{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T04:20:50Z","timestamp":1759033250616,"version":"3.41.0"},"publisher-location":"Berlin, Heidelberg","reference-count":52,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662467336"},{"type":"electronic","value":"9783662467343"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-46734-3_3","type":"book-chapter","created":{"date-parts":[[2015,3,19]],"date-time":"2015-03-19T11:37:12Z","timestamp":1426765032000},"page":"96-131","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Co-change Clusters: Extraction and Application on Assessing Software Modularity"],"prefix":"10.1007","author":[{"given":"Luciana Lourdes","family":"Silva","sequence":"first","affiliation":[]},{"given":"Marco Tulio","family":"Valente","sequence":"additional","affiliation":[]},{"given":"Marcelo","family":"de A. Maia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,20]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Adams, B., Jiang, Z.M., Hassan, A.E.: Identifying crosscutting concerns using historical code changes. In: 32nd International Conference on Software Engineering (ICSE), pp. 305\u2013314 (2010)","DOI":"10.1145\/1806799.1806846"},{"key":"3_CR2","unstructured":"Agrawal, R., Srikant, R.: Fast algorithms for mining association rules in large databases. In: 20th International Conference on Very Large Data Bases (VLDB), pp. 487\u2013499 (1994)"},{"key":"3_CR3","volume-title":"Design Rules: The Power of Modularity","author":"CY Baldwin","year":"2003","unstructured":"Baldwin, C.Y., Clark, K.B.: Design Rules: The Power of Modularity. MIT Press, Cambridge (2003)"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Beck, F., Diehl, S.: Evaluating the impact of software evolution on software clustering. In: 17th Working Conference on Reverse Engineering (WCRE), pp. 99\u2013108 (2010)","DOI":"10.1109\/WCRE.2010.19"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Beyer, D., Noack, A.: Clustering software artifacts based on frequent common changes. In: 13th International Workshop on Program Comprehension (IWPC), pp. 259\u2013268 (2005)","DOI":"10.1109\/WPC.2005.12"},{"issue":"10","key":"3_CR6","doi-asserted-by":"publisher","first-page":"P10008","DOI":"10.1088\/1742-5468\/2008\/10\/P10008","volume":"2008","author":"VD Blondel","year":"2008","unstructured":"Blondel, V.D., Guillaume, J.L., Lambiotte, R., Lefebvre, E.: Fast unfolding of communities in large networks. J. Stat. Mech. Theory Exp. 2008(10), P10008 (2008)","journal-title":"J. Stat. Mech. Theory Exp."},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Breu, S., Zimmermann, T.: Mining aspects from version history. In: 21st Automated Software Engineering Conference (ASE), pp. 221\u2013230 (2006)","DOI":"10.1109\/ASE.2006.50"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Brin, S., Motwani, R., Ullman, J.D., Tsur, S.: Dynamic itemset counting and implication rules for market basket data. In: International Conference on Management of Data (SIGMOD), pp. 255\u2013264 (1997)","DOI":"10.1145\/253262.253325"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Chidamber, S., Kemerer, C.: Towards a metrics suite for object oriented design. In: 6th Object-oriented Programming Systems, Languages, and Applications Conference (OOPSLA), pp. 197\u2013211 (1991)","DOI":"10.1145\/118014.117970"},{"key":"3_CR10","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.jss.2014.01.033","volume":"93","author":"C Couto","year":"2014","unstructured":"Couto, C., Pires, P., Valente, M.T., Bigonha, R., Anquetil, N.: Predicting software defects with causality tests. J. Syst. Softw. 93, 24\u201341 (2014)","journal-title":"J. Syst. Softw."},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Couto, C., Silva, C., Valente, M.T., Bigonha, R., Anquetil, N.: Uncovering causal relationships between software metrics and bugs. In: 16th European Conference on Software Maintenance and Reengineering (CSMR), pp. 223\u2013232 (2012)","DOI":"10.1109\/CSMR.2012.31"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"D\u2019Ambros, M., Lanza, M., Robbes, R.: An extensive comparison of bug prediction approaches. In: 7th Working Conference on Mining Software Repositories (MSR), pp. 31\u201341 (2010)","DOI":"10.1109\/MSR.2010.5463279"},{"key":"3_CR13","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9","volume":"41","author":"S Deerwester","year":"1990","unstructured":"Deerwester, S., Dumais, S.T., Furnas, G.W., Landauer, T.K., Harshman, R.: Indexing by latent semantic analysis. J. Am. Soc. Inf. Sci. 41, 391\u2013407 (1990)","journal-title":"J. Am. Soc. Inf. Sci."