{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T04:10:16Z","timestamp":1759032616553,"version":"3.28.0"},"reference-count":55,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1109\/saner.2015.7081850","type":"proceedings-article","created":{"date-parts":[[2015,4,13]],"date-time":"2015-04-13T17:57:15Z","timestamp":1428947835000},"page":"399-408","source":"Crossref","is-referenced-by-count":4,"title":["Reverse engineering time-series interaction data from screen-captured videos"],"prefix":"10.1109","author":[{"family":"Lingfeng Bao","sequence":"first","affiliation":[]},{"family":"Jing Li","sequence":"additional","affiliation":[]},{"given":"Zhenchang","family":"Xing","sequence":"additional","affiliation":[]},{"family":"Xinyu Wang","sequence":"additional","affiliation":[]},{"family":"Bo Zhou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","first-page":"430","DOI":"10.1007\/11744023_34","article-title":"Machine learning for high-speed comer detection","author":"rosten","year":"2006","journal-title":"Computer Vision-ECCV 2006"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2007.09.014"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1049\/ip-vis:20000104","article-title":"spatial-domain image hiding using image differencing","volume":"147","author":"wu","year":"2000","journal-title":"Vision Image and Signal Processing IEE Proceedings-"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606622"},{"key":"ref31","first-page":"151","article-title":"Designing the whyline: a debugging interface for asking questions about program behavior","author":"ko","year":"2004","journal-title":"Proc CHI"},{"key":"ref30","article-title":"The think aloud method: A practical guide to modelling cognitive processes","volume":"2","author":"van someren","year":"1994"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.1999.790410"},{"key":"ref36","first-page":"226","article-title":"A density-based algorithm for discovering clusters in large spatial databases with noise","volume":"96","author":"ester","year":"1996","journal-title":"Proc KDD"},{"article-title":"Digital image processintg","year":"2002","author":"gonzalez","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.1986.4767851"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2005.44"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2012.46"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070505"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.2000.0423"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/266399.266414"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2011.6070387"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1056808.1056965"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2009.5090040"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227189"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2005.1553555"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/WVL.1992.275771"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568226"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753554"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2380116.2380129"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357126"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/371578.371593"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753555"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/1622176.1622213"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1151588.1151599"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.101"},{"key":"ref40","first-page":"331","article-title":"Fastapproximate nearest neighbors with automatic alzorithm confizuration","author":"muja","year":"2009","journal-title":"VISAPP (I)"},{"key":"ref12","first-page":"266","article-title":"Asking and answering questions about unfamiliar apis: An exploratory study","author":"duata-ekoko","year":"2012","journal-title":"Proc ICSE"},{"journal-title":"Introduction to Behavioral Research Methods","year":"1991","author":"leary","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227190"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1719970.1719973"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2047196.2047228"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ISESE.2005.1541811"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2000.852488"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357261"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2013.6671289"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.111"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.116"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080788"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CHASE.2009.5071410"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1083106.1083114"},{"key":"ref49","first-page":"4321","article-title":"Gpu-based video feature tracking and matching","volume":"278","author":"sinha","year":"2006","journal-title":"EDGE Workshop on Edge Computing Using New Commodity Architectures"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2004.08.003"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-4076(96)01818-0"},{"key":"ref45","article-title":"Least squares fitting-exponential","author":"weisstein","year":"2011","journal-title":"MathWorld-A Wolfram Web Resource"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2008.4536131"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177704472"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/34.868688"},{"journal-title":"Computer Vision A Modern Approach","year":"2002","author":"forsyth","key":"ref41"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1038\/nature03459"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-3324-9"}],"event":{"name":"2015 IEEE 22nd International Conference on Software Analysis, Evolution and Reengineering (SANER)","start":{"date-parts":[[2015,3,2]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2015,3,6]]}},"container-title":["2015 IEEE 22nd International Conference on Software Analysis, Evolution, and Reengineering (SANER)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7066219\/7081802\/07081850.pdf?arnumber=7081850","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T05:20:02Z","timestamp":1498195202000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7081850\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3]]},"references-count":55,"URL":"https:\/\/doi.org\/10.1109\/saner.2015.7081850","relation":{},"subject":[],"published":{"date-parts":[[2015,3]]}}}