{"status":"ok","message-type":"work-list","message-version":"1.0.0","message":{"facets":{},"total-results":2824022,"items":[{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T21:39:58Z","timestamp":1769809198774,"version":"3.49.0"},"reference-count":0,"publisher":"JSTOR","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Marketing Research"],"published-print":{"date-parts":[[1988,5]]},"DOI":"10.2307\/3172660","type":"journal-article","created":{"date-parts":[[2006,4,25]],"date-time":"2006-04-25T23:54:26Z","timestamp":1146009266000},"page":"219","source":"Crossref","is-referenced-by-count":1,"title":["CRUNCH [Computer Software]","ELF [Computer Software]","NCSS [Computer Software]","POWERSTAT [Computer Software]","SIGSTAT [Computer Software]","SST [Computer Software]","STAN [Computer Software]","STATISTIX [Computer Software]"],"prefix":"10.2307","volume":"25","author":[{"given":"Clifford E.","family":"Young","sequence":"first","affiliation":[]}],"member":"1121","container-title":["Journal of Marketing Research"],"deposited":{"date-parts":[[2018,5,8]],"date-time":"2018-05-08T20:07:18Z","timestamp":1525810038000},"score":19.232893,"resource":{"primary":{"URL":"https:\/\/www.jstor.org\/stable\/3172660?origin=crossref"}},"issued":{"date-parts":[[1988,5]]},"references-count":0,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1988,5]]}},"URL":"https:\/\/doi.org\/10.2307\/3172660","ISSN":["0022-2437"],"issn-type":[{"value":"0022-2437","type":"print"}],"published":{"date-parts":[[1988,5]]}},{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T23:13:16Z","timestamp":1769814796335,"version":"3.49.0"},"reference-count":0,"publisher":"JSTOR","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Marketing Research"],"published-print":{"date-parts":[[1987,8]]},"DOI":"10.2307\/3151652","type":"journal-article","created":{"date-parts":[[2006,4,25]],"date-time":"2006-04-25T23:53:07Z","timestamp":1146009187000},"page":"330","source":"Crossref","is-referenced-by-count":1,"title":["Y-STAT [Computer Software]","STATA 1.4 [Computer Software]","SYSTAT 3.0 [Computer Software]","STATPRO 2.0 [Computer Software]","STATGRAPHICS [Computer Software]"],"prefix":"10.2307","volume":"24","author":[{"given":"Peter H.","family":"Bloch","sequence":"first","affiliation":[]}],"member":"1121","container-title":["Journal of Marketing Research"],"deposited":{"date-parts":[[2018,4,17]],"date-time":"2018-04-17T18:09:26Z","timestamp":1523988566000},"score":18.007315,"resource":{"primary":{"URL":"https:\/\/www.jstor.org\/stable\/3151652?origin=crossref"}},"issued":{"date-parts":[[1987,8]]},"references-count":0,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1987,8]]}},"URL":"https:\/\/doi.org\/10.2307\/3151652","ISSN":["0022-2437"],"issn-type":[{"value":"0022-2437","type":"print"}],"published":{"date-parts":[[1987,8]]}},{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T21:40:17Z","timestamp":1769809217696,"version":"3.49.0"},"reference-count":0,"publisher":"JSTOR","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Marketing Research"],"published-print":{"date-parts":[[1989,2]]},"DOI":"10.2307\/3172680","type":"journal-article","created":{"date-parts":[[2006,4,26]],"date-time":"2006-04-26T03:55:32Z","timestamp":1146023732000},"page":"129","source":"Crossref","is-referenced-by-count":1,"title":["Smartforecasts II [Computer Software]","Forecast Plus [Computer Software]","SPSS\/PC + Trends [Computer Software]","Forecast Master [Computer Software]"],"prefix":"10.2307","volume":"26","author":[{"given":"James B.","family":"Wiley","sequence":"first","affiliation":[]}],"member":"1121","container-title":["Journal of Marketing Research"],"deposited":{"date-parts":[[2018,4,18]],"date-time":"2018-04-18T19:24:19Z","timestamp":1524079459000},"score":17.349506,"resource":{"primary":{"URL":"https:\/\/www.jstor.org\/stable\/3172680?origin=crossref"}},"issued":{"date-parts":[[1989,2]]},"references-count":0,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1989,2]]}},"URL":"https:\/\/doi.org\/10.2307\/3172680","ISSN":["0022-2437"],"issn-type":[{"value":"0022-2437","type":"print"}],"published":{"date-parts":[[1989,2]]}},{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T23:11:39Z","timestamp":1769814699194,"version":"3.49.0"},"reference-count":0,"publisher":"JSTOR","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Marketing