{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T12:47:36Z","timestamp":1777639656440,"version":"3.51.4"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030347055","type":"print"},{"value":"9783030347062","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,12,15]],"date-time":"2019-12-15T00:00:00Z","timestamp":1576368000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-34706-2_5","type":"book-chapter","created":{"date-parts":[[2019,12,14]],"date-time":"2019-12-14T07:05:52Z","timestamp":1576307152000},"page":"77-99","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Software Defect Prediction Using Bad Code Smells: A Systematic Literature Review"],"prefix":"10.1007","author":[{"given":"Pawe\u0142","family":"Piotrowski","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3907-3357","authenticated-orcid":false,"given":"Lech","family":"Madeyski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,15]]},"reference":[{"key":"5_CR1","doi-asserted-by":"publisher","unstructured":"Aman H (2012) An empirical analysis on fault-proneness of well-commented modules. In: Proceedings - 2012 4th international workshop on empirical software engineering in practice, IWESEP 2012, pp 3\u20139. \nhttps:\/\/doi.org\/10.1109\/IWESEP.2012.12","DOI":"10.1109\/IWESEP.2012.12"},{"key":"5_CR2","doi-asserted-by":"publisher","unstructured":"Aman H, Amasaki S, Sasaki T, Kawahara M (2014) Empirical analysis of fault-proneness in methods by focusing on their comment lines. In: Proceedings\u2014Asia-pacific software engineering conference, APSEC. \nhttps:\/\/doi.org\/10.1109\/APSEC.2014.93","DOI":"10.1109\/APSEC.2014.93"},{"key":"5_CR3","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2015EDP7107","author":"H Aman","year":"2015","unstructured":"Aman H, Amasaki S, Sasaki T, Kawahara M (2015) Lines of comments as a noteworthy metric for analyzing fault-proneness in methods. IEICE Trans Inf Syst. \nhttps:\/\/doi.org\/10.1587\/transinf.2015EDP7107","journal-title":"IEICE Trans Inf Syst"},{"key":"5_CR4","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-3-319-09156-3_25","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2014","author":"D\u00e9nes B\u00e1n","year":"2014","unstructured":"B\u00e1n D, Ferenc R (2014) Recognizing antipatterns and analyzing their effects on software maintainability, vol 8583 LNCS. \nhttps:\/\/doi.org\/10.1007\/978-3-319-09156-3_25"},{"key":"5_CR5","doi-asserted-by":"publisher","unstructured":"D\u2019Ambros M, Bacchelli A, Lanza M (2010) On the impact of design flaws on software defects. In: Proceedings - international conference on quality software 1:23\u201331. \nhttps:\/\/doi.org\/10.1109\/QSIC.2010.58","DOI":"10.1109\/QSIC.2010.58"},{"key":"5_CR6","doi-asserted-by":"publisher","DOI":"10.1145\/2629648","author":"T Hall","year":"2014","unstructured":"Hall T, Zhang M, Bowes D, Sun Y (2014) Some code smells have a significant but small effect on faults. ACM Trans Softw Eng Methodol. \nhttps:\/\/doi.org\/10.1145\/2629648","journal-title":"ACM Trans Softw Eng Methodol"},{"issue":"3","key":"5_CR7","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1007\/s11219-013-9200-8","volume":"22","author":"C Izurieta","year":"2013","unstructured":"Izurieta C, Seaman C, Cai Y, Shull F, Zazworka N, Wong S, Vetro\u2019 A (2013) Comparing four approaches for technical debt identification. Softw Qual J 22(3):403\u2013426. \nhttps:\/\/doi.org\/10.1007\/s11219-013-9200-8","journal-title":"Softw Qual J"},{"key":"5_CR8","doi-asserted-by":"publisher","unstructured":"Jaafar F, Gu\u00e9h\u00e9neuc Y, Hamel S, Khomh F (2013) Mining the relationship between anti-patterns dependencies and fault-proneness. In: 2013 20th working conference on reverse engineering (WCRE), pp 