{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T02:39:50Z","timestamp":1772159990463,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2012,1,19]],"date-time":"2012-01-19T00:00:00Z","timestamp":1326931200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Autom Softw Eng"],"published-print":{"date-parts":[[2013,3]]},"DOI":"10.1007\/s10515-011-0098-8","type":"journal-article","created":{"date-parts":[[2012,1,18]],"date-time":"2012-01-18T03:01:46Z","timestamp":1326855706000},"page":"47-79","source":"Crossref","is-referenced-by-count":117,"title":["Maintainability defects detection and correction: a multi-objective approach"],"prefix":"10.1007","volume":"20","author":[{"given":"Ali","family":"Ouni","sequence":"first","affiliation":[]},{"given":"Marouane","family":"Kessentini","sequence":"additional","affiliation":[]},{"given":"Houari","family":"Sahraoui","sequence":"additional","affiliation":[]},{"given":"Mounir","family":"Boukadoum","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,1,19]]},"reference":[{"key":"98_CR1","volume-title":"actes du 12e colloque LMO","author":"H. Alikacem","year":"2006","unstructured":"Alikacem, H., Sahraoui, H.: D\u00e9tection d\u2019anomalies utilisant un langage de description de r\u00e8gle de qualit\u00e9. In: actes du 12e colloque LMO (2006)"},{"key":"98_CR2","volume-title":"Software Engineering Economics","author":"B. Boehm","year":"1981","unstructured":"Boehm, B.: Software Engineering Economics. Prentice Hall, New York (1981)"},{"key":"98_CR3","volume-title":"Software Cost Estimation with Cocomo II","author":"B. Boehm","year":"2000","unstructured":"Boehm, B., Horowitz, E., Madachy, R., Reifer, D., Clark, B.K., Steece, B., Brown, A.W., Chulani, S., Abts, C.: Software Cost Estimation with Cocomo II. Prentice Hall, New York (2000)"},{"issue":"11","key":"98_CR4","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1145\/219717.219771","volume":"38","author":"I. Bratko","year":"1995","unstructured":"Bratko, I., Muggleton, S.: Applications of inductive logic programming. Commun. ACM 38(11), 65\u201370 (1995)","journal-title":"Commun. ACM"},{"key":"98_CR5","volume-title":"Anti Patterns: Refactoring Software, Architectures, and Projects in Crisis","author":"W.J. Brown","year":"1998","unstructured":"Brown, W.J., Malveau, R.C., Brown, W.H., McCormick, H.W. III, Mowbray, T.J.: Anti Patterns: Refactoring Software, Architectures, and Projects in Crisis, 1st edn. Wiley, New York (1998)","edition":"1"},{"issue":"6","key":"98_CR6","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1109\/32.295895","volume":"20","author":"S.R. Chidamber","year":"1994","unstructured":"Chidamber, S.R., Kemerer, C.F.: A metrics suite for object-oriented design. IEEE Trans. Softw. Eng. 20(6), 293\u2013318 (1994)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"98_CR7","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/0004-3702(77)90003-0","volume":"8","author":"R. Davis","year":"1977","unstructured":"Davis, R., Buchanan, B., Shortcliffe, E.H.: Production rules as a representation for a knowledge-base consultation program. Artif. Intell. 8, 15\u201345 (1977)","journal-title":"Artif. Intell."},{"key":"98_CR8","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1109\/4235.996017","volume":"6","author":"K. Deb","year":"2002","unstructured":"Deb, K., Pratap, A., Agarwal, S., Meyarivan, T.: A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comput. 6, 182\u2013197 (2002)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"98_CR9","first-page":"279","volume-title":"CSMR. IEEE","author":"K. Dhambri","year":"2008","unstructured":"Dhambri, K., Sahraoui, H.A., Poulin, P.: Visual detection of design anomalies. In: CSMR. IEEE, pp. 279\u2013283 (2008)"},{"key":"98_CR10","volume-title":"Proc. IEEE Symp. Software Metrics","author":"K. Erni","year":"1996","unstructured":"Erni, K., Lewerentz, C.: Applying design metrics to object-oriented frameworks. In: Proc. IEEE Symp. Software Metrics. IEEE Comput. Soc., Los Alamitos (1996)"},{"key":"98_CR11","volume-title":"Software Metrics: A Rigorous and Practical Approach","author":"N. Fenton","year":"1997","unstructured":"Fenton, N., Pfleeger, S.L.: Software Metrics: A Rigorous and Practical Approach, 2nd edn. International Thomson Computer Press, London (1997)","edition":"2"},{"key":"98_CR12","volume-title":"Refactoring\u2014improving the design of existing