},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Ducasse, S., G\u00eerba, T., Kuhn, A.: Distribution map. In: 22nd IEEE International Conference on Software Maintenance (ICSM), pp. 203\u2013212 (2006)","DOI":"10.1109\/ICSM.2006.22"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Gethers, M., Kagdi, H., Dit, B., Poshyvanyk, D.: An adaptive approach to impact analysis from change requests to source code. In: 26th Automated Software Engineering Conference (ASE), pp. 540\u2013543 (2011)","DOI":"10.1109\/ASE.2011.6100120"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Griswold, W.G., Yuan, J.J., Kato, Y.: Exploiting the map metaphor in a tool for software evolution. In: 23rd International Conference on Software Engineering (ICSE), pp. 265\u2013274 (2001)","DOI":"10.1109\/ICSE.2001.919100"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Herzing, K., Zeller, A.: The impact of tangled code changes. In: 10th Working Conference on Mining Software Repositories (MSR), pp. 121\u2013130 (2013)","DOI":"10.1109\/MSR.2013.6624018"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Janzen, D., Volder, K.D.: Navigating and querying code without getting lost. In: 2nd International Conference on Aspect-oriented Software Development (AOSD), pp. 178\u2013187 (2003)","DOI":"10.1145\/643603.643622"},{"issue":"5","key":"3_CR19","doi-asserted-by":"publisher","first-page":"933","DOI":"10.1007\/s10664-012-9233-9","volume":"18","author":"H Kagdi","year":"2013","unstructured":"Kagdi, H., Gethers, M., Poshyvanyk, D.: Integrating conceptual and logical couplings for change impact analysis in software. Empirical Softw. Eng. (EMSE) 18(5), 933\u2013969 (2013)","journal-title":"Empirical Softw. Eng. (EMSE)"},{"issue":"8","key":"3_CR20","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/2.781637","volume":"32","author":"G Karypis","year":"1999","unstructured":"Karypis, G., Han, E.H.S., Kumar, V.: Chameleon: hierarchical clustering using dynamic modeling. Computer 32(8), 68\u201375 (1999)","journal-title":"Computer"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"K\u00e4stner, C., Apel, S., Kuhlemann, M.: Granularity in software product lines. In: 30th International Conference on Software Engineering (ICSE), pp. 311\u2013320 (2008)","DOI":"10.1145\/1368088.1368131"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Kersten, M., Murphy, G.C.: Using task context to improve programmer productivity. In: 14th International Symposium on Foundations of Software Engineering (FSE), pp. 1\u201311 (2006)","DOI":"10.1145\/1181775.1181777"},{"key":"3_CR23","series-title":"Lecture Notes in Computer Science","volume-title":"ECOOP \u201997 - Object-Oriented Programming","author":"G Kiczales","year":"1997","unstructured":"Kiczales, G., Lamping, J., Mendhekar, A., Maeda, C., Lopes, C., Loingtier, J.M., Irwin, J.: Aspect-oriented programming. In: Ak\u015fit, M., Matsuoka, S. (eds.) ECOOP 1997. LNCS, vol. 1241. Springer, Heidelberg (1997)"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Kouroshfar, E.: Studying the effect of co-change dispersion on software quality. In: 35th International Conference on Software Engineering (ICSE), pp. 1450\u20131452 (2013)","DOI":"10.1109\/ICSE.2013.6606741"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Lent, B., Swami, A.N., Widom, J.: Clustering association rules. In: 13th International Conference on Data Engineering (ICDE), pp. 220\u2013231 (1997)","DOI":"10.1109\/ICDE.1997.581756"},{"key":"3_CR26","unstructured":"MacQueen, J.B.: Some methods for classification and analysis of multivariate observations. In: 5th Berkeley Symposium on Mathematical Statistics and Probability, pp. 281\u2013297 (1967)"},{"key":"3_CR27","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809071","volume-title":"Introduction to Information Retrieval","author":"CD