Research"],"published-print":{"date-parts":[[1986,5]]},"DOI":"10.2307\/3151670","type":"journal-article","created":{"date-parts":[[2006,4,25]],"date-time":"2006-04-25T23:51:04Z","timestamp":1146009064000},"page":"191","source":"Crossref","is-referenced-by-count":1,"title":["SPSS\/PC+ [Computer Software]","BMDPC [Computer Software]","SAS [Computer Software]"],"prefix":"10.2307","volume":"23","author":[{"given":"Robert H.","family":"Collins","sequence":"first","affiliation":[]}],"member":"1121","container-title":["Journal of Marketing Research"],"deposited":{"date-parts":[[2018,5,8]],"date-time":"2018-05-08T21:00:19Z","timestamp":1525813219000},"score":16.847458,"resource":{"primary":{"URL":"https:\/\/www.jstor.org\/stable\/3151670?origin=crossref"}},"issued":{"date-parts":[[1986,5]]},"references-count":0,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1986,5]]}},"URL":"https:\/\/doi.org\/10.2307\/3151670","ISSN":["0022-2437"],"issn-type":[{"value":"0022-2437","type":"print"}],"published":{"date-parts":[[1986,5]]}},{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T02:19:49Z","timestamp":1726021189822},"edition-number":"0","reference-count":1,"publisher":"Chapman and Hall\/CRC","isbn-type":[{"type":"electronic","value":"9780429159497"}],"content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2015,5,8]]},"DOI":"10.1201\/b18453-3","type":"book-chapter","created":{"date-parts":[[2015,5,4]],"date-time":"2015-05-04T22:10:56Z","timestamp":1430777456000},"page":"10-39","source":"Crossref","is-referenced-by-count":0,"title":["\u25fe Introducing Computer Games and Software Engineering"],"prefix":"10.1201","member":"301","reference":[{"key":"ref1","unstructured":"Alexander, T. (Ed.) (2003). Massively Multiplayer Game Development. Charles River Media, Hingham, MA."}],"container-title":["Computer Games and Software Engineering"],"language":"en","deposited":{"date-parts":[[2020,12,23]],"date-time":"2020-12-23T01:19:56Z","timestamp":1608686396000},"score":16.806925,"resource":{"primary":{"URL":"https:\/\/www.taylorfrancis.com\/books\/9781482226690\/chapters\/10.1201\/b18453-3"}},"issued":{"date-parts":[[2015,5,8]]},"ISBN":["9780429159497"],"references-count":1,"URL":"https:\/\/doi.org\/10.1201\/b18453-3","published":{"date-parts":[[2015,5,8]]}},{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T23:06:48Z","timestamp":1649113608336},"description":"Figure 1.6 Estimated Personal Computer Software Piracy Rates","reference-count":0,"publisher":"Organisation for Economic Co-Operation and Development  (OECD)","content-domain":{"domain":[],"crossmark-restriction":false},"DOI":"10.1787\/805134130588","type":"component","created":{"date-parts":[[2010,2,10]],"date-time":"2010-02-10T08:19:04Z","timestamp":1265789944000},"source":"Crossref","is-referenced-by-count":0,"title":["Figure 1.6 Estimated Personal Computer Software Piracy Rates"],"prefix":"10.1787","member":"1963","deposited":{"date-parts":[[2021,9,3]],"date-time":"2021-09-03T23:43:42Z","timestamp":1630712622000},"score":16.648499,"resource":{"primary":{"URL":"https:\/\/statlinks.oecdcode.org\/252010011P1G005.XLS"}},"issued":{"date-parts":[[null]]},"references-count":0,"URL":"https:\/\/doi.org\/10.1787\/805134130588"},{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T03:09:01Z","timestamp":1725505741871},"reference-count":0,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[1978]]},"DOI":"10.1109\/cmpsac.1978.810295","type":"proceedings-article","created":{"date-parts":[[2013,7,31]],"date-time":"2013-07-31T09:16:42Z","timestamp":1375262202000},"page":"i-xii","source":"Crossref","is-referenced-by-count":0,"title":["Computer Software and Applications Conference"],"prefix":"10.1109","member":"263","event":{"name":"COMPSAC '78 - The IEEE Computer Society's Second International Computer Software and Applications Conference","start":{"date-parts":[[1978,11,13]]},"location":"Chicago, IL, USA","end":{"date-parts":[[1978,11,16]]}},"container-title":["The IEEE Computer Society's Second International Computer Software and Applications Conference, 