{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T00:48:19Z","timestamp":1772930899057,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":87,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,5,31]],"date-time":"2014-05-31T00:00:00Z","timestamp":1401494400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,5,31]]},"DOI":"10.1145\/2593882.2593893","type":"proceedings-article","created":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T13:48:00Z","timestamp":1400593680000},"page":"133-144","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":64,"title":["Software evolution and maintenance"],"prefix":"10.1145","author":[{"given":"V\u00e1clav","family":"Rajlich","sequence":"first","affiliation":[{"name":"Wayne State University, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,5,31]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/336512.336534"},{"key":"e_1_3_2_1_2_1","volume-title":"Software Engineering: The Current Practice.","author":"Rajlich V.","year":"2012","unstructured":"Rajlich , V. 2012 . Software Engineering: The Current Practice. Boca Raton, FL : CRC Press . Rajlich, V. 2012. Software Engineering: The Current Practice. Boca Raton, FL: CRC Press."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.153.0225"},{"key":"e_1_3_2_1_4_1","first-page":"129","article-title":"The past, present, and future of software evolution","volume":"2008","author":"Godfrey M. W.","year":"2008","unstructured":"Godfrey , M. W. and German , D. M. 2008 . The past, present, and future of software evolution . In Proceedings of the Frontiers of Software Maintenance , 2008. pp. 129 - 138 . Godfrey, M. W. and German, D. M. 2008. The past, present, and future of software evolution. In Proceedings of the Frontiers of Software Maintenance, 2008. pp. 129-138.","journal-title":"Proceedings of the Frontiers of Software Maintenance"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Mens T. and Demeyer S. 2008. Software evolution. Springer. Mens T. and Demeyer S. 2008. Software evolution. Springer.","DOI":"10.1007\/978-3-540-76440-3"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.869374"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1204375"},{"key":"e_1_3_2_1_8_1","volume-title":"NJ: Prentice Hall.","author":"Schwaber K.","year":"2002","unstructured":"Schwaber , K. and Beedle , M . 2002 . Agile Software Development with Scrum. Upper Saddle River , NJ: Prentice Hall. Schwaber, K. and Beedle, M. 2002. Agile Software Development with Scrum. Upper Saddle River, NJ: Prentice Hall."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.854065"},{"key":"e_1_3_2_1_10_1","volume-title":"Extreme Programming Explained","author":"Beck K.","unstructured":"Beck , K. 2000. Extreme Programming Explained . Reading, MA : Addison Wesley . Beck, K. 2000. Extreme Programming Explained. Reading, MA: Addison Wesley."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.67"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/358234.358254"},{"key":"e_1_3_2_1_13_1","volume-title":"The success of open source","author":"Weber S.","unstructured":"Weber , S. 2004. The success of open source . Cambridge University Press . Weber, S. 2004. The success of open source. Cambridge University Press."},{"key":"e_1_3_2_1_14_1","unstructured":"Feller J. and Fitzgerald B. 2002. Understanding open source software development: Addison-Wesley London. Feller J. and Fitzgerald B. 2002. Understanding open source software development: Addison-Wesley London."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134352"},{"key":"e_1_3_2_1_16_1","first-page":"381","volume-title":"Communities and Quality","author":"Lindman J.","unstructured":"Lindman , J. , Rossi , M. , and Marttiin , P . 2008. Applying open source development practices inside a company. In Open Source Development , Communities and Quality , Springer , pp. 381 - 387 . Lindman, J., Rossi, M., and Marttiin, P. 2008. Applying open source development practices inside a company. In Open Source Development, Communities and Quality, Springer, pp. 381-387."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Humphrey W. S. 1999. Introduction to the team software process Addison-Wesley Professional. Humphrey W. S. 1999. Introduction to the team software process Addison-Wesley Professional.","DOI":"10.21236\/ADA386941"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/255656.255698"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/Agile.2012.13"},{"key":"e_1_3_2_1_20_1","volume-title":"Chaos Manifesto","year":"2013","unstructured":"2013. Chaos Manifesto 2013 . Available at: http:\/\/versionone.com\/assets\/img\/files\/ChaosManifesto2013. pdf, accessed on 2013. Chaos Manifesto 2013. Available at: http:\/\/versionone.com\/assets\/img\/files\/ChaosManifesto2013. pdf, accessed on"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1060.0553"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jebo.2010.12.003"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/AGILE.2011.24"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978802.1978803"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2011.12.003"},{"key":"e_1_3_2_1_26_1","unstructured":"2009. Survey