{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T05:59:13Z","timestamp":1726034353657},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030243043"},{"type":"electronic","value":"9783030243050"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24305-0_31","type":"book-chapter","created":{"date-parts":[[2019,6,28]],"date-time":"2019-06-28T08:02:51Z","timestamp":1561708971000},"page":"418-427","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Code Smells Enabled by Artificial Intelligence: A Systematic Mapping"],"prefix":"10.1007","author":[{"given":"Moayid Ali","family":"Zaidi","sequence":"first","affiliation":[]},{"given":"Ricardo","family":"Colomo-Palacios","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,29]]},"reference":[{"key":"31_CR1","doi-asserted-by":"publisher","first-page":"841","DOI":"10.1109\/TSE.2014.2331057","volume":"40","author":"W Kessentini","year":"2014","unstructured":"Kessentini, W., Kessentini, M., Sahraoui, H., Bechikh, S., Ouni, A.: A cooperative parallel search-based software engineering approach for code-smells detection. IEEE Trans. Softw. Eng. 40, 841\u2013861 (2014). \n                      https:\/\/doi.org\/10.1109\/TSE.2014.2331057","journal-title":"IEEE Trans. Softw. Eng."},{"key":"31_CR2","doi-asserted-by":"publisher","first-page":"1144","DOI":"10.1109\/TSE.2012.89","volume":"39","author":"DIK Sj\u00f8berg","year":"2013","unstructured":"Sj\u00f8berg, D.I.K., Yamashita, A., Anda, B.C.D., Mockus, A., Dyb\u00e5, T.: Quantifying the effect of code smells on maintenance effort. IEEE Trans. Softw. Eng. 39, 1144\u20131156 (2013). \n                      https:\/\/doi.org\/10.1109\/TSE.2012.89","journal-title":"IEEE Trans. Softw. Eng."},{"key":"31_CR3","volume-title":"Refactoring: Improving the Design of Existing Code","author":"M Fowler","year":"2018","unstructured":"Fowler, M.: Refactoring: Improving the Design of Existing Code. Addison-Wesley Professional, Boston (2018)"},{"key":"31_CR4","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.infsof.2017.09.002","volume":"93","author":"M Hozano","year":"2018","unstructured":"Hozano, M., Garcia, A., Fonseca, B., Costa, E.: Are you smelling it? Investigating how similar developers detect code smells. Inf. Softw. Technol. 93, 130\u2013146 (2018). \n                      https:\/\/doi.org\/10.1016\/j.infsof.2017.09.002","journal-title":"Inf. Softw. Technol."},{"key":"31_CR5","doi-asserted-by":"publisher","first-page":"1188","DOI":"10.1007\/s10664-017-9535-z","volume":"23","author":"F Palomba","year":"2018","unstructured":"Palomba, F., Bavota, G., Penta, M.D., Fasano, F., Oliveto, R., Lucia, A.D.: On the diffuseness and the impact on maintainability of code smells: a large scale empirical investigation. Empir. Softw. Eng. 23, 1188\u20131221 (2018). \n                      https:\/\/doi.org\/10.1007\/s10664-017-9535-z","journal-title":"Empir. Softw. Eng."},{"key":"31_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jss.2018.05.057","volume":"144","author":"B Walter","year":"2018","unstructured":"Walter, B., Fontana, F.A., Ferme, V.: Code smells and their collocations: a large-scale experiment on open-source systems. J. Syst. Softw. 144, 1\u201321 (2018). \n                      https:\/\/doi.org\/10.1016\/j.jss.2018.05.057","journal-title":"J. Syst. Softw."},{"key":"31_CR7","doi-asserted-by":"publisher","first-page":"1112","DOI":"10.1109\/TSE.2013.4","volume":"39","author":"H Liu","year":"2013","unstructured":"Liu, H., Guo, X., Shao, W.: Monitor-based instant software refactoring. IEEE Trans. Softw. Eng. 39, 1112\u20131126 (2013). \n                      https:\/\/doi.org\/10.1109\/TSE.2013.4","journal-title":"IEEE Trans. Softw. Eng."},{"key":"31_CR8","first-page":"257","volume":"2","author":"A Garcia-Crespo","year":"2009","unstructured":"Garcia-Crespo, A., Colomo-Palacios, R., Gomez-Berbis, J.M., Mencke, M.: BMR: benchmarking metrics recommender for personnel issues in software development projects. Int. J. Comput. Intell. Syst. 2, 257\u2013267 (2009)","journal-title":"Int. J. Comput. Intell. Syst."},{"key":"31_CR9","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1016\/j.ijinfomgt.2017.11.005","volume":"40","author":"R Colomo-Palacios","year":"2018","unstructured":"Colomo-Palacios, R., Fernandes, E., Soto-Acosta, P., Larrucea, X.: A case analysis of enabling continuous software deployment through knowledge management. Int. J. Inf. Manag. 40, 186\u2013189 (2018). \n                      https:\/\/doi.org\/10.1016\/j.ijinfomgt.2017.11.005","journal-title":"Int. J. Inf. Manag."},{"key":"31_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.infsof.2018.02.004","volume":"99","author":"F Palomba","year":"2018","unstructured":"Palomba, F., Bavota, G., Di Penta, M., Fasano, F., Oliveto, R., De Lucia, A.: A large-scale empirical study on the lifecycle of code smell co-occurrences. Inf. Softw. Technol. 