{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T18:42:27Z","timestamp":1694630547372},"reference-count":30,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[1985,8,1]],"date-time":"1985-08-01T00:00:00Z","timestamp":491702400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer"],"published-print":{"date-parts":[[1985,8]]},"DOI":"10.1109\/mc.1985.1662979","type":"journal-article","created":{"date-parts":[[2007,9,4]],"date-time":"2007-09-04T20:35:32Z","timestamp":1188938132000},"page":"72-85","source":"Crossref","is-referenced-by-count":31,"title":["Visualizing Program Designs Through PegaSys"],"prefix":"10.1109","volume":"18","author":[{"family":"Moriconi","sequence":"first","affiliation":[]},{"family":"Hare","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","first-page":"90","article-title":"the smalltalk environment","volume":"6","author":"tesler","year":"1981","journal-title":"Byte"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233534"},{"key":"ref11","first-page":"174","article-title":"the impact of mesa on system design","author":"lauer","year":"1979","journal-title":"Proc Int l Conf Software Engineering"},{"key":"ref12","author":"tichy","year":"1980","journal-title":"Software Development Control Based on Module Interconnection"},{"key":"ref13","first-page":"151","volume":"2","author":"london","year":"1977","journal-title":"Current Trends in Programming Methodology"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/800020.808246"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"276","DOI":"10.1109\/TSE.1985.232211","article-title":"pecan: program development systems that support multiple views","volume":"se 11","author":"reiss","year":"1985","journal-title":"IEEE Transactions on Software Engineering"},{"key":"ref16","first-page":"402","article-title":"the gist behavior explainer","author":"swartout","year":"1983","journal-title":"Proc Nat l Conf Artificial Intelligence"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MS.1985.229778"},{"key":"ref18","author":"baecker","year":"1981","journal-title":"Sorting Out Sorting"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1476793.1476881"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MS.1984.234050"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1145\/953349.953350","article-title":"flowchart techniques for structured programming","volume":"8","author":"nassi","year":"1973","journal-title":"SIGPlan Notices"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/942576.807016"},{"key":"ref3","article-title":"a logical basis for graphical description of program designs","author":"moriconi","year":"1985"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/800226.806847"},{"key":"ref29","year":"1983","journal-title":"Reference Manual for the Ada Programming Language"},{"key":"ref5","author":"yourdan","year":"1979","journal-title":"Structured Design Fundamentals of a Discipline of Computer Program and Systems Design"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1978.233869"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1982.1653939"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/800225.806836"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.21236\/ADA070955","author":"cooprider","year":"1979","journal-title":"The Representation of Families of Software Systems"},{"key":"ref1","article-title":"pegasys: a graphical program design environment, three papers","year":"1985"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(84)80051-6"},{"key":"ref22","article-title":"displaying data structures for interactive debugging","author":"myers","year":"1980"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1985.1662978"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/965139.807368"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/357146.357147"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1461551.1461591"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MS.1985.230354"}],"container-title":["Computer"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/2\/34808\/01662979.pdf?arnumber=1662979","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:29:57Z","timestamp":1638217797000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1662979\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1985,8]]},"references-count":30,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/mc.1985.1662979","relation":{},"ISSN":["0018-9162"],"issn-type":[{"value":"0018-9162","type":"print"}],"subject":[],"published":{"date-parts":[[1985,8]]}}}