351\u2013360. \nhttps:\/\/doi.org\/10.1109\/WCRE.2013.6671310","DOI":"10.1109\/WCRE.2013.6671310"},{"key":"5_CR9","doi-asserted-by":"publisher","unstructured":"Jaafar F, Khomh F, Gueheneuc YG, Zulkernine M (2014) Anti-pattern mutations and fault-proneness. In: Proceedings - international conference on quality software, pp 246\u2013255. \nhttps:\/\/doi.org\/10.1109\/QSIC.2014.45","DOI":"10.1109\/QSIC.2014.45"},{"key":"5_CR10","doi-asserted-by":"publisher","unstructured":"Jaafar F, Lozano A, Gueheneuc YG, Mens K (2017) On the analysis of co-occurrence of anti-patterns and clones. In: Proceedings - 2017 ieee international conference on software quality, reliability and security, QRS 2017. \nhttps:\/\/doi.org\/10.1109\/QRS.2017.38","DOI":"10.1109\/QRS.2017.38"},{"key":"5_CR11","doi-asserted-by":"publisher","unstructured":"Kaur K, Kaur P (2017) Evaluation of sampling techniques in software fault prediction using metrics and code smells. In: 2017 international conference on advances in computing, communications and informatics, ICACCI 2017, vol 2017-Janua. IEEE, pp 1377\u20131386. \nhttps:\/\/doi.org\/10.1109\/ICACCI.2017.8126033","DOI":"10.1109\/ICACCI.2017.8126033"},{"issue":"3","key":"5_CR12","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s10664-011-9171-y","volume":"17","author":"F Khomh","year":"2012","unstructured":"Khomh F, Penta MD, Gu\u00e9h\u00e9neuc YG, Antoniol G (2012) An exploratory study of the impact of antipatterns on class change- and fault-proneness. Empir Softw Eng 17(3):243\u2013275. \nhttps:\/\/doi.org\/10.1007\/s10664-011-9171-y","journal-title":"Empir Softw Eng"},{"issue":"7","key":"5_CR13","doi-asserted-by":"publisher","first-page":"1120","DOI":"10.1016\/j.jss.2006.10.018","volume":"80","author":"W Li","year":"2007","unstructured":"Li W, Shatnawi R (2007) An empirical study of the bad smells and class error probability in the post-release object-oriented system evolution. J Syst Softw 80(7):1120\u20131128. \nhttps:\/\/doi.org\/10.1016\/j.jss.2006.10.018","journal-title":"J Syst Softw"},{"key":"5_CR14","doi-asserted-by":"publisher","unstructured":"Marinescu R, Marinescu C (2011) Are the clients of flawed classes (also) defect prone? In: Proceedings - 11th IEEE international working conference on source code analysis and manipulation, SCAM 2011, pp 65\u201374. \nhttps:\/\/doi.org\/10.1109\/SCAM.2011.9","DOI":"10.1109\/SCAM.2011.9"},{"key":"5_CR15","doi-asserted-by":"publisher","unstructured":"Olbrich SM, Cruzes DS, Sjo\u00f8berg DI (2010) Are all code smells harmful? a study of god classes and brain classes in the evolution of three open source systems. In: IEEE international conference on software maintenance. ICSM. \nhttps:\/\/doi.org\/10.1109\/ICSM.2010.5609564","DOI":"10.1109\/ICSM.2010.5609564"},{"key":"5_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9535-z","author":"F Palomba","year":"2018","unstructured":"Palomba F, Bavota G, Penta MD, Fasano F, Oliveto R, Lucia AD (2018) On the diffuseness and the impact on maintainability of code smells: a large scale empirical investigation. Empir Softw Eng. \nhttps:\/\/doi.org\/10.1007\/s10664-017-9535-z","journal-title":"Empir Softw Eng"},{"key":"5_CR17","doi-asserted-by":"publisher","unstructured":"Palomba F, Zanoni M, Fontana FA, De Lucia A, Oliveto R (2017) Smells like teen spirit: improving bug prediction performance using the intensity of code smells. In: Proceedings - 2016 IEEE international conference on software maintenance and evolution. ICSME 2016, pp. 244\u2013255. \nhttps:\/\/doi.org\/10.1109\/ICSME.2016.27","DOI":"10.1109\/ICSME.2016.27"},{"issue":"2","key":"5_CR18","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1109\/TSE.2017.2770122","volume":"45","author":"F Palomba","year":"2019","unstructured":"Palomba F, Zanoni M, Fontana FA, Lucia AD, Oliveto R (2019) Toward a