{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T21:18:55Z","timestamp":1742937535330,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":25,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811579837"},{"type":"electronic","value":"9789811579844"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-7984-4_37","type":"book-chapter","created":{"date-parts":[[2020,8,20]],"date-time":"2020-08-20T12:03:10Z","timestamp":1597924990000},"page":"490-505","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Code Smell Detection Based on Multi-dimensional Software Data and Complex Networks"],"prefix":"10.1007","author":[{"given":"Heng","family":"Tong","sequence":"first","affiliation":[]},{"given":"Cheng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Futian","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,20]]},"reference":[{"issue":"1","key":"37_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/32.895984","volume":"27","author":"SG Eick","year":"2001","unstructured":"Eick, S.G., Graves, T.L., Karr, A.F., Marron, J.S., Mockus, A.: Does code decay? Assessing the evidence from change management data. IEEE Trans. Software Eng. 27(1), 1\u201312 (2001)","journal-title":"IEEE Trans. Software Eng."},{"issue":"2","key":"37_CR2","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1109\/MS.2011.24","volume":"29","author":"J Li","year":"2019","unstructured":"Li, J., Stalhane, T., Conradi, R., Kristiansen, J.M.W.: Enhancing defect tracking systems to facilitate software quality improvement. IEEE Softw. 29(2), 59\u201366 (2019)","journal-title":"IEEE Softw."},{"issue":"6","key":"37_CR3","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MS.2012.167","volume":"29","author":"P Kruchten","year":"2012","unstructured":"Kruchten, P., Nord, R.L., Ozkaya, I.: Technical debt: from metaphor to theory and practice. IEEE Softw. 29(6), 18\u201321 (2012)","journal-title":"IEEE Softw."},{"key":"37_CR4","unstructured":"Fowler, M.: Refactoring: improving the design of existing code (1999)"},{"key":"37_CR5","doi-asserted-by":"crossref","unstructured":"Tufano, M., et al.: When and why your code starts to smell bad. In: 37th International Conference on Software Engineering, Firenze, Italy, pp. 403\u2013414. IEEE (2015)","DOI":"10.1109\/ICSE.2015.59"},{"key":"37_CR6","doi-asserted-by":"crossref","unstructured":"Yamashita, A., Moonen, L.: Exploring the impact of inter-smell relations on software maintainability: an empirical study. In: 2013 International Conference on Software Engineering, San Francisco, USA, pp. 682\u2013691. IEEE (2013)","DOI":"10.1109\/ICSE.2013.6606614"},{"key":"37_CR7","doi-asserted-by":"crossref","unstructured":"Abbes, M., Khomh, F., Gueheneuc, Y., Antoniol, G.: An empirical study of the impact of two antipatterns, Blob and Spaghetti Code, on program comprehension. In: 2011 15th European Conference on Software Maintenance and Reengineering, Oldenburg, Germany, pp. 181\u2013190. IEEE (2011)","DOI":"10.1109\/CSMR.2011.24"},{"issue":"3","key":"37_CR8","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s10664-011-9171-y","volume":"17","author":"F Khomh","year":"2012","unstructured":"Khomh, F., Di Penta, M., Gu\u00e9h\u00e9neucl, Y., Antoniol, G.: An exploratory study of the impact of antipatterns on class change- and fault-proneness. Empir. Softw. Eng. 17(3), 243\u2013275 (2012)","journal-title":"Empir. Softw. Eng."},{"issue":"1","key":"37_CR9","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/TSE.2009.50","volume":"36","author":"N Moha","year":"2010","unstructured":"Moha, N., Gueheneuc, Y., Duchien, L., Le Meur, A.: DECOR: a method for the specification and detection of code and design smells. IEEE Trans. Software Eng. 36(1), 20\u201336 (2010)","journal-title":"IEEE Trans. Software Eng."},{"issue":"3","key":"37_CR10","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1007\/s10515-014-0175-x","volume":"23","author":"SA Vidal","year":"2014","unstructured":"Vidal, S.A., Marcos, C., D\u00edaz-Pace, J.A.: An approach to prioritize code smells for refactoring. Autom. Softw. Eng. 23(3), 501\u2013532 (2014). https:\/\/doi.org\/10.1007\/s10515-014-0175-x","journal-title":"Autom. Softw. Eng."},{"issue":"4","key":"37_CR11","doi-asserted-by":"publisher","first-page":"33:1","DOI":"10.1145\/2629648","volume":"23","author":"T Hall","year":"2014","unstructured":"Hall, T., Zhang, M., Bowes, D., Sun, Y.: Some code smells have a significant but small effect on faults. ACM Trans. Softw. Eng. Methodol. (TOSEM) 23(4), 33:1\u201333:39 (2014)","journal-title":"ACM Trans. Softw. Eng. Methodol. (TOSEM)"},{"issue":"2","key":"37_CR12","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1109\/TSE.2017.2770122","volume":"45","author":"F Palomba","year":"2019","unstructured":"Palomba, F., Zanoni, M., Fontana, F.A., De Lucia, A., Oliveto, R.: Toward a smell-aware bug prediction model. IEEE Trans. Software Eng. 45(2), 194\u2013218 (2019)","journal-title":"IEEE Trans. Software Eng."},{"key":"37_CR13","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.infsof.2018.12.009","volume":"108","author":"MI Azeem","year":"2019","unstructured":"Azeem, M.I., Palomba, F., Shi, L., Wang, Q.: Machine learning techniques for code smell detection: a systematic literature review and meta-analysis. Inf. Softw. Technol. 108, 115\u2013138 (2019)","journal-title":"Inf. Softw. Technol."