{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T06:52:01Z","timestamp":1743058321630,"version":"3.40.3"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319608365"},{"type":"electronic","value":"9783319608372"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-60837-2_37","type":"book-chapter","created":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T21:13:51Z","timestamp":1497993231000},"page":"447-464","source":"Crossref","is-referenced-by-count":0,"title":["Temporal Relations of Rough Anti-patterns in Software Development"],"prefix":"10.1007","author":[{"given":"\u0141ukasz","family":"Pu\u0142awski","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,22]]},"reference":[{"key":"37_CR1","unstructured":"http:\/\/checkstyle.sourceforge.net\/config_metrics.html . Accessed June 2016"},{"key":"37_CR2","unstructured":"The 14th Working Conference on Mining Software Repositories, February 2017"},{"key":"37_CR3","unstructured":"International Conference on Software Analysis, Evolution and Reengineering, February 2017"},{"key":"37_CR4","unstructured":"International Conference on Software Maintenance and Evolution, February 2017"},{"key":"37_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-6045-0","volume-title":"Managing and Mining Graph Data","author":"CC Aggarwal","year":"2010","unstructured":"Aggarwal, C.C., Wang, H.: Managing and Mining Graph Data. Springer, Heidelberg (2010)"},{"issue":"11","key":"37_CR6","doi-asserted-by":"publisher","first-page":"832","DOI":"10.1145\/182.358434","volume":"26","author":"JF Allen","year":"1983","unstructured":"Allen, J.F.: Maintaining knowledge about temporal intervals. Commun. ACM 26(11), 832\u2013843 (1983)","journal-title":"Commun. ACM"},{"key":"37_CR7","doi-asserted-by":"crossref","unstructured":"Antoniol, G., Fiutem, R., Cristoforetti, L.: Design pattern recovery in object-oriented software. In: Proceedings of 6th International Workshop on Program Comprehension, IWPC 1998, p. 153+. IEEE Computer Society, Washington, DC (1998)","DOI":"10.1109\/WPC.1998.693342"},{"key":"37_CR8","volume-title":"The Java Programming Language","author":"K Arnold","year":"2005","unstructured":"Arnold, K., Gosling, J., Holmes, D.: The Java Programming Language, 4th edn. Addison-Wesley Professional, Boston (2005)","edition":"4"},{"issue":"12","key":"37_CR9","doi-asserted-by":"publisher","first-page":"1233","DOI":"10.1002\/smr.1674","volume":"26","author":"ML Bernardi","year":"2014","unstructured":"Bernardi, M.L., Cimitile, M., Di Lucca, G.: Design pattern detection using a DSL-driven graph matching approach. J. Softw. Evol. Process 26(12), 1233\u20131266 (2014)","journal-title":"J. Softw. Evol. Process"},{"key":"37_CR10","volume-title":"AntiPatterns: Refactoring Software, Architectures, and Projects in Crisis","author":"WJ Brown","year":"1998","unstructured":"Brown, W.J., Malveau, R.C., McCormick, H.W., Mowbray, T.J.: AntiPatterns: Refactoring Software, Architectures, and Projects in Crisis, 1st edn. Wiley, New York (1998)","edition":"1"},{"key":"37_CR11","volume-title":"Software Design","author":"D Bugen","year":"2003","unstructured":"Bugen, D.: Software Design, 2nd edn. Pearson Education, London (2003)","edition":"2"},{"key":"37_CR12","unstructured":"Cich\u00fd, M., Jakub\u2019\u0131k, J.: Design patterns identification using similarity scoring algorithm with weighting score extension. In: Proceedings of 2008 Conference on Knowledge-Based Software Engineering: Proceedings of 8th Joint Conference on Knowledge-Based Software Engineering, pp. 465\u2013473. IOS Press, Amsterdam (2008)"},{"key":"37_CR13","unstructured":"Dong, J., Zhao, Y., Peng, T.: A review of design pattern mining