iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1002/SPE.616
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,11,17]],"date-time":"2023-11-17T12:40:31Z","timestamp":1700224831076},"reference-count":40,"publisher":"Wiley","issue":"14","license":[{"start":{"date-parts":[[2004,8,23]],"date-time":"2004-08-23T00:00:00Z","timestamp":1093219200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Softw Pract Exp"],"published-print":{"date-parts":[[2004,11,25]]},"abstract":"Abstract<\/jats:title>Program understanding tools manipulate program representations, such as abstract syntax trees, control\u2010flow graphs, or data\u2010flow graphs. This paper deals with the use of visitor combinators to conduct such manipulations. Visitor combinators are an extension of the well\u2010known visitor design pattern. They are small, reusable classes that carry out specific visiting steps. They can be composed in different constellations to build more complex visitors. We evaluate the expressiveness, reusability, ease of development, and applicability of visitor combinators to the construction of program understanding tools. To that end, we conduct a case study in the use of visitor combinators for control\u2010flow analysis and visualization as used in a commercial Cobol program understanding tool. Copyright \u00a9 2004 John Wiley & Sons, Ltd.<\/jats:p>","DOI":"10.1002\/spe.616","type":"journal-article","created":{"date-parts":[[2004,8,23]],"date-time":"2004-08-23T19:27:11Z","timestamp":1093289231000},"page":"1345-1379","source":"Crossref","is-referenced-by-count":3,"title":["Source model analysis using the JJTraveler visitor combinator framework"],"prefix":"10.1002","volume":"34","author":[{"given":"Arie","family":"van Deursen","sequence":"first","affiliation":[]},{"given":"Joost","family":"Visser","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2004,8,23]]},"reference":[{"key":"e_1_2_1_2_2","volume-title":"Design Patterns: Elements of Reusable Object\u2010Oriented Software","author":"Gamma E","year":"1994"},{"key":"e_1_2_1_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/504311.504302"},{"key":"e_1_2_1_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-6423(02)00108-9"},{"key":"e_1_2_1_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47833-7"},{"issue":"7","key":"e_1_2_1_6_2","first-page":"51","article-title":"Test infected: Programmers love writing tests","volume":"3","author":"Beck K","year":"1998","journal-title":"Java Report"},{"key":"e_1_2_1_7_2","first-page":"40","volume-title":"Proceedings International Conference on Software Maintenance, ICSM'99","author":"van Deursen A","year":"1999"},{"key":"e_1_2_1_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/316158.316163"},{"key":"e_1_2_1_9_2","first-page":"90","volume-title":"Proceedings International Workshop on Program Comprehension","author":"van Deursen A","year":"1998"},{"key":"e_1_2_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2001.957806"},{"key":"e_1_2_1_11_2","unstructured":"WatsonAH McCabeTJ.Structured testing: A testing methodology using the cyclomatic complexity metric.Technical Report 500\u2010235 NIST Computer Systems Laboratory 1996."},{"key":"e_1_2_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/32.221135"},{"key":"e_1_2_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1998.723191"},{"key":"e_1_2_1_14_2","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/CSMR.1999.756681","volume-title":"Proceedings 3rd European Conference on Software Maintenance and Reengineering (CSMR)","author":"Kullbach B","year":"1999"},{"key":"e_1_2_1_15_2","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/222124.222136","volume-title":"Proceedings of the 3rd ACM SIGSOFT Symposium on the Foundations of Software Engineering","author":"Murphy GC","year":"1995"},{"key":"e_1_2_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/52.363166"},{"key":"e_1_2_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2002.995812"},{"key":"e_1_2_1_18_2","volume-title":"Proceedings 9th Working Conference on Reverse Engineering (WCRE'02)","author":"Bull RI","year":"2002"},{"issue":"2","key":"e_1_2_1_19_2","article-title":"Generation of components for software renovation factories from context\u2010free grammars","volume":"36","author":"van den Brand MGJ","year":"2000","journal-title":"Science of Computer Programming"},{"key":"e_1_2_1_20_2","unstructured":"van den BrandMGJ KlintP VinjuJJ.Term rewriting with traversal functions.Technical Report SEN\u2010R0121 CWI 2001."},{"key":"e_1_2_1_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/175290.175297"},{"key":"e_1_2_1_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/291251.289425"},{"key":"e_1_2_1_23_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45587-6_10"},{"key":"e_1_2_1_24_2","series-title":"Lecture Notes in Computer Science","volume-title":"Proceedings of Practical Aspects of Declarative Programming 2003 (PADL'03)","author":"L\u00e4mmel R","year":"2003"},{"key":"e_1_2_1_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/262009.262011"},{"key":"e_1_2_1_26_2","doi-asserted-by":"publisher","DOI":"10.1017\/S0956796898003050"},{"key":"e_1_2_1_27_2","series-title":"Advanced Functional Programming","volume-title":"The Design of a Pretty\u2010printing Library","author":"Hughes J","year":"1995"},{"key":"e_1_2_1_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/317636.317794"},{"key":"e_1_2_1_29_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45587-6_13"},{"key":"e_1_2_1_30_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-44833-4_6"},{"key":"e_1_2_1_31_2","series-title":"Lecture Notes in Computer Science","first-page":"150","volume-title":"Advanced Functional Programming","author":"Swierstra D","year":"1998"},{"key":"e_1_2_1_32_2","unstructured":"StepanovAA LeeM.The Standard Template Library.Technical Report X3J16\/94\u20100095 WG21\/N0482 Hewlett\u2010Packard 1994."},{"key":"e_1_2_1_33_2","unstructured":"Portland pattern repository.http:\/\/www.c2.com\/cgi\/wiki[19 January2004]."},{"key":"e_1_2_1_34_2","unstructured":"LieberherrKJ Patt\u2010ShamirB.Traversals of object structures: Specification and efficient implementation.Technical Report NU\u2010CCS\u201097\u201015 College of Computer Science Northeastern University Boston MA July1997."},{"key":"e_1_2_1_35_2","volume-title":"Proceedings Aspect\u2010Oriented Software Development (AOSD03)","author":"L\u00e4mmel R","year":"2003"},{"key":"e_1_2_1_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/320384.320391"},{"issue":"10","key":"e_1_2_1_37_2","first-page":"40","article-title":"Visitor in frameworks","volume":"11","author":"Vlissides J","year":"1999","journal-title":"C++ Report"},{"key":"e_1_2_1_38_2","volume-title":"TOOLS USA 98 (Technology of Object\u2010Oriented Languages and Systems)","author":"Gagnon EM","year":"1998"},{"key":"e_1_2_1_39_2","first-page":"9","volume-title":"Proceedings of COMPSAC'98, 22nd Annual International Computer Software and Applications Conference","author":"Palsberg J","year":"1998"},{"key":"e_1_2_1_40_2","first-page":"555","volume-title":"21st International Conference on Software Engineering, ICSE\u201099","author":"Bowman IT","year":"1999"},{"key":"e_1_2_1_41_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(98)00093-7"}],"container-title":["Software: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fspe.616","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/spe.616","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,17]],"date-time":"2023-11-17T12:25:57Z","timestamp":1700223957000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/spe.616"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,8,23]]},"references-count":40,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2004,11,25]]}},"alternative-id":["10.1002\/spe.616"],"URL":"http:\/\/dx.doi.org\/10.1002\/spe.616","archive":["Portico"],"relation":{},"ISSN":["0038-0644","1097-024X"],"issn-type":[{"value":"0038-0644","type":"print"},{"value":"1097-024X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004,8,23]]}}}