1978. COMPSAC '78."],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6195\/16537\/00810295.pdf?arnumber=810295","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,10]],"date-time":"2017-03-10T20:01:56Z","timestamp":1489176116000},"score":16.587408,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/810295\/"}},"issued":{"date-parts":[[1978]]},"references-count":0,"URL":"https:\/\/doi.org\/10.1109\/cmpsac.1978.810295","published":{"date-parts":[[1978]]}},{"indexed":{"date-parts":[[2024,5,5]],"date-time":"2024-05-05T00:54:13Z","timestamp":1714870453604},"reference-count":0,"publisher":"Elsevier","isbn-type":[{"value":"9780080244488","type":"print"}],"license":[{"start":{"date-parts":[[1979,1,1]],"date-time":"1979-01-01T00:00:00Z","timestamp":283996800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[1979]]},"DOI":"10.1016\/b978-0-08-024448-8.50004-6","type":"book-chapter","created":{"date-parts":[[2014,6,30]],"date-time":"2014-06-30T00:48:04Z","timestamp":1404089284000},"page":"v","source":"Crossref","is-referenced-by-count":0,"title":["SECOND IFAC\/IFIP SYMPOSIUM ON SOFTWARE FOR COMPUTER CONTROL"],"prefix":"10.1016","member":"78","container-title":["Software for Computer Control"],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:B9780080244488500046?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:B9780080244488500046?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,10,2]],"date-time":"2018-10-02T14:23:17Z","timestamp":1538490197000},"score":16.504467,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/B9780080244488500046"}},"issued":{"date-parts":[[1979]]},"ISBN":["9780080244488"],"references-count":0,"URL":"https:\/\/doi.org\/10.1016\/b978-0-08-024448-8.50004-6","published":{"date-parts":[[1979]]}},{"indexed":{"date-parts":[[2024,5,5]],"date-time":"2024-05-05T01:49:24Z","timestamp":1714873764334},"reference-count":0,"publisher":"Elsevier","isbn-type":[{"value":"9780080340838","type":"print"}],"license":[{"start":{"date-parts":[[1987,1,1]],"date-time":"1987-01-01T00:00:00Z","timestamp":536457600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[1987]]},"DOI":"10.1016\/b978-0-08-034083-8.50004-1","type":"book-chapter","created":{"date-parts":[[2014,7,1]],"date-time":"2014-07-01T04:36:29Z","timestamp":1404189389000},"page":"v","source":"Crossref","is-referenced-by-count":0,"title":["FOURTH IFAC\/IFIP SYMPOSIUM ON SOFTWARE FOR COMPUTER CONTROL"],"prefix":"10.1016","member":"78","container-title":["Software for Computer Control 1986"],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:B9780080340838500041?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:B9780080340838500041?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,10,2]],"date-time":"2018-10-02T06:59:14Z","timestamp":1538463554000},"score":16.368969,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/B9780080340838500041"}},"issued":{"date-parts":[[1987]]},"ISBN":["9780080340838"],"references-count":0,"URL":"https:\/\/doi.org\/10.1016\/b978-0-08-034083-8.50004-1","published":{"date-parts":[[1987]]}},{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T20:47:08Z","timestamp":1774903628270,"version":"3.50.1"},"reference-count":0,"publisher":"Publishing House Helvetica (Publications)","content-domain":{"domain":[],"crossmark-restriction":false},"DOI":"10.32782\/it","type":"journal","created":{"date-parts":[[2021,8,20]],"date-time":"2021-08-20T04:39:02Z","timestamp":1629434342000},"source":"Crossref","is-referenced-by-count":0,"title":["Information Technology: Computer Science, Software Engineering and Cyber Security"],"prefix":"10.32782","member":"17914","deposited":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T19:51:06Z","timestamp":1774900266000},"score":16.354263,"resource":{"primary":{"URL":"https:\/\/journals.politehnica.dp.ua\/index.php\/it\/homepage"}},"short-title":["Information Technology: Computer Science, Software Engineering and Cyber Security"],"issued":{"date-parts":[[null]]},"references-count":0,"URL":"https:\/\/doi.org\/10.32782\/it"},{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T02:19:57Z","timestamp":1726021197418},"edition-number":"0","reference-count":1,"publisher":"Chapman and