{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:43:26Z","timestamp":1750308206233,"version":"3.41.0"},"reference-count":23,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2004,9,1]],"date-time":"2004-09-01T00:00:00Z","timestamp":1093996800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGSOFT Softw. Eng. Notes"],"published-print":{"date-parts":[[2004,9]]},"abstract":"<jats:p>Extreme Programming is presented as an answer to problems in software engineering. Extreme Programming is briefly introduced and one of its primary principles, pair programming, is examined more closely. Drawing from readings and Medtronic employee interviews, potential challenges to pair programming are discussed and analyzed. Finally, recommendations for those considering pair programming are suggested.<\/jats:p>","DOI":"10.1145\/1022494.1022512","type":"journal-article","created":{"date-parts":[[2004,10,7]],"date-time":"2004-10-07T17:39:09Z","timestamp":1097170749000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Technical and human perspectives on pair programming"],"prefix":"10.1145","volume":"29","author":[{"given":"Jason","family":"Aiken","sequence":"first","affiliation":[{"name":"Capella University"}]}],"member":"320","published-online":{"date-parts":[[2004,9]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Anthes G. (1997). Killer apps. Computerworld. Retrieved 15 March 2004 from http:\/\/www.computerworld.com\/news\/1997\/story\/0 11280 1663 00.html  Anthes G. (1997). Killer apps. Computerworld. Retrieved 15 March 2004 from http:\/\/www.computerworld.com\/news\/1997\/story\/0 11280 1663 00.html"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/962342.962352"},{"key":"e_1_2_1_3_1","unstructured":"Beck K. (2000). Extreme programming explained: embrace change. Boston: Addison-Wesley.   Beck K. (2000). Extreme programming explained: embrace change. Boston: Addison-Wesley."},{"key":"e_1_2_1_4_1","unstructured":"Cockburn A. & Williams L. (2000). The costs and benefits of pair programming. Retrieved 5 February 2004 from (PDF) &lt;http:\/\/collaboration.csc.ncsu.edu\/laurie\/Papers\/XPSardinia.PDF  Cockburn A. & Williams L. (2000). The costs and benefits of pair programming. Retrieved 5 February 2004 from (PDF) &lt; http:\/\/collaboration.csc.ncsu.edu\/laurie\/Papers\/XPSardinia.PDF"},{"key":"e_1_2_1_5_1","unstructured":"Crispin L. & House T. (2003). Testing extreme programming. Boston: Addison-Wesley.   Crispin L. & House T. (2003). Testing extreme programming. Boston: Addison-Wesley."},{"key":"e_1_2_1_6_1","unstructured":"DeMarco T. & Lister T. (1999). Peopleware: productive projects and teams. New York: Dorset House Publishing Co.   DeMarco T. & Lister T. (1999). Peopleware: productive projects and teams. New York: Dorset House Publishing Co."},{"key":"e_1_2_1_7_1","unstructured":"Dove L. (2004). Personal interview. 9 March 2004.  Dove L. (2004). Personal interview. 9 March 2004."},{"key":"e_1_2_1_8_1","unstructured":"Humphrey W. (1997). Managing technical people: innovation teamwork and the software process. Reading MA: Addision-Wesley.   Humphrey W. (1997). Managing technical people: innovation teamwork and the software process. Reading MA: Addision-Wesley."},{"key":"e_1_2_1_9_1","unstructured":"Jeffries R. (2002). What is extreme programming. Retrieved 5 February 2004 from http:\/\/www.xprogramming.com\/xpmag\/whatisxp.htm  Jeffries R. (2002). What is extreme programming. Retrieved 5 February 2004 from http:\/\/www.xprogramming.com\/xpmag\/whatisxp.htm"},{"key":"e_1_2_1_10_1","article-title":"The more more things change more. {Electronic version} Network","volume":"16","author":"Liebmann L.","year":"2001","journal-title":"Magazine."