{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T09:06:35Z","timestamp":1775811995994,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,9,9]],"date-time":"2019-09-09T00:00:00Z","timestamp":1567987200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Science Foundation Ireland","award":["13\/RC\/2094"],"award-info":[{"award-number":["13\/RC\/2094"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,9,9]]},"DOI":"10.1145\/3344948.3344983","type":"proceedings-article","created":{"date-parts":[[2019,9,5]],"date-time":"2019-09-05T12:16:25Z","timestamp":1567685785000},"page":"205-208","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Source-code divergence diagnosis using constraints and cryptography"],"prefix":"10.1145","author":[{"given":"Farshad Ghassemi","family":"Toosi","sequence":"first","affiliation":[{"name":"University of Limerick, Limerick, Ireland"}]},{"given":"Jim","family":"Buckley","sequence":"additional","affiliation":[{"name":"University of Limerick, Limerick, Ireland"}]},{"given":"Ashish Rajendra","family":"Sai","sequence":"additional","affiliation":[{"name":"University of Limerick, Limerick, Ireland"}]}],"member":"320","published-online":{"date-parts":[[2019,9,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774117"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/2666719.2666740"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-9323-8_11"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30982-3_3"},{"key":"e_1_3_2_1_5_1","volume-title":"Object modeling with the OCL: the rationale behind the Object Constraint Language","author":"Clark T.","year":"2003","unstructured":"T. Clark and J. Warmer . Object modeling with the OCL: the rationale behind the Object Constraint Language , volume 2263 . Springer , 2003 . T. Clark and J. Warmer. Object modeling with the OCL: the rationale behind the Object Constraint Language, volume 2263. Springer, 2003."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2781227"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1007\/3-540-45669-4_8","volume-title":"Object Modeling with the OCL","author":"Flake S.","year":"2002","unstructured":"S. Flake and W. Mueller . An ocl extension for real-time constraints . In Object Modeling with the OCL , pages 150 -- 171 . Springer , 2002 . S. Flake and W. Mueller. An ocl extension for real-time constraints. In Object Modeling with the OCL, pages 150--171. Springer, 2002."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/2821327.2821329"},{"key":"e_1_3_2_1_9_1","unstructured":"JabRef Development Team. http:\/\/www.jabref.org\/ Accessed: 2019-05-27.  JabRef Development Team. http:\/\/www.jabref.org\/ Accessed: 2019-05-27."},{"key":"e_1_3_2_1_10_1","unstructured":"JavaParser Development Team. https:\/\/javaparser.org\/ Accessed: 2019-05-31.  JavaParser Development Team. https:\/\/javaparser.org\/ Accessed: 2019-05-31."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2012.35"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884868"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40411-015-0025-y"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3129790.3129810"},{"key":"e_1_3_2_1_15_1","first-page":"393","volume-title":"International Conference on Software Maintenance","author":"Tvedt R. T.","year":"2002","unstructured":"R. T. Tvedt , P. Costa , and M. Lindvall . Does the code match the design ? In International Conference on Software Maintenance , pages 393 -- 401 , Oct 2002 . R. T. Tvedt, P. Costa, and M. Lindvall. Does the code match the design? In International Conference on Software Maintenance, pages 393--401, Oct 2002."},{"key":"e_1_3_2_1_16_1","first-page":"555","volume-title":"TOOLS (34)","author":"Vaziri M.","year":"2000","unstructured":"M. Vaziri and D. Jackson . Some shortcomings of ocl, the object constraint language of uml . In TOOLS (34) , pages 555 -- 562 , 2000 . M. Vaziri and D. Jackson. Some shortcomings of ocl, the object constraint language of uml. In TOOLS (34), pages 555--562, 2000."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SYNASC.2008.10"}],"event":{"name":"ECSA: European Conference on Software Architecture","location":"Paris France","acronym":"ECSA"},"container-title":["Proceedings of the 13th European Conference on Software Architecture - Volume 2"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3344948.3344983","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3344948.3344983","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:28Z","timestamp":1750204468000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3344948.3344983"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,9]]},"references-count":17,"alternative-id":["10.1145\/3344948.3344983","10.1145\/3344948"],"URL":"https:\/\/doi.org\/10.1145\/3344948.3344983","relation":{},"subject":[],"published":{"date-parts":[[2019,9,9]]},"assertion":[{"value":"2019-09-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}