{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:46:25Z","timestamp":1729651585971,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/wcre.2013.6671330","type":"proceedings-article","created":{"date-parts":[[2013,12,3]],"date-time":"2013-12-03T17:00:42Z","timestamp":1386090042000},"page":"485-486","source":"Crossref","is-referenced-by-count":1,"title":["Detecting dependencies in Enterprise JavaBeans with SQuAVisiT"],"prefix":"10.1109","author":[{"given":"Alexandru","family":"Sutii","sequence":"first","affiliation":[]},{"given":"Serguei","family":"Roubtsov","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Serebrenik","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"13","DOI":"10.1002\/smr.1558"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1109\/ICSM.2011.6080798"},{"year":"0","author":"souti","journal-title":"Gestionnaire Fiches","key":"11"},{"key":"12","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1049\/iet-sen.2012.0056","article-title":"I2SD: Reverse engineering sequence diagrams from Enterprise JavaBeans with interceptors","volume":"7","author":"roubtsov","year":"0","journal-title":"IET Software"},{"year":"0","journal-title":"SolidSource Website","key":"3"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1109\/TSE.2002.1019480"},{"key":"1","first-page":"331","article-title":"Squavisit: A flexible tool for visual software analytics","author":"den van brand","year":"2009","journal-title":"CSMR IEEE"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1109\/TSE.2010.47"},{"key":"7","article-title":"JSR 318: Enterprise javabeanstm, version 3.1, ejb core contracts and requirements","author":"saks","year":"2009","journal-title":"JCP Tech Rep"},{"key":"6","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1145\/2465478.2465482","article-title":"Simulink models are also software: Modularity assessment","author":"dajsuren","year":"2013","journal-title":"QoSA ACM"},{"key":"5","first-page":"95","article-title":"Dn-based design quality comparison of industrial Java applications","author":"roubtsov","year":"2009","journal-title":"Ceesecr"},{"key":"4","first-page":"205","article-title":"Behavioural analysis of an I2C Linux driver","author":"bosnacki","year":"2009","journal-title":"FMICS"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/CSMR.2010.45"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1145\/1142031.1142045"}],"event":{"name":"2013 20th Working Conference on Reverse Engineering (WCRE)","start":{"date-parts":[[2013,10,14]]},"location":"Koblenz, Germany","end":{"date-parts":[[2013,10,17]]}},"container-title":["2013 20th Working Conference on Reverse Engineering (WCRE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6656028\/6671267\/06671330.pdf?arnumber=6671330","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T23:35:28Z","timestamp":1498088128000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6671330\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/wcre.2013.6671330","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}