Finds Majority of Senior Software Business Leaders See Rise in Development Budgets. Available at: http:\/\/www.softserveinc.com\/news\/survey-senior-softwarebusiness-leaders-rise-development-budgets\/ accessed on 3\/12\/2014 2009. Survey Finds Majority of Senior Software Business Leaders See Rise in Development Budgets. Available at: http:\/\/www.softserveinc.com\/news\/survey-senior-softwarebusiness-leaders-rise-development-budgets\/ accessed on 3\/12\/2014"},{"key":"e_1_3_2_1_27_1","unstructured":"Hu E. 2013. This Slide Shows Why HealthCare.gov Wouldn't Work At Launch. Available at: http:\/\/www.npr.org\/blogs\/alltechconsidered\/2013\/11\/19\/2461 32770\/this-slide-shows-why-healthcare-gov-wouldnt-workat-launch accessed on 3\/12\/2014 Hu E. 2013. This Slide Shows Why HealthCare.gov Wouldn't Work At Launch. Available at: http:\/\/www.npr.org\/blogs\/alltechconsidered\/2013\/11\/19\/2461 32770\/this-slide-shows-why-healthcare-gov-wouldnt-workat-launch accessed on 3\/12\/2014"},{"key":"e_1_3_2_1_28_1","first-page":"1","article-title":"Computer glitch: Patching up software occupies programmers and disables systems","volume":"118","author":"Carroll P. B.","year":"1988","unstructured":"Carroll , P. B. 1988 . Computer glitch: Patching up software occupies programmers and disables systems . Wall Street Journal , vol. 118 , p. 1 . Carroll, P. B. 1988.Computer glitch: Patching up software occupies programmers and disables systems. Wall Street Journal, vol. 118, p. 1.","journal-title":"Wall Street Journal"},{"key":"e_1_3_2_1_29_1","volume-title":"Test driven development: By example","author":"Beck K.","unstructured":"Beck , K. 2003. Test driven development: By example . Addison-Wesley Professional . Beck, K. 2003. Test driven development: By example. Addison-Wesley Professional."},{"key":"e_1_3_2_1_30_1","volume-title":"Working Effectively with Legacy Code","author":"Feathers M.","unstructured":"Feathers , M. 2005. Working Effectively with Legacy Code . Upper Saddle River, NJ : Prentice Hall PTR. Feathers, M. 2005. Working Effectively with Legacy Code. Upper Saddle River, NJ: Prentice Hall PTR."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2004.17"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/AGILE.2007.58"},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the IEEE International Conference on Software Engineering (ICSE), Future of Software Engineering.","author":"Nuseibeh B.","year":"2014","unstructured":"Nuseibeh , B. 2014 . Requirements Engineering Travelogue . In Proceedings of the IEEE International Conference on Software Engineering (ICSE), Future of Software Engineering. Nuseibeh, B. 2014. Requirements Engineering Travelogue. In Proceedings of the IEEE International Conference on Software Engineering (ICSE), Future of Software Engineering."},{"key":"e_1_3_2_1_34_1","volume-title":"Refactoring: Improving the Design of Existing Code.","author":"Fowler M.","year":"1999","unstructured":"Fowler , M. 1999 . Refactoring: Improving the Design of Existing Code. Reading, MA : Addison Wesley . Fowler, M. 1999. Refactoring: Improving the Design of Existing Code. Reading, MA: Addison Wesley."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.1265817"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593882.2593885"},{"key":"e_1_3_2_1_37_1","unstructured":"Duvall P. M. Matyas S. and Glover A. 2007. Continuous integration: improving software quality and reducing risk: Pearson Education. Duvall P. M. Matyas S. and Glover A. 2007. Continuous integration: improving software quality and reducing risk: Pearson Education."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Frege G. 1964. The basic laws of arithmetic University of California Press. Frege G. 1964. The basic laws of arithmetic University of California Press.","DOI":"10.1525\/9780520312364"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"De Saussure F. 2006. Writings in general linguistics Oxford University Press. De Saussure F. 2006. Writings in general linguistics Oxford University Press.","DOI":"10.1093\/oso\/9780199261444.001.0001"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2012.09.013"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2009.5090022"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(02)00052-3"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.567"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2007.22"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0219649212500189"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1475"},{"key":"e_1_3_2_1_47_1","unstructured":"Petrenko M. 2011. JRipples. Available at: http:\/\/jripples.sourceforge.net\/ Petrenko M. 2011. JRipples. Available at: http:\/\/jripples.sourceforge.net\/"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-006-9006-4"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.877875"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1041053"},{"key":"e_1_3_2_1_51_1","first-page":"125","volume-title":"Proceedings of the International Conference on Software Engineering (ICSE)","author":"Marcus A.","unstructured":"Marcus , A. and Maletic , J. I . 