{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T02:55:21Z","timestamp":1725677721240},"reference-count":16,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/scam.2001.972676","type":"proceedings-article","created":{"date-parts":[[2002,11,13]],"date-time":"2002-11-13T17:16:03Z","timestamp":1037207763000},"page":"150-160","source":"Crossref","is-referenced-by-count":8,"title":["Restructuring Web applications via transformation rules"],"prefix":"10.1109","author":[{"given":"F.","family":"Ricca","sequence":"first","affiliation":[]},{"given":"P.","family":"Tonella","sequence":"additional","affiliation":[]},{"given":"I.D.","family":"Baxter","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Extending rmm: Russian dolls and hypertext","author":"isakowitz","year":"1997","journal-title":"Proc of HICSS-30"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1980.11805"},{"journal-title":"HTML Tidy Keeping it clean on-line journal webreview","year":"2000","author":"nesbit","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2000.883017"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2001.919078"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-1885-0"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.1999.777757"},{"journal-title":"Evaluation Repair and Transformation Tools for web Content Accessabil-ity","year":"2001","author":"chisholm","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738528"},{"journal-title":"Web content accessibility guidelines 1 0","year":"1999","author":"chisholm","key":"ref6"},{"journal-title":"Techniques for Web Content Accessibility Guidelines 1 0","year":"2000","author":"chisholm","key":"ref5"},{"journal-title":"Refactoring Improving the Design of Existing Code","year":"1999","author":"fowler","key":"ref8"},{"journal-title":"Building Web Applications with UML","year":"2000","author":"conallen","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1997.624252"},{"key":"ref1","first-page":"9","article-title":"Web site reengineering using rmm","author":"antoniol","year":"2000","journal-title":"Proc IEEE Int'l Workshop Web Site Evolution"},{"journal-title":"Information Technology–Software Product Evaluation Quality Characteristics and Guidelines for their Use","year":"1991","key":"ref9"}],"event":{"name":"First IEEE International Workshop on Source Code Analysis and Manipulation","acronym":"SCAM-01","location":"Florence, Italy"},"container-title":["Proceedings First IEEE International Workshop on Source Code Analysis and Manipulation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/7667\/20963\/00972676.pdf?arnumber=972676","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,10]],"date-time":"2017-03-10T18:15:38Z","timestamp":1489169738000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/972676\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/scam.2001.972676","relation":{},"subject":[]}}