{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T22:02:49Z","timestamp":1742940169926,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319471655"},{"type":"electronic","value":"9783319471662"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-47166-2_36","type":"book-chapter","created":{"date-parts":[[2016,10,4]],"date-time":"2016-10-04T18:07:34Z","timestamp":1475604454000},"page":"517-531","source":"Crossref","is-referenced-by-count":11,"title":["Safer Refactorings"],"prefix":"10.1007","author":[{"given":"Anna Maria","family":"Eilertsen","sequence":"first","affiliation":[]},{"given":"Anya Helene","family":"Bagge","sequence":"additional","affiliation":[]},{"given":"Volker","family":"Stolz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,5]]},"reference":[{"key":"36_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1007\/978-3-540-72952-5_2","volume-title":"Formal Methods for Open Object-Based Distributed Systems","author":"W Ahrendt","year":"2007","unstructured":"Ahrendt, W., Beckert, B., H\u00e4hnle, R., Schmitt, P.H.: KeY: a formal method for object-oriented systems. In: Bonsangue, M.M., Johnsen, E.B. (eds.) FMOODS 2007. LNCS, vol. 4468, pp. 32\u201343. Springer, Heidelberg (2007)"},{"doi-asserted-by":"crossref","unstructured":"Cinn\u00e9ide, M.\u00d3., Nixon, P.: A methodology for the automated introduction of design patterns. In: International Conference on Software Maintenance, ICSM 1999, pp. 463\u2013472. IEEE Computer Society (1999)","key":"36_CR2","DOI":"10.1109\/ICSM.1999.792644"},{"unstructured":"Eilertsen, A.M.: Making software refactoring safer. Master\u2019s thesis, Department of Informatics, University of Bergen (2016)","key":"36_CR3"},{"issue":"1\u20133","key":"36_CR4","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.scico.2007.02.003","volume":"69","author":"T Ekman","year":"2007","unstructured":"Ekman, T., Hedin, G.: The JastAdd system - modular extensible compiler construction. Sci. Comput. Program. 69(1\u20133), 14\u201326 (2007)","journal-title":"Sci. Comput. Program."},{"key":"36_CR5","volume-title":"Refactoring: Improving the Design of Existing Code","author":"M Fowler","year":"1999","unstructured":"Fowler, M.: Refactoring: Improving the Design of Existing Code. Addison-Wesley, Boston (1999)"},{"key":"36_CR6","volume-title":"Design Patterns: Elements of Reusable Object-Oriented Software","author":"E Gamma","year":"1994","unstructured":"Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, Boston (1994)"},{"key":"36_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-78663-4_1","volume-title":"Trustworthy Global Computing","author":"M Hofmann","year":"2008","unstructured":"Hofmann, M., Pavlova, M.: Elimination of ghost variables in program logics. In: Barthe, G., Fournet, C. (eds.) TGC 2007. LNCS, vol. 4912, pp. 1\u201320. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-78663-4_1"},{"issue":"3","key":"36_CR8","doi-asserted-by":"crossref","first-page":"396","DOI":"10.1145\/503502.503505","volume":"23","author":"A Igarashi","year":"2001","unstructured":"Igarashi, A., Pierce, B.C., Wadler, P.: Featherweight Java: a minimal core calculus for Java and GJ. ACM Trans. Program. Lang. Syst. (TOPLAS) 23(3), 396\u2013450 (2001)","journal-title":"ACM Trans. Program. Lang. Syst. (TOPLAS)"},{"unstructured":"Kristiansen, E.: Automated composition of refactorings. Master\u2019s thesis, Department of Informatics, University of Oslo (2014). http:\/\/www.mn.uio.no\/ifi\/english\/research\/groups\/pma\/completedmasters\/2014\/kristiansen\/","key":"36_CR9"},{"unstructured":"Kristiansen, E., Stolz, V.: Search-based composed refactorings. In: 27th Norsk Informatikkonferanse, NIK. Bibsys Open Journal Systems, Norway (2014)","key":"36_CR10"},{"key":"36_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/11901433_2","volume-title":"Formal Methods and Software Engineering","author":"GT Leavens","year":"2006","unstructured":"Leavens, G.T.: JML\u2019s rich, inherited specifications for behavioral subtypes. In: Liu, Z., Kleinberg, R.D. (eds.) ICFEM 2006. LNCS, vol. 4260, pp. 2\u201334. Springer, Heidelberg (2006)"},{"issue":"3","key":"36_CR12","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1007\/s10270-006-0044-6","volume":"6","author":"T Mens","year":"2007","unstructured":"Mens, T., Taentzer, G., Runge, O.: Analysing refactoring dependencies using graph transformation. Softw. Syst. Model. 6(3), 269\u2013285 (2007)","journal-title":"Softw. Syst. Model."},{"issue":"1","key":"36_CR13","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/TSE.2011.41","volume":"38","author":"E Murphy-Hill","year":"2012","unstructured":"Murphy-Hill, E., Parnin, C., Black, A.P.: How we refactor, and how we know it. IEEE Trans. Softw. Eng. 38(1), 5\u201318 (2012)","journal-title":"IEEE Trans. Softw. Eng."},{"unstructured":"Opdyke, W.F.: Refactoring object-oriented frameworks. Ph.D. thesis, University of Illinois at Urbana-Champaign (1992). UMI Order No. GAX93-05645","key":"36_CR14"},{"key":"36_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/3-540-36579-6_10","volume-title":"Compiler Construction","author":"BG Ryder","year":"2003","unstructured":"Ryder, B.G.: Dimensions of precision in reference analysis of object-oriented programming languages. In: Hedin, G. (ed.) CC 2003. LNCS, vol. 2622, pp. 126\u2013137. Springer, Heidelberg (2003). doi: 10.1007\/3-540-36579-6_10"},{"doi-asserted-by":"crossref","unstructured":"Sch\u00e4fer, M., de Moor, O.: Specifying, implementing refactorings. In: Cook, W.R., Clarke, S., Rinard, M.C. (eds.) Object Oriented Programming: Systems, Languages, and Applications (OOPSLA) 2010, pp. 286\u2013301. ACM (2010)","key":"36_CR16","DOI":"10.1145\/1869459.1869485"},{"issue":"1","key":"36_CR17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1561\/2500000014","volume":"2","author":"Y Smaragdakis","year":"2015","unstructured":"Smaragdakis, Y., Balatsouras, G.: Pointer analysis. Found. Trends Program. Lang. 2(1), 1\u201369 (2015)","journal-title":"Found. Trends Program. Lang."},{"issue":"4","key":"36_CR18","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/MS.2010.63","volume":"27","author":"G Soares","year":"2010","unstructured":"Soares, G., Gheyi, R., Serey, D., Massoni, T.: Making program refactoring safer. IEEE Softw. 27(4), 52\u201357 (2010)","journal-title":"IEEE Softw."},{"doi-asserted-by":"crossref","unstructured":"Wimmer, C., M\u00f6ssenb\u00f6ck, H.: Automatic feedback-directed object inlining in the Java HotSpot $$^{\\text{tm}}$$ virtual machine. In: Krintz, C., Hand, S., Tarditi, D. (eds.) 3rd International Conference on Virtual Execution Environments VEE, pp. 12\u201321. ACM (2007)","key":"36_CR19","DOI":"10.1145\/1254810.1254813"},{"issue":"1\u20132","key":"36_CR20","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/s00165-007-0067-y","volume":"21","author":"L Zhao","year":"2009","unstructured":"Zhao, L., Liu, X., Liu, Z., Qiu, Z.: Graph transformations for object-oriented refinement. Formal Asp. Comput. 21(1\u20132), 103\u2013131 (2009)","journal-title":"Formal Asp. Comput."}],"container-title":["Lecture Notes in Computer Science","Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47166-2_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T20:22:07Z","timestamp":1498335727000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47166-2_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319471655","9783319471662"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47166-2_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}