{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,10]],"date-time":"2026-05-10T10:17:09Z","timestamp":1778408229385,"version":"3.51.4"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031707964","type":"print"},{"value":"9783031707971","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-70797-1_6","type":"book-chapter","created":{"date-parts":[[2024,8,31]],"date-time":"2024-08-31T11:02:22Z","timestamp":1725102142000},"page":"86-101","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Attention-Based Method for\u00a0Design Pattern Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3086-370X","authenticated-orcid":false,"given":"Rania","family":"Mzid","sequence":"first","affiliation":[]},{"given":"Ilyes","family":"Rezgui","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9241-8276","authenticated-orcid":false,"given":"Tewfik","family":"Ziadi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,1]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Allamanis, M., Sutton, C.: Mining source code repositories at massive scale using language modeling. In: The 10th Working Conference on Mining Software Repositories, pp. 207\u2013216. IEEE (2013)","DOI":"10.1109\/MSR.2013.6624029"},{"key":"6_CR2","unstructured":"Bae, H., Deeb, A., Fleury, A., Zhu, K.: Complexitynet: Increasing llm inference efficiency by learning task complexity. arXiv preprint arXiv:2312.11511 (2023)"},{"issue":"1","key":"6_CR3","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1017\/S1351324916000334","volume":"23","author":"KW Church","year":"2017","unstructured":"Church, K.W.: Word2vec. Nat. Lang. Eng. 23(1), 155\u2013162 (2017)","journal-title":"Nat. Lang. Eng."},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Dewangan, S., Rao, R.S.: Design pattern detection by using correlation feature selection technique. In: 2022 IEEE 11th International Conference on Communication Systems and Network Technologies (CSNT), pp. 641\u2013645. IEEE (2022)","DOI":"10.1109\/CSNT54456.2022.9787569"},{"issue":"6","key":"6_CR5","doi-asserted-by":"publisher","first-page":"1271","DOI":"10.1109\/TSMCA.2009.2028012","volume":"39","author":"J Dong","year":"2009","unstructured":"Dong, J., Zhao, Y., Sun, Y.: A matrix-based approach to recovering design patterns. IEEE Trans. Syst. Man Cybern.-Part A: Syst. Hum. 39(6), 1271\u20131282 (2009)","journal-title":"IEEE Trans. Syst. Man Cybern.-Part A: Syst. Hum."},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Dwivedi, A.K., Tirkey, A., Rath, S.K.: Applying software metrics for the mining of design pattern. In: 2016 IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics Engineering (UPCON), pp. 426\u2013431. IEEE (2016)","DOI":"10.1109\/UPCON.2016.7894692"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Fan, G., Diao, X., Yu, H., Yang, K., Chen, L., et\u00a0al.: Software defect prediction via attention-based recurrent neural network. Scientific Programming 2019, 6230953 (2019)","DOI":"10.1155\/2019\/6230953"},{"key":"6_CR8","unstructured":"Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design patterns: elements of reusable object-oriented software. Pearson Deutschland GmbH (1995)"},{"key":"6_CR9","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/s11334-014-0241-3","volume":"11","author":"I Issaoui","year":"2015","unstructured":"Issaoui, I., Bouassida, N., Ben-Abdallah, H.: Using metric-based filtering to improve design pattern detection approaches. Innov. Syst. Softw. Eng. 11, 39\u201353 (2015)","journal-title":"Innov. Syst. Softw. Eng."},{"issue":"10","key":"6_CR10","doi-asserted-by":"publisher","first-page":"151","DOI":"10.3390\/computers11100151","volume":"11","author":"S Komolov","year":"2022","unstructured":"Komolov, S., Dlamini, G., Megha, S., Mazzara, M.: Towards predicting architectural design patterns: a machine learning approach. Computers 11(10), 151 (2022)","journal-title":"Computers"},{"issue":"7","key":"6_CR11","doi-asserted-by":"publisher","first-page":"1491","DOI":"10.3390\/sym14071491","volume":"14","author":"M Kouli","year":"2022","unstructured":"Kouli, M., Rasoolzadegan, A.: A feature-based method for detecting design patterns in source code. Symmetry 14(7), 1491 (2022)","journal-title":"Symmetry"},{"key":"6_CR12","unstructured":"Li, L., Wu, Y., Ye, M.: Experimental comparisons of multi-class classifiers. Informatica 39(1), 71\u201375 (2015)"},{"issue":"3","key":"6_CR13","first-page":"659","volume":"11","author":"P Misra","year":"2020","unstructured":"Misra, P., Yadav, A.S.: Improving the classification accuracy using recursive feature elimination with cross-validation. Int. J. Emerg. Technol. 11(3), 659\u2013665 (2020)","journal-title":"Int. J. Emerg. Technol."