{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:22:47Z","timestamp":1725790967434},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icsm.2004.1357797","type":"proceedings-article","created":{"date-parts":[[2004,12,23]],"date-time":"2004-12-23T09:34:02Z","timestamp":1103794442000},"page":"124-133","source":"Crossref","is-referenced-by-count":4,"title":["Assertions in object oriented software maintenance: analysis and case study"],"prefix":"10.1109","author":[{"given":"M.","family":"Satpathy","sequence":"first","affiliation":[]},{"given":"N.T.","family":"Siebel","sequence":"additional","affiliation":[]},{"given":"D.","family":"Rodriguez","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2002.1167815"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/32.67598"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/32.341844"},{"journal-title":"The Object Constrained Language (2nd Edn )","year":"2003","author":"warmer","key":"23"},{"journal-title":"Practical Analysis for Refactoring","year":"1999","author":"roberts","key":"18"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/52.582981"},{"journal-title":"Object Oriented Software Construction","year":"1997","author":"meyer","key":"15"},{"journal-title":"Refactoring Object-Oriented Frameworks","year":"1999","author":"opdyke","key":"16"},{"journal-title":"Writing solid code","year":"1993","author":"maguire","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.1265817"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1996.493403"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/197320.197383"},{"journal-title":"Planning Extreme Programming","year":"2001","author":"beck","key":"3"},{"journal-title":"Design and Implementation of People Tracking Algorithms for Visual Surveillance Applications","year":"2003","author":"siebel","key":"21"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/38713.38748"},{"key":"20","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1007\/3-540-47979-1_25","article-title":"Fusion of multiple tracking algorithms for robust people tracking","author":"siebel","year":"2002","journal-title":"Proceedings of ECCV 2002"},{"journal-title":"Learning deformable models for tracking human motion","year":"1995","author":"baumberg","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/MAHC.2003.1203056"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-5983-1"},{"key":"6","article-title":"Towards automating source-consistent UML refactorings","author":"van gorp","year":"2003","journal-title":"Proc of the Unified Modelling Language Conference"},{"journal-title":"Refactoring Improving the Design of Existing Code","year":"2000","author":"fowler","key":"5"},{"key":"4","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1090\/psapm\/019\/0235771","article-title":"Assigning meaning to programs","author":"floyd","year":"1967","journal-title":"Mathematical Aspects of Computer Science"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/363235.363259"},{"key":"8","first-page":"24","author":"miller","year":"2000","journal-title":"Error Recovery Using Forced Validity Assisted by Executable Assertions for Error Detection An Experimental Evaluation"}],"event":{"name":"20th IEEE International Conference on Software Maintenance, 2004. Proceedings.","location":"Chicago, IL, USA"},"container-title":["20th IEEE International Conference on Software Maintenance, 2004. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9383\/29793\/01357797.pdf?arnumber=1357797","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T13:43:08Z","timestamp":1497620588000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1357797\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icsm.2004.1357797","relation":{},"subject":[]}}