{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T16:24:18Z","timestamp":1743006258766,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031437021"},{"type":"electronic","value":"9783031437038"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-43703-8_1","type":"book-chapter","created":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T06:02:16Z","timestamp":1694498536000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Scientific Workflow Management for\u00a0Software Quality Assessment Replication: An Open Source Architecture"],"prefix":"10.1007","author":[{"given":"Jos\u00e9 Pereira","family":"dos Reis","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fernando Brito e","family":"Abreu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Glauco","family":"de F. Carneiro","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Duarte","family":"Almeida","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,9,13]]},"reference":[{"doi-asserted-by":"publisher","unstructured":"Abbuhl, R.: Why, when, and how to replicate research. In: Research Methods in Second Language Acquisition: A Practical Guide, pp. 296\u2013312 (2012). https:\/\/doi.org\/10.1002\/9781444347340.ch15","key":"1_CR1","DOI":"10.1002\/9781444347340.ch15"},{"doi-asserted-by":"publisher","unstructured":"Bryton, S., Brito e Abreu, F., Monteiro, M.: Reducing subjectivity in code smells detection: experimenting with the Long Method. In: Proceedings of the 7th International Conference on the Quality of Information and Communications Technology (QUATIC), pp. 337\u2013342. IEEE (2010). https:\/\/doi.org\/10.1109\/QUATIC.2010.60","key":"1_CR2","DOI":"10.1109\/QUATIC.2010.60"},{"issue":"Suppl 1","key":"1_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1471-2105-15-S1-S12","volume":"15","author":"S Cohen-Boulakia","year":"2014","unstructured":"Cohen-Boulakia, S., Chen, J., Missier, P., Goble, C., Williams, A.R., Froidevaux, C.: Distilling structure in taverna scientific workflows: a refactoring approach. BMC Bioinformatics 15(Suppl 1), 1\u201314 (2014). https:\/\/doi.org\/10.1186\/1471-2105-15-S1-S12","journal-title":"BMC Bioinformatics"},{"key":"1_CR4","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.infsof.2015.02.001","volume":"64","author":"CV De Magalh\u00e3es","year":"2015","unstructured":"De Magalh\u00e3es, C.V., Da Silva, F.Q., Santos, R.E., Suassuna, M.: Investigations about replication of empirical studies in software engineering: a systematic mapping study. Inf. Softw. Technol. 64, 76\u2013101 (2015). https:\/\/doi.org\/10.1016\/j.infsof.2015.02.001","journal-title":"Inf. Softw. Technol."},{"issue":"5","key":"1_CR5","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1016\/j.future.2008.06.010","volume":"25","author":"D De Roure","year":"2009","unstructured":"De Roure, D., Goble, C., Stevens, R.: The design and realisation of the Experimentmy virtual research environment for social sharing of workflows. Futur. Gener. Comput. Syst. 25(5), 561\u2013567 (2009). https:\/\/doi.org\/10.1016\/j.future.2008.06.010","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"1","key":"1_CR6","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1177\/1094342017704893","volume":"32","author":"E Deelman","year":"2018","unstructured":"Deelman, E., et al.: The future of scientific workflows. Int. J. High-Perform. Comput. Appl. 32(1), 159\u2013175 (2018). https:\/\/doi.org\/10.1177\/1094342017704893","journal-title":"Int. J. High-Perform. Comput. Appl."},{"key":"1_CR7","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/J.FUTURE.2014.10.008","volume":"46","author":"E Deelman","year":"2015","unstructured":"Deelman, E., et al.: Pegasus, a workflow management system for science automation. Future Gener. Comput. Syst. 46, 17\u201335 (2015). https:\/\/doi.org\/10.1016\/J.FUTURE.2014.10.008","journal-title":"Future Gener. Comput. Syst."