Hall\/CRC","isbn-type":[{"type":"electronic","value":"9780429159497"}],"content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2015,5,8]]},"DOI":"10.1201\/b18453-14","type":"book-chapter","created":{"date-parts":[[2015,5,4]],"date-time":"2015-05-04T22:10:56Z","timestamp":1430777456000},"page":"270-301","source":"Crossref","is-referenced-by-count":1,"title":["\u25fe Emerging Research Challenges in Computer Games and Software Engineering"],"prefix":"10.1201","member":"301","reference":[{"key":"ref12","unstructured":"Alspaugh, T.A. and Scacchi, W. (2013). Ongoing Software Development without Classical Requirements, Proceedings of the 21st IEEE International Conference on Requirements Engineering, Rio de Janeiro, Brazil, pp. 165\u2013174, July 15\u201319."}],"container-title":["Computer Games and Software Engineering"],"language":"en","deposited":{"date-parts":[[2020,12,23]],"date-time":"2020-12-23T01:20:21Z","timestamp":1608686421000},"score":16.333582,"resource":{"primary":{"URL":"https:\/\/www.taylorfrancis.com\/books\/9781482226690\/chapters\/10.1201\/b18453-14"}},"issued":{"date-parts":[[2015,5,8]]},"ISBN":["9780429159497"],"references-count":1,"URL":"https:\/\/doi.org\/10.1201\/b18453-14","published":{"date-parts":[[2015,5,8]]}},{"indexed":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T16:59:02Z","timestamp":1694624342719},"reference-count":0,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[1995,12,1]],"date-time":"1995-12-01T00:00:00Z","timestamp":817776000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer"],"published-print":{"date-parts":[[1995,12]]},"DOI":"10.1109\/mc.1995.476207","type":"journal-article","created":{"date-parts":[[2005,4,21]],"date-time":"2005-04-21T20:22:11Z","timestamp":1114114931000},"page":"88","source":"Crossref","is-referenced-by-count":1,"title":["How Software Personnel Learn New Skills, Software Challenges"],"prefix":"10.1109","volume":"28","author":[{"given":"C.","family":"Jones","sequence":"first","affiliation":[]}],"member":"263","container-title":["Computer"],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx1\/2\/10196\/00476207.pdf?arnumber=476207","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:30:11Z","timestamp":1638217811000},"score":16.3255,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/476207\/"}},"issued":{"date-parts":[[1995,12]]},"references-count":0,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/mc.1995.476207","ISSN":["0018-9162"],"issn-type":[{"value":"0018-9162","type":"print"}],"published":{"date-parts":[[1995,12]]}},{"indexed":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T19:22:12Z","timestamp":1694632932281},"reference-count":53,"publisher":"China Science Publishing & Media Ltd.","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Software"],"published-print":{"date-parts":[[2010,3,25]]},"DOI":"10.3724\/sp.j.1001.2008.01051","type":"journal-article","created":{"date-parts":[[2008,7,11]],"date-time":"2008-07-11T01:25:01Z","timestamp":1215739501000},"page":"1051-1068","source":"Crossref","is-referenced-by-count":1,"title":["Computer Architecture Software-Based Simulation"],"prefix":"10.3724","volume":"19","author":[{"given":"Zhi-Bin","family":"YU","sequence":"first","affiliation":[]},{"given":"Hai","family":"JIN","sequence":"additional","affiliation":[]},{"given":"Nan-Hai","family":"ZOU","sequence":"additional","affiliation":[]}],"member":"2026","reference":[{"key":"10.3724\/SP.J.1001.2008.01051-1","doi-asserted-by":"publisher","author":"Skadron K","DOI":"10.1145\/980152.980157"},{"key":"10.3724\/SP.J.1001.2008.01051-2"},{"key":"10.3724\/SP.J.1001.2008.01051-3","author":"Yi J"},{"key":"10.3724\/SP.J.1001.2008.01051-4"},{"key":"10.3724\/SP.J.1001.2008.01051-5"},{"key":"10.3724\/SP.J.1001.2008.01051-6"},{"key":"10.3724\/SP.J.1001.2008.01051-7"},{"key":"10.3724\/SP.J.1001.2008.01051-8"},{"key":"10.3724\/SP.J.1001.2008.01051-9","doi-asserted-by":"publisher","author":"Rosenblum M","DOI":"10.1109\/88.473612"},{"key":"10.3724\/SP.J.1001.2008.01051-10"},{"key":"10.3724\/SP.J.1001.2008.01051-11"},{"key":"10.3724\/SP.J.1001.2008.01051-12","author":"Belady