{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T18:17:33Z","timestamp":1772821053558,"version":"3.50.1"},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1109\/icse.2013.6606678","type":"proceedings-article","created":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T14:38:03Z","timestamp":1380638283000},"page":"1201-1204","source":"Crossref","is-referenced-by-count":5,"title":["Liberating pair programming research from the oppressive driver\/observer regime"],"prefix":"10.1109","author":[{"given":"Stephan","family":"Salinger","sequence":"first","affiliation":[]},{"given":"Franz","family":"Zieris","sequence":"additional","affiliation":[]},{"given":"Lutz","family":"Prechelt","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"crossref","first-page":"1110","DOI":"10.1016\/j.infsof.2009.02.001","article-title":"The effectiveness of pair programming: A meta-analysis","volume":"51","author":"hannay","year":"2009","journal-title":"Information and Software Technology"},{"key":"2","author":"williams","year":"2002","journal-title":"Pair Programming Illuminated"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/52.854064"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2007.03.005"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/272287.272333"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2003.1201243"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1007996.1008043"},{"key":"9","article-title":"What happens during pair programming","author":"salinger","year":"2008","journal-title":"Proceedings of the 20th Annual Workshop of the Psychology of Programming Interest Group (PPIG '08)"},{"key":"8","author":"strauss","year":"1990","journal-title":"Basics of Qualitative Research Grounded Theory Procedures and Techniques"}],"event":{"name":"2013 35th International Conference on Software Engineering (ICSE)","location":"San Francisco, CA, USA","start":{"date-parts":[[2013,5,18]]},"end":{"date-parts":[[2013,5,26]]}},"container-title":["2013 35th International Conference on Software Engineering (ICSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6596173\/6606539\/06606678.pdf?arnumber=6606678","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T18:55:51Z","timestamp":1498071351000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6606678\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/icse.2013.6606678","relation":{},"subject":[],"published":{"date-parts":[[2013,5]]}}}