code","author":"M. Fowler","year":"1999","unstructured":"Fowler, M.: Refactoring\u2014improving the design of existing code, 1st edn. Addison-Wesley, Reading (1999)","edition":"1"},{"key":"98_CR13","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1145\/800175.809854","volume-title":"Proc. of the ACM \u201981 Conference","author":"J.E. Gaffney","year":"1981","unstructured":"Gaffney, J.E.: Metrics in software quality assurance. In: Proc. of the ACM \u201981 Conference, pp. 126\u2013130. ACM, New York (1981)"},{"key":"98_CR14","volume-title":"Genetic Algorithms in Search, Optimization and Machine Learning","author":"D.E. Goldberg","year":"1989","unstructured":"Goldberg, D.E.: Genetic Algorithms in Search, Optimization and Machine Learning. Addison-Wesley\/Longman, Boston (1989)"},{"key":"98_CR15","first-page":"58","volume-title":"IEEE METRICS","author":"M. Harman","year":"2004","unstructured":"Harman, M., Clark, J.A.: Metrics are fitness functions too. In: IEEE METRICS, pp. 58\u201369. IEEE Computer Society, Los Alamitos (2004)"},{"key":"98_CR16","doi-asserted-by":"crossref","first-page":"1106","DOI":"10.1145\/1276958.1277176","volume-title":"Proceedings of the Genetic and Evolutionary Computation Conference (GECCO\u201907)","author":"M. Harman","year":"2007","unstructured":"Harman, M., Tratt, L.: Pareto optimal search based refactoring at the design level. In: Proceedings of the Genetic and Evolutionary Computation Conference (GECCO\u201907), pp. 1106\u20131113 (2007)"},{"key":"98_CR17","unstructured":"Heckel, R.: Algebraic graph transformations with application conditions, M.S. thesis, TU Berlin, (1995)"},{"key":"98_CR18","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/WCRE.2006.1","volume-title":"Proceedings of the 13th Working Conference on Reverse Engineering (WCRE\u201906)","author":"C. Kapser","year":"2006","unstructured":"Kapser, C., Godfrey, M.W.: Cloning considered harmful considered harmful. In: Proceedings of the 13th Working Conference on Reverse Engineering (WCRE\u201906), pp. 19\u201328. IEEE Comput. Soc., Los Alamitos (2006)"},{"key":"98_CR19","first-page":"736","volume-title":"Proc. Int\u2019l Conf. Software Maintenance","author":"Y. Kataoka","year":"2001","unstructured":"Kataoka, Y., Ernst, M.D., Griswold, W.G., Notkin, D.: Automated support for program refactoring using invariants. In: Proc. Int\u2019l Conf. Software Maintenance, pp. 736\u2013743. IEEE Comput. Soc., Los Alamitos (2001)"},{"key":"98_CR20","volume-title":"Proc. of the International Conference on Automated Software Engineering (ASE\u201910)","author":"M. Kessentini","year":"2010","unstructured":"Kessentini, M., Vaucher, S., Sahraoui, H.: Deviance from perfection is a better criterion than closeness to evil when identifying risky code. In: Proc. of the International Conference on Automated Software Engineering (ASE\u201910) (2010)"},{"key":"98_CR21","volume-title":"Proc. of the ICQS\u201909","author":"F. Khomh","year":"2009","unstructured":"Khomh, F., Vaucher, S., Gu\u00e9h\u00e9neuc, Y.-G., Sahraoui, H.: A Bayesian approach for the detection of code and design smells. In: Proc. of the ICQS\u201909 (2009)"},{"issue":"2","key":"98_CR22","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1023\/B:SQJO.0000024058.90885.6a","volume":"12","author":"S.C. Kothari","year":"2004","unstructured":"Kothari, S.C., Bishop, L., Sauceda, J., Daugherty, G.: A pattern-based framework for software anomaly detection. Softw. Qual. J. 12(2), 99\u2013120 (2004)","journal-title":"Softw. Qual. J."},{"key":"98_CR23","volume-title":"Genetic Programming: On the Programming of Computers by Means of Natural Selection","author":"J.R. Koza","year":"1992","unstructured":"Koza, J.R.: Genetic Programming: On the Programming of Computers by Means of Natural Selection. MIT Press, Cambridge (1992)"},{"key":"98_CR24","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1145\/1595696.1595738","volume-title":"Proc. of the ESEC\/FSE \u201909","author":"H. Liu","year":"2009","unstructured":"Liu, H., Yang, L., Niu, Z., Ma, Z., Shao, W.: Facilitating software refactoring with appropriate resolution order of bad smells. In: Proc. of the ESEC\/FSE \u201909, pp. 265\u2013268 (2009)"},{"key":"98_CR25","doi-asserted-by":"crossref","unstructured":"Marinescu, R.: Detection strategies: metrics-based rules for detecting design flaws. In: Proc. of ICM\u201904, pp. 