L"},{"key":"10.3724\/SP.J.1001.2008.01051-13"},{"key":"10.3724\/SP.J.1001.2008.01051-14"},{"key":"10.3724\/SP.J.1001.2008.01051-15"},{"key":"10.3724\/SP.J.1001.2008.01051-16"},{"key":"10.3724\/SP.J.1001.2008.01051-17","author":"Hughes C"},{"key":"10.3724\/SP.J.1001.2008.01051-18"},{"key":"10.3724\/SP.J.1001.2008.01051-19"},{"key":"10.3724\/SP.J.1001.2008.01051-20"},{"key":"10.3724\/SP.J.1001.2008.01051-21","doi-asserted-by":"publisher","author":"Rosenblum M","DOI":"10.1145\/244804.244807"},{"key":"10.3724\/SP.J.1001.2008.01051-22","author":"Martin M"},{"key":"10.3724\/SP.J.1001.2008.01051-23","author":"Austin T"},{"key":"10.3724\/SP.J.1001.2008.01051-24"},{"key":"10.3724\/SP.J.1001.2008.01051-25"},{"key":"10.3724\/SP.J.1001.2008.01051-26"},{"key":"10.3724\/SP.J.1001.2008.01051-27","author":"Magnusson P"},{"key":"10.3724\/SP.J.1001.2008.01051-28"},{"key":"10.3724\/SP.J.1001.2008.01051-29"},{"key":"10.3724\/SP.J.1001.2008.01051-30"},{"key":"10.3724\/SP.J.1001.2008.01051-31"},{"key":"10.3724\/SP.J.1001.2008.01051-32"},{"key":"10.3724\/SP.J.1001.2008.01051-33","author":"Emer J"},{"key":"10.3724\/SP.J.1001.2008.01051-34"},{"key":"10.3724\/SP.J.1001.2008.01051-35"},{"key":"10.3724\/SP.J.1001.2008.01051-36","doi-asserted-by":"publisher","author":"Vachharajani M","DOI":"10.1145\/1151690.1151691"},{"key":"10.3724\/SP.J.1001.2008.01051-37"},{"key":"10.3724\/SP.J.1001.2008.01051-38"},{"key":"10.3724\/SP.J.1001.2008.01051-39"},{"key":"10.3724\/SP.J.1001.2008.01051-40","doi-asserted-by":"publisher","author":"Dwarkadas S","DOI":"10.1145\/200883.200890"},{"key":"10.3724\/SP.J.1001.2008.01051-41"},{"key":"10.3724\/SP.J.1001.2008.01051-42","author":"Mukherjee S"},{"key":"10.3724\/SP.J.1001.2008.01051-43"},{"key":"10.3724\/SP.J.1001.2008.01051-44"},{"key":"10.3724\/SP.J.1001.2008.01051-45"},{"key":"10.3724\/SP.J.1001.2008.01051-46"},{"key":"10.3724\/SP.J.1001.2008.01051-47"},{"key":"10.3724\/SP.J.1001.2008.01051-48"},{"key":"10.3724\/SP.J.1001.2008.01051-49","doi-asserted-by":"publisher","author":"Babaoglu O","DOI":"10.1109\/TC.1983.1676176"},{"key":"10.3724\/SP.J.1001.2008.01051-50","doi-asserted-by":"publisher","author":"Heidelberger P","DOI":"10.1109\/TC.1984.1676394"},{"key":"10.3724\/SP.J.1001.2008.01051-51"},{"key":"10.3724\/SP.J.1001.2008.01051-52","doi-asserted-by":"publisher","author":"Coe P","DOI":"10.1145\/295251.295259"},{"key":"10.3724\/SP.J.1001.2008.01051-53"}],"container-title":["Journal of Software"],"language":"en","link":[{"URL":"http:\/\/jos.org.cn\/jos\/article\/pdf\/20080422","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,8]],"date-time":"2022-03-08T07:17:22Z","timestamp":1646723842000},"score":16.292545,"resource":{"primary":{"URL":"http:\/\/jos.org.cn\/jos\/article\/abstract\/20080422"}},"subtitle":["Computer Architecture Software-Based Simulation"],"issued":{"date-parts":[[2010,3,25]]},"references-count":53,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2008,7,10]]}},"URL":"https:\/\/doi.org\/10.3724\/sp.j.1001.2008.01051","ISSN":["1000-9825"],"issn-type":[{"value":"1000-9825","type":"print"}],"published":{"date-parts":[[2010,3,25]]}},{"indexed":{"date-parts":[[2024,5,5]],"date-time":"2024-05-05T01:51:37Z","timestamp":1714873897016},"reference-count":0,"publisher":"Elsevier","isbn-type":[{"value":"9780080293523","type":"print"}],"license":[{"start":{"date-parts":[[1983,1,1]],"date-time":"1983-01-01T00:00:00Z","timestamp":410227200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[1983]]},"DOI":"10.1016\/b978-0-08-029352-3.50004-0","type":"book-chapter","created":{"date-parts":[[2014,7,1]],"date-time":"2014-07-01T03:04:11Z","timestamp":1404183851000},"page":"v","source":"Crossref","is-referenced-by-count":0,"title":["THIRD IFAC\/IFIP SYMPOSIUM ON SOFTWARE FOR COMPUTER CONTROL"],"prefix":"10.1016","member":"78","container-title":["Software for Computer Control 1982"],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:B9780080293523500040?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:B9780080293523500040?