Manning","year":"2008","unstructured":"Manning, C.D., Raghavan, P., Schtze, H.: Introduction to Information Retrieval. Cambridge University Press, Cambridge (2008)"},{"key":"3_CR28","volume-title":"Object-Oriented Software Construction","author":"B Meyer","year":"2000","unstructured":"Meyer, B.: Object-Oriented Software Construction. Prentice-Hall, Upper Saddle River (2000)"},{"key":"3_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-642-31057-7_5","volume-title":"ECOOP 2012 \u2013 Object-Oriented Programming","author":"S Negara","year":"2012","unstructured":"Negara, S., Vakilian, M., Chen, N., Johnson, R.E., Dig, D.: Is it dangerous to use version control histories to study source code evolution? In: Noble, J. (ed.) ECOOP 2012. LNCS, vol. 7313, pp. 79\u2013103. Springer, Heidelberg (2012)"},{"key":"3_CR30","doi-asserted-by":"crossref","unstructured":"Oliva, G.A., Santana, F.W., Gerosa, M.A., de Souza, C.R.B.: Towards a classification of logical dependencies origins: a case study. In: 12th International Workshop on Principles of Software Evolution and the 7th Annual ERCIM Workshop on Software Evolution (EVOL\/IWPSE), pp. 31\u201340 (2011)","DOI":"10.1145\/2024445.2024452"},{"issue":"1","key":"3_CR31","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1109\/TKDE.2003.1161582","volume":"15","author":"E Omiecinski","year":"2003","unstructured":"Omiecinski, E.: Alternative interest measures for mining associations in databases. IEEE Trans. Knowl. Data Eng. 15(1), 57\u201369 (2003)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"3_CR32","doi-asserted-by":"crossref","unstructured":"Palomba, F., Bavota, G., Penta, M.D., Oliveto, R., de Lucia, A., Poshyvanyk, D.: Detecting bad smells in source code using change history information. In: 28th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 268\u2013278 (2013)","DOI":"10.1109\/ASE.2013.6693086"},{"issue":"12","key":"3_CR33","doi-asserted-by":"publisher","first-page":"1053","DOI":"10.1145\/361598.361623","volume":"15","author":"DL Parnas","year":"1972","unstructured":"Parnas, D.L.: On the criteria to be used in decomposing systems into modules. Commun. ACM 15(12), 1053\u20131058 (1972)","journal-title":"Commun. ACM"},{"key":"3_CR34","unstructured":"Piatetsky-Shapiro, G.: Discovery, analysis and presentation of strong rules. In: Knowledge Discovery in Databases, pp. 229\u2013248 (1991)"},{"key":"3_CR35","doi-asserted-by":"crossref","unstructured":"Poshyvanyk, D., Marcus, A.: Using information retrieval to support design of incremental change of software. In: 22th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 563\u2013566 (2007)","DOI":"10.1145\/1321631.1321743"},{"key":"3_CR36","unstructured":"Poshyvanyk, D., Marcus, A.: Measuring the semantic similarity of comments in bug reports. In: 1st International ICPC Workshop on Semantic Technologies in System Maintenance (STSM), pp. 265\u2013280 (2008)"},{"issue":"3","key":"3_CR37","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1002\/smr.413","volume":"22","author":"MP Robillard","year":"2010","unstructured":"Robillard, M.P., Dagenais, B.: Recommending change clusters to support software investigation: an empirical study. J. Softw. Maintenance Evol. Res. Pract. 22(3), 143\u2013164 (2010)","journal-title":"J. Softw. Maintenance Evol. Res. Pract."},{"key":"3_CR38","doi-asserted-by":"crossref","unstructured":"Robillard, M.P., Murphy, G.C.: Concern graphs: finding and describing concerns using structural program dependencies. In: 24th International Conference on Software Engineering (ICSE), pp. 406\u2013416 (2002)","DOI":"10.1145\/581339.581390"},{"issue":"1","key":"3_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1189748.1189751","volume":"16","author":"MP Robillard","year":"2007","unstructured":"Robillard, M.P., Murphy, G.C.: Representing concerns in source code. ACM Trans. Softw. Eng. Methodol. 