{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:36Z","timestamp":1750220856537,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,28]],"date-time":"2019-10-28T00:00:00Z","timestamp":1572220800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,28]]},"DOI":"10.1145\/3364641.3364658","type":"proceedings-article","created":{"date-parts":[[2019,12,5]],"date-time":"2019-12-05T14:07:37Z","timestamp":1575554857000},"page":"149-157","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Using auxiliary artifacts during code inspection activity"],"prefix":"10.1145","author":[{"given":"Anderson","family":"Belgamo","sequence":"first","affiliation":[{"name":"Department of Computing - Federal Institute of S\u00e3o, Paulo Piracicaba-SP-Brazil"}]},{"given":"Auri Marcelo Rizzo","family":"Vincenzi","sequence":"additional","affiliation":[{"name":"Computing Department - Federal University of S\u00e3o, Carlos S\u00e3o Carlos-SP-Brazil"}]},{"given":"Fabiano Cutigi","family":"Ferrari","sequence":"additional","affiliation":[{"name":"Department of Computing - Federal University of S\u00e3o, Carlos S\u00e3o Carlos-SP-Brazil"}]},{"given":"Sandra","family":"Fabbri","sequence":"additional","affiliation":[{"name":"Computing Department - Federal University of S\u00e3o, Carlos S\u00e3o Carlos-SP-Brazil"}]}],"member":"320","published-online":{"date-parts":[[2019,10,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"de Almeida Camargo B. Basseto and S. Paz. 2003. Best practices in code inspection for safety-critical software. Software IEEE 20 (06 2003) 56- 63.  de Almeida Camargo B. Basseto and S. Paz. 2003. Best practices in code inspection for safety-critical software. Software IEEE 20 (06 2003) 56- 63.","DOI":"10.1109\/MS.2003.1196322"},{"volume-title":"On the Optimal Order of Reading Source Code Changes for Review. In 2017 IEEE International Conference on Software Maintenance and Evolution (ICSME). 329--340","author":"Baum T.","key":"e_1_3_2_1_2_1","unstructured":"T. Baum , K. Schneider , and A. Bacchelli . 2017 . On the Optimal Order of Reading Source Code Changes for Review. In 2017 IEEE International Conference on Software Maintenance and Evolution (ICSME). 329--340 . T. Baum, K. Schneider, and A. Bacchelli. 2017. On the Optimal Order of Reading Source Code Changes for Review. In 2017 IEEE International Conference on Software Maintenance and Evolution (ICSME). 329--340."},{"volume-title":"Proceedings of ISSRE '96: 7th International Symposium on Software Reliability Engineering. 24--33","author":"Belli F.","key":"e_1_3_2_1_3_1","unstructured":"F. Belli and R. Crisan . 1996. Towards automation of checklist-based code-reviews . In Proceedings of ISSRE '96: 7th International Symposium on Software Reliability Engineering. 24--33 F. Belli and R. Crisan. 1996. Towards automation of checklist-based code-reviews. In Proceedings of ISSRE '96: 7th International Symposium on Software Reliability Engineering. 24--33"},{"volume-title":"Proceedings The Eighth International Symposium on Software Reliability Engineering. 245--255","author":"Belli F.","key":"e_1_3_2_1_4_1","unstructured":"F. Belli and R. Crisan . 1997. Empirical performance analysis of computer-supported code-reviews . In Proceedings The Eighth International Symposium on Software Reliability Engineering. 245--255 . F. Belli and R. Crisan. 1997. Empirical performance analysis of computer-supported code-reviews. In Proceedings The Eighth International Symposium on Software Reliability Engineering. 245--255."},{"volume-title":"2011 IEEE 13th International Symposium on High-Assurance Systems Engineering. 182--187","author":"Bernhart M.","key":"e_1_3_2_1_5_1","unstructured":"M. Bernhart , S. Reiterer , K. Matt , A. Mauczka , and T. Grechenig . 2011. A Task-Based Code Review Process and Tool to Comply with the DO-278\/ED-109 Standard for Air Traffic Managment Software Development: An Industrial Case Study . In 2011 IEEE 13th International Symposium on High-Assurance Systems Engineering. 182--187 . M. Bernhart, S. Reiterer, K. Matt, A. Mauczka, and T. Grechenig. 