{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:22:33Z","timestamp":1729624953339,"version":"3.28.0"},"reference-count":57,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1109\/icpc.2013.6613844","type":"proceedings-article","created":{"date-parts":[[2013,10,2]],"date-time":"2013-10-02T18:32:40Z","timestamp":1380738760000},"page":"162-171","source":"Crossref","is-referenced-by-count":7,"title":["Evaluating software clustering algorithms in the context of program comprehension"],"prefix":"10.1109","author":[{"given":"Anas","family":"Mahmoud","sequence":"first","affiliation":[]},{"family":"Nan Niu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2004.1317478"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511615320"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1145\/108844.108863"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2008.14"},{"journal-title":"Numerical Taxonomy Series of Books in Biology","year":"1973","author":"sneath","key":"39"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/SEFM.2010.19"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2010.19"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.25"},{"key":"42","first-page":"64","article-title":"On the comparability of software clustering algorithms","author":"shtem","year":"2010","journal-title":"International Conference on Program Comprehension"},{"key":"41","first-page":"227","article-title":"An optimal algorithm for MoJo distance","author":"wen","year":"2003","journal-title":"International Workshop on Program Comprehension"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2005.31"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/BF00590439"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/792024"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1999.806964"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2004.1311061"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2000.852494"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70732"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080802"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72927-3_4"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010283"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/0010-0285(87)90007-7"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/2.402076"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.1977.0306"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2002.1021348"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080826"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1999.792498"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2001.991489"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2000.891477"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(83)80031-5"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2005.12"},{"key":"8","first-page":"58","author":"letovsky","year":"1986","journal-title":"Cognitive Processes in Program comprehension"},{"key":"57","first-page":"143","article-title":"Recommending change clusters to support software investigation: An empirical study","volume":"22","author":"robillard","year":"2010","journal-title":"Journal of Software Maintenance"},{"key":"56","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2003.1201219"},{"journal-title":"Using Structural and Semantic Measures to Improve Software Modularization","year":"2012","author":"bavota","key":"19"},{"key":"55","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2005.32"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(79)90022-0"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/32.895984"},{"key":"15","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1109\/WCRE.2000.891478","article-title":"Evaluating the suitability of data clustering for software remodularization","author":"davey","year":"2000","journal-title":"Working Conference on Reverse Engineering"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/32.666825"},{"journal-title":"Finding Groups in Data An Introduction to Cluster Analysis","year":"1990","author":"kaufman","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2001.914968"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2011.13"},{"journal-title":"Structured Design","year":"1979","author":"yourdon","key":"12"},{"key":"21","first-page":"95","article-title":"An automatic architecture reconstruction and refactoring framework","author":"schmidt","year":"2011","journal-title":"International Conference on Software Engineering Research Management and Applications"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70768"},{"key":"49","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/11776420_4","article-title":"A sober look at clustering stability","author":"ben-david","year":"2006","journal-title":"Annual Conference on Learning Theory"},{"key":"48","article-title":"Cluster stability for finite samples","author":"shamir","year":"2007","journal-title":"Annual Conference on Neural Information Processing Systems"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.232524"},{"journal-title":"Algorithms for clustering data","year":"1988","author":"jain","key":"44"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2000.852495"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1142\/9789812799623_0002"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2003.1287264"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1007\/b97673"},{"journal-title":"The Traveling Salesman Problem A Guided Tour of Combinatorial Pptimization","year":"1985","author":"lawler","key":"52"},{"key":"53","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2003.1192438"},{"journal-title":"The Canonical Activities of Reverse Engineering","year":"2000","author":"tilley","key":"54"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.1981.4767125"}],"event":{"name":"2013 IEEE 21st International Conference on Program Comprehension (ICPC)","start":{"date-parts":[[2013,5,20]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2013,5,21]]}},"container-title":["2013 21st International Conference on Program Comprehension (ICPC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6597032\/6613823\/06613844.pdf?arnumber=6613844","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T19:02:25Z","timestamp":1498071745000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6613844\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5]]},"references-count":57,"URL":"https:\/\/doi.org\/10.1109\/icpc.2013.6613844","relation":{},"subject":[],"published":{"date-parts":[[2013,5]]}}}