99, 1\u201310 (2018). \n                      https:\/\/doi.org\/10.1016\/j.infsof.2018.02.004","journal-title":"Inf. Softw. Technol."},{"key":"31_CR11","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.infsof.2018.12.009","volume":"108","author":"MI Azeem","year":"2019","unstructured":"Azeem, M.I., Palomba, F., Shi, L., Wang, Q.: Machine learning techniques for code smell detection: a systematic literature review and meta-analysis. Inf. Softw. Technol. 108, 115\u2013138 (2019). \n                      https:\/\/doi.org\/10.1016\/j.infsof.2018.12.009","journal-title":"Inf. Softw. Technol."},{"key":"31_CR12","doi-asserted-by":"publisher","unstructured":"Fernandes, E., Oliveira, J., Vale, G., Paiva, T., Figueiredo, E.: A review-based comparative study of bad smell detection tools. In: Proceedings of the 20th International Conference on Evaluation and Assessment in Software Engineering - EASE 2016, Limerick, Ireland, pp. 1\u201312. ACM Press (2016). \n                      https:\/\/doi.org\/10.1145\/2915970.2915984","DOI":"10.1145\/2915970.2915984"},{"key":"31_CR13","doi-asserted-by":"publisher","first-page":"1143","DOI":"10.1007\/s10664-015-9378-4","volume":"21","author":"F Arcelli Fontana","year":"2016","unstructured":"Arcelli Fontana, F., M\u00e4ntyl\u00e4, M.V., Zanoni, M., Marino, A.: Comparing and experimenting machine learning techniques for code smell detection. Empir. Softw. Eng. 21, 1143\u20131191 (2016). \n                      https:\/\/doi.org\/10.1007\/s10664-015-9378-4","journal-title":"Empir. Softw. Eng."},{"key":"31_CR14","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.entcs.2005.02.059","volume":"141","author":"J Kreimer","year":"2005","unstructured":"Kreimer, J.: Adaptive detection of design flaws. Electron. Notes Theor. Comput. Sci. 141, 117\u2013136 (2005). \n                      https:\/\/doi.org\/10.1016\/j.entcs.2005.02.059","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"31_CR15","doi-asserted-by":"publisher","unstructured":"Khomh, F., Vaucher, S., Gu\u00e9h\u00e9neuc, Y., Sahraoui, H.: A Bayesian approach for the detection of code and design smells. In: 2009 Ninth International Conference on Quality Software, pp. 305\u2013314 (2009). \n                      https:\/\/doi.org\/10.1109\/QSIC.2009.47","DOI":"10.1109\/QSIC.2009.47"},{"key":"31_CR16","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1016\/j.jss.2010.11.921","volume":"84","author":"F Khomh","year":"2011","unstructured":"Khomh, F., Vaucher, S., Gu\u00e9h\u00e9neuc, Y.-G., Sahraoui, H.: BDTEX: a GQM-based Bayesian approach for the detection of antipatterns. J. Syst. Softw. 84, 559\u2013572 (2011). \n                      https:\/\/doi.org\/10.1016\/j.jss.2010.11.921","journal-title":"J. Syst. Softw."},{"key":"31_CR17","doi-asserted-by":"publisher","unstructured":"Yang, J., Hotta, K., Higo, Y., Igaki, H., Kusumoto, S.: Filtering clones for individual user based on machine learning analysis. In: 2012 6th International Workshop on Software Clones (IWSC), Zurich, Switzerland, pp. 76\u201377. IEEE (2012). \n                      https:\/\/doi.org\/10.1109\/IWSC.2012.6227872","DOI":"10.1109\/IWSC.2012.6227872"},{"key":"31_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.infsof.2015.03.007","volume":"64","author":"K Petersen","year":"2015","unstructured":"Petersen, K., Vakkalanka, S., Kuzniarz, L.: Guidelines for conducting systematic mapping studies in software engineering: an update. Inf. Softw. Technol. 64, 1\u201318 (2015). \n                      https:\/\/doi.org\/10.1016\/j.infsof.2015.03.007","journal-title":"Inf. Softw. Technol."},{"issue":"5","key":"31_CR19","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1016\/j.infsof.2010.12.003","volume":"53","author":"Paulo Anselmo da Mota Silveira Neto","year":"2011","unstructured":"da Mota Silveira Neto, P.A., do Carmo Machado, I., McGregor, J.D., de Almeida, E.S., de Lemos Meira, S.R.: A systematic mapping study of software product lines testing. Inf. Softw. Technol. 53, 407\u2013423 (2011). \n                      https:\/\/doi.org\/10.1016\/j.infsof.2010.12.003","journal-title":"Information and Software Technology"},{"key":"31_CR20","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1007\/s10115-013-0721-z","volume":"42","author":"G Czibula","year":"2015","unstructured":"Czibula, G., Marian, Z., Czibula, I.G.: Detecting software design defects using relational association rule mining. Knowl. Inf. Syst. 42, 545\u2013577 (2015). \n                      https:\/\/doi.org\/10.1007\/s10115-013-0721-z","journal-title":"Knowl. Inf. Syst."