{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:24:49Z","timestamp":1729664689853,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/scam.2003.1238041","type":"proceedings-article","created":{"date-parts":[[2004,3,1]],"date-time":"2004-03-01T21:26:50Z","timestamp":1078176410000},"page":"151-160","source":"Crossref","is-referenced-by-count":7,"title":["Unique renaming of Java using source transformation"],"prefix":"10.1109","author":[{"given":"X.","family":"Guo","sequence":"first","affiliation":[]},{"given":"J.R.","family":"Cordy","sequence":"additional","affiliation":[]},{"given":"T.R.","family":"Dean","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2001.957810"},{"journal-title":"DATRIX-Abstract Semantic Graph Reference Manual Version 1 2","year":"2000","author":"canada","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2001.921726"},{"journal-title":"The Dagstuhl Middle Model version 0 005","year":"0","author":"lethbridge","key":"ref30"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/2.30731"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2002.1134109"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1998.723191"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2001.972707"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2002.1173068"},{"key":"ref13","article-title":"Sun Microsystems Inc.","author":"gosling","year":"2000","journal-title":"The Java Language Specification"},{"key":"ref14","first-page":"159","article-title":"JavaML: A Markup Language for Java Source Code","author":"badros","year":"2002","journal-title":"9Th International World Wide Web Conference"},{"journal-title":"JavaCheck - Platform Compatibility Insurance for your Applications and Applets","year":"0","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1142\/9789812797995_0014"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2001.972738"},{"journal-title":"SHriMP Views","year":"0","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1999.806970"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/253228.253496"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2002.1173067"},{"journal-title":"The Java Language An overview","year":"0","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2002.1173078"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2000.891464"},{"key":"ref29","article-title":"Architectural Design Recovery Using Source Transformation","author":"cordy","year":"1995","journal-title":"7th International Workshop on Computer Aided Software Engineering (CASE'95) Workshop on Software Architecture"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2002.1173074"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"827","DOI":"10.1016\/S0950-5849(02)00104-0","article-title":"Source Transformation in Software Engineering using the TXL Transformation System","volume":"44","author":"cordy","year":"2002","journal-title":"Journal of Information and Software Technology"},{"journal-title":"Programming Language Version 10 2","year":"2002","author":"txl","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2002.1173077"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"622","DOI":"10.1109\/ICSM.2001.972779","article-title":"Experience Using Design Recovery Techniques to Transform Legacy Systems","author":"dean","year":"2001","journal-title":"IEEE International Conference on Software Maintenance (ICSM 2002)"},{"journal-title":"Extensible Markup Language (XML)","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2001.921732"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1147\/sj.364.0564"},{"year":"0","key":"ref21"},{"journal-title":"Introduction to the Grok Language","year":"0","author":"holt","key":"ref24"},{"journal-title":"Grammar Collection","year":"0","author":"txl","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1998.723171"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2002.1173088"}],"event":{"name":"Third IEEE International Workshop on Source Code Analysis and Manipulation.","acronym":"SCAM-03","location":"Amsterdam, Netherlands"},"container-title":["Proceedings Third IEEE International Workshop on Source Code Analysis and Manipulation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8773\/27776\/01238041.pdf?arnumber=1238041","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T00:05:28Z","timestamp":1497571528000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1238041\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/scam.2003.1238041","relation":{},"subject":[]}}