{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T04:07:33Z","timestamp":1746072453182,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642371851"},{"type":"electronic","value":"9783642371868"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37186-8_22","type":"book-chapter","created":{"date-parts":[[2013,4,10]],"date-time":"2013-04-10T03:01:39Z","timestamp":1365562899000},"page":"334-349","source":"Crossref","is-referenced-by-count":3,"title":["Code Quality Cultivation"],"prefix":"10.1007","author":[{"given":"Daniel","family":"Speicher","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"Fowler, M., Beck, K., Brant, J., Opdyke, W., Roberts, D.: Refactoring: Improving the Design of Existing Code. Addison-Wesley (1999)"},{"key":"22_CR2","unstructured":"Gamma, E., Helm, R., Johnson, R.E., Vlissides, J.M.: Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley (1995)"},{"key":"22_CR3","unstructured":"Marinescu, R.: Detection Strategies: Metrics-Based Rules for Detecting Design Flaws. In: Proceedings of the 20th IEEE International Conference on Software Maintenance (ICSM 2004), Washington, DC, USA (2004)"},{"key":"22_CR4","unstructured":"Riel, A.J.: Object-Oriented Design Heuristics. Addison-Wesley (1996)"},{"key":"22_CR5","unstructured":"Lanza, M., Marinescu, R.: Object-Oriented Metrics in Practice. Springer (2006)"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Demeyer, S., Ducasse, S., Nierstrasz, O.: Object Oriented Reengineering Patterns. Morgan Kaufmann (2002)","DOI":"10.1016\/B978-155860639-5\/50006-7"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Kerievsky, J.: Refactoring to Patterns. Pearson Higher Education (2004)","DOI":"10.1007\/978-3-540-27777-4_54"},{"key":"22_CR8","unstructured":"Martin, R.C.: Acyclic Visitor. In: Pattern Languages of Program Design 3, pp. 93\u2013103. Addison-Wesley Longman Publishing Co., Inc. (1997)"},{"key":"22_CR9","unstructured":"Nordberg III, M.E.: Default and Extrinsic Visitor. In: Pattern Languages of Program Design 3, pp. 105\u2013123. Addison-Wesley Longman Publishing Co., Inc. (1997)"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Palsberg, J., Jay, C.B.: The Essence of the Visitor Pattern. In: Proceedings of the Twenty-Second Annual International Computer Software and Applications Conference, COMPSAC 1998, pp. 9\u201315. IEEE (1998)","DOI":"10.1109\/CMPSAC.1998.716629"},{"key":"22_CR11","first-page":"557","volume-title":"Aspect-Oriented Software Development","author":"M.E. Nordberg III","year":"2005","unstructured":"Nordberg III, M.E.: Aspect-Oriented Dependency Management. In: Filman, R.E., Elrad, T., Clarke, S. (eds.) Aspect-Oriented Software Development, pp. 557\u2013584. Addison-Wesley, Boston (2005)"},{"key":"22_CR12","unstructured":"Exman, I.: Knowledge Incompleteness Considered Desirable. In: Fraga, A., Llorens, J. (eds.) Proc. of 2nd Workshop on Knowledge Reuse (KREUSE 2009) Hosted by ICSR 2009, Falls Church, VA, USA (2009)"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Kniesel, G., Binun, A.: Standing on the Shoulders of Giants - A Data Fusion Approach to Design Pattern Detection. In: 17th International Conference on Program Comprehension (ICPC 2009), Vancouver, Canada (2009)","DOI":"10.1109\/ICPC.2009.5090044"},{"key":"22_CR14","unstructured":"Jancke, S.: Smell Detection in Context. Diploma Thesis, University of Bonn (2010)"},{"key":"22_CR15","unstructured":"Speicher, D., Nonnen, J., M\u00fcgge, H.: How many realities fit into a program? - Notes on the meaning of meaning for programs. In: Proceedings of the Second International Workshop on Software Knowledge (SKY 2011), Paris, France (2011)"},{"key":"22_CR16","unstructured":"Wuyts, R.: A logic meta-programming approach to support the co-evolution of object-oriented design and implementation. PhD thesis, Vrije Universiteit Brussel (2001)"},{"key":"22_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/11785477_2","volume-title":"ECOOP 2006 \u2013 Object-Oriented Programming","author":"E. Hajiyev","year":"2006","unstructured":"Hajiyev, E., Verbaere, M., de Moor, O.: codeQuest: Scalable Source Code Queries with Datalog. In: Thomas, D. (ed.) ECOOP 2006. LNCS, vol.\u00a04067, pp. 2\u201327. Springer, Heidelberg (2006)"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Kniesel, G., Hannemann, J., Rho, T.: A Comparison of Logic-Based Infrastructures for Concern Detection and Extraction. In: Proceedings of the 3rd Workshop on Linking Aspect Technology and Evolution (LATE 2007), New York, NY, USA (2007)","DOI":"10.1145\/1275672.1275678"},{"key":"22_CR19","unstructured":"Ebert, J., Riediger, V., Winter, A.: Graph Technology in Reverse Engineering. The TGraph Approach. In: Proc. 10th Workshop Software Reengineering. GI Lecture Notes in Informatics (2008)"},{"key":"22_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/978-3-642-17322-6_15","volume-title":"Graph Transformations and Model-Driven Engineering","author":"J. Ebert","year":"2010","unstructured":"Ebert, J., Bildhauer, D.: Reverse Engineering Using Graph Queries. In: Engels, G., Lewerentz, C., Sch\u00e4fer, W., Sch\u00fcrr, A., Westfechtel, B. (eds.) Nagl Festschrift. LNCS, vol.\u00a05765, pp. 335\u2013362. Springer, Heidelberg (2010)"},{"key":"22_CR21","unstructured":"Riehle, D.: Framwork Design, A Role Modeling Approach. Dissertation, ETH Z\u00fcrich (2000)"},{"key":"22_CR22","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1016\/j.scico.2009.11.005","volume":"75","author":"J. Brichau","year":"2010","unstructured":"Brichau, J., Kellens, A., Castro, S., D\u2019Hondt, T.: Enforcing Structural Regularities in Software using Intensive. Sci. Comput. Program.\u00a075, 232\u2013246 (2010)","journal-title":"Sci. Comput. Program."},{"key":"22_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1007\/978-3-540-78743-3_20","volume-title":"Fundamental Approaches to Software Engineering","author":"N. Moha","year":"2008","unstructured":"Moha, N., Gu\u00e9h\u00e9neuc, Y.-G., Le Meur, A.-F., Duchien, L.: A Domain Analysis to Specify Design Defects and Generate Detection Algorithms. In: Fiadeiro, J.L., Inverardi, P. (eds.) FASE 2008. LNCS, vol.\u00a04961, pp. 276\u2013291. Springer, Heidelberg (2008)"}],"container-title":["Communications in Computer and Information Science","Knowledge Discovery, Knowledge Engineering and Knowledge Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37186-8_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T03:54:48Z","timestamp":1745985288000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37186-8_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642371851","9783642371868"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37186-8_22","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2013]]}}}