{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:33:24Z","timestamp":1750307604617,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,8,31]],"date-time":"2009-08-31T00:00:00Z","timestamp":1251676800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,8,31]]},"DOI":"10.1145\/1735935.1735938","type":"proceedings-article","created":{"date-parts":[[2010,3,16]],"date-time":"2010-03-16T19:27:05Z","timestamp":1268767625000},"page":"8-17","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Diagnosis and semi-automatic correction of detected design inconsistencies in source code"],"prefix":"10.1145","author":[{"given":"Sergio","family":"Castro","sequence":"first","affiliation":[{"name":"Universit\u00e9 catholique de Louvain, Louvain-la-Neuve, Belgium"}]},{"given":"Johan","family":"Brichau","sequence":"additional","affiliation":[{"name":"Universit\u00e9 catholique de Louvain, Louvain-la-Neuve, Belgium"}]},{"given":"Kim","family":"Mens","sequence":"additional","affiliation":[{"name":"Universit\u00e9 catholique de Louvain, Louvain-la-Neuve, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2009,8,31]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/256664.256748"},{"key":"e_1_3_2_1_2_1","volume-title":"Smalltalk Best Practice Patterns","author":"Beck K.","year":"1997","unstructured":"K. Beck . Smalltalk Best Practice Patterns . Prentice Hall , 1997 . K. Beck. Smalltalk Best Practice Patterns. Prentice Hall, 1997."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/646561.695561"},{"key":"e_1_3_2_1_4_1","volume-title":"Scripting browsers with glamour. Master's thesis","author":"Bunge P.","year":"2009","unstructured":"P. Bunge . Scripting browsers with glamour. Master's thesis , Bern University , April 2009 . P. Bunge. Scripting browsers with glamour. Master's thesis, Bern University, April 2009."},{"key":"e_1_3_2_1_5_1","unstructured":"Checkstyle December 2006. http:\/\/checkstyle.sourceforge.net.  Checkstyle December 2006. http:\/\/checkstyle.sourceforge.net."},{"key":"e_1_3_2_1_6_1","unstructured":"Cincom Systems Inc. Visualworks smalltalk environment. http:\/\/www.cincom.com\/smalltalk 2007.  Cincom Systems Inc. Visualworks smalltalk environment. http:\/\/www.cincom.com\/smalltalk 2007."},{"key":"e_1_3_2_1_7_1","unstructured":"J. Coplien. Advance C++ Programming Styles and Idioms. Addison-Wesley 1992.   J. Coplien. Advance C++ Programming Styles and Idioms . Addison-Wesley 1992."},{"key":"e_1_3_2_1_8_1","volume-title":"Abduction in logic programming","author":"Denecker M.","year":"1993","unstructured":"M. Denecker and A. Kakas . Abduction in logic programming . 1993 . M. Denecker and A. Kakas. Abduction in logic programming. 1993."},{"key":"e_1_3_2_1_9_1","volume-title":"Simply logical: intelligent reasoning by example","author":"Flach P.","year":"1994","unstructured":"P. Flach . Simply logical: intelligent reasoning by example . John Wiley & amp; Sons, Inc., New York, NY, USA, 1994 . P. Flach. Simply logical: intelligent reasoning by example. John Wiley &amp; Sons, Inc., New York, NY, USA, 1994."},{"key":"e_1_3_2_1_10_1","volume-title":"Design patterns: elements of reusable object-oriented software","author":"Gamma E.","year":"1995","unstructured":"E. Gamma , R. Helm , R. Johnson , and J. Vlissides . Design patterns: elements of reusable object-oriented software . Addison-Wesley Longman Publishing Co., Inc. , Boston, MA, USA , 1995 . E. Gamma, R. Helm, R. Johnson, and J. Vlissides. Design patterns: elements of reusable object-oriented software. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 1995."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/292182.292187"},{"key":"e_1_3_2_1_12_1","first-page":"394","volume-title":"In: Proc. 14th Int'l Joint Conf. on Artificial Intelligence","author":"Inoue K.","year":"1998","unstructured":"K. Inoue and C. Sakama . Specifying transactions for extended abduction . In In: Proc. 14th Int'l Joint Conf. on Artificial Intelligence , pages 394 -- 405 . Morgan Kaufmann , 1998 . K. Inoue and C. Sakama. Specifying transactions for extended abduction. In In: Proc. 14th Int'l Joint Conf. on Artificial Intelligence, pages 394--405. Morgan Kaufmann, 1998."},{"key":"e_1_3_2_1_13_1","volume-title":"http:\/\/www.jutils.com\/","author":"Johnson S.","year":"2007","unstructured":"S. Johnson . Lint. http:\/\/www.jutils.com\/ , 2007 . S. Johnson. Lint. http:\/\/www.jutils.com\/, 2007."