{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T22:46:59Z","timestamp":1725662819673},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/scam.2015.7335398","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T17:49:26Z","timestamp":1448300966000},"page":"21-30","source":"Crossref","is-referenced-by-count":5,"title":["The use of C&amp;#x002B;&amp;#x002B; exception handling constructs: A comprehensive study"],"prefix":"10.1109","author":[{"given":"Rodrigo","family":"Bonifacio","sequence":"first","affiliation":[]},{"given":"Fausto","family":"Carvalho","sequence":"additional","affiliation":[]},{"given":"Guilherme N.","family":"Ramos","sequence":"additional","affiliation":[]},{"given":"Uira","family":"Kulesza","sequence":"additional","affiliation":[]},{"given":"Roberta","family":"Coelho","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"The C++ Programming Language","year":"2013","author":"stroustrup","key":"ref10"},{"journal-title":"C++ Primer Plus","year":"2011","author":"prata","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/355045.355046"},{"article-title":"Sloc count user&#x00E2;AZs guide","year":"2005","author":"wheeler","key":"ref13"},{"journal-title":"Designing and conducting survey research A comprehensive guide","year":"2012","author":"rea","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568308"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1509239.1509258"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.36"},{"journal-title":"Data Analysis and Graphics Using R","year":"2007","author":"maindonald","key":"ref18"},{"key":"ref19","first-page":"230","article-title":"Exception-chain analysis: Revealing exception handling architecture in Java server applications","author":"fu","year":"2007","journal-title":"Software Engineering 2007 ICSE 2007 29th International Conference on"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1960275.1960299"},{"key":"ref4","first-page":"151","article-title":"Exception handling: A field study in Java and. NET","author":"cabral","year":"2007","journal-title":"Proceedings of European Conference of Object-Oriented Programming"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.4135\/9781446288719"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/361227.361230"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.7"},{"article-title":"C++ Applications","year":"0","author":"stroustrup","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.69"},{"journal-title":"More effective C++ 35 new ways to improve your programs and designs","year":"1995","author":"meyers","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/234286.1057836"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1982.1676035"},{"journal-title":"The Design and Evolution of C++","year":"1994","author":"stroustrup","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1979.230191"},{"journal-title":"Patterns for Fault Tolerant Software","year":"2007","author":"hanmer","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.04.066"},{"journal-title":"Distributed Systems Principles and Paradigms (2nd Edition)","year":"2006","author":"tanenbaum","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1214\/10-AOAS366"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2000.870432"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v048.i10"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/39.3-4.324"}],"event":{"name":"2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM)","start":{"date-parts":[[2015,9,27]]},"location":"Bremen, Germany","end":{"date-parts":[[2015,9,28]]}},"container-title":["2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7321933\/7335391\/07335398.pdf?arnumber=7335398","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T18:17:31Z","timestamp":1490379451000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7335398\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/scam.2015.7335398","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}