smell-aware bug prediction model. IEEE Trans Softw Eng 45(2):194\u2013218. \nhttps:\/\/doi.org\/10.1109\/TSE.2017.2770122","journal-title":"IEEE Trans Softw Eng"},{"issue":"4\u20135","key":"5_CR19","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1007\/s10664-011-9195-3","volume":"17","author":"F Rahman","year":"2012","unstructured":"Rahman F, Bird C, Devanbu P (2012) Clones: what is that smell? Empir Softw Eng 17(4\u20135):503\u2013530. \nhttps:\/\/doi.org\/10.1007\/s10664-011-9195-3","journal-title":"Empir Softw Eng"},{"key":"5_CR20","doi-asserted-by":"publisher","unstructured":"Saboury A, Musavi P, Khomh F, Antoniol G (2017) An empirical study of code smells in JavaScript projects. In: SANER 2017 - 24th IEEE international conference on software analysis, evolution, and reengineering, pp. 294\u2013305. \nhttps:\/\/doi.org\/10.1109\/SANER.2017.7884630","DOI":"10.1109\/SANER.2017.7884630"},{"key":"5_CR21","doi-asserted-by":"publisher","unstructured":"Shatnawi R, Li W (2006) An investigation of bad smells in object-oriented design. In: Proceedings - third international conference oninformation technology: new generations. ITNG 2006, vol 2006, pp 161\u2013163. \nhttps:\/\/doi.org\/10.1109\/ITNG.2006.31","DOI":"10.1109\/ITNG.2006.31"},{"key":"5_CR22","doi-asserted-by":"publisher","unstructured":"Soltanifar B, Akbarinasaji S, Caglayan B, Bener AB, Filiz A, Kramer BM (2016) Software analytics in practice: a defect prediction model using code smells. In: Proceedings of the 20th international database engineering & applications symposium on - IDEAS \u201916, pp 148\u2013155. \nhttps:\/\/doi.org\/10.1145\/2938503.2938553","DOI":"10.1145\/2938503.2938553"},{"key":"5_CR23","doi-asserted-by":"publisher","unstructured":"Taba SES, Khomh F, Zou Y, Hassan AE, Nagappan M (2013) Predicting bugs using antipatterns. In: IEEE international conference on software maintenance. ICSM, pp 270\u2013279. \nhttps:\/\/doi.org\/10.1109\/ICSM.2013.38","DOI":"10.1109\/ICSM.2013.38"},{"key":"5_CR24","doi-asserted-by":"publisher","unstructured":"Ubayawardana GM, Damith Karunaratna D (2019) Bug prediction model using code smells. In: 2018 18th international conference on advances in ICT for emerging regions (ICTer), pp 70\u201377. \nhttps:\/\/doi.org\/10.1109\/icter.2018.8615550","DOI":"10.1109\/icter.2018.8615550"},{"key":"5_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2013.08.002","author":"A Yamashita","year":"2013","unstructured":"Yamashita A, Moonen L (2013) To what extent can maintenance problems be predicted by code smell detection? -an empirical study. Inf Softw Technol. \nhttps:\/\/doi.org\/10.1016\/j.infsof.2013.08.002","journal-title":"Inf Softw Technol"},{"key":"5_CR26","doi-asserted-by":"publisher","unstructured":"Zhang X, Zhou Y, Zhu C (2017) An empirical study of the impact of bad designs on defect proneness. In: Proceedings - 2017 annual conference on software analysis, testing and evolution, SATE 2017, vol 2017-Janua, pp 1\u20139. \nhttps:\/\/doi.org\/10.1109\/SATE.2017.9","DOI":"10.1109\/SATE.2017.9"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Data-Centric Business and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-34706-2_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,14]],"date-time":"2019-12-14T07:22:47Z","timestamp":1576308167000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-34706-2_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,15]]},"ISBN":["9783030347055","9783030347062"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-34706-2_5","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"value":"2367-4512","type":"print"},{"value":"2367-4520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12,15]]},"assertion":[{"value":"15 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}