{"status":"ok","message-type":"work-list","message-version":"1.0.0","message":{"facets":{},"total-results":63,"items":[{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T10:43:22Z","timestamp":1742381002183,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2007,5]]},"DOI":"10.1109\/icse.2007.56","type":"proceedings-article","created":{"date-parts":[[2007,6,7]],"date-time":"2007-06-07T21:12:04Z","timestamp":1181250724000},"page":"189-198","source":"Crossref","is-referenced-by-count":30,"title":["Modeling Product Line Architectures through Change Sets and Relationships"],"prefix":"10.1109","author":[{"given":"Scott A.","family":"Hendrickson","sequence":"first","affiliation":[]},{"given":"Andre","family":"van der Hoek","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"19","DOI":"10.1145\/302405.302410"},{"key":"35","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1145\/302405.302457","article-title":"n degrees of separation: multi-dimensional separation of concerns","author":"tarr","year":"1999","journal-title":"Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat No 99CB37002) ICSE"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1109\/32.464548"},{"key":"36","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/S0164-1212(99)00062-X","article-title":"A Conceptual Basis for Feature Engineering","volume":"49","author":"turner","year":"1999","journal-title":"Journal of Systems and Software"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1145\/239098.239104"},{"year":"0","journal-title":"AcmeStudio","key":"33"},{"key":"15","first-page":"37","article-title":"Variation Management for Software Production Lines","author":"krueger","year":"2002","journal-title":"1st Int Conference on Software Product Line Engineering"},{"doi-asserted-by":"publisher","key":"34","DOI":"10.1002\/spe.652"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1109\/CSMR.2004.1281428"},{"key":"13","doi-asserted-by":"crossref","DOI":"10.21236\/ADA235785","author":"kang","year":"1990","journal-title":"Feature-Oriented Domain Analysis (FODA) Feasibility Study"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1007\/BFb0053381"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1109\/ICSM.2003.1235443"},{"year":"0","journal-title":"ArchStudio An Architecture-based Development Environment","key":"12"},{"doi-asserted-by":"publisher","key":"21","DOI":"10.1109\/TSE.2002.1000449"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.1109\/32.825767"},{"key":"22","first-page":"667","author":"northrop","year":"2001","journal-title":"23rd International Conference on Software Engineering Reuse That Pays ICSE Keynote Presentation"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.1109\/2.825699"},{"key":"24","first-page":"255","article-title":"Building Product Populations with Software Components","author":"ommering","year":"2002","journal-title":"19th International Conference on Software Engineering"},{"key":"25","first-page":"729","article-title":"Multi-Dimensional Separation of Concerns for Java?","author":"ossher","year":"2001","journal-title":"19th International Conference on Software Engineering"},{"key":"26","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1145\/141874.141884","article-title":"Foundations for the Study of Software Architecture","volume":"17","author":"perry","year":"1992","journal-title":"ACM SIGSOFT Software Engineering Notes"},{"doi-asserted-by":"publisher","key":"27","DOI":"10.1007\/3-540-28901-1"},{"key":"28","first-page":"419","article-title":"Feature-Oriented Programming: A Fresh Look at Objects","author":"prehofer","year":"1997","journal-title":"Proceedings of European Conference of Object-Oriented Programming"},{"doi-asserted-by":"publisher","key":"29","DOI":"10.1016\/S0950-7051(98)00055-0"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1109\/32.585497"},{"key":"2","first-page":"225","article-title":"A Koala-Based Approach for Modelling and Deploying Configurable Software Product Families","author":"asikainen","year":"2003","journal-title":"Proceedings of the 5th International Workshop on Product Family Engineering"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1145\/1101815.1101817"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1145\/258077.258078"},{"doi-asserted-by":"publisher","key":"30","DOI":"10.1145\/1018210.1018213"},{"year":"2002","author":"clements","journal-title":"Software Product Lines Practices and Patterns","key":"7"},{"year":"2000","author":"bosch","journal-title":"Design and Use of Software Architectures Adopting and Evolving a Product-Line Approach","key":"6"},{"key":"32","first-page":"197","article-title":"COVAMOF: A Framework for Modeling Variability in Software Product Families","author":"sinnema","year":"2004","journal-title":"1st Int Conference on Software Product Line Engineering"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1016\/j.scico.2003.04.005"},{"doi-asserted-by":"publisher","key":"31","DOI":"10.1109\/32.385970"},{"key":"4","first-page":"7","article-title":"Feature Models, Grammars, and Prepositional Formulas","author":"batory","year":"2005","journal-title":"1st Int Conference on Software Product Line Engineering"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1145\/1061254.1061258"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1145\/280277.280280"}],"event":{"name":"29th International Conference on Software Engineering","start":{"date-parts":[[2007,5,20]]},"location":"Minneapolis, MN, USA","end":{"date-parts":[[2007,5,26]]}},"container-title":["29th International Conference on Software Engineering (ICSE'07)"],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4222553\/4222554\/04222581.pdf?arnumber=4222581","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T20:53:50Z","timestamp":1556484830000},"score":0.0,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4222581\/"}},"issued":{"date-parts":[[2007,5]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/icse.2007.56","ISSN":["0270-5257"],"issn-type":[{"type":"print","value":"0270-5257"}],"published":{"date-parts":[[2007,5]]}},{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T05:18:25Z","timestamp":1773379105250,"version":"3.50.1"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2007,5]]},"DOI":"10.1109\/icse.2007.87","type":"proceedings-article","created":{"date-parts":[[2007,6,7]],"date-time":"2007-06-07T17:12:04Z","timestamp":1181236324000},"page":"354-363","source":"Crossref","is-referenced-by-count":82,"title":["The Social Dynamics of Pair Programming"],"prefix":"10.1109","author":[{"given":"Jan","family":"Chong","sequence":"first","affiliation":[]},{"given":"Tom","family":"Hurlbutt","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","first-page":"41","article-title":"A study of human solutions in eXtreme programming","author":"gittins","year":"2001","journal-title":"Proc PPIG"},{"key":"15","first-page":"151","article-title":"An Empirical Study about the Feelgood Factor in Pair Programming","volume":"10","author":"padberg","year":"2004","journal-title":"METRICS"},{"key":"16","first-page":"73","article-title":"Sangam: A distributed pair programming plug-in for eclipse","author":"ho","year":"2005","journal-title":"Proc OOPSLA Workshop on Eclipse Technology eXchange"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/971300.971307"},{"key":"14","first-page":"43","article-title":"Investigating the Impact of Personality Types on Communication and Collaboration-Viability in Pair Programming","volume":"7","author":"sfetsos","year":"2006","journal-title":"XP\/Agile"},{"key":"11","first-page":"19","article-title":"Rating expertise in collaborative software development","author":"bryant","year":"2005","journal-title":"Proc PPIG"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/971300.971306"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/272287.272333"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062545"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/563340.563353"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2004.20"},{"key":"7","author":"beck","year":"2000","journal-title":"eXtreme Programming Explained"},{"key":"6","author":"williams","year":"2003","journal-title":"Pair Programming Illuminated"},{"key":"5","article-title":"The Collaborative Software Process","author":"williams","year":"2000","journal-title":"Computer Science vol"},{"key":"4","article-title":"Experimental evaluation of pair programming","author":"nawrocki","year":"2001","journal-title":"Proceedings of ESCOM"},{"key":"9","first-page":"5","article-title":"Factors affecting the perceived effectiveness of pair programming in higher education","author":"chaparro","year":"2005","journal-title":"Proc PPIG"},{"key":"8","year":"0"}],"event":{"name":"29th International Conference on Software Engineering","location":"Minneapolis, MN, USA","start":{"date-parts":[[2007,5,20]]},"end":{"date-parts":[[2007,5,26]]}},"container-title":["29th International Conference on Software Engineering (ICSE'07)"],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4222553\/4222554\/04222597.pdf?arnumber=4222597","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T19:15:54Z","timestamp":1489605354000},"score":0.0,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4222597\/"}},"issued":{"date-parts":[[2007,5]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icse.2007.87","ISSN":["0270-5257"],"issn-type":[{"value":"0270-5257","type":"print"}],"published":{"date-parts":[[2007,5]]}},{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:09:52Z","timestamp":1763467792271,"version":"build-2065373602"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2007,5]]},"DOI":"10.1109\/icse.2007.14","type":"proceedings-article","created":{"date-parts":[[2007,6,7]],"date-time":"2007-06-07T21:12:04Z","timestamp":1181250724000},"page":"511-518","source":"Crossref","is-referenced-by-count":24,"title":["An Empirical Study of the Evolution of an Agile-Developed Software System"],"prefix":"10.1109","author":[{"given":"A.","family":"Capiluppi","sequence":"first","affiliation":[]},{"given":"J.","family":"Fernandez-Ramil","sequence":"additional","affiliation":[]},{"given":"J.","family":"Higman","sequence":"additional","affiliation":[]},{"given":"H.C.","family":"Sharp","sequence":"additional","affiliation":[]},{"given":"N.","family":"Smith","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Software Engineering Economies","year":"1981","author":"boehm","key":"19"},{"journal-title":"Agile Software Development","year":"2001","author":"cockburn","key":"17"},{"year":"0","key":"18"},{"journal-title":"Project Retrospectives A Handbook for Team Reviews","year":"2001","author":"kerth","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1023\/B:EMSE.0000039884.79385.54"},{"year":"0","key":"13"},{"year":"0","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2004.1357828"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2004.1357864"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2005.30"},{"year":"0","key":"20"},{"article-title":"Agent-based simulation of open source evolution', Journal of Software Process - Improvement and Practice, ProSim 2005 Special Issue","year":"2006","author":"smith","key":"22"},{"year":"0","key":"23"},{"key":"24","doi-asserted-by":"crossref","DOI":"10.1515\/9783110866087","author":"zuse","year":"1991","journal-title":"Software Complexity Measures and Methods"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/76380.76382"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2006.31"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2003.1207450"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2004.1317503"},{"journal-title":"The Agile Manifesto","year":"0","key":"2"},{"journal-title":"Refactoring Improving the Design of Existing Code","year":"1999","author":"fowler","key":"10"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1204376"},{"journal-title":"Software evolution and feedback - theory and practice","year":"2006","key":"7"},{"year":"0","key":"6"},{"journal-title":"Software evolution - processes of software change","year":"1985","key":"5"},{"journal-title":"Software Engineering Theory and Practice","year":"2001","author":"pfieeger","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1994.296790"},{"year":"0","key":"8"}],"event":{"name":"29th International Conference on Software Engineering","start":{"date-parts":[[2007,5,20]]},"location":"Minneapolis, MN, USA","end":{"date-parts":[[2007,5,26]]}},"container-title":["29th International Conference on Software Engineering (ICSE'07)"],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4222553\/4222554\/04222612.pdf?arnumber=4222612","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,14]],"date-time":"2021-08-14T19:08:03Z","timestamp":1628968083000},"score":0.0,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4222612\/"}},"issued":{"date-parts":[[2007,5]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/icse.2007.14","ISSN":["0270-5257"],"issn-type":[{"type":"print","value":"0270-5257"}],"published":{"date-parts":[[2007,5]]}},{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T05:52:09Z","timestamp":1747806729749},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2007,5]]},"DOI":"10.1109\/icse.2007.35","type":"proceedings-article","created":{"date-parts":[[2007,6,7]],"date-time":"2007-06-07T21:12:04Z","timestamp":1181250724000},"page":"230-239","source":"Crossref","is-referenced-by-count":44,"title":["Exception-Chain Analysis: Revealing Exception Handling Architecture in Java Server Applications"],"prefix":"10.1109","author":[{"given":"Chen","family":"Fu","sequence":"first","affiliation":[]},{"given":"Barbara G.","family":"Ryder","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1109\/WIAPP.2003.1210298","article-title":"automatic failure-path inference: a generic introspection technique for internet applications","author":"candea","year":"2003","journal-title":"WIAPP '03 Proceedings of the The Third IEEE Workshop on Internet Applications"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/236337.236371"},{"journal-title":"Soot A Java Optimization Framework","year":"2003","author":"sable","key":"10"},{"journal-title":"Principles Techniques and Tools","year":"1988","key":"1"},{"key":"7","article-title":"Analyzing exception usage in large java applications","author":"reimer","year":"2003","journal-title":"EHOOS'03 ECOOP2003 - Workshop on Exception Handling in Object Oriented Systems"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(03)00057-8"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.51"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49538-X_5"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/504282.504286"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/941566.941569"},{"key":"11","article-title":"Best practices in EJB exception handling","author":"shenoy","year":"2002","journal-title":"IBM developerWorks Artical"},{"article-title":"Automated support for development, maintenance, and testing in the presence of implicit control flow","year":"2003","author":"sinha","key":"12"}],"event":{"name":"29th International Conference on Software Engineering","start":{"date-parts":[[2007,5,20]]},"location":"Minneapolis, MN, USA","end":{"date-parts":[[2007,5,26]]}},"container-title":["29th International Conference on Software Engineering (ICSE'07)"],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4222553\/4222554\/04222585.pdf?arnumber=4222585","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T18:30:27Z","timestamp":1497724227000},"score":0.0,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4222585\/"}},"issued":{"date-parts":[[2007,5]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icse.2007.35","ISSN":["0270-5257"],"issn-type":[{"type":"print","value":"0270-5257"}],"published":{"date-parts":[[2007,5]]}},{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T02:31:37Z","timestamp":1725762697766},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2007,5]]},"DOI":"10.1109\/icse.2007.93","type":"proceedings-article","created":{"date-parts":[[2007,6,7]],"date-time":"2007-06-07T21:12:04Z","timestamp":1181250724000},"page":"673-676","source":"Crossref","is-referenced-by-count":8,"title":["Using Experiments in Software Engineering as an Auxiliary Tool for Teaching--A Qualitative Evaluation from the Perspective of Students' Learning Process"],"prefix":"10.1109","author":[{"given":"Miroslaw","family":"Staron","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/11663430_33"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/METRIC.2003.1232471"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-4625-2"},{"year":"0","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/SEEP.1996.534004"},{"key":"5","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1109\/CSEE.2002.995209","article-title":"Introducing Empirical Software Engineering Methods in Education","author":"host","year":"2002","journal-title":"In the Proceedings of Software Engineering Education and Training 2002 (CSEE&T 2002) Proceedings 15th Conference on"},{"key":"4","first-page":"629","article-title":"Process Issues in Course Projects","author":"filho","year":"2005","journal-title":"Proceedings of the 16th International Conference on Software Engineering"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1083292.1083308"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2004.1311043"}],"event":{"name":"29th International Conference on Software Engineering","start":{"date-parts":[[2007,5,20]]},"location":"Minneapolis, MN, USA","end":{"date-parts":[[2007,5,26]]}},"container-title":["29th International Conference on Software Engineering (ICSE'07)"],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4222553\/4222554\/04222628.pdf?arnumber=4222628","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T18:30:27Z","timestamp":1497724227000},"score":0.0,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4222628\/"}},"issued":{"date-parts":[[2007,5]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/icse.2007.93","ISSN":["0270-5257"],"issn-type":[{"type":"print","value":"0270-5257"}],"published":{"date-parts":[[2007,5]]}},{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T15:22:34Z","timestamp":1773760954804,"version":"3.50.1"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2007,5]]},"DOI":"10.1109\/icse.2007.33","type":"proceedings-article","created":{"date-parts":[[2007,6,7]],"date-time":"2007-06-07T17:12:04Z","timestamp":1181236324000},"page":"168-177","source":"Crossref","is-referenced-by-count":17,"title":["Do Maintainers Utilize Deployed Design Patterns Effectively?"],"prefix":"10.1109","author":[{"given":"T.H.","family":"Ng","sequence":"first","affiliation":[]},{"given":"S.C.","family":"Cheung","sequence":"additional","affiliation":[]},{"given":"W.K.","family":"Chan","sequence":"additional","affiliation":[]},{"given":"Y.T.","family":"Yu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1023\/B:EMSE.0000027778.69251.1f"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.101"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.99"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1010061"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/32.988711"},{"key":"3","doi-asserted-by":"crossref","first-page":"673","DOI":"10.1016\/0950-5849(96)01116-0","article-title":"Software Evolution: Past, Present and Future","volume":"39","author":"bennett","year":"1996","journal-title":"Information and Software Technology"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1996.493406"},{"key":"1","author":"bass","year":"1997","journal-title":"Software Architecture in Practice"},{"key":"10","year":"0"},{"key":"7","year":"0","journal-title":"JUnit"},{"key":"6","year":"0","journal-title":"The JHotDraw"},{"key":"5","author":"gamma","year":"1995","journal-title":"Design Patterns Elements of Reusable Object-Oriented Software"},{"key":"4","year":"0","journal-title":"Eclipse"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/359511.359522"},{"key":"8","author":"lehman","year":"1985","journal-title":"Program Evolution -Processes of Software Change"}],"event":{"name":"29th International Conference on Software Engineering","location":"Minneapolis, MN, USA","start":{"date-parts":[[2007,5,20]]},"end":{"date-parts":[[2007,5,26]]}},"container-title":["29th International Conference on Software Engineering (ICSE'07)"],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4222553\/4222554\/04222579.pdf?arnumber=4222579","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T14:30:26Z","timestamp":1497709826000},"score":0.0,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4222579\/"}},"issued":{"date-parts":[[2007,5]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icse.2007.33","ISSN":["0270-5257"],"issn-type":[{"value":"0270-5257","type":"print"}],"published":{"date-parts":[[2007,5]]}},{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T01:31:52Z","timestamp":1773192712896,"version":"3.50.1"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2007,5]]},"DOI":"10.1109\/icse.2007.71","type":"proceedings-article","created":{"date-parts":[[2007,6,7]],"date-time":"2007-06-07T21:12:04Z","timestamp":1181250724000},"page":"427-436","source":"Crossref","is-referenced-by-count":72,"title":["Refactoring-Aware Configuration Management for Object-Oriented Programs"],"prefix":"10.1109","author":[{"given":"Danny","family":"Dig","sequence":"first","affiliation":[]},{"given":"Kashif","family":"Manzoor","sequence":"additional","affiliation":[]},{"given":"Ralph","family":"Johnson","sequence":"additional","affiliation":[]},{"given":"Tien N.","family":"Nguyen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"298","article-title":"Configuration management with logical structures","author":"lin","year":"1996","journal-title":"ICS '96"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/359581.359603"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/72910.73348"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1145\/131736.131756"},{"key":"15","author":"fowler","year":"0","journal-title":"Refactoring Improving the Design of Existing Code"},{"key":"34","year":"0","journal-title":"CM Yellow"},{"key":"16","year":"0"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/263407.263533"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2004.02.048"},{"key":"11","article-title":"Refactoring-aware Configuration Management System for Object-Oriented Programs","author":"dig","year":"2006"},{"key":"12","year":"0","journal-title":"What's new in Eclipse 3 2 (JDT) http \/\/ help"},{"key":"21","article-title":"Fine-grained revision control of Configurations in COOP\/Orm","author":"magnusson","year":"1996","journal-title":"SCM-6"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/142868.143753"},{"key":"22","author":"mens","year":"1999","journal-title":"A Formal Foundation for Object-Oriented Software Evolution"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1000449"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380151102"},{"key":"25","year":"0"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062504"},{"key":"27","first-page":"227","article-title":"Differences between versions of UML diagrams","author":"ohst","year":"2003","journal-title":"FSE'03"},{"key":"28","first-page":"236","article-title":"An efficient version model of software diagrams","author":"rho","year":"1998","journal-title":"APSEC'98"},{"key":"29","article-title":"A complete textual merging algorithm for software configuration management systems","author":"shen","year":"2004"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/197320.197403"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/168642.168668"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1218776.1218797"},{"key":"1","first-page":"231","article-title":"Identifying conflicts during structural merge","author":"asklund","year":"1994","journal-title":"Proc Nordic Workshop Programming Environment Research"},{"key":"30","year":"0"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/IWPSE.2005.30"},{"key":"6","first-page":"549","author":"cormen","year":"2001","journal-title":"Introduction to Algorithms"},{"key":"32","article-title":"How to merge program texts","volume":"27","author":"yang","year":"1994","journal-title":"The Journal of Systems and Software"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/280277.280280"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1145\/111062.111071"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/587051.587067"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1002\/smr.328"},{"key":"8","first-page":"404","article-title":"Automatic detection of refactorings in evolving components","author":"dig","year":"2006","journal-title":"ECOOP'06"}],"event":{"name":"29th International Conference on Software Engineering","location":"Minneapolis, MN, USA","start":{"date-parts":[[2007,5,20]]},"end":{"date-parts":[[2007,5,26]]}},"container-title":["29th International Conference on Software Engineering (ICSE'07)"],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4222553\/4222554\/04222604.pdf?arnumber=4222604","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T23:16:02Z","timestamp":1489619762000},"score":0.0,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4222604\/"}},"issued":{"date-parts":[[2007,5]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/icse.2007.71","ISSN":["0270-5257"],"issn-type":[{"value":"0270-5257","type":"print"}],"published":{"date-parts":[[2007,5]]}},{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T10:16:15Z","timestamp":1742379375775,"version":"3.28.0"},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2007,5]]},"DOI":"10.1109\/icse.2007.29","type":"proceedings-article","created":{"date-parts":[[2007,6,7]],"date-time":"2007-06-07T17:12:04Z","timestamp":1181236324000},"page":"775-779","source":"Crossref","is-referenced-by-count":15,"title":["Crisp--A Fault Localization Tool for Java Programs"],"prefix":"10.1109","author":[{"given":"Ophelia C.","family":"Chesley","sequence":"first","affiliation":[]},{"given":"Xiaoxia","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Barbara G.","family":"Ryder","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Tip","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/229000.226310"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2005.37"},{"year":"0","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/379605.379661"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1028976.1029012"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.90"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101948"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/32.988498"},{"key":"8","first-page":"121","article-title":"A survey of program slicing techniques","volume":"3","author":"tip","year":"1995","journal-title":"J Programming Languages"}],"event":{"name":"29th International Conference on Software