{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T03:51:22Z","timestamp":1760586682540},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642397417"},{"type":"electronic","value":"9783642397424"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39742-4_9","type":"book-chapter","created":{"date-parts":[[2013,8,16]],"date-time":"2013-08-16T11:32:08Z","timestamp":1376652728000},"page":"96-110","source":"Crossref","is-referenced-by-count":32,"title":["Model Refactoring Using Interactive Genetic Algorithm"],"prefix":"10.1007","author":[{"given":"Adnane","family":"Ghannem","sequence":"first","affiliation":[]},{"given":"Ghizlane","family":"El Boussaidi","sequence":"additional","affiliation":[]},{"given":"Marouane","family":"Kessentini","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"9_CR1","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1145\/359511.359522","volume":"21","author":"B.P. Lientz","year":"1978","unstructured":"Lientz, B.P., Swanson, E.B., Tompkins, G.E.: Characteristics of application software maintenance. Commun. ACM\u00a021(6), 466\u2013471 (1978)","journal-title":"Commun. ACM"},{"key":"9_CR2","unstructured":"Fowler, M.: Refactoring: Improving the Design of Existing Code. Addison-Wesley (1999)"},{"issue":"2","key":"9_CR3","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/TSE.2004.1265817","volume":"30","author":"T. Mens","year":"2004","unstructured":"Mens, T., Tourw\u00e9, T.: A Survey of Software Refactoring. IEEE Trans. Softw. Eng.\u00a030(2), 126\u2013139 (2004)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"9_CR4","unstructured":"Opdyke, W.F.: Refactoring: A Program Restructuring Aid in Designing Object-Oriented Application Frameworks, U. Illinois at Urbana-Champaign (1992)"},{"key":"9_CR5","first-page":"157","volume-title":"DECOR : D\u00e9tection et correction des d\u00e9fauts dans les syst\u00e8mes orient\u00e9s objet","author":"N. Moha","year":"2008","unstructured":"Moha, N.: DECOR: D\u00e9tection et correction des d\u00e9fauts dans les syst\u00e8mes orient\u00e9s objet, p. 157. UdeM & USTdeLille, Montr\u00e9al (2008)"},{"key":"9_CR6","first-page":"1106","volume-title":"Proceedings of the 9th Annual GECCO 2007","author":"M. Harman","year":"2007","unstructured":"Harman, M., Tratt, L.: Pareto optimal search based refactoring at the design level. In: Proceedings of the 9th Annual GECCO 2007, pp. 1106\u20131113. ACM, London (2007)"},{"issue":"5","key":"9_CR7","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1002\/smr.378","volume":"20","author":"M. O\u2019Keeffe","year":"2008","unstructured":"O\u2019Keeffe, M.: Search-based refactoring: an empirical study. J. Softw. Maint. Evol.\u00a020(5), 345\u2013364 (2008)","journal-title":"J. Softw. Maint. Evol."},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"O\u2019Keeffe, M., Cinneide, M.O.: Search-based software maintenance. In: CSMR (2006)","DOI":"10.1109\/CSMR.2006.49"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-540-87875-9_12","volume-title":"Model Driven Engineering Languages and Systems","author":"M. Kessentini","year":"2008","unstructured":"Kessentini, M., Sahraoui, H.A., Boukadoum, M.: Model Transformation as an Optimization Problem. In: Czarnecki, K., Ober, I., Bruel, J.-M., Uhl, A., V\u00f6lter, M. (eds.) MODELS 2008. LNCS, vol.\u00a05301, pp. 159\u2013173. Springer, Heidelberg (2008)"},{"key":"9_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/978-3-540-87875-9_14","volume-title":"Model Driven Engineering Languages and Systems","author":"G. El-Boussaidi","year":"2008","unstructured":"El-Boussaidi, G., Mili, H.: Detecting Patterns of Poor Design Solutions Using Constraint Propagation. In: Czarnecki, K., Ober, I., Bruel, J.-M., Uhl, A., V\u00f6lter, M. (eds.) MODELS 2008. LNCS, vol.\u00a05301, pp. 189\u2013203. Springer, Heidelberg (2008)"},{"issue":"9","key":"9_CR11","doi-asserted-by":"publisher","first-page":"1275","DOI":"10.1109\/5.949485","volume":"89","author":"H. Takagi","year":"2001","unstructured":"Takagi, H.: Interactive evolutionary computation: fusion of the capabilities of EC optimization and human evaluation. Proceedings of the IEEE\u00a089(9), 1275\u20131296 (2001)","journal-title":"Proceedings of the IEEE"},{"key":"9_CR12","first-page":"656","volume-title":"Software Metrics: A Rigorous and Practical Approach","author":"N.E. Fenton","year":"1998","unstructured":"Fenton, N.E., Pfleeger, A.S.L.: Software Metrics: A Rigorous and Practical Approach, 2nd edn., p. 656. PWS Pub., Boston (1998)","edition":"2"},{"key":"9_CR13","unstructured":"Genero, M., Piattini, M., Calero, C.: Empirical validation of class diagram metrics. In: Proceedings of the International Symposium on ESE (2002)"},{"key":"9_CR14","unstructured":"Pearl, J.: Heuristics: intelligent search strategies for computer problem solving, p. 382. Addison-Wesley Longman Publishing Co., Inc. (1984)"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Mitchell, M.: