{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:44:01Z","timestamp":1729658641463,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,9]]},"DOI":"10.1109\/scam.2007.28","type":"proceedings-article","created":{"date-parts":[[2008,4,28]],"date-time":"2008-04-28T12:50:08Z","timestamp":1209387008000},"page":"37-48","source":"Crossref","is-referenced-by-count":5,"title":["Statement-Level Cohesion Metrics and their Visualization"],"prefix":"10.1109","author":[{"given":"Jens","family":"Krinke","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2003.1199187"},{"journal-title":"Advanced Slicing of Sequential and Concurrent Programs","year":"2003","author":"krinke","key":"ref11"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"677","DOI":"10.1016\/S0950-5849(98)00091-3","article-title":"Restructuring programs by tucking statements into functions","volume":"40","author":"lakhotia","year":"1998","journal-title":"Information and Software Technology"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1999.806945"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1993.366923"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/32.588543"},{"key":"ref16","first-page":"96","article-title":"Analyzing the conditions of coupling existence based on program slicing and some abstract information-Flow","author":"li","year":"2005","journal-title":"Proceedings of the 6th ACIS International Conference on Software Engineering Artificial Intelligence Networking and Parallel\/Distributed Computing (SNPD 2005)"},{"key":"ref17","first-page":"100","article-title":"A new algorithm for the calculation of transitive dependences","volume":"6","author":"livadas","year":"1994","journal-title":"Journal of Software Maintenance"},{"article-title":"Slice based program metrics","year":"1985","author":"longworth","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2004.34"},{"key":"ref4","first-page":"279","article-title":"An efficient interprocedu-Ral slicing method for large programs","author":"forgcs","year":"1997","journal-title":"Proceedings of SEKE'97 the 9th International Conference on Software Engineering & Knowledge Engineering"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/24039.24041"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/77606.77608"},{"key":"ref5","article-title":"Cohesion metrics","author":"harman","year":"1995","journal-title":"Proceedings of 8th International Quality Week"},{"article-title":"An examination of the behavior of slice based cohesion measures","year":"1994","author":"karstu","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/193173.195281"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/32.177365"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/325694.325713"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/32.310673"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"691","DOI":"10.1016\/S0950-5849(98)00092-5","article-title":"Program slices as an abstraction for cohesion measurement","volume":"40","author":"ott","year":"1998","journal-title":"Information and Software Technology"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/METRIC.1993.263799"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1989.714420"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2006.6"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/800020.808263"},{"journal-title":"Program Slices Formal Psychological and Practical Investigations ofan Automatic Program Abstraction Method","year":"1979","author":"weiser","key":"ref25"}],"event":{"name":"Seventh IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007)","start":{"date-parts":[[2007,9,30]]},"location":"Paris, France","end":{"date-parts":[[2007,10,1]]}},"container-title":["Seventh IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4362882\/4362883\/04362896.pdf?arnumber=4362896","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T03:30:00Z","timestamp":1497756600000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4362896\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/scam.2007.28","relation":{},"subject":[],"published":{"date-parts":[[2007,9]]}}}