2011. A Task-Based Code Review Process and Tool to Comply with the DO-278\/ED-109 Standard for Air Traffic Managment Software Development: An Industrial Case Study. In 2011 IEEE 13th International Symposium on High-Assurance Systems Engineering. 182--187."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2012.61"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2005.19"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9373-9"},{"key":"e_1_3_2_1_9_1","volume-title":"Investigating Effective Inspection of Object-oriented Code. (10","author":"Dunsmore Alastair","year":"2002","unstructured":"Alastair Dunsmore . 2002. Investigating Effective Inspection of Object-oriented Code. (10 2002 ). Alastair Dunsmore. 2002. Investigating Effective Inspection of Object-oriented Code. (10 2002)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/337180.337343"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2003.1207450"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.153.0182"},{"volume-title":"Automating Techniques for Inspecting High Assurance Systems. In The 6th IEEE International Symposium on High-Assurance Systems Engineering: Special Topic: Impact of Networking (HASE '01)","author":"Fisher M. S.","key":"e_1_3_2_1_13_1","unstructured":"M. S. Fisher and B. Cukic . 2001 . Automating Techniques for Inspecting High Assurance Systems. In The 6th IEEE International Symposium on High-Assurance Systems Engineering: Special Topic: Impact of Networking (HASE '01) . IEEE Computer Society, Washington, DC, USA, 0117--. M. S. Fisher and B. Cukic. 2001. Automating Techniques for Inspecting High Assurance Systems. In The 6th IEEE International Symposium on High-Assurance Systems Engineering: Special Topic: Impact of Networking (HASE '01). IEEE Computer Society, Washington, DC, USA, 0117--."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2008.100"},{"volume-title":"2011 Proceedings of the Ninth ACM International Conference on Embedded Software (EMSOFT). 205--210","author":"Havelund K.","key":"e_1_3_2_1_15_1","unstructured":"K. Havelund and G. J. Holzmann . 2011. Software certification - coding, code, and coders . In 2011 Proceedings of the Ninth ACM International Conference on Embedded Software (EMSOFT). 205--210 . K. Havelund and G. J. Holzmann. 2011. Software certification - coding, code, and coders. In 2011 Proceedings of the Ninth ACM International Conference on Embedded Software (EMSOFT). 205--210."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(99)00137-5"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/VISUAL.1991.175815"},{"key":"e_1_3_2_1_18_1","unstructured":"Diane Kelly and Terry Shepard. 2002. Qualitative observations from software code inspection experiments. 5.  Diane Kelly and Terry Shepard. 2002. Qualitative observations from software code inspection experiments. 5."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.116"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:SQJO.0000024058.90885.6a"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.922713"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/781915.781956"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICGSE.2007.11"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2017.265100500"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2008.20"},{"key":"e_1_3_2_1_26_1","volume-title":"Significance of depth of inspection and inspection performance metrics for consistent defect management in software industry. IET Software 6 (December","author":"Gopalakrishnan Nair T.R.","year":"2012","unstructured":"T.R. Gopalakrishnan Nair . 2012. Significance of depth of inspection and inspection performance metrics for consistent defect management in software industry. IET Software 6 (December 2012 ), 524--535(11). Issue 6. T.R. Gopalakrishnan Nair. 2012. Significance of depth of inspection and inspection performance metrics for consistent defect management in software industry. IET Software 6 (December 2012), 524--535(11). Issue 6."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080814"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Masami Noro and Atsushi Sawada. 2015. Software Architecture and Specification Model for Customizable Code Inspection Tools. 230--237.  Masami Noro and Atsushi Sawada. 