{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T06:57:25Z","timestamp":1743145045395,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642226540"},{"type":"electronic","value":"9783642226557"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22655-7_6","type":"book-chapter","created":{"date-parts":[[2011,7,18]],"date-time":"2011-07-18T17:37:43Z","timestamp":1311010663000},"page":"105-129","source":"Crossref","is-referenced-by-count":7,"title":["Mining Evolution of Object Usage"],"prefix":"10.1007","author":[{"given":"Yana Momchilova","family":"Mileva","sequence":"first","affiliation":[]},{"given":"Andrzej","family":"Wasylkowski","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Zeller","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","first-page":"481","volume-title":"ICSE 2008: Proceedings of the 30th International Conference on Software Engineering","author":"B. Dagenais","year":"2008","unstructured":"Dagenais, B., Robillard, M.P.: Recommending adaptive changes for framework evolution. In: ICSE 2008: Proceedings of the 30th International Conference on Software Engineering, pp. 481\u2013490. ACM, New York (2008)"},{"key":"6_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1007\/11785477_24","volume-title":"ECOOP 2006 \u2013 Object-Oriented Programming","author":"D. Dig","year":"2006","unstructured":"Dig, D., Comertoglu, C., Marinov, D., Johnson, R.: Automated detection of refactorings in evolving components. In: Hu, Q. (ed.) ECOOP 2006. LNCS, vol.\u00a04067, pp. 404\u2013428. Springer, Heidelberg (2006)"},{"key":"6_CR3","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1109\/ICSM.2005.90","volume-title":"Proceedings of the 21st IEEE International Conference on Software Maintenance","author":"D. Dig","year":"2005","unstructured":"Dig, D., Johnson, R.: The role of refactorings in API evolution. In: Proceedings of the 21st IEEE International Conference on Software Maintenance, pp. 389\u2013398. IEEE Computer Society, Washington, DC, USA (2005)"},{"key":"6_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1454247.1454249","volume-title":"RSSE 2008: Proceedings of the 2008 International Workshop on Recommendation Systems for Software Engineering","author":"B. Fluri","year":"2008","unstructured":"Fluri, B., Zuberb\u00fchler, J., Gall, H.C.: Recommending method invocation context changes. In: RSSE 2008: Proceedings of the 2008 International Workshop on Recommendation Systems for Software Engineering, pp. 1\u20135. ACM, New York (2008)"},{"key":"6_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-59830-2","volume-title":"Formal concept analysis: Mathematical foundations","author":"B. Ganter","year":"1999","unstructured":"Ganter, B., Wille, R.: Formal concept analysis: Mathematical foundations. Springer, Heidelberg (1999)"},{"key":"6_CR6","unstructured":"G\u00f6tzmann, D.\u00a0N.: Formale Begriffsanalyse in Java: Entwurf und Implementierung effizienter Algorithmen. Bachelor thesis, Saarland University, Publication and software available from (2007), http:\/\/code.google.com\/p\/colibri-java\/ (accessed April 6, 2010)"},{"key":"6_CR7","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1109\/ICSE.2009.5070531","volume-title":"ICSE 2009: Proceedings of the 31st International Conference on Software Engineering","author":"M. Kim","year":"2009","unstructured":"Kim, M., Notkin, D.: Discovering and representing systematic code changes. In: ICSE 2009: Proceedings of the 31st International Conference on Software Engineering, pp. 309\u2013319. IEEE Computer Society, Washington, DC, USA (2009)"},{"key":"6_CR8","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1145\/1181775.1181781","volume-title":"SIGSOFT 2006\/FSE-14: Proceedings of the 14th ACM SIGSOFT International Symposium on Foundations of Software Engineering","author":"S. Kim","year":"2006","unstructured":"Kim, S., Pan, K., James Whitehead, J.E.E.: Memories of bug fixes. In: SIGSOFT 2006\/FSE-14: Proceedings of the 14th ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 35\u201345. ACM, New York (2006)"},{"key":"6_CR9","first-page":"143","volume-title":"Proceedings of the 12th Working Conference on Reverse Engineering","author":"S. Kim","year":"2005","unstructured":"Kim, S., Pan, K., Whitehead Jr., E.J.: When functions change their names: Automatic detection of origin relationships. In: Proceedings of the 12th Working Conference on Reverse Engineering, pp. 143\u2013152. IEEE Computer Society, Washington, DC, USA (2005)"},{"key":"6_CR10","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1145\/1081706.1081755","volume-title":"ESEC\/FSE-13: Proceedings of the 10th European Software Engineering Conference held Jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering","author":"Z. Li","year":"2005","unstructured":"Li, Z., Zhou, Y.: PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code. In: ESEC\/FSE-13: Proceedings of the 10th European Software Engineering Conference held Jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 306\u2013315. ACM, New York (2005)"},{"key":"6_CR11","unstructured":"Lindig, C.: Mining patterns and violations using concept analysis. Technical report, Saarland University, Saarbr\u00fccken, Germany (June 2007)"},{"key":"6_CR12","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1145\/1081706.1081754","volume-title":"Proceedings of the 10th European Software Engineering Conference held jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering","author":"V.B. Livshits","year":"2005","unstructured":"Livshits, V.B., Zimmermann, T.: Dynamine: Finding common error patterns by mining software revision histories. In: Proceedings of the 10th European Software Engineering Conference held jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 296\u2013305. ACM, New York (2005)"},{"key":"6_CR13","volume-title":"The New Oxford American Dictionary","year":"2005","unstructured":"McKean, E. (ed.): The New Oxford American Dictionary, 2nd edn. Oxford University Press, Oxford (2005)","edition":"2"},{"key":"6_CR14","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1145\/1869459.1869486","volume-title":"Proceedings of the ACM International Conference on Object Oriented Programming Systems Languages and Applications, OOPSLA 2010","author":"H.A. Nguyen","year":"2010","unstructured":"Nguyen, H.A., Nguyen, T.T., Wilson Jr., G., Nguyen, A.T., Kim, M., Nguyen, T.N.: A graph-based approach to API usage adaptation. In: Proceedings of the ACM International Conference on Object Oriented Programming Systems Languages and Applications, OOPSLA 2010, pp. 302\u2013321. ACM, New York (2010)"},{"key":"6_CR15","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1145\/1806799.1806847","volume-title":"ICSE 2010: Proceedings of the 32nd ACM\/IEEE International Conference on Software Engineering","author":"T.T. Nguyen","year":"2010","unstructured":"Nguyen, T.T., Nguyen, H.A., Pham, N.H., Al-Kofahi, J., Nguyen, T.N.: Recurring bug fixes in object-oriented programs. In: ICSE 2010: Proceedings of the 32nd ACM\/IEEE International Conference on Software Engineering, pp. 315\u2013324. ACM, New York (2010)"},{"key":"6_CR16","first-page":"383","volume-title":"ESEC\/FSE 2009: Proceedings of the the 7th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering","author":"T.T. Nguyen","year":"2009","unstructured":"Nguyen, T.T., Nguyen, H.A., Pham, N.H., Al-Kofahi, J.M., Nguyen, T.N.: Graph-based mining of multiple object usage patterns. In: ESEC\/FSE 2009: Proceedings of the the 7th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, pp. 383\u2013392. ACM, New York (2009)"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Wasylkowski, A., Zeller, A., Lindig, C.: Detecting object usage anomalies. In: Proceedings of the 11th European Software Engineering Conference held jointly with 15th ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 35\u201344 (September 2007)","DOI":"10.1145\/1287624.1287632"},{"key":"6_CR18","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1109\/ASE.2006.41","volume-title":"Proceedings of the 21st IEEE\/ACM International Conference on Automated Software Engineering","author":"P. Weissgerber","year":"2006","unstructured":"Weissgerber, P., Diehl, S.: Identifying refactorings from source-code changes. In: Proceedings of the 21st IEEE\/ACM International Conference on Automated Software Engineering, pp. 231\u2013240. IEEE Computer Society, Washington, DC, USA (2006)"},{"issue":"6","key":"6_CR19","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1109\/TSE.2005.63","volume":"31","author":"C.C. Williams","year":"2005","unstructured":"Williams, C.C., Hollingsworth, J.K.: Automatic mining of source code repositories to improve bug finding techniques. IEEE Trans. Softw. Eng.\u00a031(6), 466\u2013480 (2005)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"6_CR20","first-page":"263","volume-title":"Proceedings of the 13th Working Conference on Reverse Engineering","author":"Z. Xing","year":"2006","unstructured":"Xing, Z., Stroulia, E.: Refactoring detection based on umldiff change-facts queries. In: Proceedings of the 13th Working Conference on Reverse Engineering, pp. 263\u2013274. IEEE Computer Society, Washington, DC, USA (2006)"}],"container-title":["Lecture Notes in Computer Science","ECOOP 2011 \u2013 Object-Oriented Programming"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22655-7_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,28]],"date-time":"2021-11-28T05:38:55Z","timestamp":1638077935000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22655-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642226540","9783642226557"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22655-7_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}