-Based Diagnosis of Novice Programming Errors","year":"1986","author":"johnson","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/52.43052"},{"article-title":"Automatic control understanding for natural programs","year":"1991","author":"hartman","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2001.921725"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2001.972768"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/32.824377"},{"journal-title":"The Programmer s Apprentice","year":"1990","author":"rich","key":"20"},{"journal-title":"Software Engineering 6th Edition","year":"2001","author":"sommerville","key":"22"},{"journal-title":"A Survey of Program Slicing Techniques","year":"1994","author":"tip","key":"23"},{"journal-title":"Using Data Mining for Program Comprehension","year":"2002","author":"tjortjis","key":"24"},{"key":"25","first-page":"221","article-title":"Using data mining to assess software reliability","author":"tjortjis","year":"2001","journal-title":"Suppl Proc IEEE 12th Int'l Symposium Software Reliability Engineering (ISSRE2001)"},{"key":"26","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1109\/APSEC.2001.991489","article-title":"Expert maintainers' strategies and needs when understanding software: A qualitative empirical study","author":"tjortjis","year":"2001","journal-title":"Proc of Asia-Pacific Software Engineering Conf (APSEC 2001)"},{"key":"27","doi-asserted-by":"crossref","DOI":"10.21236\/ADA259609","article-title":"Automated program recognition by graph parsing","author":"wills","year":"1992"},{"key":"28","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-5461-5","article-title":"Constraint-Based design recovery for software reengineering: Theory and experiments","author":"woods","year":"1998"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1993.346017"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/2.30731"},{"article-title":"Hypothesis-based concept assignment to support software maintenance","year":"2000","author":"gold","key":"10"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2000.852501"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1096-908X(199601)8:1<3::AID-SMR122>3.0.CO;2-I"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(01)00149-5"},{"key":"5","first-page":"401","article-title":"Evaluating the use of dominance trees for C and COBOL","author":"burd","year":"1999","journal-title":"International Conference on Software Maintenance 30th Aug-3rd Sept 1999 Oxford England"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/175290.175300"},{"key":"9","first-page":"1","article-title":"From data mining to knowledge discovery: An overview","author":"fayyad","year":"1996","journal-title":"Advances in Knowledge Discovery and Data Mining"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/103167.103172"}],"event":{"name":"26th Annual International Computer Software and Applications","acronym":"CMPSAC-02","location":"Oxford, UK"},"container-title":["Proceedings 26th Annual International Computer Software and Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8094\/22390\/01045039.pdf?arnumber=1045039","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,24]],"date-time":"2020-03-24T01:17:57Z","timestamp":1585012677000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1045039\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/cmpsac.2002.1045039","relation":{},"subject":[]}}