{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T03:03:15Z","timestamp":1725505395322},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,9]]},"DOI":"10.1109\/scam.2007.21","type":"proceedings-article","created":{"date-parts":[[2008,4,28]],"date-time":"2008-04-28T16:50:08Z","timestamp":1209401408000},"page":"180-192","source":"Crossref","is-referenced-by-count":6,"title":["Relating the Evolution of Design Patterns and Crosscutting Concerns"],"prefix":"10.1109","author":[{"given":"Lerina","family":"Aversano","sequence":"first","affiliation":[]},{"given":"Luigi","family":"Cerulo","sequence":"additional","affiliation":[]},{"given":"Massimiliano Di","family":"Penta","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2004.1317478"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1028664.1028676"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/976270.976283"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IWPSE.2003.1231205"},{"journal-title":"Design Patterns Elements of Reusable Object Oriented Software","year":"1995","author":"gamma","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1052898.1052899"},{"key":"ref14","first-page":"411","article-title":"Relation of code clones and change couplings","author":"geiger","year":"2006","journal-title":"Proceedings of the 9th International Conference of Funtamental Approaches to Software Engineering (FASE) number 3922 in LNCS"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2001.919100"},{"key":"ref16","article-title":"Overcoming the prevalent decomposition in legacy code","author":"hannemann","year":"2001","journal-title":"Workshop on Advanced Separation of Concerns in Software Engineering (ICSE 2001)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/582435.582436"},{"key":"ref18","first-page":"187","article-title":"An empirical study of code clone genealogies","author":"kim","year":"2005","journal-title":"Proceedings of the European Software Engineering Conference and the ACM Symposium on the Foundations of Software Engineering"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2006.23"},{"journal-title":"Case Study Research Design and Methods","year":"2002","author":"yin","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2006.50"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.99"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2004.1342754"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/STEP.2005.13"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.52"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.114"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2006.43"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/METRICS.2005.28"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/METRIC.2003.1232454"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2006.40"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1993.366933"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1145\/1081706.1081754","article-title":"Dynamine: finding common error patterns by mining software revision histories","author":"livshits","year":"2005","journal-title":"ESEC\/FSE-13 Proceedings of the 10th European software engineering conference held jointly with 13th ACM SIG-SOFT international symposium on Foundations of software engineering"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2005.75"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1314493.1314496"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/32.988711"},{"key":"ref23","first-page":"507","article-title":"Design recommendations for concern elaboration tools","author":"murphy","year":"2005","journal-title":"Aspect-Oriented Software Development"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2004.15"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2004.13"}],"event":{"name":"Seventh IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007)","start":{"date-parts":[[2007,9,30]]},"location":"Paris, France","end":{"date-parts":[[2007,10,1]]}},"container-title":["Seventh IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4362882\/4362883\/04362912.pdf?arnumber=4362912","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T07:30:00Z","timestamp":1497771000000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4362912\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/scam.2007.21","relation":{},"subject":[],"published":{"date-parts":[[2007,9]]}}}