{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,23]],"date-time":"2025-03-23T19:10:20Z","timestamp":1742757020834,"version":"3.40.2"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642288715"},{"type":"electronic","value":"9783642288722"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-28872-2_31","type":"book-chapter","created":{"date-parts":[[2012,3,22]],"date-time":"2012-03-22T20:48:16Z","timestamp":1332449296000},"page":"455-470","source":"Crossref","is-referenced-by-count":7,"title":["A New Design Defects Classification: Marrying Detection and Correction"],"prefix":"10.1007","author":[{"given":"Rim","family":"Mahouachi","sequence":"first","affiliation":[]},{"given":"Marouane","family":"Kessentini","sequence":"additional","affiliation":[]},{"given":"Khaled","family":"Ghedira","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","volume-title":"Genetic Algorithms in Search, Optimization and Machine Learning","author":"D.E. Goldberg","year":"1989","unstructured":"Goldberg, D.E.: Genetic Algorithms in Search, Optimization and Machine Learning. Addison-Wesley Longman Publishing Co., Inc., Boston (1989)"},{"key":"31_CR2","unstructured":"Alikacem, H., Sahraoui, H.: D\u00e9tection d\u2019anomalies utilisant un langage de description de r\u00e8gle de qualit\u00e9, in actes du 12e colloque LMO (2006)"},{"key":"31_CR3","doi-asserted-by":"crossref","unstructured":"Liu, H., Yang, L., Niu, Z., Ma, Z., Shao, W.: Facilitating software refactoring with appropriate resolution order of bad smells. In: Proc. of the ESEC\/FSE 2009, pp. 265\u2013268 (2009)","DOI":"10.1145\/1595696.1595738"},{"issue":"11","key":"31_CR4","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/219717.219771","volume":"38","author":"I. Bratko","year":"1995","unstructured":"Bratko, I., Muggleton, S.: Applications of inductive logic programming. Commun. ACM\u00a038(11), 65\u201370 (1995)","journal-title":"Commun. ACM"},{"key":"31_CR5","volume-title":"Genetic Programming: On the Programming of Computers by Means of Natural Selection","author":"J.R. Koza","year":"1992","unstructured":"Koza, J.R.: Genetic Programming: On the Programming of Computers by Means of Natural Selection. MIT Press, Cambridge (1992)"},{"key":"31_CR6","unstructured":"Erni, K., Lewerentz, C.: Applying design metrics to object-oriented frameworks. In: Proc. IEEE Symp. Software Metrics. IEEE Computer Society Press (1996)"},{"key":"31_CR7","doi-asserted-by":"crossref","unstructured":"Kessentini, M., Vaucher, S., Sahraoui, H.: Deviance from perfection is a better criterion than closeness to evil when identifying risky code. In: Proc. of ASE 2010. IEEE (2010)","DOI":"10.1145\/1858996.1859015"},{"issue":"4598","key":"31_CR8","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1126\/science.220.4598.671","volume":"220","author":"S. Kirkpatrick","year":"1983","unstructured":"Kirkpatrick, S., Gelatt Jr., C.D., Vecchi, M.P.: Optimization by simulated annealing. Sciences\u00a0220(4598), 671\u2013680 (1983)","journal-title":"Sciences"},{"key":"31_CR9","unstructured":"Fowler, M.: Refactoring \u2013 Improving the Design of Existing Code, 1st edn. Addison-Wesley (June 1999)"},{"key":"31_CR10","doi-asserted-by":"crossref","unstructured":"Harman, M., Clark, J.A.: Metrics are fitness functions too. In: IEEE METRICS, pp. 58\u201369 (2004)","DOI":"10.1109\/METRIC.2004.1357891"},{"key":"31_CR11","doi-asserted-by":"crossref","unstructured":"Kessentini, M., Kessentini, W., Sahraoui, H., Boukadoum, M., Ouni, A.: Design Defects Detection and Correction by Example. In: Proc. ICPC 2011, pp. 81\u201390. IEEE (2011)","DOI":"10.1109\/ICPC.2011.22"},{"key":"31_CR12","unstructured":"Mantyla, M., Vanhanen, J., Lassenius, C.: A taxonomy and an initial empirical study of bad smells in code. In: Proc. of ICSM 2003. IEEE Computer Society (2003)"},{"issue":"5","key":"31_CR13","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1002\/smr.378","volume":"20","author":"M. O\u2019Keeffe","year":"2008","unstructured":"O\u2019Keeffe, M., Cinn\u00e9ide, M.: Search-based refactoring: an empirical study. Journal of Software Maintenance\u00a020(5), 345\u2013364 (2008)","journal-title":"Journal of Software Maintenance"},{"issue":"2","key":"31_CR14","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/TSE.2004.1265817","volume":"30","author":"T. Mens","year":"2004","unstructured":"Mens, T., Tourw\u00e9, T.: A Survey of Software Refactoring. IEEE Trans. Softw.\u00a030(2), 126\u2013139 (2004)","journal-title":"IEEE Trans. Softw."},{"key":"31_CR15","volume-title":"Software Metrics: A Rigorous and Practical Approach","author":"N. Fenton","year":"1997","unstructured":"Fenton, N., Pfleeger, S.L.: Software Metrics: A Rigorous and Practical Approach, 2nd edn. International Thomson Computer Press, London (1997)","edition":"2"},{"key":"31_CR16","unstructured":"Moha, N., Gu\u00e9h\u00e9neuc, Y.-G., Duchien, L., Meu, A.-F.L.: DECOR: A method for the specification and detection of code and design smells. Transactions on Software Engineering (TSE), 16 pages (2009)"},{"key":"31_CR17","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/0004-3702(77)90003-0","volume":"8","author":"R. Davis","year":"1977","unstructured":"Davis, R., Buchanan, B., Shortcliffe, E.H.: Production Rules as a Representation for a Knowledge-base Consultation Program. Artificial Intelligence\u00a08, 15\u201345 (1977)","journal-title":"Artificial Intelligence"},{"key":"31_CR18","doi-asserted-by":"crossref","unstructured":"Marinescu, R.: Detection strategies: Metrics-based rules for detecting design flaws. In: Proc. of ICM 2004, pp. 350\u2013359 (2004)","DOI":"10.1109\/ICSM.2004.1357820"},{"key":"31_CR19","unstructured":"Heckel, R.: Algebraic graph transformations with application conditions. M.S. thesis, TU Berlin (1995)"},{"key":"31_CR20","unstructured":"Opdyke, W.F.: Refactoring: A Program Restructuring Aid in Designing Object-Oriented Application Frameworks, Ph.D. thesis, University of Illinois at Urbana-Champaign (1992)"},{"key":"31_CR21","unstructured":"Brown, W.J., Malveau, R.C., Brown, W.H., McCormick III, H.W., Mowbray, T.J.: Anti Patterns: Refactoring Software, Architectures, and Projects in Crisis, 1st edn. John Wiley and Sons (March 1998)"},{"key":"31_CR22","doi-asserted-by":"crossref","unstructured":"Kataoka, Y., Ernst, M.D., Griswold, W.G., Notkin, D.: Automated support for program refactoring using invariants. In: Proc. Int\u2019l Conf. Software Maintenance, pp. 736\u2013743. IEEE Computer Society (2001)","DOI":"10.1109\/ICSM.2001.972794"}],"container-title":["Lecture Notes in Computer Science","Fundamental Approaches to Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-28872-2_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,23]],"date-time":"2025-03-23T18:50:18Z","timestamp":1742755818000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-28872-2_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642288715","9783642288722"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-28872-2_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}