{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:32:08Z","timestamp":1729639928247,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/scam.2015.7335419","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T22:49:26Z","timestamp":1448318966000},"page":"231-240","source":"Crossref","is-referenced-by-count":19,"title":["Discovering likely mappings between APIs using text mining"],"prefix":"10.1109","author":[{"given":"Rahul","family":"Pandita","sequence":"first","affiliation":[]},{"given":"Raoul Praful","family":"Jetley","sequence":"additional","affiliation":[]},{"given":"Sithu D","family":"Sudarsan","sequence":"additional","affiliation":[]},{"given":"Laurie","family":"Williams","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321646"},{"journal-title":"Apache Lucene Core","year":"0","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809071"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2003.1192409"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2643010"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591072"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227137"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070525"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.63"},{"key":"ref19","first-page":"35","article-title":"Modern information retrieval: A brief overview","volume":"24","author":"singhal","year":"2001","journal-title":"IEEE Data Eng Bull"},{"key":"ref4","article-title":"Introduction to information storage and retrieval systems","volume":"14","author":"frakes","year":"1992","journal-title":"Space"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2008.31"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1037","DOI":"10.1109\/AICCSA.2006.205215","article-title":"an experiment in automatic conversion of legacy java programs to c#","author":"el-ramly","year":"2006","journal-title":"IEEE International Conference on Computer Systems and Applications 2006"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806868"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606554"},{"journal-title":"Java 2 CSharp Translator for Eclipse","year":"0","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2004.10.002"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070532"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1609\/aaai.v24i1.7503","article-title":"Towards an intelligent code search engine","author":"kim","year":"2010","journal-title":"Proc AAAI"},{"key":"ref1","first-page":"385","article-title":"Sniff: A search engine for java using free-form queries","author":"chatterjee","year":"2009","journal-title":"The FASEB Journal"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2011.28"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/302405.302629"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2387172"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025197"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/32.7629"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.94"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806831"}],"event":{"name":"2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM)","start":{"date-parts":[[2015,9,27]]},"location":"Bremen, Germany","end":{"date-parts":[[2015,9,28]]}},"container-title":["2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7321933\/7335391\/07335419.pdf?arnumber=7335419","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,12]],"date-time":"2024-06-12T16:52:37Z","timestamp":1718211157000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7335419\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/scam.2015.7335419","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}