{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:14:46Z","timestamp":1763468086173,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,7,16]],"date-time":"2012-07-16T00:00:00Z","timestamp":1342396800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1117593"],"award-info":[{"award-number":["1117593"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,7,16]]},"DOI":"10.1145\/2335484.2335511","type":"proceedings-article","created":{"date-parts":[[2012,7,19]],"date-time":"2012-07-19T14:38:27Z","timestamp":1342708707000},"page":"241-251","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Impact analysis for distributed event-based systems"],"prefix":"10.1145","author":[{"given":"Daniel","family":"Popescu","sequence":"first","affiliation":[{"name":"University of Southern California, Los Angeles, CA"}]},{"given":"Joshua","family":"Garcia","sequence":"additional","affiliation":[{"name":"University of Southern California, Los Angeles, CA"}]},{"given":"Kevin","family":"Bierhoff","sequence":"additional","affiliation":[{"name":"Two Sigma Investments, New York, NY"}]},{"given":"Nenad","family":"Medvidovic","sequence":"additional","affiliation":[{"name":"University of Southern California, Los Angeles, CA"}]}],"member":"320","published-online":{"date-parts":[[2012,7,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/WICSA.2008.48"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297027.1297050"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03013-0_10"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1016\/S0065-2458(03)62003-6","article-title":"A survey of empirical results on program slicing","volume":"62","author":"Binkley D.","year":"2004","unstructured":"D. Binkley and M. Harman . A survey of empirical results on program slicing . Advances in Computers: Advances in Software Engineering , 62 : 105 , 2004 . D. Binkley and M. Harman. A survey of empirical results on program slicing. Advances in Computers: Advances in Software Engineering, 62:105, 2004.","journal-title":"Advances in Computers: Advances in Software Engineering"},{"key":"e_1_3_2_1_5_1","volume-title":"Worldwide, 2009","author":"Biscotti F.","year":"2010","unstructured":"F. Biscotti , T. Jones , and A. Raina . Market Share: AIM and Portal Software , Worldwide, 2009 . Gartner market research report , April 2010 . F. Biscotti, T. Jones, and A. Raina. Market Share: AIM and Portal Software, Worldwide, 2009. Gartner market research report, April 2010."},{"key":"e_1_3_2_1_6_1","volume-title":"Software Change Impact Analysis","author":"Bohner S.","year":"1996","unstructured":"S. Bohner and R. Arnold . Software Change Impact Analysis . Wiley-IEEE Computer Society Pr , 1996 . S. Bohner and R. Arnold. Software Change Impact Analysis. Wiley-IEEE Computer Society Pr, 1996."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133651.1133655"},{"key":"e_1_3_2_1_8_1","volume-title":"Worldwide, 2005","author":"Correira J.","year":"2006","unstructured":"J. Correira and F. Biscotti . Market Share: AIM and Portal Software , Worldwide, 2005 . Gartner market research report , June 2006 . J. Correira and F. Biscotti. Market Share: AIM and Portal Software, Worldwide, 2005. Gartner market research report, June 2006."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03013-0_26"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02351-4_10"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2007.3"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/53990.53994"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2002259.2002278"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/876882.879814"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287675"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806829"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(79)90022-0"},{"key":"e_1_3_2_1_18_1","volume-title":"Proc. ICSM","author":"Liang D.","year":"1998","unstructured":"D. Liang and M. Harrold . Slicing objects using system dependence graphs . In Proc. ICSM , 1998 . D. Liang and M. Harrold. Slicing objects using system dependence graphs. In Proc. ICSM, 1998."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.29"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/302405.302410"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194003001330"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s100090050041"},{"key":"e_1_3_2_1_24_1","volume-title":"Distributed Event-Based Systems","author":"M\u00fchl G.","year":"2006","unstructured":"G. M\u00fchl Distributed Event-Based Systems . Springer-Verlag New York, Inc. , 2006 . G. M\u00fchl et al. Distributed Event-Based Systems. Springer-Verlag New York, Inc., 2006."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/234426.234441"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1810295.1810403"},{"key":"e_1_3_2_1_27_1","volume-title":"ICSM, page 84. Published by the","author":"Rajlich V.","year":"1997","unstructured":"V. Rajlich . A model for change propagation based on graph rewriting. In ICSM, page 84. Published by the IEEE Computer Society , 1997 . V. Rajlich. A model for change propagation based on graph rewriting. In ICSM, page 84. Published by the IEEE Computer Society, 1997."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/222124.222138"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2009.01.003"},{"key":"e_1_3_2_1_30_1","volume-title":"Proc. BenchmarX","author":"Sachs K.","year":"2010","unstructured":"K. Sachs In Proc. BenchmarX , 2010 . K. Sachs et al. Benchmarking publish\/subscribe-based messaging systems. In Proc. BenchmarX, 2010."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2008.25"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/288408.288441"},{"key":"e_1_3_2_1_33_1","volume-title":"Software Architecture: Foundations, Theory, and Practice","author":"Taylor R.","year":"2008","unstructured":"R. Taylor Software Architecture: Foundations, Theory, and Practice . John Wiley & amp; Sons, 2008 . R. Taylor et al. Software Architecture: Foundations, Theory, and Practice. John Wiley &amp; Sons, 2008."},{"key":"e_1_3_2_1_34_1","volume-title":"Journal of programming languages, 3(3):121--189","author":"Tip F.","year":"1995","unstructured":"F. Tip . A survey of program slicing techniques. Journal of programming languages, 3(3):121--189 , 1995 . F. Tip. A survey of program slicing techniques. Journal of programming languages, 3(3):121--189, 1995."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.258"}],"event":{"name":"DEBS '12: The 6th ACM International Conference on Distributed Event-based system","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Berlin Germany","acronym":"DEBS '12"},"container-title":["Proceedings of the 6th ACM International Conference on Distributed Event-Based Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2335484.2335511","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2335484.2335511","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:11Z","timestamp":1750240091000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2335484.2335511"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7,16]]},"references-count":34,"alternative-id":["10.1145\/2335484.2335511","10.1145\/2335484"],"URL":"https:\/\/doi.org\/10.1145\/2335484.2335511","relation":{},"subject":[],"published":{"date-parts":[[2012,7,16]]},"assertion":[{"value":"2012-07-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}