},{"doi-asserted-by":"publisher","unstructured":"Fokaefs, M., Tsantalis, N., Stroulia, E.: JDeodorant: identification and application of extract class refactorings. In: Proceedings of the 33rd International Conference on Software Engineering, (ICSE). ACM\/IEEE (2011). https:\/\/doi.org\/10.1145\/1985793.1985989","key":"1_CR8","DOI":"10.1145\/1985793.1985989"},{"doi-asserted-by":"publisher","unstructured":"Fontana, F.A., Mangiacavalli, M., Pochiero, D., Zanoni, M.: On experimenting refactoring tools to remove code smells. In: Proceedings of the XP\u201915 Workshops, pp. 1\u20138. ACM Press, New York (2015). https:\/\/doi.org\/10.1145\/2764979.2764986","key":"1_CR9","DOI":"10.1145\/2764979.2764986"},{"doi-asserted-by":"publisher","unstructured":"Fontana, F.A., Zanoni, M., Marino, A., M\u00e4ntyl\u00e4, M.V.: Code smell detection: towards a machine learning-based approach. In: Proceedings of the International Conference on Software Maintenance (ICSM). IEEE (2013). https:\/\/doi.org\/10.1109\/ICSM.2013.56","key":"1_CR10","DOI":"10.1109\/ICSM.2013.56"},{"issue":"8","key":"1_CR11","doi-asserted-by":"publisher","first-page":"1033","DOI":"10.1016\/j.infsof.2014.04.004","volume":"56","author":"OS G\u00f3mez","year":"2014","unstructured":"G\u00f3mez, O.S., Juristo, N., Vegas, S.: Understanding replication of experiments in software engineering: a classification. Inf. Softw. Technol. 56(8), 1033\u20131048 (2014). https:\/\/doi.org\/10.1016\/j.infsof.2014.04.004","journal-title":"Inf. Softw. Technol."},{"key":"1_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-25231-0_1","volume-title":"Empirical Software Engineering and Verification","author":"M Harman","year":"2012","unstructured":"Harman, M., McMinn, P., de Souza, J.T., Yoo, S.: Search based software engineering: techniques, taxonomy, tutorial. In: Meyer, B., Nordio, M. (eds.) LASER 2008-2010. LNCS, vol. 7007, pp. 1\u201359. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-25231-0_1"},{"issue":"3","key":"1_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3186266","volume":"51","author":"P Ivie","year":"2018","unstructured":"Ivie, P., Thain, D.: Reproducibility in scientific computing. ACM Comput. Surv. 51(3), 1\u201336 (2018). https:\/\/doi.org\/10.1145\/3186266","journal-title":"ACM Comput. Surv."},{"key":"1_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/978-3-642-25231-0_2","volume-title":"Empirical Software Engineering and Verification","author":"N Juristo","year":"2012","unstructured":"Juristo, N., G\u00f3mez, O.S.: Replication of software engineering experiments. In: Meyer, B., Nordio, M. (eds.) Empirical Software Engineering and Verification. Lecture Notes in Computer Science, vol. 7007, pp. 60\u201388. Springer, Berlin (2012)"},{"issue":"2","key":"1_CR15","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s10664-008-9061-0","volume":"13","author":"B Kitchenham","year":"2008","unstructured":"Kitchenham, B.: The role of replications in empirical software engineering-a word of warning. Empir. Softw. Eng. 13(2), 219\u2013221 (2008). https:\/\/doi.org\/10.1007\/s10664-008-9061-0","journal-title":"Empir. Softw. Eng."},{"issue":"2","key":"1_CR16","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1111\/j.1533-8525.1972.tb00805.x","volume":"13","author":"MA La Sorte","year":"1972","unstructured":"La Sorte, M.A.: Replication as a verification technique in survey research: a paradigm. Sociol. Q. 13(2), 218\u2013227 (1972). https:\/\/doi.org\/10.1111\/j.1533-8525.1972.tb00805.x","journal-title":"Sociol. Q."},{"issue":"1","key":"1_CR17","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1109\/TSE.2011.9","volume":"38","author":"H Liu","year":"2012","unstructured":"Liu, H., Ma, Z., Shao, W., Niu, Z.: Schedule of bad smell detection and resolution: a new way to save effort. IEEE Trans. Softw. Eng. 38(1), 220\u2013235 (2012). https:\/\/doi.org\/10.1109\/TSE.2011.9","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"3","key":"1_CR18","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/s10664-006-9002-8","volume":"11","author":"M Mantyla","year":"2006","unstructured":"Mantyla, M., Lassenius, C.: Subjective evaluation of software evolvability using code smells: an empirical study. Empir. Softw. Eng. 11(3), 395\u2013431 (2006). https:\/\/doi.org\/10.1007\/s10664-006-9002-8","journal-title":"Empir. Softw. Eng."},{"doi-asserted-by":"publisher","unstructured":"Mantyla, M., Vanhanen, J., Lassenius, C.: Bad smells - humans as code critics. In: Proceedings of the 20th International Conference on Software Maintenance (ICSM), pp. 399\u2013408 (2004). https:\/\/doi.org\/10.1109\/ICSM.2004.1357825","key":"1_CR19","DOI":"10.1109\/ICSM.2004.1357825"},{"issue":"5","key":"1_CR20","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1109\/TSE.2014.2372760","volume":"41","author":"F Palomba","year":"2015","unstructured":"Palomba, F., Bavota, G., Penta, M.D., Oliveto, R., Poshyvanyk, D., Lucia, A.D.: Mining version histories for detecting code smells. IEEE Trans. Software Eng. 41(5), 462\u2013489 (2015). https:\/\/doi.org\/10.1109\/TSE.2014.2372760","journal-title":"IEEE Trans. Software Eng."