{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:43:33Z","timestamp":1730303013115,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/vlhcc.2014.6883027","type":"proceedings-article","created":{"date-parts":[[2014,9,3]],"date-time":"2014-09-03T14:19:56Z","timestamp":1409753996000},"page":"81-88","source":"Crossref","is-referenced-by-count":1,"title":["Code you can use: Searching for web automation scripts based on reusability"],"prefix":"10.1109","author":[{"given":"James","family":"Admire","sequence":"first","affiliation":[]},{"given":"Abbas Al","family":"Zawwad","sequence":"additional","affiliation":[]},{"given":"Abdulwahab","family":"Almorebah","sequence":"additional","affiliation":[]},{"given":"Sanchit","family":"Karve","sequence":"additional","affiliation":[]},{"given":"Christopher","family":"Scaffidi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1922649.1922658"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ICISA.2011.5772326"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511763113"},{"key":"33","article-title":"The mashup opportunity","author":"young","year":"2008","journal-title":"Forrester Research"},{"key":"15","first-page":"1","author":"hoyer","year":"2011","journal-title":"What Are the Business Benefits of Enterprise Mashups?"},{"journal-title":"Corporate Website","year":"2013","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-01466-1_13"},{"key":"14","first-page":"109","article-title":"When, why and how do novice programmers reuse code","author":"hoadley","year":"1996","journal-title":"Empirical Studies of Programmers Sixth Workshop"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph110201725"},{"journal-title":"Mashups Give Defense Department Strategic Edge","year":"2009","author":"gibson","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357323"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453119"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.7326\/0003-4819-155-1-201107050-00005"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1080\/07380560802368090"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1559\/152304010790588098"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.2167142"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1037\/a0025697"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2004.26"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2010.08.003"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2011.23"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2008.4639056"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1161\/STROKEAHA.111.633305"},{"key":"10","first-page":"10","article-title":"Mashing up multiple web feeds using yahoo! pipes","volume":"27","author":"fagan","year":"2007","journal-title":"Computers in Libraries"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/2503823"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1145\/2048237.2048245"},{"key":"7","article-title":"Watch this: Greasemonkey the web","volume":"10","author":"brooks","year":"2005","journal-title":"Information Research"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1186\/1476-072X-7-38"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2005.36"},{"journal-title":"A Comparison of HTML-aware Tools for Web Data Extraction","year":"2008","author":"boronat","key":"5"},{"journal-title":"Demystifying Factor Analysis How It Works and How to Use It","year":"2010","author":"walkey","key":"31"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1378773.1378796"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1852786.1852825"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2006.152"}],"event":{"name":"2014 IEEE Symposium on Visual Languages and Human-Centric Computing (VL\/HCC)","start":{"date-parts":[[2014,7,28]]},"location":"Melbourne, Australia","end":{"date-parts":[[2014,8,1]]}},"container-title":["2014 IEEE Symposium on Visual Languages and Human-Centric Computing (VL\/HCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6878991\/6883003\/06883027.pdf?arnumber=6883027","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:36:38Z","timestamp":1602689798000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6883027"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/vlhcc.2014.6883027","relation":{},"subject":[],"published":{"date-parts":[[2014,7]]}}}