{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:54:05Z","timestamp":1730228045100,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,2,19]],"date-time":"2024-02-19T00:00:00Z","timestamp":1708300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,2,19]],"date-time":"2024-02-19T00:00:00Z","timestamp":1708300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,2,19]]},"DOI":"10.1109\/icacs60934.2024.10473293","type":"proceedings-article","created":{"date-parts":[[2024,3,21]],"date-time":"2024-03-21T18:11:22Z","timestamp":1711044682000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["Comparing the Effectiveness and Efficiency of Inspections and Walkthroughs"],"prefix":"10.1109","author":[{"given":"Nimra","family":"Arif","sequence":"first","affiliation":[{"name":"National University of Computer and Emerging Sciences,FAST School of Computing,Lahore,Pakistan"}]},{"given":"Ali Afzal","family":"Malik","sequence":"additional","affiliation":[{"name":"National University of Computer and Emerging Sciences,FAST School of Computing,Lahore,Pakistan"}]}],"member":"263","reference":[{"volume-title":"Software Engineering: A Practitioner\u2019s Approach","year":"2014","author":"Pressman","key":"ref1"},{"volume-title":"Software quality assurance from theory to implementation","year":"2016","author":"Galin","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSE.2013.6553998"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3234152.3234159"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/0026-2714(92)90072-s"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-3802-7_15"},{"key":"ref7","first-page":"673","article-title":"Comparing the Effectiveness of Inspection and Peer Review in Detecting Software Defects","volume-title":"2019 IEEE\/ACM International Conference on Software Engineering (ICSE)","author":"Gollamudi"},{"article-title":"A Comparative Study of Inspection and Peer Review for Software Quality Assurance","volume-title":"2016 International Conference on Computational Techniques in Information and Communication","author":"Misra","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2009.27"},{"issue":"10","key":"ref10","doi-asserted-by":"crossref","first-page":"9","DOI":"10.5815\/ijmecs.2016.10.02","article-title":"A Comparative Study of Software Inspection Techniques for Quality Perspective","volume":"8","author":"Qazi","year":"2016","journal-title":"International Journal of Modern Education and Computer Science"}],"event":{"name":"2024 5th International Conference on Advancements in Computational Sciences (ICACS)","start":{"date-parts":[[2024,2,19]]},"location":"Lahore, Pakistan","end":{"date-parts":[[2024,2,20]]}},"container-title":["2024 5th International Conference on Advancements in Computational Sciences (ICACS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10473181\/10473230\/10473293.pdf?arnumber=10473293","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T21:02:43Z","timestamp":1711486963000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10473293\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,19]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/icacs60934.2024.10473293","relation":{},"subject":[],"published":{"date-parts":[[2024,2,19]]}}}