{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:22:33Z","timestamp":1750306953797,"version":"3.41.0"},"reference-count":31,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2013,7,12]],"date-time":"2013-07-12T00:00:00Z","timestamp":1373587200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGSOFT Softw. Eng. Notes"],"published-print":{"date-parts":[[2013,7,12]]},"abstract":"<jats:p>Reusing program modules is one of the most direct and useful ways to develop cost effective software, especially with the availability of huge amounts of open-source projects. Reuse saves cost, increases the speed of development and improves software reliability. The quality of popular open-source packages is good as shown by various empirical studies. However, the quality of less known packages and the large number of projects developed by programming enthusiasts is unknown. Reusing them may be the source of more problems rather than being a solution to a problem. In this paper, a conceptual model is proposed to measure the reusability of program modules. A balanced set of wellestablished metrics is used to compute the most significant factors of reusability and an empirical investigation is conducted to measure the reusability of the modules of randomly selected open-source Java projects. The results obtained are thoroughly analyzed to discover the real reusability potential of open-source program code together with suggestions on how to improve this potential.<\/jats:p>","DOI":"10.1145\/2492248.2492276","type":"journal-article","created":{"date-parts":[[2013,7,16]],"date-time":"2013-07-16T18:06:45Z","timestamp":1373998005000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Reusability of open-source program code"],"prefix":"10.1145","volume":"38","author":[{"given":"Fathi","family":"Taibi","sequence":"first","affiliation":[{"name":"UNITAR International University, Selangor, Malaysia"}]}],"member":"320","published-online":{"date-parts":[[2013,7,12]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2089116.2089118"},{"volume-title":"Proc of the Centre for Advanced Studies on Collaborative Research Conference.","author":"Anquetil N.","key":"e_1_2_1_2_1"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.962984"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.70"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.295895"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2005.160"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.89"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.85"},{"issue":"1","key":"e_1_2_1_9_1","first-page":"40","article-title":"Sonar","volume":"18","author":"Gaudin O.","year":"2010","journal-title":"Methods and Tools"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.112"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1070.0748"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2008.29"},{"volume-title":"Proc of the 2nd Workshop on Open Source Software Engineering, International Conference on Software Engineering, USA.","author":"Halloran T.","key":"e_1_2_1_13_1"},{"first-page":"34","volume-title":"Automated Duplicate Detection for Bug Tracking Systems. In Proc of the International Conference on Dependable Systems and Networks","author":"Jalbert N.","key":"e_1_2_1_14_1"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04211-9_15"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11334-007-0031-2"},{"volume-title":"Proc of the International Conference on Computer Systems and Technologies.","author":"Makela S.","key":"e_1_2_1_17_1"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70768"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233837"},{"key":"e_1_2_1_20_1","volume-title":"Code Complete: A Practical Handbook of Software Construction","author":"McConnell S.","year":"2004","edition":"2"},{"key":"e_1_2_1_21_1","first-page":"138","volume-title":"Proc 1968 NATO Conference on Software Engineering, Buxton, J.M., Naur, P., Randell, B. (eds.)","author":"Mcilroy D.","year":"1969"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/375360.375365"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.9"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2005.137.144"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1191795"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985850"},{"first-page":"99","volume-title":"Predicting Fault-Proneness Using OO Metrics: An Industrial Case Study. In Proc of the 6th European Conference on Software Maintenance and Reengineering","author":"Yu P.","key":"e_1_2_1_27_1"},{"key":"e_1_2_1_28_1","unstructured":"http:\/\/www.planet-source-code.com\/  http:\/\/www.planet-source-code.com\/"},{"key":"e_1_2_1_29_1","unstructured":"http:\/\/sourceforge.net\/  http:\/\/sourceforge.net\/"},{"key":"e_1_2_1_30_1","unstructured":"http:\/\/cccc.sourceforge.net\/  http:\/\/cccc.sourceforge.net\/"},{"key":"e_1_2_1_31_1","unstructured":"http:\/\/www.spinellis.gr\/sw\/ckjm\/  http:\/\/www.spinellis.gr\/sw\/ckjm\/"}],"container-title":["ACM SIGSOFT Software Engineering Notes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2492248.2492276","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2492248.2492276","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:39:02Z","timestamp":1750235942000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2492248.2492276"}},"subtitle":["a conceptual model and empirical investigation"],"short-title":[],"issued":{"date-parts":[[2013,7,12]]},"references-count":31,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,7,12]]}},"alternative-id":["10.1145\/2492248.2492276"],"URL":"https:\/\/doi.org\/10.1145\/2492248.2492276","relation":{},"ISSN":["0163-5948"],"issn-type":[{"type":"print","value":"0163-5948"}],"subject":[],"published":{"date-parts":[[2013,7,12]]},"assertion":[{"value":"2013-07-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}