{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T19:46:22Z","timestamp":1725392782461},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/wpc.2004.1311053","type":"proceedings-article","created":{"date-parts":[[2004,11,12]],"date-time":"2004-11-12T19:14:14Z","timestamp":1100286854000},"page":"111-119","source":"Crossref","is-referenced-by-count":0,"title":["Understanding CASE generated legacy applications: a case study"],"prefix":"10.1109","author":[{"given":"C.","family":"Sarmiento","sequence":"first","affiliation":[]},{"given":"S.","family":"Takahashi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1999.806968"},{"year":"2004","author":"sarmiento","key":"17"},{"journal-title":"Architecture Reconstruction","year":"2003","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1998.723185"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008781513258"},{"journal-title":"DB2 Universal Database V8 1","year":"2003","key":"13"},{"journal-title":"Coleccio?n Cultura Informa?tica","year":"1999","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1993.287768"},{"year":"2003","key":"12"},{"journal-title":"Options Analysis for Reengineering (OAR) A Method for Mining Legacy Assets","year":"0","author":"bergey","key":"3"},{"key":"20","first-page":"391","article-title":"A semantic foundation for architectural reengineering","author":"woods","year":"1999","journal-title":"Proceedings of ICSM99"},{"journal-title":"Architecture-Based Development","year":"1999","author":"bass","key":"2"},{"journal-title":"Data Reverse Engineering Slaying the Legacy Dragon","year":"1996","author":"aiken","key":"1"},{"key":"10","article-title":"The nature of data reverse engineering","author":"hainaut","year":"2000","journal-title":"Data Reverse Engineering Workshop"},{"journal-title":"Object Oriented Reengineering Patterns","year":"2003","author":"demeyer","key":"7"},{"journal-title":"Reverse Engineering Design Recovery A Taxonomy","year":"1992","author":"chikofsky","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1999.806943"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1998.723188"},{"year":"2003","key":"9"},{"year":"2003","key":"8"}],"event":{"name":"Proceedings. 12th IEEE International Workshop on Program Comprehension, 2004.","location":"Bari, Italy"},"container-title":["Proceedings. 12th IEEE International Workshop on Program Comprehension, 2004."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9175\/29108\/01311053.pdf?arnumber=1311053","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T20:43:54Z","timestamp":1489437834000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1311053\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/wpc.2004.1311053","relation":{},"subject":[]}}