{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:10:51Z","timestamp":1729635051921,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1109\/iisa.2015.7388099","type":"proceedings-article","created":{"date-parts":[[2016,3,25]],"date-time":"2016-03-25T16:45:24Z","timestamp":1458924324000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Prioritized test-driven reverse engineering process: A case study"],"prefix":"10.1109","author":[{"given":"Panagiotis","family":"Sfetsos","sequence":"first","affiliation":[]},{"given":"Lefteris","family":"Angelis","sequence":"additional","affiliation":[]},{"given":"Ioannis","family":"Stamelos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010248"},{"key":"ref32","first-page":"52","article-title":"Domain-Specific Software Architecture (DSSA) &#x2013; FAQ","volume":"19","author":"tracz","year":"1994"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1002\/spe.1053"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2010.74"},{"key":"ref35","article-title":"Case study research","author":"yin","year":"2003","journal-title":"Design and Methods"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-4625-2"},{"key":"ref10","first-page":"13","article-title":"Reverse Engineering and Design Recovery: A Taxonomy in IEEE Software","author":"chikofsky","year":"1990","journal-title":"IEEE Comp Society"},{"article-title":"Quasi-experimentation: design and analysis for field settings","year":"1979","author":"cook","key":"ref11"},{"key":"ref12","article-title":"Empirical studies of test case prioritization in a junit testing environment","author":"do","year":"2004","journal-title":"Proceedings of the 15th International Symposium on Software Reliability Engineering"},{"key":"ref13","first-page":"1","article-title":"An Iterative Reengineering Process Applying Test-Driven Development and Reverse Engineering Patterns","author":"durelli","year":"2010","journal-title":"INFOCOMP Journal of Computer Science"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/347324.348910"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1023\/A:1026586415054","article-title":"Using Students as Subjects &#x2013; A Comparative Study of Students and Professionals in Lead-Time Impact Assessment","volume":"5","author":"h\u00f6st","year":"2000","journal-title":"Empirical Software Engineering"},{"key":"ref16","first-page":"65","author":"kamal","year":"2006","journal-title":"A Hierarchical Approach To Software Testing"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.2307\/249410"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.08.007"},{"article-title":"Managing Software Requirements &#x2013; A Use Case Approach","year":"2003","author":"leffingwell","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1002\/9781118181034"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.2307\/248684"},{"article-title":"Program Comprehension for Reverse Engineering","year":"0","author":"rugaber","key":"ref27"},{"article-title":"Test-driven development: By example","year":"2003","author":"beck","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009720117601"},{"article-title":"The Analytic Hierarchy Process","year":"1980","author":"saaty","key":"ref29"},{"article-title":"The Unified Modeling Language &#x2013; User Guide","year":"1998","author":"booch","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISESE.2003.1237966"},{"key":"ref7","first-page":"1?12","article-title":"Experimental and quasi-experimental designs for research","author":"campbell","year":"1996"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010301"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SEAA.2010.35"},{"article-title":"Software Reengineering","year":"1993","author":"arnold","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24659-6_36"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/EmpiRE.2013.6615215"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/336512.336526"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s007660170015"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3923\/ajit.2012.169.180"},{"key":"ref26","first-page":"929","article-title":"Prioritizing test cases for regression testing. Software Engineering","volume":"27","author":"rprintmel","year":"2001","journal-title":"IEEE Transactions"},{"article-title":"Real World Research","year":"2002","author":"robson","key":"ref25"}],"event":{"name":"2015 6th International Conference on Information, Intelligence, Systems and Applications (IISA)","start":{"date-parts":[[2015,7,6]]},"location":"Corfu, Greece","end":{"date-parts":[[2015,7,8]]}},"container-title":["2015 6th International Conference on Information, Intelligence, Systems and Applications (IISA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7376844\/7387951\/07388099.pdf?arnumber=7388099","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T05:19:42Z","timestamp":1498281582000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7388099\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/iisa.2015.7388099","relation":{},"subject":[],"published":{"date-parts":[[2015,7]]}}}