{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T18:46:55Z","timestamp":1774550815426,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,6,19]],"date-time":"2010-06-19T00:00:00Z","timestamp":1276905600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,6,19]]},"DOI":"10.1145\/1822018.1822045","type":"proceedings-article","created":{"date-parts":[[2010,6,25]],"date-time":"2010-06-25T17:43:45Z","timestamp":1277487825000},"page":"181-186","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["The GUISurfer tool"],"prefix":"10.1145","author":[{"given":"Jo\u00e3o Carlos","family":"Silva","sequence":"first","affiliation":[{"name":"Instituto Polit\u00e9cnico do C\u00e1vado e do Ave, Barcelos, Portugal"}]},{"given":"Carlos","family":"Silva","sequence":"additional","affiliation":[{"name":"Universidade do Minho, Braga, Portugal"}]},{"given":"Rui D.","family":"Gon\u00e7alo","sequence":"additional","affiliation":[{"name":"Universidade do Minho, Braga, Portugal"}]},{"given":"Jo\u00e3o","family":"Saraiva","sequence":"additional","affiliation":[{"name":"Universidade do Minho, Braga, Portugal"}]},{"given":"Jos\u00e9 Creissac","family":"Campos","sequence":"additional","affiliation":[{"name":"Universidade do Minho, Braga, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2010,6,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/351240.351266"},{"key":"e_1_3_2_1_2_1","volume-title":"Addison-Wesley","author":"Fowler M.","year":"2003"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1017\/CBO9780511814570.006","volume-title":"Research Methods in Human Computer Interaction","author":"Harrison M.D.","year":"2008"},{"key":"e_1_3_2_1_4_1","volume-title":"2nd Edition. O Reilly","author":"Loy M.","year":"2002"},{"key":"e_1_3_2_1_5_1","volume-title":"Institute of Technology","author":"Moore M.","year":"1996"},{"key":"e_1_3_2_1_6_1","volume-title":"Springer","author":"Patern\u00f2 F.","year":"1999"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Silva J.C. Campos J.C. and \n      \n      \n      Saraiva J\n      \n  \n  . \n  Combining Formal Methods and Functional Strategies Regarding the Reverse Engineering of Interactive Applications. In\n   vol. \n  4323\n   of \n  LNCS pp \n  137\n  --\n  150\n  . \n  Springer 2007\n  .   Silva J.C. Campos J.C. and Saraiva J. Combining Formal Methods and Functional Strategies Regarding the Reverse Engineering of Interactive Applications. In vol. 4323 of LNCS pp 137--150. Springer 2007.","DOI":"10.1007\/978-3-540-69554-7_11"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1529282.1529307"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-92698-6_30"},{"key":"e_1_3_2_1_10_1","volume-title":"Journal of Programming Languages","author":"Tip F.","year":"1995"},{"key":"e_1_3_2_1_11_1","unstructured":"Visser E. Program transformation with Stratego\/XT: Rules strategies tools and systems in StrategoXT-0.9. 2003.  Visser E. Program transformation with Stratego\/XT: Rules strategies tools and systems in StrategoXT-0.9. 2003."},{"key":"e_1_3_2_1_12_1","volume-title":"8th Brazilian Symposium on Programming Languages","author":"Visser J.","year":"2004"}],"event":{"name":"EICS '10: ACM SIGCHI Symposium on Engineering Interactive Computing Systems","location":"Berlin Germany","acronym":"EICS '10","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2nd ACM SIGCHI symposium on Engineering interactive computing systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1822018.1822045","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1822018.1822045","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:20Z","timestamp":1750250480000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1822018.1822045"}},"subtitle":["towards a language independent approach to reverse engineering GUI code"],"short-title":[],"issued":{"date-parts":[[2010,6,19]]},"references-count":12,"alternative-id":["10.1145\/1822018.1822045","10.1145\/1822018"],"URL":"https:\/\/doi.org\/10.1145\/1822018.1822045","relation":{},"subject":[],"published":{"date-parts":[[2010,6,19]]},"assertion":[{"value":"2010-06-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}