2003. Recovering Documentation-to-Source-Code Traceability Links using Latent Semantic Indexing .In Proceedings of the International Conference on Software Engineering (ICSE) , Portland, Oregon, USA , pp. 125 - 135 . Marcus, A. and Maletic, J. I. 2003. Recovering Documentation-to-Source-Code Traceability Links using Latent Semantic Indexing.In Proceedings of the International Conference on Software Engineering (ICSE), Portland, Oregon, USA, pp. 125-135."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2008.14"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2008.123"},{"key":"e_1_3_2_1_55_1","first-page":"7","volume-title":"Empirical Methods and Studies in Software Engineering","author":"Wohlin C.","unstructured":"Wohlin , C. , H\u00f6st , M. , and Henningsson , K . 2003. Empirical research methods in software engineering . in Empirical Methods and Studies in Software Engineering , Springer , pp. 7 - 23 . Wohlin, C., H\u00f6st, M., and Henningsson, K. 2003. Empirical research methods in software engineering. in Empirical Methods and Studies in Software Engineering, Springer, pp. 7-23."},{"key":"e_1_3_2_1_56_1","first-page":"200","volume-title":"Locating User Functionality in Old Code. In Proceedings of the IEEE Conference on Software Maintenance (CSM)","author":"Wilde N.","unstructured":"Wilde , N. , Gust , T. , Gomez , J. A. , and Strasburg , D . 1992 . Locating User Functionality in Old Code. In Proceedings of the IEEE Conference on Software Maintenance (CSM) , pp. 200 - 205 . Wilde, N., Gust, T., Gomez, J. A., and Strasburg, D. 1992. Locating User Functionality in Old Code. In Proceedings of the IEEE Conference on Software Maintenance (CSM), pp. 200-205."},{"key":"e_1_3_2_1_57_1","first-page":"241","volume-title":"Case Study of Feature Location Using Dependency Graph. In Proceedings of the IEEE International Workshop on Program Comprehension (IWPC)","author":"Chen K.","unstructured":"Chen , K. and Rajlich , V . 2000 . Case Study of Feature Location Using Dependency Graph. In Proceedings of the IEEE International Workshop on Program Comprehension (IWPC) , pp. 241 - 249 . Chen, K. and Rajlich, V. 2000. Case Study of Feature Location Using Dependency Graph. In Proceedings of the IEEE International Workshop on Program Comprehension (IWPC), pp. 241-249."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9102-8"},{"key":"e_1_3_2_1_59_1","first-page":"137","volume-title":"Proceedings of the IEEE International Conference on Software Maintenance (ICSM)","author":"J\u00e1sz J.","unstructured":"J\u00e1sz , J. , Besz\u00e9des , \u00c1., Gyim\u00f3thy , T. , and Rajlich , V . 2008. Static execute after\/before as a replacement of traditional software dependencies . In Proceedings of the IEEE International Conference on Software Maintenance (ICSM) , pp. 137 - 146 . J\u00e1sz, J., Besz\u00e9des, \u00c1., Gyim\u00f3thy, T., and Rajlich, V. 2008. Static execute after\/before as a replacement of traditional software dependencies. In Proceedings of the IEEE International Conference on Software Maintenance (ICSM), pp. 137-146."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.344"},{"key":"e_1_3_2_1_61_1","first-page":"353","volume-title":"Proceedings of the International Workshop on Mining Software Repositories (MSR)","author":"Demeyer S.","unstructured":"Demeyer , S. , Murgia , A. , Wyckmans , K. , and Lamkanfi , A . 2013. Happy birthday! a trend analysis on past MSR papers . In Proceedings of the International Workshop on Mining Software Repositories (MSR) , pp. 353 - 362 . Demeyer, S., Murgia, A., Wyckmans, K., and Lamkanfi, A. 2013. Happy birthday! a trend analysis on past MSR papers. In Proceedings of the International Workshop on Mining Software Repositories (MSR), pp. 353-362."},{"key":"e_1_3_2_1_62_1","first-page":"10","volume-title":"Variable Granularity for Improving Precision of Impact Analysis. In Proceedings of the IEEE International Conference on Program Comprehension (ICPC)","author":"Petrenko M.","unstructured":"Petrenko , M. and Rajlich , V . 2009 . Variable Granularity for Improving Precision of Impact Analysis. In Proceedings of the IEEE International Conference on Program Comprehension (ICPC) , pp. 10 - 19 . Petrenko, M. and Rajlich, V. 2009. Variable Granularity for Improving Precision of Impact Analysis. In Proceedings of the IEEE International Conference on Program Comprehension (ICPC), pp. 10-19."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/METRICS.2005.28"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.5555\/518900.795271"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.1016"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1027796"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.7"},{"key":"e_1_3_2_1_68_1","volume-title":"The logic of scientific discovery. London and","author":"Popper K. R.","unstructured":"Popper , K. R. 2002. The logic of scientific discovery. London and New York : Routledge . Popper, K. R. 2002. The logic of scientific discovery. London and New York: Routledge."