},{"key":"e_1_3_2_1_14_1","volume-title":"Philosophy, Technology","author":"Josephson J. R.","year":"1994","unstructured":"J. R. Josephson and S. G. Josephson . Abductive Inference: Computation , Philosophy, Technology . Cambridge University Press , 1994 . J. R. Josephson and S. G. Josephson. Abductive Inference: Computation, Philosophy, Technology. Cambridge University Press, 1994."},{"key":"e_1_3_2_1_15_1","volume-title":"C. H. D. gabbay and J","author":"Kakas R. K. A.","year":"1998","unstructured":"R. K. A. Kakas and F. Tony . The role of abduction in logic programming . In C. H. D. gabbay and J . Robinson, editors, Handbook of Logic in Artificial Intelligence and Logic Programming. Oxford University Press , 1998 . R. K. A. Kakas and F. Tony. The role of abduction in logic programming. In C. H. D. gabbay and J. Robinson, editors, Handbook of Logic in Artificial Intelligence and Logic Programming. Oxford University Press, 1998."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.1986.233414"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1116163.1116408"},{"key":"e_1_3_2_1_19_1","first-page":"81","volume-title":"International Conference on Software Maintenance (ICSM) Industrial and Tool Volume","author":"Mens K.","year":"2005","unstructured":"K. Mens , A. Kellens , F. Pluquet , and R. Wuyts . The intensional view environment . International Conference on Software Maintenance (ICSM) Industrial and Tool Volume , pages 81 -- 84 , 2005 . K. Mens, A. Kellens, F. Pluquet, and R. Wuyts. The intensional view environment. International Conference on Software Maintenance (ICSM) Industrial and Tool Volume, pages 81--84, 2005."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.1996.0054"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1096-9942(1996)2:4%3C283::AID-TAPO4%3E3.0.CO;2-V"},{"key":"e_1_3_2_1_22_1","first-page":"299","volume-title":"In Proceedings of the ACM Symposium on Principles of Programming Languages","author":"Minsky N. H.","year":"1994","unstructured":"N. H. Minsky and H. Minsky . Law-governed regularities in software systems . In In Proceedings of the ACM Symposium on Principles of Programming Languages , pages 299 -- 312 . Springer-Verlag , 1994 . N. H. Minsky and H. Minsky. Law-governed regularities in software systems. In In Proceedings of the ACM Symposium on Principles of Programming Languages, pages 299--312. Springer-Verlag, 1994."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/336512.336523"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.3127\/ajis.v6i2.296"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.3127\/ajis.v6i2.296"},{"key":"e_1_3_2_1_26_1","volume-title":"Abduction as a logic and methodology of discovery: the importance of strategies. Foundations of Science, 9(3):267+","author":"Paavola S.","year":"2004","unstructured":"S. Paavola . Abduction as a logic and methodology of discovery: the importance of strategies. Foundations of Science, 9(3):267+ , 2004 . S. Paavola. Abduction as a logic and methodology of discovery: the importance of strategies. Foundations of Science, 9(3):267+, 2004."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/257734.257788"},{"key":"e_1_3_2_1_28_1","volume-title":"The Collected Papers of Charles Sanders Peirce","author":"Pierce C. S.","year":"1935","unstructured":"C. S. Pierce . The Collected Papers of Charles Sanders Peirce . Harvard University Press , 1935 . C. S. Pierce. The Collected Papers of Charles Sanders Peirce. Harvard University Press, 1935."},{"key":"e_1_3_2_1_29_1","first-page":"150","volume-title":"Philosophical Writings of Pierce","author":"Pierce C. S.","year":"1955","unstructured":"C. S. Pierce . Abduction and induction . In J. Buchler, editor, Philosophical Writings of Pierce , pages 150 -- 156 . Dover Books , New York , 1955 . C. S. Pierce. Abduction and induction. In J. Buchler, editor, Philosophical Writings of Pierce, pages 150--156. Dover Books, New York, 1955."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(87)90062-2"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.101"},{"key":"e_1_3_2_1_32_1","volume-title":"ICSE2000 Workshop on Intelligence Software Engineering","author":"Russo A.","year":"2000","unstructured":"A. Russo , R. Miller , B. Nuseibeh , and J. Kramer . An abductive approach for handling inconsistencies in scr specifications . In ICSE2000 Workshop on Intelligence Software Engineering , 2000 . A. Russo, R. Miller, B. Nuseibeh, and J. Kramer. An abductive approach for handling inconsistencies in scr specifications. In ICSE2000 Workshop on Intelligence Software Engineering, 2000."