techniques"},{"key":"37_CR14","unstructured":"Driessen, V. (2010). https:\/\/datasift.github.io\/gitflow\/IntroducingGitFlow.html"},{"key":"37_CR15","doi-asserted-by":"crossref","unstructured":"Ferenc, R., Beszedes, A., Fulop, L., Lele, J.: Design pattern mining enhanced by machine learning. In: Proceedings of 21st IEEE International Conference on Software Maintenance, ICSM 2005, pp. 295\u2013304. IEEE Computer Society, Washington, DC (2005)","DOI":"10.1109\/ICSM.2005.40"},{"key":"37_CR16","unstructured":"Fontana, F.A., Dietrich, J., Walter, B., Yamashita, A., Zanoni, M.: Preliminary catalogue of anti-pattern and code smell false positives. Technical report RA-5\/15, Poznan University of Technology (2015)"},{"issue":"1","key":"37_CR17","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s11219-007-9034-3","volume":"16","author":"O Funkhouser","year":"2008","unstructured":"Funkhouser, O., Etzkorn, L., Hughes, W.: A lightweight approach to software validation by comparing UML use cases with internal program documentation selected via call graphs. Softw. Qual. J. 16(1), 131\u2013156 (2008)","journal-title":"Softw. Qual. J."},{"key":"37_CR18","volume-title":"Elements of Reusable Object-Oriented Software","author":"E Gamma","year":"1994","unstructured":"Gamma, E., Helm, R., Johnson, R., Vlissides, J., Patterns, D.: Elements of Reusable Object-Oriented Software, 1st edn. Addison-Wesley Professional, Boston (1994)","edition":"1"},{"key":"37_CR19","doi-asserted-by":"crossref","unstructured":"G\u00f3mez, V.U., Kellens, A., Brichau, J., D\u2019Hondt, T.: Time warp, an approach for reasoning over system histories. In: Proceedings of Joint International and Annual ERCIM Workshops on Principles of Software Evolution (IWPSE) and Software Evolution (Evol) Workshops, IWPSE-Evol 2009, pp. 79\u201388. ACM, New York (2009)","DOI":"10.1145\/1595808.1595825"},{"key":"37_CR20","doi-asserted-by":"crossref","unstructured":"Gueheneuc, Y.G., Sahraoui, H., Zaidi, F.: Fingerprinting design patterns. In: Proceedings of 11th Working Conference on Reverse Engineering, WCRE 2004, pp. 172\u2013181. IEEE Computer Society, Washington, DC (2004)","DOI":"10.1109\/WCRE.2004.21"},{"issue":"C","key":"37_CR21","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1016\/j.infsof.2014.11.006","volume":"59","author":"P He","year":"2015","unstructured":"He, P., Li, B., Liu, X., Chen, J., Ma, Y.: An empirical study on software defect prediction with a simplified metric set. Inf. Softw. Technol. 59(C), 170\u2013190 (2015)","journal-title":"Inf. Softw. Technol."},{"key":"37_CR22","unstructured":"M. Heri\u010dko, S. Beloglavec. A composite design-pattern identification technique. Informatica 29 (2005)"},{"key":"37_CR23","doi-asserted-by":"crossref","unstructured":"Heuzeroth, D., Holl, T., Hogstrom, G., Lowe, W.: Automatic design pattern detection. In: 11th IEEE International Workshop on Program Comprehension, pp. 94\u2013103. IEEE, May 2003","DOI":"10.1109\/WPC.2003.1199193"},{"key":"37_CR24","doi-asserted-by":"crossref","unstructured":"Heuzeroth, D., Mandel, S., Lowe, W.: Generating design pattern detectors from pattern specifications. In: Proceedings of 18th IEEE International Conference on Automated Software Engineering, pp. 245\u2013248. IEEE Computer Society (2003)","DOI":"10.1109\/ASE.2003.1240313"},{"key":"37_CR25","doi-asserted-by":"crossref","unstructured":"Hindle, A., German, D.M.: SCQL: a formal model and a query language for source control repositories. In: Proceedings of 2005 International Workshop on Mining Software Repositories, MSR 2005, vol. 30, pp. 1\u20135. ACM, New York (2005)","DOI":"10.1145\/1083142.1083161"},{"issue":"1\u20132","key":"37_CR26","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.jss.2003.11.018","volume":"75","author":"H Huang","year":"2005","unstructured":"Huang, H., Zhang, S., Cao, J., Duan, Y.: A practical pattern recovery approach based on both structural and behavioral analysis. J. Syst. Softw. 