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1987.1663532"},{"key":"e_1_3_2_1_70_1","unstructured":"Sneed H. M. 1989.Software engineering management: Halsted Press. Sneed H. M. 1989.Software engineering management: Halsted Press."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1016\/0165-6074(91)90409-M"},{"key":"e_1_3_2_1_72_1","first-page":"1525","volume-title":"2nd SEMAT workshop on a general theory of software engineering. In Proceedings of the International Conference on Software Engineering (ICSE)","author":"Johnson P.","unstructured":"Johnson , P. , Jacobson , I. , Goedicke , M. , and Kajko-Mattsson , M . 2013 . 2nd SEMAT workshop on a general theory of software engineering. In Proceedings of the International Conference on Software Engineering (ICSE) , pp. 1525 - 1526 . Johnson, P., Jacobson, I., Goedicke, M., and Kajko-Mattsson, M. 2013. 2nd SEMAT workshop on a general theory of software engineering. In Proceedings of the International Conference on Software Engineering (ICSE), pp. 1525-1526."},{"key":"e_1_3_2_1_73_1","first-page":"5","volume-title":"Uncovering Theories in Software Engineering. In Proceedings of the General Theories of Software Engineering (GTSE","author":"Stol K. J.","year":"2013","unstructured":"Stol , K. J. and Fitzgerald , B . 2013 . Uncovering Theories in Software Engineering. In Proceedings of the General Theories of Software Engineering (GTSE 2013 ), pp. 5 - 14 . Stol, K. J. and Fitzgerald, B. 2013. Uncovering Theories in Software Engineering. In Proceedings of the General Theories of Software Engineering (GTSE 2013), pp. 5 - 14."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629175.1629192"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486940"},{"key":"e_1_3_2_1_76_1","volume-title":"Software Engineering: The Current Practice","author":"Rajlich V.","year":"2013","unstructured":"Rajlich , V. 2013 . Software Engineering: The Current Practice \u201d, Lab manual. Available at: http:\/\/www.cs.wayne.edu\/rajlich\/ProjectAndLabs\/index.html, accessed on 3\/12\/2014 Rajlich, V. 2013. Software Engineering: The Current Practice\u201d, Lab manual. Available at: http:\/\/www.cs.wayne.edu\/rajlich\/ProjectAndLabs\/index.html, accessed on 3\/12\/2014"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/336512.336592"},{"key":"e_1_3_2_1_78_1","unstructured":"2008. \"ISO\/IEC\/IEEE Standard for Systems and Software Engineering - Software Life Cycle Processes\". Available at: http:\/\/ieeexplore.ieee.org\/xpl\/mostRecentIssue.jsp?punumber =4475822 accessed on 1\/06. 2008. \"ISO\/IEC\/IEEE Standard for Systems and Software Engineering - Software Life Cycle Processes\". Available at: http:\/\/ieeexplore.ieee.org\/xpl\/mostRecentIssue.jsp?punumber =4475822 accessed on 1\/06."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICGSE.2008.18"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.v17:3"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.541"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.467"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159961"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/1961258.1961291"},{"key":"e_1_3_2_1_85_1","volume-title":"Practical software maintenance: best practices for managing your software investment","author":"Pigoski T. M.","unstructured":"Pigoski , T. M. 1996. Practical software maintenance: best practices for managing your software investment . John Wiley & Sons, Inc. Pigoski, T. M. 1996. Practical software maintenance: best practices for managing your software investment. John Wiley & Sons, Inc."},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.895984"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.5555\/257734.257788"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.947084"}],"event":{"name":"ICSE '14: 36th International Conference on Software Engineering","location":"Hyderabad India","acronym":"ICSE '14","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","TCSE IEEE Computer Society's Tech. Council on Software Engin."]},"container-title":["Future of Software Engineering Proceedings"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2593882.2593893","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2593882.2593893","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:03:54Z","timestamp":1750273434000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2593882.2593893"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,31]]},"references-count":87,"alternative-id":["10.1145\/2593882.2593893","10.1145\/2593882"],"URL":"https:\/\/doi.org\/10.1145\/2593882.2593893","relation":{},"subject":[],"published":{"date-parts":[[2014,5,31]]},"assertion":[{"value":"2014-05-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}