{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T02:59:27Z","timestamp":1775617167182,"version":"3.50.1"},"reference-count":72,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2018,2,1]],"date-time":"2018-02-01T00:00:00Z","timestamp":1517443200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"},{"start":{"date-parts":[[2018,2,1]],"date-time":"2018-02-01T00:00:00Z","timestamp":1517443200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Google Faculty Research Award"},{"DOI":"10.13039\/501100003400","name":"Ontario Ministry of Research and Innovation","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100003400","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100000001","name":"U.S. National Science Foundation","doi-asserted-by":"crossref","award":["1117593"],"award-info":[{"award-number":["1117593"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100000001","name":"U.S. National Science Foundation","doi-asserted-by":"crossref","award":["1218115"],"award-info":[{"award-number":["1218115"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100000001","name":"U.S. National Science Foundation","doi-asserted-by":"crossref","award":["1321141"],"award-info":[{"award-number":["1321141"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Infosys Technologies, Ltd."}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2018,2,1]]},"DOI":"10.1109\/tse.2017.2671865","type":"journal-article","created":{"date-parts":[[2017,2,20]],"date-time":"2017-02-20T19:09:12Z","timestamp":1487617752000},"page":"159-181","source":"Crossref","is-referenced-by-count":76,"title":["Measuring the Impact of Code Dependencies on Software Architecture Recovery Techniques"],"prefix":"10.1109","volume":"44","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1823-0061","authenticated-orcid":false,"given":"Thibaud","family":"Lutellier","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Devin","family":"Chollak","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Joshua","family":"Garcia","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lin","family":"Tan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Derek","family":"Rayside","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nenad","family":"Medvidovic","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Robert","family":"Kroeger","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref72","author":"butler","year":"2010","journal-title":"Universal Principles of Design"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2004.6"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2007.32"},{"key":"ref39","first-page":"60","article-title":"AOVis: A model-driven multiple-graph approach to program fact extraction for AspectJ\/Java source code","volume":"1","author":"koch","year":"2011","journal-title":"Intl Journal of Software Engineering"},{"key":"ref38","article-title":"Integrating information sources for visualizing Java programs","author":"muller","year":"2001","journal-title":"Proc IEEE Int Conf Softw Maintenance"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.21236\/ADA407795"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2005.49"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/302405.302691"},{"key":"ref30","article-title":"Architecture and evolution of the modern Web browser","author":"grosskurth","year":"2006"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1147\/sj.364.0564"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008781513258"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2009.10.007"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/253228.253496"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/243327.243340"},{"key":"ref62","first-page":"2014","article-title":"An empirical study of architectural change and decay in open-source software systems","author":"garcia","year":"2014"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1137\/0105003"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2011.87"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2001.914973"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2009.111"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1996.558904"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.31"},{"key":"ref66","first-page":"1","article-title":"Appropriate statistics for ordinal level data: Should we really be using t-test and Cohen&#x2019;s $\\delta$ for evaluating group differences on the NSSE and other surveys?","author":"romano","year":"2006","journal-title":"Annual Meeting of the Florida Association of Institutional Research"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/WICSA.2001.948400"},{"key":"ref67","first-page":"3","article-title":"A case study of Toyota unintended acceleration and software safety","author":"koopman","year":"2014","journal-title":"presented at the 9th TSP Symposium"},{"key":"ref68","article-title":"Technical support to the National Highway Traffic Safety Administration (NHTSA) on the reported Toyota Motor Corporation (TMC) unintended acceleration (UA) investigation","author":"kirsch","year":"2011"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46078-8_37"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.25"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606639"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.136"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1049\/ip-sen:20030581","article-title":"Comparative study of clustering algorithms and abstract representations for software remodularization","volume":"150","author":"lethbridge","year":"2003","journal-title":"IEE Proc Softw"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/222132.222136"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2004.1281402"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24741-8_9"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1996.565035"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1096-908X(199909\/10)11:5<339::AID-SMR196>3.0.CO;2-I"},{"key":"ref50","author":"teller","year":"2013","journal-title":"Data Visualization with D3 Js"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.1998.693283"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1998.671114"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2015.29"},{"key":"ref57","first-page":"194","article-title":"An effectiveness measure for software clustering algorithms","author":"wen","year":"2004","journal-title":"Proc 12th IEEE Int Workshop Program Comprehension"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2003.1235432"},{"key":"ref55","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"J Mach Learn Res"},{"key":"ref54","author":"brown","year":"2011","journal-title":"The Architecture of Open Source Applications"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2015.29"},{"key":"ref52","first-page":"993","article-title":"Latent Dirichlet allocation","volume":"3","author":"blei","year":"2003","journal-title":"J Mach Learn Res"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693106"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/236338.236371"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2005.11"},{"key":"ref12","volume":"35","author":"sundaresan","year":"2000","journal-title":"Practical Virtual Method Call Resolution for Java"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49538-X_5"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2000.852493"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2005.30"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2004.15"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2011.133"},{"key":"ref18","volume":"7","author":"brahler","year":"2010","journal-title":"Analysis of the Android Architecture"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/WICSA.2001.948429"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100123"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2011.8"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1999.792498"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405308"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70732"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2000.891477"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1002\/1097-024X(200009)30:11<1203::AID-SPE338>3.3.CO;2-E"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2005.31"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134420"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/367766.368168"},{"key":"ref48","article-title":"Generating accurate dependencies for large software","author":"wang","year":"2013"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-6423(02)00059-X"},{"key":"ref42","first-page":"24","article-title":"Lattix LDM","author":"waldman","year":"2006"},{"key":"ref41","year":"0"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/MTD.2013.6608678"},{"key":"ref43","author":"chedgey","year":"0","journal-title":"Structure"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielaam\/32\/8289825\/7859416-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/8289825\/07859416.pdf?arnumber=7859416","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:48:20Z","timestamp":1649443700000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7859416\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,1]]},"references-count":72,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tse.2017.2671865","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,2,1]]}}}