{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T13:27:10Z","timestamp":1730294830961,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1109\/scam.2013.6648196","type":"proceedings-article","created":{"date-parts":[[2013,11,1]],"date-time":"2013-11-01T20:09:39Z","timestamp":1383336579000},"page":"147-156","source":"Crossref","is-referenced-by-count":3,"title":["Assembler restructuring in FermaT"],"prefix":"10.1109","author":[{"given":"Martin","family":"Ward","sequence":"first","affiliation":[]}],"member":"263","reference":[{"journal-title":"The Year 2000 Software Problem Quantifying the Costs and Assessing the Consequences","year":"1998","author":"capers","key":"3"},{"journal-title":"Mainframe Succession Long Live the Mainframe","year":"2012","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2004.1357800"},{"journal-title":"The Critical Need to Protect Mainframe Business Critical Applications","year":"2012","author":"amatruda","key":"1"},{"key":"7","article-title":"Assembler to c migration using the fermat transformation system","author":"ward","year":"1999","journal-title":"International Conference on Software Maintenance"},{"journal-title":"Reengineering the Corporation-A Manifesto for IT Evolution","year":"0","author":"sneed","key":"6"},{"key":"5","first-page":"7","article-title":"The e business hat trick-adaptive enterprises, adaptable software, agile it professionals","volume":"13","author":"scott","year":"2000","journal-title":"Cutter IT Journal"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/2.471193"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2009.11.001"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2004.03.007"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1002\/spe.869"}],"event":{"name":"2013 IEEE 13th International Working Conference on Source Code Analysis and Manipulation (SCAM)","start":{"date-parts":[[2013,9,22]]},"location":"Eindhoven, Netherlands","end":{"date-parts":[[2013,9,23]]}},"container-title":["2013 IEEE 13th International Working Conference on Source Code Analysis and Manipulation (SCAM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6636284\/6648171\/06648196.pdf?arnumber=6648196","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T20:42:35Z","timestamp":1490215355000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6648196\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/scam.2013.6648196","relation":{},"subject":[],"published":{"date-parts":[[2013,9]]}}}