{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T04:19:27Z","timestamp":1759033167505,"version":"3.28.0"},"reference-count":93,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/wcre.2013.6671274","type":"proceedings-article","created":{"date-parts":[[2013,12,3]],"date-time":"2013-12-03T17:00:42Z","timestamp":1386090042000},"page":"1-10","source":"Crossref","is-referenced-by-count":24,"title":["Genetic programming for Reverse Engineering"],"prefix":"10.1109","author":[{"given":"Mark","family":"Harman","sequence":"first","affiliation":[]},{"given":"William B.","family":"Langdon","sequence":"additional","affiliation":[]},{"given":"Westley","family":"Weimer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"79","first-page":"249","article-title":"Multi-objective genetic synthesis of software architecture","author":"raiha","year":"0","journal-title":"Proceedings of the 13th Annual Conference Companion on Genetic and Evolutionary Computation (GECCO 11"},{"key":"78","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483785"},{"key":"77","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.26"},{"journal-title":"Open Problems in Testability Transformation","year":"2008","author":"harman","key":"35"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2011.60"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(00)00051-7"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/FOSE.2007.29"},{"key":"39","first-page":"1351","article-title":"A new representation and crossover operator for search-based optimization of software modularization","author":"harman","year":"0","journal-title":"Proceedings of the 2002 Conference on Genetic and Evolutionary Computation (GECCO 02"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2011.38"},{"key":"38","first-page":"143","volume":"5","author":"harman","year":"1995","journal-title":"Using Program Slicing to Simplify Testing"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351678"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(01)00189-6"},{"key":"41","first-page":"212","author":"harman","year":"0","journal-title":"Strong Higher Order Mutationbased Test Data Generation"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1002\/swf.41"},{"key":"82","doi-asserted-by":"publisher","DOI":"10.1109\/RAISE.2013.6615200"},{"key":"83","doi-asserted-by":"publisher","DOI":"10.1145\/1068009.1068186"},{"key":"80","first-page":"611","article-title":"Rinard. Living in the comfort zone","author":"martin","year":"2007","journal-title":"Proceedings of the 22nd Annual ACM SIGPLAN Conference on Object-Oriented Programming"},{"key":"81","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-4631-3"},{"key":"86","first-page":"313","article-title":"Foster. from program verification to program synthesis","author":"srivastava","year":"0","journal-title":"Proc of the 15th ACM SIGPLAN-SIGACT Symp on Principles of Programming Languages"},{"key":"87","doi-asserted-by":"publisher","DOI":"10.1145\/2463372.2463545"},{"key":"84","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025153"},{"key":"85","doi-asserted-by":"publisher","DOI":"10.1145\/2070781.2024186"},{"key":"67","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.18"},{"key":"66","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065018"},{"key":"69","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.31"},{"key":"68","first-page":"1375","article-title":"Using heuristic search techniques to extract design abstractions from source code","author":"mitchell","year":"0","journal-title":"Proceedings of the 2002 Conference on Genetic and Evolutionary Computation (GECCO 02"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1143997.1144314"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/1137661.1137674"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2004.11"},{"key":"25","first-page":"3","author":"fatiregun","year":"2005","journal-title":"Search-based Amorphous Slicing"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025179"},{"key":"27","first-page":"1733","article-title":"Cheng. Exploring automated software composition with genetic programming","author":"fredericks","year":"0","journal-title":"Proceeding of the 15th Annual Conference Companion on Genetic and Evolutionary Computation (GECCO 13"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336775"},{"key":"29","first-page":"133","author":"futamura","year":"1987","journal-title":"Generalized Partial Computation"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100082"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1146809.1146812"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2009.13"},{"key":"7","first-page":"1205","article-title":"An analysis of the effects of composite objectives in multiobjective software module clustering","author":"de oliveira barros","year":"0","journal-title":"Proceedings of the 14th International Conference on Genetic and Evolutionary Computation Conference (GECCO 12"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39742-4_9"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2008.4630793"},{"key":"5","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/978-3-540-89694-4_7","article-title":"Multi-objective improvement of software using co-evolution and smart seeding","author":"arcuri","year":"2008","journal-title":"7th International Conference on Simulated Evolution and Learning (SEAL"},{"journal-title":"A Systematic Study of Automated Program Repair Fixing 