2015. Software Architecture and Specification Model for Customizable Code Inspection Tools. 230--237.","DOI":"10.1109\/APSEC.2015.44"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Jun-Suk Oh and Ho-Jin Choi. 2005. A reflective practice of automated and manual code reviews for a studio project. 37 -- 42.  Jun-Suk Oh and Ho-Jin Choi. 2005. A reflective practice of automated and manual code reviews for a studio project. 37 -- 42.","DOI":"10.1109\/ICIS.2005.17"},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the 21st International Conference on Software Engineering and Knowledge Engineering, SEKE 2009, 386--391","author":"Porto Daniel","year":"2009","unstructured":"Daniel Porto , Manoel Mendon\u00e7a , and Sandra Fabbri . 2009 . The Use of Reading Technique and Visualization for Program Understanding . Proceedings of the 21st International Conference on Software Engineering and Knowledge Engineering, SEKE 2009, 386--391 . Daniel Porto, Manoel Mendon\u00e7a, and Sandra Fabbri. 2009. The Use of Reading Technique and Visualization for Program Understanding. Proceedings of the 21st International Conference on Software Engineering and Knowledge Engineering, SEKE 2009, 386--391."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.101"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Guoping Rong He Zhang Qi Shan and Gaoxuan Liu. 2015. The Impacts of Supporting Materials on Code Reading: A Controlled Experiment. 88--95.  Guoping Rong He Zhang Qi Shan and Gaoxuan Liu. 2015. The Impacts of Supporting Materials on Code Reading: A Controlled Experiment. 88--95.","DOI":"10.1109\/APSEC.2015.39"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/951952.952363"},{"key":"e_1_3_2_1_34_1","volume-title":"IET 7 (04","author":"Scanniello Giuseppe","year":"2013","unstructured":"Giuseppe Scanniello , Fausto Fasano , Andrea Lucia , and Genoveffa Tortora . 2013. Does software error\/defect identification matter in the Italian industry? Software , IET 7 (04 2013 ), 76--84. Giuseppe Scanniello, Fausto Fasano, Andrea Lucia, and Genoveffa Tortora. 2013. Does software error\/defect identification matter in the Italian industry? Software, IET 7 (04 2013), 76--84."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.869376"},{"key":"e_1_3_2_1_36_1","volume-title":"An experimental comparison of usage-based and checklist-based reading. Software Engineering","author":"Thelin Thomas","year":"2003","unstructured":"Thomas Thelin , Per Runeson , and Claes Wohlin . 2003. An experimental comparison of usage-based and checklist-based reading. Software Engineering , IEEE Transactions on 29 (09 2003 ), 687-- 704. Thomas Thelin, Per Runeson, and Claes Wohlin. 2003. An experimental comparison of usage-based and checklist-based reading. Software Engineering, IEEE Transactions on 29 (09 2003), 687-- 704."},{"key":"e_1_3_2_1_37_1","unstructured":"Guilherme H. Travassos Forrest Shull Jeffrey Carver and Victor Basili. 2002. Reading Techniques for OO Design Inspections.  Guilherme H. Travassos Forrest Shull Jeffrey Carver and Victor Basili. 2002. Reading Techniques for OO Design Inspections."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.46"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/330775"}],"event":{"name":"SBQS'19: XVIII Brazilian Symposium on Software Quality","sponsor":["SBC Brazilian Computer Society"],"location":"Fortaleza Brazil","acronym":"SBQS'19"},"container-title":["Proceedings of the XVIII Brazilian Symposium on Software Quality"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3364641.3364658","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3364641.3364658","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:24Z","timestamp":1750202604000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3364641.3364658"}},"subtitle":["findings from an exploratory study"],"short-title":[],"issued":{"date-parts":[[2019,10,28]]},"references-count":39,"alternative-id":["10.1145\/3364641.3364658","10.1145\/3364641"],"URL":"https:\/\/doi.org\/10.1145\/3364641.3364658","relation":{},"subject":[],"published":{"date-parts":[[2019,10,28]]},"assertion":[{"value":"2019-10-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}