},{"issue":"3","key":"6_CR14","doi-asserted-by":"publisher","first-page":"e0247444","DOI":"10.1371\/journal.pone.0247444","volume":"16","author":"HS Munir","year":"2021","unstructured":"Munir, H.S., Ren, S., Mustafa, M., Siddique, C.N., Qayyum, S.: Attention based GRU-LSTM for software defect prediction. PLoS ONE 16(3), e0247444 (2021)","journal-title":"PLoS ONE"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Nacef, A., Bahroun, S., Khalfallah, A., Ahmed, S.B.: Features and supervised machine learning based method for singleton design pattern variants detection. Proceedings of the 18th International Conference on Evaluation of Novel Approaches to Software Engineering, ENASE 2023, Prague, Czech Republic, 24\u201325 April 2023, pp. 226\u2013237 (2023)","DOI":"10.5220\/0011992100003464"},{"key":"6_CR16","doi-asserted-by":"publisher","first-page":"111179","DOI":"10.1016\/j.jss.2021.111179","volume":"185","author":"N Nazar","year":"2022","unstructured":"Nazar, N., Aleti, A., Zheng, Y.: Feature-based software design pattern detection. J. Syst. Softw. 185, 111179 (2022)","journal-title":"J. Syst. Softw."},{"issue":"4","key":"6_CR17","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1016\/j.advengsoft.2009.10.014","volume":"41","author":"G Rasool","year":"2010","unstructured":"Rasool, G., Philippow, I., M\u00e4der, P.: Design pattern recovery based on annotations. Adv. Eng. Softw. 41(4), 519\u2013526 (2010)","journal-title":"Adv. Eng. Softw."},{"key":"6_CR18","unstructured":"Richards, M., Ford, N.: Fundamentals of software architecture: an engineering approach. O\u2019Reilly Media (2020)"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Ruaro, N., et al.: Syml: guiding symbolic execution toward vulnerable states through pattern learning. In: Proceedings of the 24th International Symposium on Research in Attacks, Intrusions and Defenses, pp. 456\u2013468 (2021)","DOI":"10.1145\/3471621.3471865"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Thaller, H., Linsbauer, L., Egyed, A.: Feature maps: a comprehensible software representation for design pattern detection. In: 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 207\u2013217. IEEE (2019)","DOI":"10.1109\/SANER.2019.8667978"},{"key":"6_CR21","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Advances in neural Information Processing Systems, vol. 30 (2017)"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Wang, X., Liu, J., Li, L., Chen, X., Liu, X., Wu, H.: Detecting and explaining self-admitted technical debts with attention-based neural networks. In: Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering, pp. 871\u2013882 (2020)","DOI":"10.1145\/3324884.3416583"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Wang, Y., Le, H., Gotmare, A.D., Bui, N.D., Li, J., Hoi, S.C.: Codet5+: Open code large language models for code understanding and generation. arXiv preprint arXiv:2305.07922 (2023)","DOI":"10.18653\/v1\/2023.emnlp-main.68"},{"issue":"23","key":"6_CR24","doi-asserted-by":"publisher","first-page":"12463","DOI":"10.3390\/app122312463","volume":"12","author":"S Zaharia","year":"2022","unstructured":"Zaharia, S., Rebedea, T., Trausan-Matu, S.: Machine learning-based security pattern recognition techniques for code developers. Appl. Sci. 12(23), 12463 (2022)","journal-title":"Appl. Sci."},{"key":"6_CR25","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.jss.2015.01.037","volume":"103","author":"M Zanoni","year":"2015","unstructured":"Zanoni, M., Fontana, F.A., Stella, F.: On applying machine learning techniques for design pattern detection. J. Syst. Softw. 103, 102\u2013117 (2015)","journal-title":"J. Syst. Softw."},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Zhou, P., et al.: Attention-based bidirectional long short-term memory networks for relation classification. In: Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics (volume 2: Short papers), pp. 207\u2013212 (2016)","DOI":"10.18653\/v1\/P16-2034"},{"key":"6_CR27","doi-asserted-by":"crossref","unstructured":"Zhu, H., Bayley, I., Shan, L., Amphlett, R.: Tool support for design pattern recognition at model level. In: 2009 33rd Annual IEEE International Computer Software and Applications Conference, vol.\u00a01, pp. 228\u2013233. IEEE (2009)","DOI":"10.1109\/COMPSAC.2009.37"}],"container-title":["Lecture Notes in Computer Science","Software Architecture"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-70797-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,31]],"date-time":"2024-08-31T11:03:43Z","timestamp":1725102223000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-70797-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031707964","9783031707971"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-70797-1_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"1 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The data that supports the findings is available through Zenodo ().","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Data Availability"}},{"value":"ECSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Software Architecture","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg City","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ecsa2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}