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,10,2]],"date-time":"2018-10-02T07:54:57Z","timestamp":1538466897000},"score":16.285934,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/B9780080293523500040"}},"issued":{"date-parts":[[1983]]},"ISBN":["9780080293523"],"references-count":0,"URL":"https:\/\/doi.org\/10.1016\/b978-0-08-029352-3.50004-0","published":{"date-parts":[[1983]]}},{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T04:12:33Z","timestamp":1648613553830},"reference-count":0,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2002]]},"DOI":"10.1109\/cmpsac.2002.1044534","type":"proceedings-article","created":{"date-parts":[[2011,9,14]],"date-time":"2011-09-14T16:02:26Z","timestamp":1316016146000},"source":"Crossref","is-referenced-by-count":0,"title":["Proceedings 26th Annual International Computer Software and Applications"],"prefix":"10.1109","member":"263","event":{"name":"Proceedings of 26th Annual International Computer Software and Applications","location":"Oxford, UK","start":{"date-parts":[[2002,8,29]]},"end":{"date-parts":[[2002,8,29]]}},"container-title":["Proceedings 26th Annual International Computer Software and Applications CMPSAC-02"],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8094\/22390\/01044534.pdf?arnumber=1044534","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T21:41:31Z","timestamp":1489441291000},"score":16.222748,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1044534\/"}},"issued":{"date-parts":[[2002]]},"references-count":0,"URL":"https:\/\/doi.org\/10.1109\/cmpsac.2002.1044534","published":{"date-parts":[[2002]]}},{"indexed":{"date-parts":[[2022,3,28]],"date-time":"2022-03-28T23:12:24Z","timestamp":1648509144849},"reference-count":0,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[1983,4,1]],"date-time":"1983-04-01T00:00:00Z","timestamp":418003200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Advances in Engineering Software (1978)"],"published-print":{"date-parts":[[1983,4]]},"DOI":"10.1016\/0141-1195(83)90178-x","type":"journal-article","created":{"date-parts":[[2008,11,5]],"date-time":"2008-11-05T10:50:56Z","timestamp":1225882256000},"page":"117-118","source":"Crossref","is-referenced-by-count":0,"title":["New Computer applications software from NISEE\/Computer applications"],"prefix":"10.1016","volume":"5","member":"78","container-title":["Advances in Engineering Software (1978)"],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:014111958390178X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:014111958390178X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,12,24]],"date-time":"2018-12-24T17:58:01Z","timestamp":1545674281000},"score":16.214636,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/014111958390178X"}},"issued":{"date-parts":[[1983,4]]},"references-count":0,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1983,4]]}},"alternative-id":["014111958390178X"],"URL":"https:\/\/doi.org\/10.1016\/0141-1195(83)90178-x","ISSN":["0141-1195"],"issn-type":[{"value":"0141-1195","type":"print"}],"published":{"date-parts":[[1983,4]]}},{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:55:09Z","timestamp":1725555309298},"reference-count":0,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[1979]]},"DOI":"10.1109\/cmpsac.1979.762453","type":"proceedings-article","created":{"date-parts":[[2013,7,31]],"date-time":"2013-07-31T13:16:42Z","timestamp":1375276602000},"page":"i-xvi","source":"Crossref","is-referenced-by-count":0,"title":["The IEEE Computer Society's Third International Computer software &amp; Applications Conference"],"prefix":"10.1109","member":"263","event":{"name":"COMPSAC 79 - Proceedings. Computer Software and The IEEE Computer Society's Third International Applications Conference","start":{"date-parts":[[1979,11,6]]},"location":"Chicago, IL, USA","end":{"date-parts":[[1979,11,8]]}},"container-title":["COMPSAC 79. Proceedings. Computer Software and The IEEE Computer Society's Third International Applications Conference, 1979."],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6188\/16515\/00762453.pdf?arnumber=762453","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,5]],"date-time":"2020-02-05T22:20:39Z","timestamp":1580941239000},"score":16.156948,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/762453\/"}},"issued":{"date-parts":[[1979]]},"references-count":0,"URL":"https:\/\/doi.org\/10.1109\/cmpsac.1979.762453","published":{"date-parts":[[1979]]}},{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T18:16:28Z","timestamp":1725387388069},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"DOI":"10.1109\/cmpsac.1978.810484","type":"proceedings-article","created":{"date-parts":[[2005,8,25]],"date-time":"2005-08-25T02:43:29Z","timestamp":1124937809000},"page":"559-564","source":"Crossref","is-referenced-by-count":2,"title":["Safety