{"id":"https://openalex.org/W1975591813","doi":"https://doi.org/10.1109/csmr-wcre.2014.6747200","title":"Towards recovering and exploiting domain knowledge from C code: A case study on automotive software","display_name":"Towards recovering and exploiting domain knowledge from C code: A case study on automotive software","publication_year":2014,"publication_date":"2014-02-01","ids":{"openalex":"https://openalex.org/W1975591813","doi":"https://doi.org/10.1109/csmr-wcre.2014.6747200","mag":"1975591813"},"language":"en","primary_location":{"id":"doi:10.1109/csmr-wcre.2014.6747200","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csmr-wcre.2014.6747200","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 Software Evolution Week - IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering (CSMR-WCRE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086943828","display_name":"Jochen Quante","orcid":"https://orcid.org/0000-0002-4005-5124"},"institutions":[{"id":"https://openalex.org/I889804353","display_name":"Robert Bosch (Germany)","ror":"https://ror.org/01fe0jt45","country_code":"DE","type":"company","lineage":["https://openalex.org/I889804353"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Jochen Quante","raw_affiliation_strings":["Robert Bosch GmbH, Corporate Research Stuttgart, Germany","Corp. Res., Robert Bosch GmbH, Stuttgart, Germany"],"affiliations":[{"raw_affiliation_string":"Robert Bosch GmbH, Corporate Research Stuttgart, Germany","institution_ids":["https://openalex.org/I889804353"]},{"raw_affiliation_string":"Corp. Res., Robert Bosch GmbH, Stuttgart, Germany","institution_ids":["https://openalex.org/I889804353"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068246350","display_name":"Mohammed Tarabain","orcid":null},"institutions":[{"id":"https://openalex.org/I4210138551","display_name":"University Hospital Magdeburg","ror":"https://ror.org/03m04df46","country_code":"DE","type":"healthcare","lineage":["https://openalex.org/I4210138551"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Mohammed Tarabain","raw_affiliation_strings":["University of Magdeburg Magdeburg, Germany","University of Magdeburg, Magdeburg, Germany"],"affiliations":[{"raw_affiliation_string":"University of Magdeburg Magdeburg, Germany","institution_ids":["https://openalex.org/I4210138551"]},{"raw_affiliation_string":"University of Magdeburg, Magdeburg, Germany","institution_ids":["https://openalex.org/I4210138551"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016750744","display_name":"Janet Siegmund","orcid":null},"institutions":[{"id":"https://openalex.org/I186354981","display_name":"University of Passau","ror":"https://ror.org/05ydjnb78","country_code":"DE","type":"education","lineage":["https://openalex.org/I186354981"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Janet Siegmund","raw_affiliation_strings":["University of Passau Passau, Germany",", University of Passau, Passau, Germany"],"affiliations":[{"raw_affiliation_string":"University of Passau Passau, Germany","institution_ids":["https://openalex.org/I186354981"]},{"raw_affiliation_string":", University of Passau, Passau, Germany","institution_ids":["https://openalex.org/I186354981"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5086943828"],"corresponding_institution_ids":["https://openalex.org/I889804353"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14468748,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"383","last_page":"386"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7045996189117432},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.6109203100204468},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5578083395957947},{"id":"https://openalex.org/keywords/software-construction","display_name":"Software construction","score":0.5551238656044006},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5526099801063538},{"id":"https://openalex.org/keywords/domain-knowledge","display_name":"Domain knowledge","score":0.5084725618362427},{"id":"https://openalex.org/keywords/software-mining","display_name":"Software mining","score":0.5059735178947449},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.49006879329681396},{"id":"https://openalex.org/keywords/domain-engineering","display_name":"Domain engineering","score":0.4630034267902374},{"id":"https://openalex.org/keywords/backporting","display_name":"Backporting","score":0.4614172875881195},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4535147547721863},{"id":"https://openalex.org/keywords/software-sizing","display_name":"Software