Engineering","start":{"date-parts":[[2007,5,20]]},"location":"Minneapolis, MN, USA","end":{"date-parts":[[2007,5,26]]}},"container-title":["29th International Conference on Software Engineering (ICSE'07)"],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4222553\/4222554\/04222645.pdf?arnumber=4222645","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T17:46:38Z","timestamp":1489599998000},"score":0.0,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4222645\/"}},"issued":{"date-parts":[[2007,5]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/icse.2007.29","ISSN":["0270-5257"],"issn-type":[{"type":"print","value":"0270-5257"}],"published":{"date-parts":[[2007,5]]}},{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T08:13:09Z","timestamp":1760170389626,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2007,5]]},"DOI":"10.1109\/icse.2007.54","type":"proceedings-article","created":{"date-parts":[[2007,6,7]],"date-time":"2007-06-07T21:12:04Z","timestamp":1181250724000},"page":"458-467","source":"Crossref","is-referenced-by-count":25,"title":["Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis"],"prefix":"10.1109","author":[{"given":"Vinod","family":"Ganapathy","sequence":"first","affiliation":[]},{"given":"David","family":"King","sequence":"additional","affiliation":[]},{"given":"Trent","family":"Jaeger","sequence":"additional","affiliation":[]},{"given":"Somesh","family":"Jha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Aspect-oriented programming","author":"kiczales","year":"1997","journal-title":"ECOOP"},{"key":"17","article-title":"Case study: Enhancing IBM Websphere with SELinux","author":"hocking","year":"2006","journal-title":"Security Enhanced Linux Symposium"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/996943.996944"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.34"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8640.1995.tb00031.x"},{"key":"13","article-title":"Case study: Open source and commercial applications in a Java-based SELinux cross-domain solution","author":"fletcher","year":"2006","journal-title":"Security Enhanced Linux Symposium"},{"key":"14","article-title":"Automatic placement of authorization hooks in the Linux security modules framework. In ACM","author":"ganapathy","year":"2005","journal-title":"Conf Comp Sr Comm Security"},{"journal-title":"The Mined Reference Monitor Approach to Security Policy Enforcement","year":"2004","author":"erlingsson","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766716"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1997.610285"},{"article-title":"Securing the X Window system with SELinux","year":"2003","author":"kilpatrick","key":"20"},{"key":"22","article-title":"Integrating flexible support for security policies into the Linux operating system","author":"loscocco","year":"2001","journal-title":"USENIX Annual Technical Conf (FREENIX)"},{"key":"23","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45937-5_16","article-title":"CIL: Intermediate language and tools for analysis and transformation of C programs","author":"necula","year":"2002","journal-title":"Proc Conf Compiler Construction"},{"journal-title":"Techniques for Software Renovation","year":"1998","author":"siff","key":"24"},{"year":"0","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2004.13"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2004.15"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/302405.302629"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-009-7798-3_15"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/781131.781152"},{"journal-title":"PennMUSH multi-user dungeon","year":"0","key":"2"},{"key":"10","doi-asserted-by":"crossref","DOI":"10.3233\/JCS-1993-22-306","article-title":"A high assurance window system prototype","volume":"2","author":"epstein","year":"1993","journal-title":"Computers and Security Journal"},{"year":"0","key":"1"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/FITS.2003.1264934"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/32.55089"},{"year":"0","key":"6"},{"key":"32","article-title":"Using CQUAL for static analysis of authorization hook placement","author":"zhang","year":"2002","journal-title":"Usenix Security Symp"},{"year":"0","key":"5"},{"year":"0","key":"31"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.21236\/AD0772806","author":"anderson","year":"1972","journal-title":"Computer Security Technology Planning Study Volume II"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1183929"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2005.2"}],"event":{"name":"29th International Conference on Software Engineering","start":{"date-parts":[[2007,5,20]]},"location":"Minneapolis, MN, USA","end":{"date-parts":[[2007,5,26]]}},"container-title":["29th International Conference on Software Engineering (ICSE'07)"],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4222553\/4222554\/04222607.pdf?arnumber=4222607","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T20:54:02Z","timestamp":1556484842000},"score":0.0,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4222607\/"}},"issued":{"date-parts":[[2007,5]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/icse.2007.54","ISSN":["0270-5257"],"issn-type":[{"type":"print","value":"0270-5257"}],"published":{"date-parts":[[2007,5]]}},{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T03:12:36Z","timestamp":1767237156647},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2007,5]]},"DOI":"10.1109\/icse.2007.57","type":"proceedings-article","created":{"date-parts":[[2007,6,7]],"date-time":"2007-06-07T17:12:04Z","timestamp":1181236324000},"page":"199-208","source":"Crossref","is-referenced-by-count":33,"title":["On Accurate Automatic Verification of Publish-Subscribe Architectures"],"prefix":"10.1109","author":[{"given":"Luciano","family":"Baresi","sequence":"first","affiliation":[]},{"given":"Carlo","family":"Ghezzi","sequence":"additional","affiliation":[]},{"given":"Luca","family":"Mottola","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"19"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/958492.958494"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1023\/B:TELS.0000029046.79337.8f"},{"key":"23","first-page":"35","article-title":"An approach to model and validate publish\/subscribe architectures","author":"zanolin","year":"2003","journal-title":"Proc of the SAVCBS'03 Workshop"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1061318.1061322"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2005.15"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/32.588521"},{"journal-title":"The Gryphon Middleware","year":"0","key":"16"},{"key":"13","first-page":"166","article-title":"Model checking publishsubscribe systems","author":"garlan","year":"2002","journal-title":"10th Int SPIN Workshop on Model Checking Software"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2003.1201197"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/857076.857078"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/IWSSD.2000.891123"},{"year":"0","key":"21"},{"key":"3","first-page":"596","article-title":"A case study on the automated verification of groupware protocols","author":"beek","year":"2005","journal-title":"Proc Of the 27th Int Conf on Software Engineering (ICSE05)"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/940071.940107"},{"key":"2","first-page":"131","article-title":"Towards fine-grained automated verification of publish-subscribe architectures","author":"baresi","year":"2006","journal-title":"Proc of the 26 th Int Conf on Formal Methods for Networked and Distributed Systems (FORTE06)"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1138953.1138959"},{"key":"10","first-page":"154","article-title":"Model-checking middleware-based event-driven real-time embedded software","author":"deng","year":"2002","journal-title":"Proc 4th Int'l Symp Formal Methods for Components and Objects"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2004.1317444"},{"key":"6","first-page":"78","article-title":"Evaluating and improving the automatic analysis of implicit invocation systems","author":"bradbury","year":"2003","journal-title":"Proc European Software Eng Conf"},{"year":"0","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2002.1028881"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/337180.337234"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/380749.380767"}],"event":{"name":"29th International Conference on Software Engineering","start":{"date-parts":[[2007,5,20]]},"location":"Minneapolis, MN, USA","end":{"date-parts":[[2007,5,26]]}},"container-title":["29th International Conference on Software Engineering (ICSE'07)"],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4222553\/4222554\/04222582.pdf?arnumber=4222582","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T17:42:58Z","timestamp":1489599778000},"score":0.0,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4222582\/"}},"issued":{"date-parts":[[2007,5]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icse.2007.57","ISSN":["0270-5257"],"issn-type":[{"type":"print","value":"0270-5257"}],"published":{"date-parts":[[2007,5]]}},{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T01:31:01Z","timestamp":1773192661805,"version":"3.50.1"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2007,5]]},"DOI":"10.1109\/icse.2007.13","type":"proceedings-article","created":{"date-parts":[[2007,6,7]],"date-time":"2007-06-07T21:12:04Z","timestamp":1181250724000},"page":"519-528","source":"Crossref","is-referenced-by-count":8,"title":["Agility and Experimentation: Practical Techniques for Resolving Architectural Tradeoffs"],"prefix":"10.1109","author":[{"given":"T.C. Nicholas","family":"Graham","sequence":"first","affiliation":[]},{"given":"Rick","family":"Kazman","sequence":"additional","affiliation":[]},{"given":"Chris","family":"Walmsley","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","first-page":"299","article-title":"Comparison of CMM Level 2 and eXtreme Programming","author":"nawrocki","year":"2002","journal-title":"LNCS"},{"key":"16","year":"2006","journal-title":"WebArrow"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2004.1317460"},{"key":"14","year":"0"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/302405.302452"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-2796-1"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1101779.1101781"},{"key":"2","year":"2006","journal-title":"AgileManifesto"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2003.1201204"},{"key":"10","author":"juristo","year":"2006","journal-title":"Basics of Software Engineering Experimentation"},{"key":"7","author":"clements","year":"2002","journal-title":"Evaluating Sofiware Architectures Methods and Case Studies"},{"key":"6","author":"brooks","year":"1995","journal-title":"The Mythical Man Month"},{"key":"5","author":"boehm","year":"2005","journal-title":"Balancing Agility and Discipline"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1996.493439"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/2.947100"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/52.877872"}],"event":{"name":"29th International Conference on Software Engineering","location":"Minneapolis, MN, USA","start":{"date-parts":[[2007,5,20]]},"end":{"date-parts":[[2007,5,26]]}},"container-title":["29th International Conference on Software Engineering (ICSE'07)"],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4222553\/4222554\/04222613.pdf?arnumber=4222613","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T21:52:01Z","timestamp":1489614721000},"score":0.0,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4222613\/"}},"issued":{"date-parts":[[2007,5]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icse.2007.13","ISSN":["0270-5257"],"issn-type":[{"value":"0270-5257","type":"print"}],"published":{"date-parts":[[2007,5]]}},{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T17:08:51Z","timestamp":1774631331537,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2007,5]]},"DOI":"10.1109\/icse.2007.66","type":"proceedings-article","created":{"date-parts":[[2007,6,7]],"date-time":"2007-06-07T17:12:04Z","timestamp":1181236324000},"page":"489-498","source":"Crossref","is-referenced-by-count":290,"title":["Predicting Faults from Cached History"],"prefix":"10.1109","author":[{"given":"Sunghun","family":"Kim","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Zimmermann","sequence":"additional","affiliation":[]},{"given":"E. James","family":"Whitehead Jr.","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Zeller","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2005.1553571"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2000.883028"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.2229"},{"key":"15","year":"0"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2004.08.003"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1998.730899"},{"key":"14","year":"0"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2005.91"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1023\/A:1023632027907"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.49"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134349"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1083142.1083147"},{"key":"23","first-page":"107","article-title":"HATARI: Raising Risk Awareness. Research Demonstration","author":"s?liwerski","year":"2005","journal-title":"Proc Of the 2005 European Software Engineering Conference and 2005 Foundations of Software Engineering (ESEC\/FSE"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2006.41"},{"key":"25","article-title":"Preprocessing CVS Data for Fine-Grained Analysis","author":"zimmermann","year":"2004","journal-title":"Proc of Proc Intl Workshop on Mining Software Repositories (MSR)"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.72"},{"key":"3","year":"0"},{"key":"2","article-title":"Subversion Project Homepage","author":"behlendorf","year":"2005"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/32.859533"},{"key":"1","author":"alpaydin","year":"2004","journal-title":"Introduction to Machine Learning"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2003.1235403"},{"key":"6","author":"dallmeier","year":"2005","journal-title":"APFEL A Preprocessing Framework For Eclipse"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2003.1201219"},{"key":"4","article-title":"Facilitating Software Evolution with Kenyon","author":"bevan","year":"2005","journal-title":"Proc Of the 2005 European Software Engineering Conference and 2005 Foundations of Software Engineering (ESEC\/FSE"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.28"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/IWPSE.2003.1231205"}],"event":{"name":"29th International Conference on Software Engineering","location":"Minneapolis, MN, USA","start":{"date-parts":[[2007,5,20]]},"end":{"date-parts":[[2007,5,26]]}},"container-title":["29th International Conference on Software Engineering (ICSE'07)"],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4222553\/4222554\/04222610.pdf?arnumber=4222610","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T17:51:58Z","timestamp":1489600318000},"score":0.0,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4222610\/"}},"issued":{"date-parts":[[2007,5]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/icse.2007.66","ISSN":["0270-5257"],"issn-type":[{"value":"0270-5257","type":"print"}],"published":{"date-parts":[[2007,5]]}},{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T01:31:22Z","timestamp":1773192682749,"version":"3.50.1"},"reference-count":7,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2007,5]]},"DOI":"10.1109\/icse.2007.48","type":"proceedings-article","created":{"date-parts":[[2007,6,7]],"date-time":"2007-06-07T17:12:04Z","timestamp":1181236324000},"page":"771-774","source":"Crossref","is-referenced-by-count":39,"title":["Korat: A Tool for Generating Structurally Complex Test Inputs"],"prefix":"10.1109","author":[{"given":"Aleksandar","family":"Milicevic","sequence":"first","affiliation":[]},{"given":"Sasa","family":"Misailovic","sequence":"additional","affiliation":[]},{"given":"Darko","family":"Marinov","sequence":"additional","affiliation":[]},{"given":"Sarfraz","family":"Khurshid","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","author":"dahm","year":"0","journal-title":"Byte Code Engineering Library"},{"key":"2","article-title":"Javassist - a reflection-based programming wizard for Java","author":"chiba","year":"1998","journal-title":"Proceedings of the ACM OOPSLA'98 Workshop on Reflective Programming in C++ and Java"},{"key":"1","doi-asserted-by":"crossref","DOI":"10.1145\/566172.566191","article-title":"Korat: Automated testing based on Java predicates","author":"boyapati","year":"2002","journal-title":"Proc International Symposium on Software Testing and Analysis (ISSTA)"},{"key":"7","article-title":"Mutation 2000: Uniting the orthogonal","author":"offutt","year":"2000","journal-title":"Mutation 2000 Mutation Testing in the Twentieth and the Twenty First Centuries"},{"key":"6","author":"marinov","year":"2004","journal-title":"Automatic testing of software with structurally complex inputs"},{"key":"5","author":"liskov","year":"2000","journal-title":"Program Development in Java Abstraction Specification and Object-Oriented Design"},{"key":"4","author":"jackson","year":"2006","journal-title":"Software Abstractions Logic Language and Analysis"}],"event":{"name":"29th International Conference on Software Engineering","location":"Minneapolis, MN, USA","start":{"date-parts":[[2007,5,20]]},"end":{"date-parts":[[2007,5,26]]}},"container-title":["29th International Conference on Software Engineering (ICSE'07)"],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4222553\/4222554\/04222644.pdf?arnumber=4222644","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T14:30:26Z","timestamp":1497709826000},"score":0.0,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4222644\/"}},"issued":{"date-parts":[[2007,5]]},"references-count":7,"URL":"https:\/\/doi.org\/10.1109\/icse.2007.48","ISSN":["0270-5257"],"issn-type":[{"value":"0270-5257","type":"print"}],"published":{"date-parts":[[2007,5]]}},{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:08:29Z","timestamp":1729634909646,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2007,5]]},"DOI":"10.1109\/icse.2007.51","type":"proceedings-article","created":{"date-parts":[[2007,6,7]],"date-time":"2007-06-07T17:12:04Z","timestamp":1181236324000},"page":"652-663","source":"Crossref","is-referenced-by-count":9,"title":["Maturity Status within Front-End Support Organisations"],"prefix":"10.1109","author":[{"given":"Mira","family":"Kajko-Mattsson","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/17.62320"},{"journal-title":"Real World Research","year":"2002","author":"robson","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.1997.638139"},{"key":"15","article-title":"Taxonomy of Predelivery\/Prerelease Maintenance Activities","author":"kajko-mattsson","year":"2005","journal-title":"Proc Software Eng and Knowledge Eng"},{"year":"0","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2001.919135"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ISESE.2005.1541840"},{"key":"11","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1109\/CSMR.2006.27","article-title":"Evaluation of CM3: Front-End Problem Management within Industry","author":"kajko-mattsson","year":"2006","journal-title":"Proc European Conf Software Maintenance and Reengineering"},{"key":"12","first-page":"13","article-title":"Outlining a Model of a Release Management Process","volume":"9","author":"kajko-mattsson","year":"2005","journal-title":"Journal of Design & Process Science Transactions of the SDPS"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/52.895170"},{"journal-title":"Third New International Dictionary","year":"1986","author":"webster's","key":"20"},{"journal-title":"The Capability Maturity Model Guidelines for Improving the Software Process","year":"1994","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/STEP.1999.798790"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSEA.2006.261280"},{"key":"7","first-page":"19","article-title":"Taxonomy of Front-End Support Activities","volume":"8","author":"kajko-mattsson","year":"2004","journal-title":"Journal of Design & Process Science Transactions of the SDPS"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2003.1235422"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1002\/smr.252"},{"journal-title":"Running an Effective Help Desk","year":"1998","author":"czegel","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/EUROMICRO.2005.13"},{"year":"0","key":"8"}],"event":{"name":"29th International Conference on Software Engineering","start":{"date-parts":[[2007,5,20]]},"location":"Minneapolis, MN, USA","end":{"date-parts":[[2007,5,26]]}},"container-title":["29th International Conference on Software Engineering (ICSE'07)"],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4222553\/4222554\/04222626.pdf?arnumber=4222626","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T16:53:49Z","timestamp":1556470429000},"score":0.0,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4222626\/"}},"issued":{"date-parts":[[2007,5]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icse.2007.51","ISSN":["0270-5257"],"issn-type":[{"type":"print","value":"0270-5257"}],"published":{"date-parts":[[2007,5]]}},{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T07:54:18Z","timestamp":1772783658866,"version":"3.50.1"},"reference-count":6,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2007,5]]},"DOI":"10.1109\/icse.2007.73","type":"proceedings-article","created":{"date-parts":[[2007,6,7]],"date-time":"2007-06-07T21:12:04Z","timestamp":1181250724000},"page":"797-800","source":"Crossref","is-referenced-by-count":16,"title":["Revel8or: Model Driven Capacity Planning Tool Suite"],"prefix":"10.1109","author":[{"given":"Liming","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Yan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Ngoc Bao","family":"Bui","sequence":"additional","affiliation":[]},{"given":"Ian","family":"Gorton","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.127"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2001.989805"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.9"},{"key":"6","first-page":"32","article-title":"Preserving distributed systems critical properties: A model-driven approach, Software","volume":"21","author":"yilmaz","year":"2004","journal-title":"IEEE"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/QEST.2004.1348017"},{"key":"4","article-title":"Integrating a Performance Analysis Kit into Model-Driven Development","author":"rutherford","year":"2003","journal-title":"7th GPCE Young Researcher Workshop"}],"event":{"name":"29th International Conference on Software Engineering","location":"Minneapolis, MN, USA","start":{"date-parts":[[2007,5,20]]},"end":{"date-parts":[[2007,5,26]]}},"container-title":["29th International Conference on Software Engineering (ICSE'07)"],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4222553\/4222554\/04222650.pdf?arnumber=4222650","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T21:43:46Z","timestamp":1489614226000},"score":0.0,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4222650\/"}},"issued":{"date-parts":[[2007,5]]},"references-count":6,"URL":"https:\/\/doi.org\/10.1109\/icse.2007.73","ISSN":["0270-5257"],"issn-type":[{"value":"0270-5257","type":"print"}],"published":{"date-parts":[[2007,5]]}},{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:22:56Z","timestamp":1773840176662,"version":"3.50.1"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2007,5]]},"DOI":"10.1109\/icse.2007.32","type":"proceedings-article","created":{"date-parts":[[2007,6,7]],"date-time":"2007-06-07T21:12:04Z","timestamp":1181250724000},"page":"499-510","source":"Crossref","is-referenced-by-count":372,"title":["Detection of Duplicate Defect Reports Using Natural Language Processing"],"prefix":"10.1109","author":[{"given":"Per","family":"Runeson","sequence":"first","affiliation":[]},{"given":"Magnus","family":"Alexandersson","sequence":"additional","affiliation":[]},{"given":"Oskar","family":"Nyholm","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/s11334-005-0011-3"},{"key":"17","author":"salton","year":"1989","journal-title":"Automatic Text Processing The Transformation Analysis and Retrieval of Information by Computer"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2005.32"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2003.1201224"},{"key":"16","author":"pol","year":"2002","journal-title":"Software Testing A Guide to the TMap approach"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2005.1"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-006-6405-5"},{"key":"11","year":"0"},{"key":"12","first-page":"283","article-title":"Speeding up Requirements Management in a Product Software Company: Linking Customer Wishes to Product Requirements through Linguistic Engineering","author":"natt och dag","year":"2004","journal-title":"Proc 12th Int'l Requirements Eng Conf"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2005.156"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/METRICS.2005.28"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1041053"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.3115\/1118253.1118281"},{"key":"7","first-page":"57","article-title":"Natural Language Processing for Requirements Specification","author":"macias","year":"1993","journal-title":"Safety Critical Systems"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2006.13"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MCISE.2003.1238707"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.3"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/32.83915"},{"key":"8","author":"manning","year":"1999","journal-title":"Foundations of Statistical Natural Language Processing"}],"event":{"name":"29th International Conference on Software Engineering","location":"Minneapolis, MN, USA","start":{"date-parts":[[2007,5,20]]},"end":{"date-parts":[[2007,5,26]]}},"container-title":["29th International Conference on Software Engineering (ICSE'07)"],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4222553\/4222554\/04222611.pdf?arnumber=4222611","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T21:55:09Z","timestamp":1489614909000},"score":0.0,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4222611\/"}},"issued":{"date-parts":[[2007,5]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icse.2007.32","ISSN":["0270-5257"],"issn-type":[{"value":"0270-5257","type":"print"}],"published":{"date-parts":[[2007,5]]}},{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T09:04:03Z","timestamp":1774602243046,"version":"3.50.1"},"reference-count":46,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2007,5]]},"DOI":"10.1109\/icse.2007.36","type":"proceedings-article","created":{"date-parts":[[2007,6,7]],"date-time":"2007-06-07T17:12:04Z","timestamp":1181236324000},"page":"44-53","source":"Crossref","is-referenced-by-count":79,"title":["Feature