{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T02:00:38Z","timestamp":1768269638665,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,14]],"date-time":"2016-05-14T00:00:00Z","timestamp":1463184000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002848","name":"Comisi\u00f3n Nacional de Investigaci\u00f3n Cient\u00edfica y Tecnol\u00f3gica","doi-asserted-by":"publisher","award":["2015-21150841"],"award-info":[{"award-number":["2015-21150841"]}],"id":[{"id":"10.13039\/501100002848","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,14]]},"DOI":"10.1145\/2889160.2889267","type":"proceedings-article","created":{"date-parts":[[2016,5,16]],"date-time":"2016-05-16T12:27:23Z","timestamp":1463401643000},"page":"839-842","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Mining software process lines"],"prefix":"10.1145","author":[{"given":"Fabian Rojas","family":"Blum","sequence":"first","affiliation":[{"name":"Universidad de Chile, Santiago, Chile"}]}],"member":"320","published-online":{"date-parts":[[2016,5,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1002\/spip.v14:3"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1987875.1987920"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593770.2593773"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of REVASOFT'2014","author":"Blum F. R.","year":"2014","unstructured":"F. R. Blum , M. C. Bastarrica , and J. Simmonds . Software Process Line Discovery from (Noisy) Logs . In Proceedings of REVASOFT'2014 , 2014 . F. R. Blum, M. C. Bastarrica, and J. Simmonds. Software Process Line Discovery from (Noisy) Logs. In Proceedings of REVASOFT'2014, 2014."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785592.2785605"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40176-3_5"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13036-1_11"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2010.0020"},{"key":"e_1_3_2_1_9_1","volume-title":"Software Process Definition and Management. The Fraunhofer IESE Series on Software and Systems Engineering","author":"M\u00fcnch J.","year":"2012","unstructured":"J. M\u00fcnch , O. Armbrust , M. Kowalczyk , and M. Soto . Software Process Definition and Management. The Fraunhofer IESE Series on Software and Systems Engineering . Springer Berlin Heidelberg , Berlin, Heidelberg , 2012 . J. M\u00fcnch, O. Armbrust, M. Kowalczyk, and M. Soto. Software Process Definition and Management. The Fraunhofer IESE Series on Software and Systems Engineering. Springer Berlin Heidelberg, Berlin, Heidelberg, 2012."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.09.004"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781118181034"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2695664.2696046"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2745802.2745814"},{"key":"e_1_3_2_1_14_1","first-page":"267","volume-title":"Advanced Information Systems Engineering","author":"Weidlich M.","year":"2011","unstructured":"M. Weidlich , J. Mendling , and M. Weske . A foundational approach for managing process variability . In Advanced Information Systems Engineering , pages 267 -- 282 . Springer , 2011 . M. Weidlich, J. Mendling, and M. Weske. A foundational approach for managing process variability. In Advanced Information Systems Engineering, pages 267--282. Springer, 2011."},{"key":"e_1_3_2_1_15_1","volume-title":"Case study research: Design and methods","author":"Yin R. K.","year":"2013","unstructured":"R. K. Yin . Case study research: Design and methods . Sage publications, 2013 . R. K. Yin. Case study research: Design and methods. Sage publications, 2013."}],"event":{"name":"ICSE '16: 38th International Conference on Software Engineering","location":"Austin Texas","acronym":"ICSE '16","sponsor":["ACM Association for Computing Machinery","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS\\TCSE TC on Software Engineering","IEEE-CS\\DATC IEEE Computer Society"]},"container-title":["Proceedings of the 38th International Conference on Software Engineering Companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2889160.2889267","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2889160.2889267","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:39:12Z","timestamp":1750221552000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2889160.2889267"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,14]]},"references-count":15,"alternative-id":["10.1145\/2889160.2889267","10.1145\/2889160"],"URL":"https:\/\/doi.org\/10.1145\/2889160.2889267","relation":{},"subject":[],"published":{"date-parts":[[2016,5,14]]},"assertion":[{"value":"2016-05-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}