},{"unstructured":"Pessoa, T., Brito e Abreu, F., Monteiro, M.P., Bryton, S.: An eclipse plugin to support code smells detection. In: Proceedings of INFORUM 2011 (Simp\u00f3sio de Inform\u00e1tica). p. 12 (2011). https:\/\/arxiv.org\/abs\/1204.6492","key":"1_CR21"},{"doi-asserted-by":"publisher","unstructured":"Pereira dos Reis, J., Brito e Abreu, F., de Figueiredo Carneiro, G., Anslow, C.: Code smells detection and visualization: a systematic literature review. Arch. Comput. Methods Eng. 29(1), 47\u201394 (2022). https:\/\/doi.org\/10.1007\/s11831-021-09566-x","key":"1_CR22","DOI":"10.1007\/s11831-021-09566-x"},{"doi-asserted-by":"publisher","unstructured":"Shepperd, M.: Replication studies considered harmful. In: Proceedings of the International Conference on Software Engineering (ICSE), pp. 73\u201376. ACM\/IEEE (2018). https:\/\/doi.org\/10.1145\/3183399.3183423","key":"1_CR23","DOI":"10.1145\/3183399.3183423"},{"issue":"2","key":"1_CR24","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s10664-008-9060-1","volume":"13","author":"FJ Shull","year":"2008","unstructured":"Shull, F.J., Carver, J.C., Vegas, S., Juristo, N.: The role of replications in empirical software engineering. Empir. Softw. Eng. 13(2), 211\u2013218 (2008). https:\/\/doi.org\/10.1007\/s10664-008-9060-1","journal-title":"Empir. Softw. Eng."},{"key":"1_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84628-757-2","volume-title":"Workflows for E-science: Scientific Workflows for Grids","author":"IJ Taylor","year":"2007","unstructured":"Taylor, I.J., Deelman, E., Gannon, D., Shields, M.S.: Workflows for E-science: Scientific Workflows for Grids. Springer, Cham (2007). https:\/\/doi.org\/10.1007\/978-1-84628-757-2"},{"doi-asserted-by":"publisher","unstructured":"Tsantalis, N., Chaikalis, T., Chatzigeorgiou, A.: JDeodorant: identification and removal of type-checking bad smells. In: Proceedings of the 12th European Conference on Software Maintenance and Reengineering (CSMR), pp. 329\u2013331 (2008). https:\/\/doi.org\/10.1109\/CSMR.2008.4493342","key":"1_CR26","DOI":"10.1109\/CSMR.2008.4493342"},{"issue":"1","key":"1_CR27","doi-asserted-by":"publisher","first-page":"180","DOI":"10.15803\/ijnc.5.1_180","volume":"5","author":"C Wang","year":"2015","unstructured":"Wang, C., Hirasawa, S., Takizawa, H., Kobayashi, H.: Identification and elimination of platform-specific code smells in high performance computing applications. Int. J. Networking Comput. 5(1), 180\u2013199 (2015). https:\/\/doi.org\/10.15803\/ijnc.5.1_180","journal-title":"Int. J. Networking Comput."},{"doi-asserted-by":"publisher","unstructured":"Wolstencroft, K., et al.: The taverna workflow suite: designing and executing workflows of web services on the desktop, web or in the cloud. Nucleic Acids Res. 41(Web Server issue), 557\u2013561 (2013). https:\/\/doi.org\/10.1093\/nar\/gkt328","key":"1_CR28","DOI":"10.1093\/nar\/gkt328"},{"key":"1_CR29","first-page":"1","volume":"26","author":"K Wolstencroft","year":"2009","unstructured":"Wolstencroft, K., Fisher, P., Goble, C.: Scientific workflows overview. Connexions 26, 1\u20136 (2009)","journal-title":"Connexions"},{"issue":"12","key":"1_CR30","doi-asserted-by":"publisher","first-page":"2223","DOI":"10.1016\/j.infsof.2013.08.002","volume":"55","author":"A Yamashita","year":"2013","unstructured":"Yamashita, A., Moonen, L.: To what extent can maintenance problems be predicted by code smell detection? - An empirical study. Inf. Softw. Technol. 55(12), 2223\u20132242 (2013). https:\/\/doi.org\/10.1016\/j.infsof.2013.08.002","journal-title":"Inf. Softw. Technol."}],"container-title":["Communications in Computer and Information Science","Quality of Information and Communications Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-43703-8_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T06:02:26Z","timestamp":1694498546000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-43703-8_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031437021","9783031437038"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-43703-8_1","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"13 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"QUATIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Quality of Information and Communications Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Aveiro","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"quatic2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2023.quatic.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.1","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}