{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T03:05:10Z","timestamp":1725764710151},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,9]]},"DOI":"10.1109\/scam.2007.31","type":"proceedings-article","created":{"date-parts":[[2008,4,28]],"date-time":"2008-04-28T16:50:08Z","timestamp":1209401408000},"page":"3-16","source":"Crossref","is-referenced-by-count":29,"title":["Keynote Address: .QL for Source Code Analysis"],"prefix":"10.1109","author":[{"given":"Oege de","family":"Moor","sequence":"first","affiliation":[]},{"given":"Mathieu","family":"Verbaere","sequence":"additional","affiliation":[]},{"given":"Elnar","family":"Hajiyev","sequence":"additional","affiliation":[]},{"given":"Pavel","family":"Avgustinov","sequence":"additional","affiliation":[]},{"given":"Torbjorn","family":"Ekman","sequence":"additional","affiliation":[]},{"given":"Neil","family":"Ongkingco","sequence":"additional","affiliation":[]},{"given":"Damien","family":"Sereni","sequence":"additional","affiliation":[]},{"given":"Julian","family":"Tibble","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Eclipse metrics plugin - State of Flow","year":"2006","author":"walton","key":"ref33"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1007\/3-540-46423-9_2","article-title":"Optimizing Java bytecode using the Soot framework: Is it feasible?","author":"vallee-rai","year":"2000","journal-title":"Compiler Construction 9th International Conference (CC 2000)"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-55015-1_14"},{"journal-title":"Code Quality The Open Source Perspective","year":"2007","author":"spinellis","key":"ref30"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/11575467_8","article-title":"Using dat-alog and binary decision diagrams for program analysis","author":"whaley","year":"2005","journal-title":"Proceedings of APLAS volume 3780 of Lecture Notes in Computer Science"},{"journal-title":"Open Integrated Development and Analysis Environments","year":"2007","author":"eichberg","key":"ref10"},{"journal-title":"Logic and Databases","year":"1978","author":"gallaire","key":"ref11"},{"key":"ref12","first-page":"2","article-title":"CodeQuest: scalable source code queries with Datalog","author":"hajiyev","year":"2006","journal-title":"Proceedings of ECOOP volume 4067 of Lecture Notes in Computer Science"},{"journal-title":"Object-Oriented Metrics Measures of Complexity","year":"1996","author":"henderson-sellers","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/643603.643622"},{"key":"ref15","first-page":"369","article-title":"Architecture of the XL C++ browser","author":"javey","year":"1992","journal-title":"CASCON '92 Proceedings of the 1992 conference of the Centre for Advanced Studies on Collaborative research"},{"journal-title":"The Derivation of Algorithms","year":"1990","author":"kaldewaij","key":"ref16"},{"journal-title":"Large-Scale C++ Software Design","year":"1996","author":"lakos","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1065167.1065169"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/800020.808258"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1052898.1052906"},{"journal-title":"Eclipse metrics 1 3 6","year":"2006","author":"sauer","key":"ref28"},{"key":"ref3","first-page":"280","article-title":"On inheritance in object oriented datalog","author":"afrati","year":"1998","journal-title":"The International Workshop on Issues and Applications of Database Technology"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-2207-2_8"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/32.48940"},{"journal-title":"Company website with free downloads doc-umentation and discussion forums","year":"2007","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/32.544352"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.130"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/32.295895"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/170035.170044"},{"key":"ref1","article-title":"IQL(2): A model with ubiquitous objects","author":"abiteboul","year":"1995","journal-title":"Database Programming Languages (DBPL-5) Electronic Workshops in Computing"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-3228-5"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/507234.507237"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1314493.1314496"},{"journal-title":"Object-Oriented Software Metrics","year":"1994","author":"lorenz","key":"ref21"},{"journal-title":"Agile Software Development Principles Patterns and Practices","year":"2002","author":"martin","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.78"},{"key":"ref26","first-page":"138","article-title":"Polyglot: An extensible compiler framework for Java","author":"nystrom","year":"2003","journal-title":"12th International Conference on Compiler Construction volume 2622 of Lecture Notes in Computer Science"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1028664.1028670"}],"event":{"name":"Seventh IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007)","start":{"date-parts":[[2007,9,30]]},"location":"Paris, France","end":{"date-parts":[[2007,10,1]]}},"container-title":["Seventh IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4362882\/4362883\/04362893.pdf?arnumber=4362893","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,10]],"date-time":"2019-05-10T19:47:56Z","timestamp":1557517676000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4362893\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/scam.2007.31","relation":{},"subject":[],"published":{"date-parts":[[2007,9]]}}}