sizing","score":0.439857542514801},{"id":"https://openalex.org/keywords/software-system","display_name":"Software system","score":0.4366888999938965},{"id":"https://openalex.org/keywords/verification-and-validation","display_name":"Verification and validation","score":0.4269993007183075},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3221256136894226},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1868579089641571}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7045996189117432},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.6109203100204468},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5578083395957947},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.5551238656044006},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5526099801063538},{"id":"https://openalex.org/C207685749","wikidata":"https://www.wikidata.org/wiki/Q2088941","display_name":"Domain knowledge","level":2,"score":0.5084725618362427},{"id":"https://openalex.org/C103520596","wikidata":"https://www.wikidata.org/wiki/Q7554328","display_name":"Software mining","level":5,"score":0.5059735178947449},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.49006879329681396},{"id":"https://openalex.org/C5977032","wikidata":"https://www.wikidata.org/wiki/Q5289815","display_name":"Domain engineering","level":5,"score":0.4630034267902374},{"id":"https://openalex.org/C21491501","wikidata":"https://www.wikidata.org/wiki/Q430253","display_name":"Backporting","level":5,"score":0.4614172875881195},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4535147547721863},{"id":"https://openalex.org/C201515116","wikidata":"https://www.wikidata.org/wiki/Q7554363","display_name":"Software sizing","level":5,"score":0.439857542514801},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.4366888999938965},{"id":"https://openalex.org/C48002344","wikidata":"https://www.wikidata.org/wiki/Q2919644","display_name":"Verification and validation","level":2,"score":0.4269993007183075},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3221256136894226},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1868579089641571},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csmr-wcre.2014.6747200","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csmr-wcre.2014.6747200","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 Software Evolution Week - IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering (CSMR-WCRE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.5099999904632568,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1970893370","https://openalex.org/W1993463619","https://openalex.org/W2075190746","https://openalex.org/W2120512199","https://openalex.org/W2135818771","https://openalex.org/W2142174168","https://openalex.org/W2142190098","https://openalex.org/W2166559705","https://openalex.org/W2998574808","https://openalex.org/W6684726440"],"related_works":["https://openalex.org/W228416522","https://openalex.org/W2893321311","https://openalex.org/W2182096761","https://openalex.org/W2366262351","https://openalex.org/W2068483578","https://openalex.org/W2535701809","https://openalex.org/W2609860947","https://openalex.org/W2945638654","https://openalex.org/W2560461391","https://openalex.org/W2349383389"],"abstract_inverted_index":{"To":[0],"create":[1],"a":[2,5],"software":[3,53,79],"system,":[4],"lot":[6],"of":[7],"knowledge":[8,46],"about":[9],"the":[10,52,58],"domain":[11],"that":[12,47],"it":[13,64,82],"deals":[14],"with":[15,31,95,104],"is":[16,19,27],"needed.":[17],"This":[18],"particularly":[20],"true":[21],"for":[22],"embedded":[23],"control":[24,78],"software,":[25],"which":[26],"in":[28],"close":[29],"contact":[30],"physical":[32],"machinery,":[33],"relationships,":[34],"and":[35,43,62,80],"effects.":[36],"In":[37,86],"this":[38,45],"paper,":[39],"we":[40,88],"investigate":[41],"if":[42],"how":[44],"was":[48],"once":[49],"built":[50],"into":[51],"can":[54,65],"be":[55,66],"recovered":[56],"from":[57,72],"source":[59],"code":[60,94],"-":[61],"what":[63],"used":[67],"for.":[68],"We":[69],"apply":[70],"approaches":[71],"previous":[73,99],"research":[74],"to":[75,83,91],"an":[76],"engine":[77],"adapt":[81],"our":[84,111],"setting.":[85],"particular,":[87],"are":[89],"constrained":[90],"pure":[92],"C":[93],"limited":[96],"structure,":[97],"whereas":[98],"work":[100],"has":[101],"mainly":[102],"dealt":[103],"object-oriented":[105],"software.":[106],"Despite":[107],"these":[108],"limiting":[109],"conditions,":[110],"study":[112],"shows":[113],"promising":[114],"results.":[115]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