},{"key":"e_1_3_2_1_33_1","volume-title":"Software Engineering and Knowledge Engineering","author":"Russo A.","year":"2000","unstructured":"A. Russo and B. Nuseibeh . On the use of logical abduction in software engineering . In S. K. Chang, editor, Software Engineering and Knowledge Engineering . World Scientific Publishing Corporation , 2000 . A. Russo and B. Nuseibeh. On the use of logical abduction in software engineering. In S. K. Chang, editor, Software Engineering and Knowledge Engineering. World Scientific Publishing Corporation, 2000."},{"key":"e_1_3_2_1_34_1","first-page":"48","volume-title":"First Asia Pacific Workshop on Intelligent Software Engineering (APWISE'98)","author":"Satoh K.","year":"1998","unstructured":"K. Satoh . Adding and deleting pollution marker by abductive logic programming . In First Asia Pacific Workshop on Intelligent Software Engineering (APWISE'98) , pages 48 -- 53 , 1998 . K. Satoh. Adding and deleting pollution marker by abductive logic programming. In First Asia Pacific Workshop on Intelligent Software Engineering (APWISE'98), pages 48--53, 1998."},{"key":"e_1_3_2_1_35_1","first-page":"177","volume-title":"International Workshop on the Principles of Software Evolution, IWPSE98","author":"Satoh K.","year":"1998","unstructured":"K. Satoh . Computing minimal revised logic program by abduction . In International Workshop on the Principles of Software Evolution, IWPSE98 , pages 177 -- 182 , 1998 . K. Satoh. Computing minimal revised logic program by abduction. In International Workshop on the Principles of Software Evolution, IWPSE98, pages 177--182, 1998."},{"key":"e_1_3_2_1_36_1","first-page":"90","volume-title":"ICSE-2000 Workshop on Intelligent Software Engineering","author":"Satoh K.","year":"2000","unstructured":"K. Satoh . Consistency management in software engineering by abduction . In ICSE-2000 Workshop on Intelligent Software Engineering , pages 90 -- 99 , 2000 . K. Satoh. Consistency management in software engineering by abduction. In ICSE-2000 Workshop on Intelligent Software Engineering, pages 90--99, 2000."},{"key":"e_1_3_2_1_37_1","volume-title":"The Art of PROLOG: Advanced Programming Techniques","author":"Shapiro L.","year":"1994","unstructured":"L. Shapiro and E. Y. Sterling . The Art of PROLOG: Advanced Programming Techniques . The MIT Press , April 1994 . L. Shapiro and E. Y. Sterling. The Art of PROLOG: Advanced Programming Techniques. The MIT Press, April 1994."},{"key":"e_1_3_2_1_38_1","unstructured":"P. Sullivan. On falsification interpretation of peirce. 27:197--219 1991.  P. Sullivan. On falsification interpretation of peirce. 27:197--219 1991."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(01)00152-2"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/832254.832862"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cl.2003.08.003"},{"key":"e_1_3_2_1_43_1","volume-title":"Annual Meeting of American Educational Research Association","author":"Yu C. H.","year":"1994","unstructured":"C. H. Yu . Abduction? deduction? induction? is there a logic of exploratory data analysis? Technical report , Annual Meeting of American Educational Research Association , April 1994 . C. H. Yu. Abduction? deduction? induction? is there a logic of exploratory data analysis? Technical report, Annual Meeting of American Educational Research Association, April 1994."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/237432.237434"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/872023.872525"}],"event":{"name":"IWST '09: International Workshop on Smalltalk Technology","sponsor":["ESUG","SIGPLAN ACM Special Interest Group on Programming Languages"],"location":"Brest France","acronym":"IWST '09"},"container-title":["Proceedings of the International Workshop on Smalltalk Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1735935.1735938","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1735935.1735938","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:45:33Z","timestamp":1750250733000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1735935.1735938"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,8,31]]},"references-count":43,"alternative-id":["10.1145\/1735935.1735938","10.1145\/1735935"],"URL":"https:\/\/doi.org\/10.1145\/1735935.1735938","relation":{},"subject":[],"published":{"date-parts":[[2009,8,31]]},"assertion":[{"value":"2009-08-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}