350\u2013359","DOI":"10.1109\/ICSM.2004.1357820"},{"key":"98_CR26","first-page":"417","volume-title":"Proceedings of the 24th International Conference on Software Engineering","author":"A. Mehta","year":"2002","unstructured":"Mehta, A., Heineman, G.T.: Evolving legacy system features into fine-grained components. In: Proceedings of the 24th International Conference on Software Engineering, pp. 417\u2013427. ACM Press, New York (2002)"},{"issue":"2","key":"98_CR27","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1109\/TSE.2004.1265817","volume":"30","author":"T. Mens","year":"2004","unstructured":"Mens, T., Tourw\u00e9, T.: A survey of software refactoring. IEEE Trans. Softw. Eng. 30(2), 126\u2013139 (2004)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"11","key":"98_CR28","doi-asserted-by":"crossref","first-page":"883","DOI":"10.1109\/TSE.2006.114","volume":"32","author":"T. Menzies","year":"2006","unstructured":"Menzies, T., Chen, Z., Hihn, J., Lum, K.: Selecting best practices for effort estimation. IEEE Trans. Softw. Eng. 32(11), 883\u2013895 (2006)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"98_CR29","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/TSE.2009.50","volume":"36","author":"N. Moha","year":"2009","unstructured":"Moha, N., Gu\u00e9h\u00e9neuc, Y.-G., Duchien, L., Meur, A.-F.L.: DECOR: A method for the specification and detection of code and design smells. IEEE Trans. Softw. Eng. 36, 20\u201336 (2009)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"5","key":"98_CR30","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1002\/smr.378","volume":"20","author":"M. O\u2019Keeffe","year":"2008","unstructured":"O\u2019Keeffe, M., Cinn\u00e9ide, M.: Search-based refactoring: an empirical study. J. Softw. Maint. 20(5), 345\u2013364 (2008)","journal-title":"J. Softw. Maint."},{"key":"98_CR31","unstructured":"Opdyke, W.F.: Refactoring: a program restructuring aid in designing object-oriented application frameworks, Ph.D. thesis, University of Illinois at Urbana-Champaign (1992)"},{"key":"98_CR32","volume-title":"Advances in Inductive Logic Programming","author":"D. Raedt","year":"1996","unstructured":"Raedt, D.: Advances in Inductive Logic Programming, 1st edn. IOS Press, Lansdale (1996)","edition":"1"},{"key":"98_CR33","volume-title":"Proc. of the International Conference on Software Maintenance (ICSM\u201900)","author":"H. Sahraoui","year":"2000","unstructured":"Sahraoui, H., Godin, R., Miceli, T.: Can metrics help to bridge the gap between the improvement of OO design quality and its automation. In: Proc. of the International Conference on Software Maintenance (ICSM\u201900) (2000)"},{"key":"98_CR34","doi-asserted-by":"crossref","first-page":"1909","DOI":"10.1145\/1143997.1144315","volume-title":"Proceedings of the Genetic and Evolutionary Computation Conference (GECCO\u201906)","author":"O. Seng","year":"2006","unstructured":"Seng, O., Stammel, J., Burkhart, D.: Search-based determination of refactorings for improving the class structure of object-oriented systems. In: Proceedings of the Genetic and Evolutionary Computation Conference (GECCO\u201906), pp. 1909\u20131916 (2006)"},{"key":"98_CR35","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1007\/BFb0056872","volume-title":"Parallel Problem Solving from Nature, V","author":"E. Zitzler","year":"1998","unstructured":"Zitzler, E., Thiele, L.: Multiobjective optimization using evolutionary algorithms\u2014a comparative case study. In: Eiben, A.E., Back, T., Schoenauer, M., Schwefel, H.-P. (eds.) Parallel Problem Solving from Nature, V, pp. 292\u2013301. Springer, Berlin (1998)"}],"container-title":["Automated Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-011-0098-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10515-011-0098-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-011-0098-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,18]],"date-time":"2025-03-18T22:41:05Z","timestamp":1742337665000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10515-011-0098-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1,19]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,3]]}},"alternative-id":["98"],"URL":"https:\/\/doi.org\/10.1007\/s10515-011-0098-8","relation":{},"ISSN":["0928-8910","1573-7535"],"issn-type":[{"value":"0928-8910","type":"print"},{"value":"1573-7535","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,1,19]]}}}