evaluation of computer hardware and software"],"prefix":"10.1109","author":[{"given":"R.","family":"Konakovsky","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"A New Method to Investigate the Safety of Control Systems","author":"konakovsky","year":"1975","journal-title":"Proceedings of the IFAC Congress"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TR.1974.5215239"},{"key":"ref10","first-page":"59","article-title":"Fault-Tolerant Computing - Progress, Problems and Prospects","author":"avizienis","year":"1977","journal-title":"Proceedings of the IFIP Conference"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1499402.1499407"},{"key":"ref11","first-page":"149","article-title":"On the Implementation of N-Version Programming for Software Fault-Tolerance During Program Execution","author":"avizienis","year":"1977","journal-title":"International Computer Software and Applications Conference"},{"journal-title":"Definition and Computation of Safety Figures for Computer Controlled Systems","year":"1977","author":"konakovsky","key":"ref5"},{"key":"ref12","article-title":"Structured Documentation Method for Safety-Related Computer Controlled Systems","author":"lauber","year":"1978","journal-title":"Proceedings of the IFAC Congress"},{"key":"ref8","first-page":"620","article-title":"A Methodology for the Development and Validation of Critical Software for Nuclear Power Plants","author":"long","year":"1977","journal-title":"International Computer Software and Applications Conference"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1975.6312819"},{"journal-title":"Report of the International Organization of Railways in Europe","year":"0","key":"ref2"},{"key":"ref9","first-page":"429","article-title":"An Approach to Error-Resistant Software Design","author":"yau","year":"1976","journal-title":"International Conference on Software Engineering"},{"journal-title":"Glossary of Terms and Definitions Related to the Safety of Industrial Computer Systems","year":"1977","key":"ref1"}],"event":{"name":"The IEEE Computer Society's Second International Computer Software and Applications Conference, 1978. COMPSAC '78.","location":"Chicago, IL"},"container-title":["The IEEE Computer Society's Second International Computer Software and Applications Conference, 1978. COMPSAC '78."],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6195\/16537\/00810484.pdf?arnumber=810484","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,10]],"date-time":"2017-03-10T23:45:39Z","timestamp":1489189539000},"score":16.141876,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/810484\/"}},"issued":{"date-parts":[[null]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/cmpsac.1978.810484"},{"indexed":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T02:42:06Z","timestamp":1709347326451},"reference-count":0,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"published-print":{"date-parts":[[2006]]},"DOI":"10.1109\/compsac.2006.4","type":"proceedings-article","created":{"date-parts":[[2011,6,8]],"date-time":"2011-06-08T12:59:16Z","timestamp":1307537956000},"source":"Crossref","is-referenced-by-count":0,"title":["30th Annual International Computer Software and Applications Conference - TOC"],"prefix":"10.1109","member":"263","event":{"name":"30th Annual International Computer Software and Applications Conference (COMPSAC'06)","location":"Chicaco, IL","start":{"date-parts":[[2006,9,17]]},"end":{"date-parts":[[2006,9,21]]}},"container-title":["30th Annual International Computer Software and Applications Conference (COMPSAC'06)"],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4020030\/4020031\/04020035.pdf?arnumber=4020035","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T16:56:19Z","timestamp":1489596979000},"score":16.098068,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4020035\/"}},"issued":{"date-parts":[[2006]]},"references-count":0,"URL":"https:\/\/doi.org\/10.1109\/compsac.2006.4","published":{"date-parts":[[2006]]}},{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:01:02Z","timestamp":1725573662188},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"DOI":"10.1109\/cmpsac.1978.810474","type":"proceedings-article","created":{"date-parts":[[2005,8,25]],"date-time":"2005-08-25T02:43:29Z","timestamp":1124937809000},"page":"508-513","source":"Crossref","is-referenced-by-count":0,"title":["Software engineering of the micro\/mini computer subnet in computer networks"],"prefix":"10.1109","author":[{"given":"N.F.","family":"Schneidewind","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1977.217557"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1977.217563"},{"key":"ref12","first-page":"765","article-title":"Evolutionary Distributed System Design","author":"des jardins","year":"1977","journal-title":"Proc Computer Software and Applications Conf"},{"journal-title":"Bit Oriented Protocols","first-page":"53-01","year":"1977","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1978.217904"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1978.217902"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1978.217907"},{"key":"ref17","first-page":"51","article-title":"A Virtual Channel System","author":"fraser","year":"1975","journal-title":"Datamation"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1978.218271"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1978.218056"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1147\/sj.151.0004"},{"key":"ref27","first-page":"87","article-title":"A British Example of Distributed Computing","author":"shepard","year":"1978","journal-title":"Datamation"},{"key":"ref3","first-page":"81","article-title":"Let's Put Information Networks In Perspective","author":"becker","year":"1978","journal-title":"Datamation"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1147\/sj.121.0094"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1147\/sj.132.0140"},{"key":"ref8","first-page":"51","article-title":"IBM's Systems Network Architecture","author":"gray","year":"1975","journal-title":"Datamation"},{"key":"ref7","first-page":"79","article-title":"Comparing Network Architectures","author":"berglund","year":"1978","journal-title":"Datamation"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1978.217902"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1977.217558"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1978.217901"},{"key":"ref20","article-title":"Network Operating System Functions and Microprocessor Front-Ends","author":"pierce","year":"1977","journal-title":"Digest of Papers Compcon"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/356608.356609"},{"key":"ref21","first-page":"140","article-title":"Distributed Processing Concepts Using Microprocessors","author":"grimes","year":"1977","journal-title":"COMPCON"},{"key":"ref24","first-page":"320","article-title":"Microstar-A Microprocessor Controlled Distributed Minicomputer System","author":"toong","year":"1977","journal-title":"COMPC0N"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1977.217565"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1978.217906"},{"key":"ref25","first-page":"81","article-title":"Microcomputers Decentralize Processing in Data Communications Network","author":"mueller","year":"1977","journal-title":"Computer Design"}],"event":{"name":"The IEEE Computer Society's Second International Computer Software and Applications Conference, 1978. COMPSAC '78.","location":"Chicago, IL"},"container-title":["The IEEE Computer Society's Second International Computer Software and Applications Conference, 1978. COMPSAC '78."],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6195\/16537\/00810474.pdf?arnumber=810474","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,11]],"date-time":"2017-03-11T01:02:45Z","timestamp":1489194165000},"score":16.089869,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/810474\/"}},"issued":{"date-parts":[[null]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/cmpsac.1978.810474"}],"items-per-page":20,"query":{"start-index":0,"search-terms":"Computer+software"}}}