Oriented Model Driven Development: A Case Study for Portlets"],"prefix":"10.1109","author":[{"given":"Salvador","family":"Trujillo","sequence":"first","affiliation":[]},{"given":"Don","family":"Batory","sequence":"additional","affiliation":[]},{"given":"Oscar","family":"Diaz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"A Statechart-Based Model for Hypermedia Applications","author":"ferreira de oliveira","year":"2001","journal-title":"ACM TOIS"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4379(01)00035-7"},{"key":"17","article-title":"Turning Portlets into Services: Introducing the Organization Profile","author":"diaz","year":"0","journal-title":"WWW 2007"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1145\/355137.358311"},{"key":"18","year":"0","journal-title":"EXO Portal Platform"},{"key":"33","year":"0"},{"key":"15","article-title":"Model Driven Architecture as Approach to Manage Variability in Software Product Families","author":"deelstra","year":"0","journal-title":"MDAFA 2003 Workshop"},{"key":"34","year":"2005","journal-title":"XML Metadata Interchange Mapping Specification"},{"key":"16","first-page":"454","article-title":"Portlets as Web Components: An Introduction","volume":"10","author":"diaz","year":"2004","journal-title":"Journal of Universal Computer Science"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1145\/582095.582099"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1094855.1094896"},{"key":"14","article-title":"Mapping Features to Models: A Template Approach Based on Superimposed Variants","author":"czarnecki","year":"0","journal-title":"GPCE 2005"},{"key":"37","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/1524.001.0001","author":"pierce","year":"1991","journal-title":"Basic Category Theory for Computer Scientists"},{"key":"11","article-title":"The IBM MDA Manifesto","author":"booch","year":"2004","journal-title":"MDA J"},{"key":"38","article-title":"MDD for Software Product-Lines: Fact or Fiction","author":"schmidt","year":"0","journal-title":"Models 2005 Workshop 9"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2002.1020321"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30175-2_19"},{"key":"20","article-title":"Product Lines, Features, and MDD","author":"gonza?lez-baixauli","year":"0","journal-title":"EWMT 2005 Workshop"},{"key":"43","year":"0"},{"key":"42","author":"trujillo","year":"2007","journal-title":"Feature-Oriented Model Driven Product Lines"},{"key":"41","article-title":"Feature Refactoring a Multi-Representation Program into a Product Line","author":"trujillo","year":"0","journal-title":"GPCE 2006"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2004.33"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-48673-9_13"},{"key":"44","year":"0"},{"key":"46","year":"0","journal-title":"MyYahoo"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6423(87)90035-9"},{"key":"23","year":"0"},{"key":"24","author":"kleppe","year":"2003","journal-title":"MDA Explained The Model Driven Architecture Practice and Promise"},{"key":"25","article-title":"The Expressive Power of UML-based Web Engineering","author":"koch","year":"0","journal-title":"IWWOST 2002"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/1060745.1060772"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/1173706.1173740"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/272263.272361"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.5381\/jot.2003.2.6.a2"},{"key":"3","article-title":"From Web Sites to Web Applications: New Issues for Conceptual Modeling","author":"baresi","year":"0","journal-title":"ER Workshops 2000"},{"key":"2","year":"0","journal-title":"Apache Ant"},{"key":"10","article-title":"Model Driven Engineering: Principles, Scope, Deployment, and Applicability","author":"bezivin","year":"0","journal-title":"GTTSE 2005"},{"key":"1","article-title":"Optimizing Model-Driven Development by Deriving Code Generation Patterns from Product Line Architectures","author":"anastaspoulos","year":"0","journal-title":"NetObject Days 2005"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2005.10.021"},{"key":"7","article-title":"Feature Models, Grammars, and Propositional Formulas","author":"batory","year":"0","journal-title":"SPLC 2005"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.23"},{"key":"32","year":"0"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/505145.505147"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2008.04.041"},{"key":"4","article-title":"Design Wizards and Visual Programming Environments for Gen-Voca Generators","author":"batory","year":"2000","journal-title":"IEEE TSE"},{"key":"9","year":"0"},{"key":"8","doi-asserted-by":"crossref","DOI":"10.1147\/sj.453.0527","article-title":"Multi-Level Models in Model Driven Development, Product-Lines, and Metaprogramming","volume":"45","author":"batory","year":"2006","journal-title":"IBM Systems Journal"}],"event":{"name":"29th International Conference on Software Engineering","location":"Minneapolis, MN, USA","start":{"date-parts":[[2007,5,20]]},"end":{"date-parts":[[2007,5,26]]}},"container-title":["29th International Conference on Software Engineering (ICSE'07)"],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4222553\/4222554\/04222567.pdf?arnumber=4222567","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T16:53:49Z","timestamp":1556470429000},"score":0.0,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4222567\/"}},"issued":{"date-parts":[[2007,5]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/icse.2007.36","ISSN":["0270-5257"],"issn-type":[{"value":"0270-5257","type":"print"}],"published":{"date-parts":[[2007,5]]}},{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T03:23:39Z","timestamp":1774495419436,"version":"3.50.1"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2007,5]]},"DOI":"10.1109\/icse.2007.37","type":"proceedings-article","created":{"date-parts":[[2007,6,7]],"date-time":"2007-06-07T21:12:04Z","timestamp":1181250724000},"page":"75-84","source":"Crossref","is-referenced-by-count":617,"title":["Feedback-Directed Random Test Generation"],"prefix":"10.1109","author":[{"given":"Carlos","family":"Pacheco","sequence":"first","affiliation":[]},{"given":"Shuvendu K.","family":"Lahiri","sequence":"additional","affiliation":[]},{"given":"Michael D.","family":"Ernst","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Ball","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/96267.96279"},{"key":"17","first-page":"431","article-title":"Discovering algebraic specifications from Java classes","author":"henkel","year":"2003","journal-title":"ECOOP"},{"key":"18","year":"0"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/WST.1988.5376"},{"key":"16","author":"hartman","year":"2006"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-003-0130-9"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1145735.1145737"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2005.10"},{"key":"21","first-page":"45","article-title":"Mutation 2000: Uniting the orthogonal","author":"offutt","year":"2000","journal-title":"Mutation 2000 Mutation Testing in the Twentieth and the Twenty First Centuries"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/271771.271785"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/11558569_18"},{"key":"23","first-page":"504","article-title":"Eclat: Automatic generation and classification of test inputs","author":"pacheco","year":"2005","journal-title":"ECOOP"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.37"},{"key":"25","first-page":"419","article-title":"CUTE and jCUTE: Concolic unit testing and explicit path model-checking tools","author":"sen","year":"2006","journal-title":"CAV"},{"key":"26","first-page":"203","article-title":"Model checking programs","volume":"10","author":"visser","year":"2003","journal-title":"ASE"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/1007512.1007526"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/1146238.1146243"},{"key":"29","author":"xie","year":"2006"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1002\/spe.602"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/351240.351266"},{"key":"10","first-page":"59","article-title":"An empirical study of the robustness of Windows NT applications using random testing","author":"forrester","year":"2000","journal-title":"4th USENIX Windows System Symposium"},{"key":"1","first-page":"1","article-title":"A theory of predicate-complete test coverage and generation","author":"ball","year":"2004","journal-title":"FMCO"},{"key":"30","first-page":"196","article-title":"Rostra: A framework for detecting redundant object-oriented unit