{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T19:53:32Z","timestamp":1762458812927,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,5,2]],"date-time":"2010-05-02T00:00:00Z","timestamp":1272758400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,5,2]]},"DOI":"10.1145\/1833310.1833319","type":"proceedings-article","created":{"date-parts":[[2010,7,11]],"date-time":"2010-07-11T22:03:17Z","timestamp":1278885797000},"page":"48-55","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":50,"title":["Saros"],"prefix":"10.1145","author":[{"given":"Stephan","family":"Salinger","sequence":"first","affiliation":[{"name":"Freie Universit\u00e4t Berlin, Berlin, Germany"}]},{"given":"Christopher","family":"Oezbek","sequence":"additional","affiliation":[{"name":"Freie Universit\u00e4t Berlin, Berlin, Germany"}]},{"given":"Karl","family":"Beecher","sequence":"additional","affiliation":[{"name":"Freie Universit\u00e4t Berlin, Berlin, Germany"}]},{"given":"Julia","family":"Schenk","sequence":"additional","affiliation":[{"name":"Freie Universit\u00e4t Berlin, Berlin, Germany"}]}],"member":"320","published-online":{"date-parts":[[2010,5,2]]},"reference":[{"key":"e_1_3_2_1_1_1","series-title":"Lecture Notes in Computer Science","first-page":"387","volume-title":"Extreme Programming and Agile Methods - XP\/Agile Universe","author":"Baheti P.","year":"2002"},{"volume-title":"INTERACT'03; IFIP TC13 International Conference on Human-Computer Interaction, 1st--5th","year":"2003","author":"Baudisch P.","key":"e_1_3_2_1_2_1"},{"volume-title":"Addison-Wesley Professional","year":"1999","author":"Beck K.","key":"e_1_3_2_1_3_1"},{"unstructured":"M. Bigler S. R\u00e4ss and L. Zbinden. ACE---a collaborative editor. Project Report. http:\/\/swiki-lifia.info.unlp.edu.ar\/ContextAware\/uploads\/25\/ACE_-_A_Collaborative_Editor_-_Report_Evaluation_Algorithms.pdf. Last visited 2009-12-18 Apr. 2005.  M. Bigler S. R\u00e4ss and L. Zbinden. ACE---a collaborative editor. Project Report. http:\/\/swiki-lifia.info.unlp.edu.ar\/ContextAware\/uploads\/25\/ACE_-_A_Collaborative_Editor_-_Report_Evaluation_Algorithms.pdf. Last visited 2009-12-18 Apr. 2005.","key":"e_1_3_2_1_4_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1016\/j.infsof.2007.05.006"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1016\/j.ijhcs.2007.03.005"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.5555\/938984.939791"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1109\/ICSE.2007.87"},{"volume-title":"Addison Wesley","year":"2004","author":"Cockburn A.","key":"e_1_3_2_1_9_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/358916.359000"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1109\/CHASE.2009.5071410"},{"volume-title":"Hamburg","year":"2007","author":"Djemili R.","key":"e_1_3_2_1_12_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1007\/s10799-007-0016-8"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1145\/143457.143468"},{"issue":"6","key":"e_1_3_2_1_15_1","first-page":"54","article-title":"Identifying success and abandonment of Free\/Libre and Open Source (FLOSS) commons: A classification of Sourceforge.net projects","author":"English R.","year":"2007","journal-title":"UPGRADE"},{"unstructured":"M. Fowler. Inversion of control containers and the dependency injection pattern. http:\/\/www.martinfowler.com\/articles\/injection.html Jan. 2004.  M. Fowler. Inversion of control containers and the dependency injection pattern. http:\/\/www.martinfowler.com\/articles\/injection.html Jan. 2004.","key":"e_1_3_2_1_16_1"},{"unstructured":"M. S. Frankel and S. Siang. Ethical and legal aspects of human subjects research on the internet. Published by AAAS online June 1999.  M. S. Frankel and S. Siang. Ethical and legal aspects of human subjects research on the internet. Published by AAAS online June 1999.","key":"e_1_3_2_1_17_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1109\/AGILE.2007.1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1145\/329693.329696"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1016\/j.ijhcs.2007.10.003"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1016\/j.infsof.2009.02.001"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1145\/1066129.1066144"},{"volume-title":"Freie Universit\u00e4t Berlin","year":"2009","author":"Jacob C.","key":"e_1_3_2_1_23_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1145\/332040.332478"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.5555\/1018434.1021572"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1145\/1052898.1052912"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.5555\/942794.943185"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1145\/1188835.1188837"},{"key":"e_1_3_2_1_29_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1007\/11586012_4","volume-title":"Software Process Improvement","author":"Nawrocki J. R.","year":"2005"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1145\/215585.215706"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.1145\/272287.272333"},{"volume-title":"Proc. 21st Annual Workshop of the Psychology of Programming Interest Group (PPIG '09)","year":"2009","author":"Prechelt L.","key":"e_1_3_2_1_32_1"},{"key":"e_1_3_2_1_33_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1007\/978-3-540-24853-8_5","volume-title":"Extreme Programming and Agile Processes in Software Engineering","author":"Reeves M.","year":"2004"},{"volume-title":"Internet Engineering Task Force","year":"2008","author":"Rosenberg J.","key":"e_1_3_2_1_34_1"},{"volume-title":"Internet Engineering Task Force","year":"2004","author":"Saint-Andre P.","key":"e_1_3_2_1_35_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.1109\/MMUL.2007.14"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_37_1","DOI":"10.17011\/ht\/urn.200804151350"},{"volume-title":"Workshop on Ethnographies of Code, Infolab21","year":"2006","author":"Schlesinger F.","key":"e_1_3_2_1_38_1"},{"key":"e_1_3_2_1_39_1","first-page":"355","volume-title":"Extreme programming examined","author":"Sch\u00fcmmer T.","year":"2001"},{"key":"e_1_3_2_1_40_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/978-3-540-92831-7_8","volume-title":"Groupware: Design, Implementation, and Use","author":"Sch\u00fcmmer T.","year":"2008"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_41_1","DOI":"10.5555\/645341.650276"},{"key":"e_1_3_2_1_42_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/978-3-540-45122-8_15","volume-title":"Extreme Programming and Agile Methods --- XP\/Agile Universe","author":"Stotts D.","year":"2003"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_43_1","DOI":"10.1145\/586081.586085"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_44_1","DOI":"10.1145\/289444.289469"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_45_1","DOI":"10.1109\/52.854064"},{"volume-title":"In Proceedings of the 2009 Conference on Software &amp; Systems Engineering Essentials","year":"2009","author":"Winkler D.","key":"e_1_3_2_1_46_1"},{"volume-title":"Freie Universit\u00e4t Berlin","year":"2009","author":"Ziller S.","key":"e_1_3_2_1_47_1"}],"event":{"sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"acronym":"ICSE '10","name":"ICSE '10: 32nd International Conference on Software Engineering","location":"Cape Town South Africa"},"container-title":["Proceedings of the 2010 ICSE Workshop on Cooperative and Human Aspects of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1833310.1833319","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1833310.1833319","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:39:42Z","timestamp":1750246782000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1833310.1833319"}},"subtitle":["an eclipse plug-in for distributed party programming"],"short-title":[],"issued":{"date-parts":[[2010,5,2]]},"references-count":47,"alternative-id":["10.1145\/1833310.1833319","10.1145\/1833310"],"URL":"https:\/\/doi.org\/10.1145\/1833310.1833319","relation":{},"subject":[],"published":{"date-parts":[[2010,5,2]]},"assertion":[{"value":"2010-05-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}