{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T13:07:37Z","timestamp":1742389657989,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/isese.2002.1166936","type":"proceedings-article","created":{"date-parts":[[2003,6,25]],"date-time":"2003-06-25T21:03:42Z","timestamp":1056575022000},"page":"173-182","source":"Crossref","is-referenced-by-count":3,"title":["The detection of faulty code violating implicit coding rules"],"prefix":"10.1109","author":[{"given":"T.","family":"Matsumura","sequence":"first","affiliation":[]},{"given":"A.","family":"Monden","sequence":"additional","affiliation":[]},{"given":"K.","family":"Matsumoto","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1007\/978-3-540-45051-1_15","article-title":"Modeling and analysis of software aging process","volume":"1840","author":"monden","year":"2000","journal-title":"Lecture Notes in Computer Science"},{"key":"ref11","first-page":"394","article-title":"Capturing industrial experiences of software maintenance using product metrics","volume":"2","author":"monden","year":"2001","journal-title":"Proc 5th World Multi-Conference on Systemics Cybernetics and Informatics"},{"journal-title":"The Art of Software Testing","year":"1979","author":"myers","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/32.295894"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1994.336781"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MS.1998.687937"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/32.859533"},{"journal-title":"Refactoring Improving the Design of Existing Code","year":"1999","author":"fowler","key":"ref3"},{"journal-title":"A Discipline for Software Engineering","year":"1995","author":"humphrey","key":"ref6"},{"key":"ref5","first-page":"162","author":"hollocker","year":"1990","journal-title":"Software Reviews and Audits Handbook"},{"key":"ref8","article-title":"A comparison of tool-based and paper-based software inspection","volume":"3","author":"macdonald","year":"1998","journal-title":"Empirical Software Engineering Autumn"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194099000309"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/32.895984"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/1096-908X(200009\/10)12:5<287::AID-SMR214>3.0.CO;2-I"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/512035.512040"}],"event":{"name":"2002 International Symposium on Empirical Software Engineering","acronym":"ISESE-02","location":"Nara, Japan"},"container-title":["Proceedings International Symposium on Empirical Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8347\/26310\/01166936.pdf?arnumber=1166936","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T18:45:49Z","timestamp":1497552349000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1166936\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/isese.2002.1166936","relation":{},"subject":[]}}