tests","author":"xie","year":"2004","journal-title":"ASE"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1978.218136"},{"key":"6","year":"0"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1146238.1146267"},{"key":"31","first-page":"365","article-title":"Symstra: A framework for generating object-oriented unit tests using symbolic execution","author":"xie","year":"2005","journal-title":"TACAS"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2005.1553585"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/226155.226158"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010257"}],"event":{"name":"29th International Conference on Software Engineering","location":"Minneapolis, MN, USA","start":{"date-parts":[[2007,5,20]]},"end":{"date-parts":[[2007,5,26]]}},"container-title":["29th International Conference on Software Engineering (ICSE'07)"],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4222553\/4222554\/04222570.pdf?arnumber=4222570","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T21:52:40Z","timestamp":1489614760000},"score":0.0,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4222570\/"}},"issued":{"date-parts":[[2007,5]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/icse.2007.37","ISSN":["0270-5257"],"issn-type":[{"value":"0270-5257","type":"print"}],"published":{"date-parts":[[2007,5]]}},{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T17:26:15Z","timestamp":1775323575659,"version":"3.50.1"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2007,5]]},"DOI":"10.1109\/icse.2007.30","type":"proceedings-article","created":{"date-parts":[[2007,6,7]],"date-time":"2007-06-07T21:12:04Z","timestamp":1181250724000},"page":"96-105","source":"Crossref","is-referenced-by-count":675,"title":["DECKARD: Scalable and Accurate Tree-Based Detection of Code Clones"],"prefix":"10.1109","author":[{"given":"Lingxiao","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Ghassan","family":"Misherghi","sequence":"additional","affiliation":[]},{"given":"Zhendong","family":"Su","sequence":"additional","affiliation":[]},{"given":"Stephane","family":"Glondu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1996.565012"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010248"},{"key":"17","first-page":"289","article-title":"CP-Miner: A tool for finding copy-paste and related bugs in operating system code","author":"li","year":"2004","journal-title":"OSDI"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066243"},{"key":"18","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1145\/1081706.1081755","article-title":"PR-Miner: Automatically extracting implicit programming rules and detecting violations in large software code","author":"li","year":"2005","journal-title":"ESEC\/FSE"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1137\/0218082"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/BF00126960"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1997.624264"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/325694.325713"},{"key":"14","first-page":"40","article-title":"Using slicing to identify duplication in source code","author":"komondoor","year":"2001","journal-title":"SAS"},{"key":"11","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1145\/1081706.1081737","article-title":"An empirical study of code clone genealogies","author":"kim","year":"2005","journal-title":"ESEC\/FSE"},{"key":"12","volume":"1","author":"knuth","year":"1997","journal-title":"The art of computer programming"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2004.6"},{"key":"3","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1145\/1081706.1081733","article-title":"Detecting higher-level similarity patterns in programs","author":"basit","year":"2005","journal-title":"ESEC\/FSE"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872770"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539793246707"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1995.514697"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/997817.997857"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502042"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738528"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2004.1317484"},{"key":"9","first-page":"518","article-title":"Similarity search in high dimensions via hashing","author":"gionis","year":"1999","journal-title":"VLDB"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/24039.24041"}],"event":{"name":"29th International Conference on Software Engineering","location":"Minneapolis, MN, USA","start":{"date-parts":[[2007,5,20]]},"end":{"date-parts":[[2007,5,26]]}},"container-title":["29th International Conference on Software Engineering (ICSE'07)"],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4222553\/4222554\/04222572.pdf?arnumber=4222572","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T18:30:26Z","timestamp":1497724226000},"score":0.0,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4222572\/"}},"issued":{"date-parts":[[2007,5]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icse.2007.30","ISSN":["0270-5257"],"issn-type":[{"value":"0270-5257","type":"print"}],"published":{"date-parts":[[2007,5]]}},{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T20:06:55Z","timestamp":1770322015390,"version":"3.49.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2007,5]]},"DOI":"10.1109\/icse.2007.74","type":"proceedings-article","created":{"date-parts":[[2007,6,7]],"date-time":"2007-06-07T17:12:04Z","timestamp":1181236324000},"page":"364-374","source":"Crossref","is-referenced-by-count":94,"title":["Role Migration and Advancement Processes in OSSD Projects: A Comparative Case Study"],"prefix":"10.1109","author":[{"given":"Chris","family":"Jensen","sequence":"first","affiliation":[]},{"given":"Walt","family":"Scacchi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","year":"0"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/567793.567795"},{"key":"18","year":"0"},{"key":"15","doi-asserted-by":"crossref","DOI":"10.1109\/HICSS.2005.147","article-title":"Collaboration, Leadership, Control, and Conflict Negotiation Processes in the NetBeans.org","author":"jensen","year":"2005","journal-title":"Open Source Software Development Community Proc 38th Hawaii Intern Conf Systems Science Waikola Village"},{"key":"16","year":"0"},{"key":"13","year":"0","journal-title":"Getting Involved with Mozilla org"},{"key":"14","year":"0","journal-title":"How the ASF works"},{"key":"11","article-title":"Delayed Returns to Open Source Participation: An Empirical Analysis of the Apache HTTP Server Project","author":"fielding","year":"2002","journal-title":"Paper presented at the Conference on Open Source Economics Law and Policy"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2004.1259206"},{"key":"21","year":"0","journal-title":"Mozilla DevNews"},{"key":"20","year":"0","journal-title":"Mozilla Code Review FAQ"},{"key":"22","year":"0","journal-title":"Mozilla Drivers"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.2307\/3003456"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/BF00979603"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1049\/ip-sen:20020202"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2004.1259221"},{"key":"27","year":"0"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1002\/spip.255"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.4018\/jitwe.2006070104"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-0462(00)00068-5"},{"key":"2","year":"0"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/299157.299167"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2007.2"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/32.799955"},{"key":"7","year":"0"},{"key":"6","year":"0"},{"key":"32","first-page":"419","article-title":"Towards an Understanding of the Motivation of Open Source Software Developers","author":"ye","year":"2003","journal-title":"Proc 20th Int l Conf Software Eng"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1002\/1099-1670(200006\/09)5:2\/3<103::AID-SPIP116>3.3.CO;2-P"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1998.671389"},{"key":"4","year":"0"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/50087.50089"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v10i2.1207"}],"event":{"name":"29th International Conference on Software Engineering","location":"Minneapolis, MN, USA","start":{"date-parts":[[2007,5,20]]},"end":{"date-parts":[[2007,5,26]]}},"container-title":["29th International Conference on Software Engineering (ICSE'07)"],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4222553\/4222554\/04222598.pdf?arnumber=4222598","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T14:30:26Z","timestamp":1497709826000},"score":0.0,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4222598\/"}},"issued":{"date-parts":[[2007,5]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/icse.2007.74","ISSN":["0270-5257"],"issn-type":[{"value":"0270-5257","type":"print"}],"published":{"date-parts":[[2007,5]]}}],"items-per-page":20,"query":{"start-index":0,"search-terms":null}}}