75(1\u20132), 69\u201387 (2005)","journal-title":"J. Syst. Softw."},{"key":"37_CR27","doi-asserted-by":"crossref","unstructured":"Jaafar, F., Gueheneuc, Y.G., Hamel, S., Khomh, F.: Mining the relationship between anti-patterns dependencies and fault-proneness. In: 2013 20th Working Conference on Reverse Engineering (WCRE), pp. 351\u2013360. IEEE, October 2013","DOI":"10.1109\/WCRE.2013.6671310"},{"key":"37_CR28","doi-asserted-by":"crossref","unstructured":"Kim, S., Pan, K., Whitehead, E.E.J.: Memories of bug fixes. In: Proceedings of 14th ACM SIGSOFT International Symposium on Foundations of Software Engineering, SIGSOFT 2006\/FSE-2014, pp. 35\u201345. ACM, New York (2006)","DOI":"10.1145\/1181775.1181781"},{"key":"37_CR29","doi-asserted-by":"crossref","unstructured":"Kim, S., Zimmermann, T., Whitehead, E.J., Zeller, A.: Predicting faults from cached history. In: Proceedings of 29th International Conference on Software Engineering, ICSE 2007, pp. 489\u2013498. IEEE Computer Society, Washington, DC, May 2007","DOI":"10.1109\/ICSE.2007.66"},{"key":"37_CR30","volume-title":"Object Oriented Metrics in Practice Using Software Metrics to Characterize, Evaluate, and Improve the Design of Object Oriented Systems","author":"M Lanza","year":"2006","unstructured":"Lanza, M., Marinescu, R.: Object Oriented Metrics in Practice Using Software Metrics to Characterize, Evaluate, and Improve the Design of Object Oriented Systems. Springer, Berlin (2006)"},{"key":"37_CR31","volume-title":"Agile Software Development: Principles, Patterns, and Practices","author":"RC Martin","year":"2003","unstructured":"Martin, R.C.: Agile Software Development: Principles, Patterns, and Practices. Prentice Hall PTR, Upper Saddle River (2003)"},{"key":"37_CR32","doi-asserted-by":"crossref","unstructured":"McCabe, T.J.: A complexity measure. In: Proceedings of 2nd International Conference on Software Engineering, ICSE 1976, p. 407+. IEEE Computer Society Press, Los Alamitos (1976)","DOI":"10.1109\/TSE.1976.233837"},{"key":"37_CR33","doi-asserted-by":"crossref","unstructured":"Nayrolles, M., Moha, N., Valtchev, P.: Improving SOA antipatterns detection in service based systems by mining execution traces. In: 2013 20th Working Conference on Reverse Engineering (WCRE), pp. 321\u2013330. IEEE, October 2013","DOI":"10.1109\/WCRE.2013.6671307"},{"key":"37_CR34","doi-asserted-by":"crossref","unstructured":"Niere, J., Sch\u00e4fer, W., Wadsack, J.P., Wendehals, L., Welsh, J.: Towards pattern-based design recovery. In: Proceedings of 24th International Conference on Software Engineering, ICSE 2002, pp. 338\u2013348. ACM, New York (2002)","DOI":"10.1145\/581380.581382"},{"key":"37_CR35","doi-asserted-by":"crossref","unstructured":"Oruc, M., Akal, F., Sever, H.: Detecting design patterns in object-oriented design models by using a graph mining approach. In: 2016 4th International Conference in Software Engineering Research and Innovation (CONISOFT), pp. 115\u2013121. IEEE, April 2016","DOI":"10.1109\/CONISOFT.2016.26"},{"key":"37_CR36","unstructured":"Park, C., Kang, Y., Wu, C., Yi, K.: A static reference flow analysis to understand design pattern behavior. In: Proceedings of 11th Working Conference on Reverse Engineering, WCRE 2004, pp. 300\u2013301. IEEE Computer Society, Washington, DC (2004)"},{"key":"37_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-27794-1_1","volume-title":"Transactions on Rough Sets I","author":"Z Pawlak","year":"2004","unstructured":"Pawlak, Z.: Some issues on rough sets. In: Peters, J., Skowron, A., Grzyma\u0142a-Busse, J., Kostek, B., \u015awiniarski, R., Szczuka, M. (eds.) Transactions on Rough Sets I. Lecture Notes in Computer Science, vol. 3100, pp. 1\u201358. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-27794-1_1"},{"key":"37_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1007\/978-3-540-27794-1_16","volume-title":"Transactions on Rough Sets I","author":"J Peters","year":"2004","unstructured":"Peters, J., Ramanna, S.: Approximation space for software models. In: Peters, J., Skowron, A., Grzyma\u0142a-Busse, J., Kostek, B., \u015awiniarski, R., Szczuka, M. (eds.) Transactions on Rough Sets I. Lecture Notes in Computer Science, vol. 3100, pp. 338\u2013355. Springer, Berlin Heidelberg (2004). doi: 10.1007\/978-3-540-27794-1_16"},{"key":"37_CR39","doi-asserted-by":"crossref","unstructured":"Seemann, J., von Gudenberg, J.W.: Pattern-based design recovery of Java software. In: Proceedings of 6th ACM SIGSOFT International Symposium on Foundations of Software Engineering, SIGSOFT 1998\/FSE-6, pp. 10\u201316. ACM, New York (1998)","DOI":"10.1145\/288195.288207"},{"key":"37_CR40","doi-asserted-by":"crossref","unstructured":"Stencel, K., Wegrzynowicz, P.: Detection of diverse design pattern variants. In: 2008 15th Asia-Pacific Software Engineering Conference, pp. 25\u201332. IEEE, December 2008","DOI":"10.1109\/APSEC.2008.67"},{"key":"37_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1007\/10720123_38","volume-title":"Computer Aided Systems Theory - EUROCAST 1999","author":"JJ Torres Carbonell","year":"2000","unstructured":"Torres Carbonell, J.J., Parets-Llorca, J.: A formalisation of the evolution of software systems. In: Kopacek, P., Moreno-D\u00edaz, R., Pichler, F. (eds.) EUROCAST 1999. LNCS, vol. 1798, pp. 435\u2013449. Springer, Heidelberg (2000). doi: 10.1007\/10720123_38"},{"issue":"11","key":"37_CR42","doi-asserted-by":"publisher","first-page":"896","DOI":"10.1109\/TSE.2006.112","volume":"32","author":"N Tsantalis","year":"2006","unstructured":"Tsantalis, N., Chatzigeorgiou, A., Stephanides, G., Halkidis, S.T.: Design pattern detection using similarity scoring. IEEE Trans. Softw. Eng. 32(11), 896\u2013909 (2006)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"37_CR43","doi-asserted-by":"crossref","unstructured":"Wedel, M., Jensen, U., G\u00f6hner, P.: Mining software code repositories and bug databases using survival analysis models. In: Proceedings of 2nd ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM 2008, pp. 282\u2013284. ACM, New York (2008)","DOI":"10.1145\/1414004.1414052"},{"key":"37_CR44","unstructured":"Wegrzynowicz, P., Stencel, K.: Relaxing queries to detect variants of design patterns. In: 2013 Federated Conference on Computer Science and Information Systems (FedCSIS), pp. 1571\u20131578. IEEE (2013)"},{"key":"37_CR45","unstructured":"Zhu, L., Babar, M.A., Jeffery, R.: Mining patterns to support software architecture evaluation. In: Proceedings of 4th Working IEEE\/IFIP Conference on Software Architecture, WICSA 2004, pp. 25\u201334. IEEE, June 2004"}],"container-title":["Lecture Notes in Computer Science","Rough Sets"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-60837-2_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T07:39:00Z","timestamp":1569483540000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-60837-2_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319608365","9783319608372"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-60837-2_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}