{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T13:26:30Z","timestamp":1730294790593,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/scam.2005.4","type":"proceedings-article","created":{"date-parts":[[2006,10,11]],"date-time":"2006-10-11T11:41:15Z","timestamp":1160566875000},"page":"75-86","source":"Crossref","is-referenced-by-count":2,"title":["Concept Assignment as a Debugging Technique for Code Generators"],"prefix":"10.1109","author":[{"given":"J.","family":"Singer","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/319301.319345"},{"journal-title":"Inside the Java Virtual Machine","year":"2000","author":"venners","key":"22"},{"journal-title":"The Java Virtual Machine Specification","year":"1999","author":"lindholm","key":"17"},{"key":"23","first-page":"187","author":"wright","year":"2002","journal-title":"Java Microarchitectures"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233837"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/BF00126960"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2004.1281665"},{"key":"13","article-title":"Systematic debugging of attribute grammars","author":"ikezoe","year":"2000","journal-title":"Proceedings of the Fourth International Workshop on Automated Debugging"},{"key":"14","article-title":"Code size optimization for embedded processors","volume":"607","author":"johnson","year":"2004","journal-title":"Technical Report"},{"key":"11","first-page":"191","article-title":"Using program checking to ensure the correctness of compiler implementations","volume":"9","author":"glesner","year":"2003","journal-title":"Journal of Universal Computer Science"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1049\/ip-sen:20020549"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/52.43053"},{"journal-title":"A Java Virtual Machine for the ARM Processor","year":"2004","author":"chen","key":"3"},{"key":"20","first-page":"87","article-title":"Elucidative programming","volume":"7","author":"n\ufffdrmark","year":"2000","journal-title":"Nordic Journal of Computing"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1993.346017"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.442.0399"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/582153.582165"},{"key":"7","article-title":"Applying the ABC metric to C, C++, and Java","author":"fitzpatrick","year":"1997","journal-title":"C++ Report"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/231379.231411"},{"key":"5","article-title":"Aspect mining and refactoring","author":"deursen","year":"2003","journal-title":"Proceedings of the First International Workshop on Refactoring Achievements Challenges Effects"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1993.366940"},{"journal-title":"ARM System Architecture","year":"1996","author":"furber","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/131080.131089"}],"event":{"name":"Fifth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM'05)","location":"Budapest, Hungary"},"container-title":["Fifth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM'05)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10344\/32907\/01541160.pdf?arnumber=1541160","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T12:08:53Z","timestamp":1489493333000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1541160\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/scam.2005.4","relation":{},"subject":[]}}