},{"key":"e_1_2_1_11_1","unstructured":"Miller R. (2003). Demystifying extreme programming: winning with a pair. Retrieved 26 February 2004 from http:\/\/www-106.ibm.com\/developerworks\/java\/library\/j-xp03113.html  Miller R. (2003). Demystifying extreme programming: winning with a pair. Retrieved 26 February 2004 from http:\/\/www-106.ibm.com\/developerworks\/java\/library\/j-xp03113.html"},{"key":"e_1_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Mueller G. & Borzuchowski J. (2002). Extreme embedded - a report from the front line. Retrieved 26 February 2004 from (PDF) &lt;http:\/\/oopsla.acm.org\/extra\/pracreports\/ExtremeEmbeddedReport.pdf  Mueller G. & Borzuchowski J. (2002). Extreme embedded - a report from the front line. Retrieved 26 February 2004 from (PDF) &lt; http:\/\/oopsla.acm.org\/extra\/pracreports\/ExtremeEmbeddedReport.pdf","DOI":"10.1145\/604251.604257"},{"key":"e_1_2_1_13_1","unstructured":"Munro J. (2003). Extreme Programming: what is XP?. {Electronic version} PC Magazine. February 25. p. 68. Retrieved 5 February 2004 from http:\/\/www.pcmag.com\/article2\/0 4149 842920 00.asp  Munro J. (2003). Extreme Programming: what is XP?. {Electronic version} PC Magazine. February 25. p. 68. Retrieved 5 February 2004 from http:\/\/www.pcmag.com\/article2\/0 4149 842920 00.asp"},{"key":"e_1_2_1_14_1","unstructured":"Pfleeger S. (2001). Software engineering: theory and practice. Upper Saddle River NJ: Prentice-Hall Inc.   Pfleeger S. (2001). Software engineering: theory and practice. Upper Saddle River NJ: Prentice-Hall Inc."},{"key":"e_1_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Rosenthal M. (2004). Personal interview. 17 March 2004.  Rosenthal M. (2004). Personal interview. 17 March 2004.","DOI":"10.1007\/s00147-004-0688-5"},{"key":"e_1_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Scheible B. (2004). Personal interview. 10 March 2004.  Scheible B. (2004). Personal interview. 10 March 2004.","DOI":"10.1016\/S1365-6937(04)00463-0"},{"key":"e_1_2_1_17_1","unstructured":"Schwalbe K. (2002). Information technology project management. Boston: Course Technology.   Schwalbe K. (2002). Information technology project management. Boston: Course Technology."},{"key":"e_1_2_1_18_1","unstructured":"Strauss D. (2002). How to make collaboration work: powerful ways to build consensus solve problems make decisions. San Francisco: Berrett-Koehler Publishers Inc.  Strauss D. (2002). How to make collaboration work: powerful ways to build consensus solve problems make decisions. San Francisco: Berrett-Koehler Publishers Inc."},{"key":"e_1_2_1_19_1","unstructured":"Wells D. (2003). eXtreme programming: a gentle introduction. Retrieved 5 February 2004 from http:\/\/www.extremeprogramming.org\/  Wells D. (2003). eXtreme programming: a gentle introduction. Retrieved 5 February 2004 from http:\/\/www.extremeprogramming.org\/"},{"key":"e_1_2_1_20_1","unstructured":"William W. (2004). XP123 - exploring extreme programming. Retrieved 5 February 2004 from http:\/\/www.xp123.com\/  William W. (2004). XP123 - exploring extreme programming. Retrieved 5 February 2004 from http:\/\/www.xp123.com\/"},{"key":"e_1_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Williams L. & Kessler R. (1999). All I really need to know about pair programming I learned in kindergarten. Retrieved 5 February 2004 from http:\/\/collaboration.csc.ncsu.edu\/laurie\/Papers\/Kindergarten.PDF  Williams L. & Kessler R. (1999). All I really need to know about pair programming I learned in kindergarten. Retrieved 5 February 2004 from http:\/\/collaboration.csc.ncsu.edu\/laurie\/Papers\/Kindergarten.PDF","DOI":"10.1145\/332833.332848"},{"key":"e_1_2_1_22_1","unstructured":"Williams L. & Kessler R. (2003). Pair programming illuminated. Boston: Addison-Wesley.   Williams L. & Kessler R. (2003). Pair programming illuminated. Boston: Addison-Wesley."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.854064"}],"container-title":["ACM SIGSOFT Software Engineering Notes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1022494.1022512","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1022494.1022512","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:30:57Z","timestamp":1750264257000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1022494.1022512"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,9]]},"references-count":23,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2004,9]]}},"alternative-id":["10.1145\/1022494.1022512"],"URL":"https:\/\/doi.org\/10.1145\/1022494.1022512","relation":{},"ISSN":["0163-5948"],"issn-type":[{"type":"print","value":"0163-5948"}],"subject":[],"published":{"date-parts":[[2004,9]]},"assertion":[{"value":"2004-09-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}