{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T03:20:54Z","timestamp":1730258454108,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,9]]},"DOI":"10.1109\/icsm.2008.4658060","type":"proceedings-article","created":{"date-parts":[[2008,10,28]],"date-time":"2008-10-28T17:09:40Z","timestamp":1225213780000},"page":"117-126","source":"Crossref","is-referenced-by-count":4,"title":["Retrieving relevant reports from a customer engagement repository"],"prefix":"10.1109","author":[{"given":"Dharmesh","family":"Thakkar","sequence":"first","affiliation":[{"name":"Software Analysis and Intelligence Lab (SAIL), Queen's University, Kingston, ON, Canada"}]},{"given":"Zhen Ming","family":"Jiang","sequence":"additional","affiliation":[{"name":"Software Analysis and Intelligence Lab (SAIL), Queen's University, Kingston, ON, Canada"}]},{"given":"Ahmed E.","family":"Hassan","sequence":"additional","affiliation":[{"name":"Software Analysis and Intelligence Lab (SAIL), Queen's University, Kingston, ON, Canada"}]},{"given":"Gilbert","family":"Hamann","sequence":"additional","affiliation":[{"name":"Research In Motion (RIM), Waterloo, ON, Canada"}]},{"given":"Parminder","family":"Flora","sequence":"additional","affiliation":[{"name":"Research In Motion (RIM), Waterloo, ON, Canada"}]}],"member":"263","reference":[{"year":"0","key":"17"},{"key":"15","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-31980-1_30","article-title":"mining temporal specifications for error detection","author":"weimer","year":"2005","journal-title":"Proceedings of Eleventh International Conference on Tools and Algorithms for the Construction and Analysis of Systems"},{"year":"0","key":"16"},{"year":"0","key":"13"},{"year":"0","key":"14"},{"journal-title":"Microsoft Exchange Server","year":"0","key":"11"},{"key":"12","article-title":"an agent oriented approach to operational profile management","volume":"1","author":"ramanujam","year":"2006","journal-title":"International Journal Of Intelligent Technology"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.1998.732614"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/RAMS.2001.902457"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(00)00051-3"},{"year":"0","key":"10"},{"journal-title":"Introduction to Data Mining","year":"2005","author":"tan","key":"7"},{"key":"6","first-page":"42","article-title":"a survey of trace exploration tools and techniques","author":"hamou-lhadj","year":"2004","journal-title":"Proceedings of the 2004 Conference of the Centre For Advanced Studies on Collaborative Research (Markham"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/336992.337024"},{"year":"0","key":"4"},{"journal-title":"Case Study Research Design and Methods","year":"1994","author":"yin","key":"9"},{"key":"8","doi-asserted-by":"crossref","DOI":"10.1002\/0471200611","author":"cover","year":"1991","journal-title":"Elements of Information Theory"}],"event":{"name":"2008 IEEE International Conference on Software Maintenance","start":{"date-parts":[[2008,9,28]]},"location":"Beijing, China","end":{"date-parts":[[2008,10,4]]}},"container-title":["2008 IEEE International Conference on Software Maintenance"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4653773\/4658028\/04658060.pdf?arnumber=4658060","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,2]],"date-time":"2021-04-02T20:01:42Z","timestamp":1617393702000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4658060\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icsm.2008.4658060","relation":{},"subject":[],"published":{"date-parts":[[2008,9]]}}}