55 out of 105 Bugs for 8 Each","year":"2012","author":"le goues","key":"32"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503275"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2006.10"},{"key":"70","doi-asserted-by":"publisher","DOI":"10.1109\/WICSA.2001.948427"},{"key":"71","doi-asserted-by":"publisher","DOI":"10.1007\/s11047-006-9004-x"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1993.287779"},{"key":"72","first-page":"987","volume":"1401","author":"nisbet","year":"1998","journal-title":"GAPS A Compiler Framework for Genetic Algorithm (GA) Optimised Parallelisation"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2010.29"},{"key":"73","first-page":"49","article-title":"Experimental assessment of software metrics using automated refactoring","author":"cinnedie","year":"0","journal-title":"6th IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM 2012"},{"key":"74","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2006.49"},{"key":"75","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2010.2052622"},{"key":"76","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39742-4_21"},{"key":"59","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2010.5585922"},{"key":"58","doi-asserted-by":"publisher","DOI":"10.1145\/570186.570188"},{"key":"57","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2012.03.009"},{"key":"56","doi-asserted-by":"publisher","DOI":"10.1023\/A:1014823126938"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.70"},{"key":"55","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.69"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1321211.1321215"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1143997.1144312"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2000.852490"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/289121.289138"},{"key":"13","first-page":"25","author":"binkley","year":"2008","journal-title":"Dependence Anti Patterns in 4th International ERCIM Workshop on Software Evolution and Evolvability (Evol08"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2005.58"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s00165-005-0077-6"},{"journal-title":"Observation-based Slicing Technical Report RN\/13\/13","year":"0","author":"binkley","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1994.336752"},{"key":"20","first-page":"782","author":"buse","year":"0","journal-title":"Synthesizing API Usage Examples"},{"key":"64","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2003.1235437"},{"key":"65","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.1998.693283"},{"key":"62","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.104"},{"key":"63","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2006.8"},{"key":"60","article-title":"Optimising existing software with genetic programming","author":"langdon","year":"2013","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"61","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-013-9208-0"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.1109\/ACOM.2007.1"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1145\/1276958.1277176"},{"key":"45","article-title":"A comprehensive survey of trends in oracles for software testing","author":"harman","year":"2013","journal-title":"Technical Report Research Memoranda CS-13-01"},{"key":"93","doi-asserted-by":"publisher","DOI":"10.1145\/1085130.1085135"},{"key":"44","first-page":"1","volume":"45","author":"harman","year":"0","journal-title":"Search Based Software Engineering Trends Techniques and Applications"},{"key":"92","doi-asserted-by":"publisher","DOI":"10.1002\/stv.430"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1145\/1068009.1068184"},{"journal-title":"Evolutionary Algorithms for Automatic Parallelization","year":"1998","author":"peter williams","key":"91"},{"key":"46","first-page":"1","article-title":"Search based software engineering: Techniques, taxonomy, tutorial","author":"harman","year":"2012","journal-title":"Bertrand Meyer and Martin Nordio Editors Empirical Software Engineering and Verification LASER 2009-2010"},{"key":"90","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1992.242542"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1993.346017"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2007.11.001"},{"key":"52","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2008.31"},{"journal-title":"Partial Evaluation and Automatic Program Generation","year":"1993","author":"jones","key":"53"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606626"},{"key":"88","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/37.9.795"},{"key":"89","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2010.2083669"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065016"}],"event":{"name":"2013 20th Working Conference on Reverse Engineering (WCRE)","start":{"date-parts":[[2013,10,14]]},"location":"Koblenz, Germany","end":{"date-parts":[[2013,10,17]]}},"container-title":["2013 20th Working Conference on Reverse Engineering (WCRE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6656028\/6671267\/06671274.pdf?arnumber=6671274","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T23:35:28Z","timestamp":1498088128000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6671274\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":93,"URL":"https:\/\/doi.org\/10.1109\/wcre.2013.6671274","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}