An Introduction to Genetic Algorithms, p. 209. MIT Press (1998)","DOI":"10.7551\/mitpress\/3927.001.0001"},{"key":"9_CR16","unstructured":"Goldberg, D.E.: Genetic Algorithms in Search, Optimization and Machine Learning, p. 372. Addison-Wesley Longman Publishing Co., Inc. (1989)"},{"key":"9_CR17","unstructured":"Koza, J.R.: Genetic programming: on the programming of computers by means of natural selection, p. 680. MIT Press (1992)"},{"key":"9_CR18","first-page":"358","volume-title":"The BlindWatchmaker","author":"R. Dawkins","year":"1986","unstructured":"Dawkins, R.: The BlindWatchmaker, 1st edn., p. 358. Longman, Essex (1986)","edition":"1"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Kim, H.S., Cho, S.B.: Application of interactive genetic algorithm to fashion design. In: Engineering Applications of Artificial Intelligence (2000)","DOI":"10.1016\/S0952-1976(00)00045-2"},{"issue":"1","key":"9_CR20","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1145\/1268573.1268575","volume":"2","author":"Y.-P. Chen","year":"2007","unstructured":"Chen, Y.-P.: Interactive music composition with the CFE framework. SIGEVOlution\u00a02(1), 9\u201316 (2007)","journal-title":"SIGEVOlution"},{"key":"9_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-642-33119-0_7","volume-title":"Search Based Software Engineering","author":"G. Bavota","year":"2012","unstructured":"Bavota, G., Carnevale, F., De Lucia, A., Di Penta, M., Oliveto, R.: Putting the developer in-the-loop: an interactive GA for software re-modularization. In: Fraser, G., Teixeira de Souza, J. (eds.) SSBSE 2012. LNCS, vol.\u00a07515, pp. 75\u201389. Springer, Heidelberg (2012)"},{"issue":"2","key":"9_CR22","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s10270-006-0025-9","volume":"6","author":"R. Straeten Van Der","year":"2007","unstructured":"Van Der Straeten, R., Jonckers, V., Mens, T.: A formal approach to model refactoring and model refinement. J. SoSyM\u00a06(2), 139\u2013162 (2007)","journal-title":"J. SoSyM"},{"key":"9_CR23","first-page":"252","volume-title":"Proceedings of the annual SAICSIT 2005","author":"M. Kempen Van","year":"2005","unstructured":"Van Kempen, M., et al.: Towards proving preservation of behaviour of refactoring of UML models. In: Proceedings of the annual SAICSIT 2005, pp. 252\u2013259. White River, South Africa (2005)"},{"issue":"3","key":"9_CR24","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/s10270-006-0044-6","volume":"6","author":"T. Mens","year":"2007","unstructured":"Mens, T., Taentzer, G., Runge, O.: Analysing refactoring dependencies using graph transformation. J. SoSyM\u00a06(3), 269\u2013285 (2007)","journal-title":"J. SoSyM"},{"key":"9_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1007\/978-3-642-15928-2_26","volume-title":"Graph Transformations","author":"E. Biermann","year":"2010","unstructured":"Biermann, E.: EMF model transformation based on graph transformation: formal foundation and tool environment. In: Ehrig, H., Rensink, A., Rozenberg, G., Sch\u00fcrr, A. (eds.) ICGT 2010. LNCS, vol.\u00a06372, pp. 381\u2013383. Springer, Heidelberg (2010)"},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"El Boussaidi, G., Mili, H.: Understanding design patterns \u2014 what is the problem? Software: Practice and Experience (2011)","DOI":"10.1002\/spe.1145"},{"key":"9_CR27","first-page":"1909","volume-title":"Proc. of the 8th Annual GECCO 2006","author":"O. Seng","year":"2006","unstructured":"Seng, O., Stammel, J., Burkhart, D.: Search-based determination of refactorings for improving the class structure of object-oriented systems. In: Proc. of the 8th Annual GECCO 2006, pp. 1909\u20131916. ACM, Seattle (2006)"},{"key":"9_CR28","first-page":"1341","volume-title":"Proc. of the 12th Annual GECCO 2010","author":"A.C. Jensen","year":"2010","unstructured":"Jensen, A.C., Cheng, B.H.C.: On the use of genetic programming for automated refactoring and the introduction of design patterns. In: Proc. of the 12th Annual GECCO 2010, pp. 1341\u20131348. ACM, Portland (2010)"},{"issue":"2","key":"9_CR29","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/s10270-010-0175-7","volume":"11","author":"M. Kessentini","year":"2012","unstructured":"Kessentini, M., et al.: Search-based model transformation by example. J. SoSyM\u00a011(2), 209\u2013226 (2012)","journal-title":"J. SoSyM"}],"container-title":["Lecture Notes in Computer Science","Search Based Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39742-4_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,16]],"date-time":"2024-05-16T18:36:53Z","timestamp":1715884613000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39742-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642397417","9783642397424"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39742-4_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}