16(1), 1\u201338 (2007)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"3_CR40","doi-asserted-by":"crossref","unstructured":"Robillard, M.P., Weigand-Warr, F.: ConcernMapper: simple view-based separation of scattered concerns. In: OOPSLA Workshop on Eclipse Technology eXchange, pp. 65\u201369 (2005)","DOI":"10.1145\/1117696.1117710"},{"issue":"11","key":"3_CR41","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1145\/361219.361220","volume":"18","author":"G Salton","year":"1975","unstructured":"Salton, G., Wong, A., Yang, C.S.: A vector space model for automatic indexing. Commun. ACM 18(11), 613\u2013620 (1975)","journal-title":"Commun. ACM"},{"key":"3_CR42","doi-asserted-by":"crossref","unstructured":"Santos, G., Valente, M.T., Anquetil, N.: Remodularization analysis using semantic clustering. In: 1st CSMR-WCRE Software Evolution Week, pp. 224\u2013233 (2014)","DOI":"10.1109\/CSMR-WCRE.2014.6747174"},{"key":"3_CR43","doi-asserted-by":"crossref","unstructured":"Silva, L., Valente, M.T., Maia, M.: Assessing modularity using co-change clusters. In: 13th International Conference on Modularity, pp. 49\u201360 (2014)","DOI":"10.1145\/2577080.2577086"},{"key":"3_CR44","doi-asserted-by":"crossref","unstructured":"\u015aliwerski, J., Zimmermann, T., Zeller, A.: When do changes induce fixes? In: 2nd Working Conference on Mining Software Repositories (MSR), pp. 1\u20135 (2005)","DOI":"10.1145\/1082983.1083147"},{"issue":"2","key":"3_CR45","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1147\/sj.132.0115","volume":"13","author":"WP Stevens","year":"1974","unstructured":"Stevens, W.P., Myers, G.J., Constantine, L.L.: Structured design. IBM Syst. J. 13(2), 115\u2013139 (1974)","journal-title":"IBM Syst. J."},{"key":"3_CR46","doi-asserted-by":"crossref","unstructured":"Tempero, E., Anslow, C., Dietrich, J., Han, T., Li, J., Lumpe, M., Melton, H., Noble, J.: Qualitas corpus: a curated collection of Java code for empirical studies. In: Asia Pacific Software Engineering Conference (APSEC), pp. 336\u2013345 (2010)","DOI":"10.1109\/APSEC.2010.46"},{"key":"3_CR47","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2507288.2507314","volume":"38","author":"R Terra","year":"2013","unstructured":"Terra, R., Miranda, L.F., Valente, M.T., Bigonha, R.S.: Qualitas.class corpus: a compiled version of the qualitas corpus. Softw. Eng. Notes 38, 1\u20134 (2013)","journal-title":"Softw. Eng. Notes"},{"issue":"4","key":"3_CR48","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1109\/TSE.2011.57","volume":"38","author":"M Valente","year":"2012","unstructured":"Valente, M., Borges, V., Passos, L.: A semi-automatic approach for extracting software product lines. IEEE Trans. Softw. Eng. 38(4), 737\u2013754 (2012)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"3_CR49","doi-asserted-by":"crossref","unstructured":"Vanya, A., Hofland, L., Klusener, S., van de Laar, P., van Vliet, H.: Assessing software archives with evolutionary clusters. In: 16th IEEE International Conference on Program Comprehension (ICPC), pp. 192\u2013201 (2008)","DOI":"10.1109\/ICPC.2008.34"},{"key":"3_CR50","doi-asserted-by":"crossref","unstructured":"Walker, R.J., Rawal, S., Sillito, J.: Do crosscutting concerns cause modularity problems? In: 20th International Symposium on the Foundations of Software Engineering (FSE), pp. 1\u201311 (2012)","DOI":"10.1145\/2393596.2393654"},{"key":"3_CR51","doi-asserted-by":"crossref","unstructured":"Zimmermann, T., Premraj, R., Zeller, A.: Predicting defects for Eclipse. In: 3rd International Workshop on Predictor Models in Software Engineering, pp. 9 (2007)","DOI":"10.1109\/PROMISE.2007.10"},{"issue":"6","key":"3_CR52","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1109\/TSE.2005.72","volume":"31","author":"T Zimmermann","year":"2005","unstructured":"Zimmermann, T., Weissgerber, P., Diehl, S., Zeller, A.: Mining version histories to guide software changes. IEEE Trans. Softw. Eng. 31(6), 429\u2013445 (2005)","journal-title":"IEEE Trans. Softw. Eng."}],"container-title":["Lecture Notes in Computer Science","Transactions on Aspect-Oriented Software Development XII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-46734-3_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T03:58:10Z","timestamp":1747799890000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-46734-3_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783662467336","9783662467343"],"references-count":52,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-46734-3_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"20 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}