{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T17:12:43Z","timestamp":1742922763718,"version":"3.40.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030870065"},{"type":"electronic","value":"9783030870072"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-87007-2_16","type":"book-chapter","created":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T17:02:22Z","timestamp":1631293342000},"page":"217-230","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Novel Approach for the Detection of Web Service Anti-Patterns Using Word Embedding Techniques"],"prefix":"10.1007","author":[{"given":"Sahithi","family":"Tummalapalli","sequence":"first","affiliation":[]},{"given":"Lov","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Lalitha Bhanu","family":"Murthy Neti","sequence":"additional","affiliation":[]},{"given":"Vipul","family":"Kocher","sequence":"additional","affiliation":[]},{"given":"Srinivas","family":"Padmanabhuni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,11]]},"reference":[{"key":"16_CR1","unstructured":"Alaku\u015f, C.: Neighborhood construction-based multi-objective evolutionary clustering algorithm with feature selection. Master\u2019s thesis (2018)"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Borovits, N., et al.: Deepiac: deep learning-based linguistic anti-pattern detection in IAC. In: Proceedings of the 4th ACM SIGSOFT International Workshop on Machine-Learning Techniques for Software-Quality Evaluation, pp. 7\u201312 (2020)","DOI":"10.1145\/3416505.3423564"},{"issue":"3","key":"16_CR3","doi-asserted-by":"publisher","first-page":"896","DOI":"10.1007\/s10664-015-9361-0","volume":"21","author":"F Jaafar","year":"2015","unstructured":"Jaafar, F., Gu\u00e9h\u00e9neuc, Y.-G., Hamel, S., Khomh, F., Zulkernine, M.: Evaluating the impact of design pattern and anti-pattern dependencies on changes and faults. Empirical Softw. Eng. 21(3), 896\u2013931 (2015). https:\/\/doi.org\/10.1007\/s10664-015-9361-0","journal-title":"Empirical Softw. Eng."},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Kumar, L., Sureka, A.: An empirical analysis on web service anti-pattern detection using a machine learning framework. In: 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), vol. 1, pp. 2\u201311. IEEE (2018)","DOI":"10.1109\/COMPSAC.2018.00010"},{"key":"16_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/11774129_8","volume-title":"Extreme Programming and Agile Processes in Software Engineering","author":"B Pietrzak","year":"2006","unstructured":"Pietrzak, B., Walter, B.: Leveraging code smell detection with inter-smell relations. In: Abrahamsson, P., Marchesi, M., Succi, G. (eds.) XP 2006. LNCS, vol. 4044, pp. 75\u201384. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11774129_8"},{"key":"16_CR6","unstructured":"Schulte, R.W., Natis, Y.V.: Service oriented architectures, part 1. Gartner, SSA Research Note SPA-401-068 (1996)"},{"issue":"3","key":"16_CR7","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1109\/TSC.2009.14","volume":"2","author":"A Segev","year":"2009","unstructured":"Segev, A., Toch, E.: Context-based matching and ranking of web services for composition. IEEE Trans. Serv. Comput. 2(3), 210\u2013222 (2009)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"16_CR8","series-title":"Intelligent Systems Reference Library","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/978-3-030-40928-9_10","volume-title":"A Journey Towards Bio-inspired Techniques in Software Engineering","author":"S Tummalapalli","year":"2020","unstructured":"Tummalapalli, S., Kumar, L., Bhanu Murthy, N.L.: Detection of web service anti-patterns using machine learning framework. In: Singh, J., Bilgaiyan, S., Mishra, B.S.P., Dehuri, S. (eds.) A Journey Towards Bio-inspired Techniques in Software Engineering. ISRL, vol. 185, pp. 189\u2013210. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-40928-9_10"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Tummalapalli, S., Kumar, L., Neti, L.B.M.: An empirical framework for web service anti-pattern prediction using machine learning techniques. In: 2019 9th Annual Information Technology, Electromechanical Engineering and Microelectronics Conference (IEMECON), pp. 137\u2013143. IEEE (2019)","DOI":"10.1109\/IEMECONX.2019.8877008"},{"key":"16_CR10","doi-asserted-by":"publisher","unstructured":"Tummalapalli, S., Kumar, L., Murthy, N.L.B., Krishna, A.: Detection of web service anti-patterns using neural networks with multiple layers. In: Yang, H., Pasupa, K., Leung, A.C.-S., Kwok, J.T., Chan, J.H., King, I. (eds.) ICONIP 2020. CCIS, vol. 1333, pp. 571\u2013579. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-63823-8_65","DOI":"10.1007\/978-3-030-63823-8_65"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Velio\u011flu, S., Sel\u00e7uk, Y.E.: An automated code smell and anti-pattern detection approach. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA), pp. 271\u2013275. IEEE (2017)","DOI":"10.1109\/SERA.2017.7965737"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2021"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-87007-2_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T17:06:35Z","timestamp":1631293595000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-87007-2_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030870065","9783030870072"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-87007-2_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"11 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cagliari","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Customed version of CyberChair 4","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1588","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"466","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}