},{"issue":"2","key":"37_CR14","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1109\/TSE.2017.2770122","volume":"45","author":"F Palomba","year":"2015","unstructured":"Palomba, F., Bavota, G., Di Penta, M., Oliveto, R., Poshyvanyk, D., De Lucia, A.: Mining version histories for detecting code smells. IEEE Trans. Software Eng. 45(2), 194\u2013218 (2015)","journal-title":"IEEE Trans. Software Eng."},{"key":"37_CR15","doi-asserted-by":"crossref","unstructured":"Fernandes, E., Oliveira, J., Vale, G., Paiva, T., Figueiredo, E.: A review-based comparative study of bad smell detection tools. In: Proceedings of the 20th International Conference on Evaluation and Assessment in Software Engineering, New York, USA, pp. 18:1\u201318:12. ACM (2016)","DOI":"10.1145\/2915970.2915984"},{"issue":"11","key":"37_CR16","doi-asserted-by":"publisher","first-page":"867","DOI":"10.1002\/smr.1737","volume":"27","author":"G Rasool","year":"2015","unstructured":"Rasool, G., Arshad, Z.: A review of code smell mining techniques. J. Softw. Evol. Process 27(11), 867\u2013895 (2015)","journal-title":"J. Softw. Evol. Process"},{"key":"37_CR17","doi-asserted-by":"crossref","unstructured":"Travassos, G., Shull, F., Fredericks, M., Basili, V.: Detecting defects in object-oriented designs: using reading techniques to increase software quality. In: Conference on Object-Oriented Programming. Systems, Languages, and Applications (OOPSLA), Denver, USA, pp. 47\u201356. ACM (1999)","DOI":"10.1145\/320385.320389"},{"issue":"2","key":"37_CR18","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1007\/s13369-016-2238-8","volume":"42","author":"G Rasool","year":"2017","unstructured":"Rasool, G., Arshad, Z.: A lightweight approach for detection of code smells. Arab. J. Sci. Eng. 42(2), 483\u2013506 (2017)","journal-title":"Arab. J. Sci. Eng."},{"issue":"3","key":"37_CR19","doi-asserted-by":"publisher","first-page":"1143","DOI":"10.1007\/s10664-015-9378-4","volume":"21","author":"F Arcelli Fontana","year":"2015","unstructured":"Arcelli Fontana, F., M\u00e4ntyl\u00e4, M.V., Zanoni, M., Marino, A.: Comparing and experimenting machine learning techniques for code smell detection. Empir. Softw. Eng. 21(3), 1143\u20131191 (2015). https:\/\/doi.org\/10.1007\/s10664-015-9378-4","journal-title":"Empir. Softw. Eng."},{"key":"37_CR20","doi-asserted-by":"crossref","unstructured":"Di Nucci, D., Palomba, F., Tamburri, D.A., Serebrenik, A., De Lucia, A.: Detecting code smells using machine learning techniques: Are we there yet? In: 2018 IEEE 25th International Conference on Software Analysis. Evolution and Reengineering (SANER), Campobasso, Italy, pp. 612\u2013621. IEEE (2018)","DOI":"10.1109\/SANER.2018.8330266"},{"key":"37_CR21","doi-asserted-by":"publisher","unstructured":"Liu, H., Jin, J., Xu, Z., Bu, Y., Zou, Y., Zhang: Deep learning based code smell detection. IEEE Trans. Softw. Eng. (2019, work in progress). https:\/\/doi.org\/10.1109\/TSE.2019.2936376","DOI":"10.1109\/TSE.2019.2936376"},{"key":"37_CR22","doi-asserted-by":"crossref","unstructured":"Fu, S., Shen, B.: Code bad smell detection through evolutionary data mining. In: 2015 ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM), Beijing, China, pp. 1\u20139. IEEE (2015)","DOI":"10.1109\/ESEM.2015.7321194"},{"key":"37_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/978-3-642-39742-4_6","volume-title":"Search Based Software Engineering","author":"M Boussaa","year":"2013","unstructured":"Boussaa, M., Kessentini, W., Kessentini, M., Bechikh, S., Ben Chikha, S.: Competitive coevolutionary code-smells detection. In: Ruhe, G., Zhang, Y. (eds.) SSBSE 2013. LNCS, vol. 8084, pp. 50\u201365. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39742-4_6"},{"issue":"9","key":"37_CR24","doi-asserted-by":"publisher","first-page":"841","DOI":"10.1109\/TSE.2014.2331057","volume":"40","author":"W Kessentini","year":"2014","unstructured":"Kessentini, W., Kessentini, M., Sahraoui, H., Bechikh, S., Ouni, A.: A cooperative parallel search-based software engineering approach for code-smells detection. IEEE Trans. Software Eng. 40(9), 841\u2013861 (2014)","journal-title":"IEEE Trans. Software Eng."},{"issue":"2","key":"37_CR25","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1142\/S021819401950013X","volume":"29","author":"F Caram","year":"2019","unstructured":"Caram, F., Rodrigues, B., Campanelli, A., Parreiras, F.: Machine learning techniques for code smells detection: a systematic mapping study. Int. J. Software Eng. Knowl. Eng. 29(2), 285\u2013316 (2019)","journal-title":"Int. J. Software Eng. Knowl. Eng."}],"container-title":["Communications in Computer and Information Science","Data Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-7984-4_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T13:47:37Z","timestamp":1710251257000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-15-7984-4_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811579837","9789811579844"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-7984-4_37","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"20 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICPCSEE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference of Pioneering Computer Scientists, Engineers and Educators","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiyuan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icpcsee2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2020.icpcsee.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"392","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"74","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}