},{"key":"31_CR21","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1002\/spe.2639","volume":"49","author":"F Sabir","year":"2019","unstructured":"Sabir, F., Palma, F., Rasool, G., Gu\u00e9h\u00e9neuc, Y.-G., Moha, N.: A systematic literature review on the detection of smells and their evolution in object-oriented and service-oriented systems. Softw. Pract. Exp. 49, 3\u201339 (2019). \n                      https:\/\/doi.org\/10.1002\/spe.2639","journal-title":"Softw. Pract. Exp."},{"key":"31_CR22","doi-asserted-by":"publisher","unstructured":"Kaur, A., Jain, S., Goel, S.: A support vector machine based approach for code smell detection. In: 2017 International Conference on Machine Learning and Data Science (MLDS), pp. 9\u201314 (2017). \n                      https:\/\/doi.org\/10.1109\/MLDS.2017.8","DOI":"10.1109\/MLDS.2017.8"},{"key":"31_CR23","doi-asserted-by":"publisher","unstructured":"Liu, H., Xu, Z., Zou, Y.: Deep learning based feature envy detection. In: Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering - ASE 2018, Montpellier, France, pp. 385\u2013396. ACM Press (2018). \n                      https:\/\/doi.org\/10.1145\/3238147.3238166","DOI":"10.1145\/3238147.3238166"},{"key":"31_CR24","doi-asserted-by":"publisher","unstructured":"Nucci, D.D., Palomba, F., Tamburri, D.A., Serebrenik, A., Lucia, A.D.: Detecting code smells using machine learning techniques: are we there yet? In: 2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 612\u2013621 (2018). \n                      https:\/\/doi.org\/10.1109\/SANER.2018.8330266","DOI":"10.1109\/SANER.2018.8330266"},{"key":"31_CR25","doi-asserted-by":"publisher","unstructured":"Alkharabsheh, K., Crespo, Y., Manso, E., Taboada, J.A.: Software Design Smell Detection: a systematic mapping study. Softw. Qual. J. (2018). \n                      https:\/\/doi.org\/10.1007\/s11219-018-9424-8","DOI":"10.1007\/s11219-018-9424-8"},{"key":"31_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-3-319-09156-3_25","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2014","author":"D B\u00e1n","year":"2014","unstructured":"B\u00e1n, D., Ferenc, R.: Recognizing antipatterns and analyzing their effects on software maintainability. In: Murgante, B., et al. (eds.) ICCSA 2014. LNCS, vol. 8583, pp. 337\u2013352. Springer, Cham (2014). \n                      https:\/\/doi.org\/10.1007\/978-3-319-09156-3_25"},{"key":"31_CR27","doi-asserted-by":"publisher","unstructured":"Kara\u0111uzovi\u0107-Had\u017eiabdi\u0107, K., Spahi\u0107, R.: Comparison of machine learning methods for code smell detection using reduced features. In: 2018 3rd International Conference on Computer Science and Engineering (UBMK), pp. 670\u2013672 (2018). \n                      https:\/\/doi.org\/10.1109\/UBMK.2018.8566561","DOI":"10.1109\/UBMK.2018.8566561"},{"key":"31_CR28","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1016\/j.jss.2017.03.044","volume":"128","author":"AS Nu\u00f1ez-Varela","year":"2017","unstructured":"Nu\u00f1ez-Varela, A.S., P\u00e9rez-Gonzalez, H.G., Mart\u00ednez-Perez, F.E., Soubervielle-Montalvo, C.: Source code metrics: a systematic mapping study. J. Syst. Softw. 128, 164\u2013197 (2017). \n                      https:\/\/doi.org\/10.1016\/j.jss.2017.03.044","journal-title":"J. Syst. Softw."},{"key":"31_CR29","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.jss.2016.11.030","volume":"125","author":"B Bafandeh Mayvan","year":"2017","unstructured":"Bafandeh Mayvan, B., Rasoolzadegan, A., Ghavidel Yazdi, Z.: The state of the art on design patterns: a systematic mapping of the literature. J. Syst. Softw. 125, 93\u2013118 (2017). \n                      https:\/\/doi.org\/10.1016\/j.jss.2016.11.030","journal-title":"J. Syst. Softw."},{"key":"31_CR30","first-page":"1544","volume":"18","author":"R Colomo-Palacios","year":"2012","unstructured":"Colomo-Palacios, R., Fernandes, E., Sabbagh, M., de Amescua Seco, A.: Human and intellectual capital management in the cloud: software vendor perspective. J. Univers. Comput. Sci. 18, 1544\u20131557 (2012)","journal-title":"J. Univers. Comput. Sci."}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2019"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24305-0_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,28]],"date-time":"2019-06-28T08:26:54Z","timestamp":1561710414000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24305-0_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030243043","9783030243050"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24305-0_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"29 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Saint Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}