{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T12:08:08Z","timestamp":1764936488383,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,9]]},"DOI":"10.1109\/icsm.2008.4658063","type":"proceedings-article","created":{"date-parts":[[2008,10,28]],"date-time":"2008-10-28T13:09:40Z","timestamp":1225199380000},"page":"147-156","source":"Crossref","is-referenced-by-count":7,"title":["Reuse or rewrite: Combining textual, static, and dynamic analyses to assess the cost of keeping a system up-to-date"],"prefix":"10.1109","author":[{"given":"Giuliano","family":"Antoniol","sequence":"first","affiliation":[]},{"given":"Jane Huffman","family":"Hayes","sequence":"additional","affiliation":[]},{"given":"Yann-Gael","family":"Gueheneuc","sequence":"additional","affiliation":[]},{"given":"Massimiliano","family":"di Penta","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2003.1254359"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(03)00242-5"},{"key":"18","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-21706-2","author":"venables","year":"2002","journal-title":"Modern Applied Statistic with SPLUS"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/570907.570919"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025368318006"},{"journal-title":"Software Maintenance Management","year":"1980","author":"lientz","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2003.1201194"},{"key":"11","article-title":"prereqir: a window into mental models","author":"hayes","year":"0","journal-title":"University of Kentucky Technical Report TR"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1980.11805"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.88"},{"key":"2","first-page":"357","volume":"icsm 2005","author":"giuliano antoniol","year":"0","journal-title":"Feature Identification A Novel Approach and a Case Study"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1041053"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.3"},{"key":"7","article-title":"cerberus: tracing requirements to source code using static, dynamic, and semantic analysis","author":"eaddy","year":"2008","journal-title":"Proc Int'l Conf Program Comprehension"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2005.1553579"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1232285"},{"journal-title":"Modern Information Retrieval","year":"1999","author":"baeza-yates","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.1994.292398"},{"key":"8","first-page":"360","author":"egyed","year":"2005","journal-title":"Determining the cost-quality trade-off for automated software traceability"}],"event":{"name":"2008 IEEE International Conference on Software Maintenance (ICSM)","start":{"date-parts":[[2008,9,28]]},"location":"Beijing, China","end":{"date-parts":[[2008,10,4]]}},"container-title":["2008 IEEE International Conference on Software Maintenance"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4653773\/4658028\/04658063.pdf?arnumber=4658063","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T08:56:46Z","timestamp":1497776206000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4658063\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icsm.2008.4658063","relation":{},"subject":[],"published":{"date-parts":[[2008,9]]}}}