{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T15:59:11Z","timestamp":1776095951353,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,5,14]],"date-time":"2005-05-14T00:00:00Z","timestamp":1116028800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,5,14]]},"DOI":"10.1145\/1056018.1056025","type":"proceedings-article","created":{"date-parts":[[2005,8,3]],"date-time":"2005-08-03T08:31:47Z","timestamp":1123057907000},"page":"47-56","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":75,"title":["CVSscan"],"prefix":"10.1145","author":[{"given":"Lucian","family":"Voinea","sequence":"first","affiliation":[{"name":"Technische Universiteit Eindhoven"}]},{"given":"Alex","family":"Telea","sequence":"additional","affiliation":[{"name":"Technische Universiteit Eindhoven"}]},{"given":"Jarke J.","family":"van Wijk","sequence":"additional","affiliation":[{"name":"Technische Universiteit Eindhoven"}]}],"member":"320","published-online":{"date-parts":[[2005,5,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Beck K. and Andres C. 2004 Extreme Programming Explained: Embrace Change (2nd Edition). Addison-Wesley   Beck K. and Andres C. 2004 Extreme Programming Explained: Embrace Change (2nd Edition). Addison-Wesley"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/774833.774844"},{"key":"e_1_3_2_1_3_1","unstructured":"Cormen T. Leiserson C. and Rivest R. 1996. Introduction to Algorithms 16th edition MIT Press.   Cormen T. Leiserson C. and Rivest R. 1996. Introduction to Algorithms 16th edition MIT Press."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.177365"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/774833.774860"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/6294.846201"},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. ICSE '04","author":"Froehlich J."},{"key":"e_1_3_2_1_8_1","volume-title":"Proc. ICSE '01","author":"Griswold W. G."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/774833.774859"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/581339.581397"},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. IEEE VISSOFT '02","author":"Maletic J. I."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/774833.774837"},{"key":"e_1_3_2_1_13_1","volume-title":"Proc. of the Workshop on Software Visualization, ICSE '01","author":"Reiss S. P.","year":"2001"},{"key":"e_1_3_2_1_14_1","unstructured":"Seacord R. C. Plakosh D. and Lewis G. 2003. A. Modernizing Legacy Systems: Software Technologies Engineering Process and Business Practices. Addision-Wesley SEI Series in Software Engineering.   Seacord R. C. Plakosh D. and Lewis G. 2003. A. Modernizing Legacy Systems: Software Technologies Engineering Process and Business Practices. Addision-Wesley SEI Series in Software Engineering."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/832277.834354"},{"key":"e_1_3_2_1_16_1","unstructured":"Sommerville I. 2000. Software Engineering (6th edition). Addison-Wesley   Sommerville I. 2000. Software Engineering (6th edition). Addison-Wesley"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010272"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/506443.506459"},{"key":"e_1_3_2_1_19_1","volume-title":"Proc. IEEE VisSym '02","author":"Telea A."},{"key":"e_1_3_2_1_20_1","volume-title":"Rigi: A visual tool for understanding legacy systems. In International Journal of Software Engineering and Knowledge Engineering, December","author":"Tilley S. R.","year":"1994"}],"event":{"name":"SOFTVIS05: ACM Symposium on Software Visualization SOFTVIS 2005","location":"St. Louis Missouri","acronym":"SOFTVIS05","sponsor":["SIGGRAPH ACM Special Interest Group on Computer Graphics and Interactive Techniques","SIGPLAN ACM Special Interest Group on Programming Languages","SIGSOFT ACM Special Interest Group on Software Engineering","SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the 2005 ACM symposium on Software visualization"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1056018.1056025","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1056018.1056025","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:07:46Z","timestamp":1750262866000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1056018.1056025"}},"subtitle":["visualization of code evolution"],"short-title":[],"issued":{"date-parts":[[2005,5,14]]},"references-count":20,"alternative-id":["10.1145\/1056018.1056025","10.1145\/1056018"],"URL":"https:\/\/doi.org\/10.1145\/1056018.1056025","relation":{},"subject":[],"published":{"date-parts":[[2005,5,14]]},"assertion":[{"value":"2005-05-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}