{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T16:28:20Z","timestamp":1746289700556},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2014,7,22]],"date-time":"2014-07-22T00:00:00Z","timestamp":1405987200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1007\/s10664-014-9317-9","type":"journal-article","created":{"date-parts":[[2014,7,21]],"date-time":"2014-07-21T08:03:32Z","timestamp":1405929812000},"page":"1126-1158","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["The impact of imperfect change rules on framework API evolution identification: an empirical study"],"prefix":"10.1007","volume":"20","author":[{"given":"Wei","family":"Wu","sequence":"first","affiliation":[]},{"given":"Adrien","family":"Serveaux","sequence":"additional","affiliation":[]},{"given":"Yann-Ga\u00ebl","family":"Gu\u00e9h\u00e9neuc","sequence":"additional","affiliation":[]},{"given":"Giuliano","family":"Antoniol","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,7,22]]},"reference":[{"key":"9317_CR1","doi-asserted-by":"crossref","unstructured":"Abbes M, Khomh F, Gu\u00e9h\u00e9neuc Y-G, Antoniol G (2011) An empirical study of the impact of two antipatterns, blob and spaghetti code, on program comprehension. In: Proceedings of the 2011 15th European conference on software maintenance and reengineering, ser. CSMR \u201911. IEEE Computer Society, Washington, DC, USA, pp 181\u2013190","DOI":"10.1109\/CSMR.2011.24"},{"key":"9317_CR2","doi-asserted-by":"crossref","unstructured":"Ali N, Sharafi Z, Gu\u00e9h\u00e9neuc Y-G, Antoniol G (2012) An empirical study on requirements traceability using eye-tracking. In: Proceedings of the international conference on software maintenance, ser. ICSM 2012","DOI":"10.1109\/ICSM.2012.6405271"},{"key":"9317_CR3","doi-asserted-by":"crossref","unstructured":"Antoniol G, Penta MD, Merlo E (2004) An automatic approach to identify class evolution discontinuities. In: IWPSE \u201904: Proceedings of the principles of software evolution, 7th international workshop. IEEE Computer Society, pp 31\u201340","DOI":"10.1109\/IWPSE.2004.1334766"},{"key":"9317_CR4","unstructured":"Baker R D (1995) Modern permutation test software. In: Edgington E (ed) Randomization tests. Marcel Dekker Incorporated"},{"key":"9317_CR5","doi-asserted-by":"crossref","unstructured":"Beckwith L, Burnett M, Wiedenbeck S, Cook C, Sorte S, Hastings M (2005) Effectiveness of end-user debugging software features: are there gender issues? In: Proceedings of the SIGCHI conference on human factors in computing systems, ser. CHI \u201905, New York, NY, USA, pp 869\u2013878","DOI":"10.1145\/1054972.1055094"},{"key":"9317_CR6","doi-asserted-by":"crossref","unstructured":"Businge J, Serebrenik A, van den Brand M (2013) Analyzing the eclipse api usage: putting the developer in the loop. In: CSMR, pp 37\u201346","DOI":"10.1109\/CSMR.2013.14"},{"key":"9317_CR7","doi-asserted-by":"crossref","unstructured":"Chow K, Notkin D (1996) Semi-automatic update of applications in response to library changes. In: Proceedings of the 1996 international conference on software maintenance. ser. ICSM 1996. IEEE Computer Society, Washington, DC, USA, p 359","DOI":"10.1109\/ICSM.1996.565039"},{"issue":"4","key":"9317_CR8","doi-asserted-by":"crossref","first-page":"19:1","DOI":"10.1145\/2000799.2000805","volume":"20","author":"B Dagenais","year":"2011","unstructured":"Dagenais B, Robillard MP (2011) Recommending adaptive changes for framework evolution. ACM Trans Softw Eng Methodol 20(4):19:1\u201319:35","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"9317_CR9","doi-asserted-by":"crossref","unstructured":"Demeyer S, Ducasse S, Nierstrasz O (2000) Finding refactorings via change metrics. In: OOPSLA \u201900: Proceedings of the 15th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications. ACM, New York, NY, USA, pp 166\u2013177","DOI":"10.1145\/353171.353183"},{"key":"9317_CR10","doi-asserted-by":"crossref","unstructured":"Dig D, Comertoglu C, Marinov D, Johnson R (2006) Automated detection of refactorings in evolving components. In: ECOOP \u201906: Proceedings of the 20th European conference on object-oriented programming. Springer, Berlin","DOI":"10.1007\/11785477_24"},{"key":"9317_CR11","doi-asserted-by":"crossref","unstructured":"Dig D, Manzoor K, Johnson R, Nguyen TN (2007) Refactoring-aware configuration management for object-oriented programs. In: ICSE \u201907: Proceedings of the 29th international conference on Software Engineering. IEEE Computer Society, Washington, DC, USA, pp 427\u2013436","DOI":"10.1109\/ICSE.2007.71"},{"key":"9317_CR12","doi-asserted-by":"crossref","unstructured":"Fagard RH, Staessen JA, Thijs L (1996) Advantages and disadvantages of the meta-analysis approach. J Hypertens 14(2)","DOI":"10.1097\/00004872-199609002-00004"},{"key":"9317_CR13","doi-asserted-by":"crossref","unstructured":"Fluri B, Gall HC (2006) Classifying change types for qualifying change couplings. In: ICPC \u201906: Proceedings of the 14th IEEE international conference on program comprehension. IEEE Computer Society, Washington, DC, USA, pp 35\u201345","DOI":"10.1109\/ICPC.2006.16"},{"key":"9317_CR14","unstructured":"Gamma E, Helm R, Johnson RE, Vlissides J (1995) Design patterns: elements of reusable object-oriented software. Addison-Wesley"},{"key":"9317_CR15","doi-asserted-by":"crossref","unstructured":"German DM, Hassan AE (2009) License integration patterns: addressing license mismatches in component-based development. In: ICSE \u201909: Proceedings of the 2009 IEEE 31st international conference on software engineering. IEEE Computer Society, Washington, DC, USA, pp 188\u2013198","DOI":"10.1109\/ICSE.2009.5070520"},{"issue":"2","key":"9317_CR16","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1109\/TSE.2005.28","volume":"31","author":"MW Godfrey","year":"2005","unstructured":"Godfrey MW, Zou L (2005) Using origin analysis to detect merging and splitting of source code entities. IEEE Trans Softw Eng 31(2):166\u2013181","journal-title":"IEEE Trans Softw Eng"},{"key":"9317_CR17","unstructured":"Grissom R, Kim J (2005) Effect sizes for research: a broad practical approach. Lawrence Erlbaum Associates"},{"key":"9317_CR18","doi-asserted-by":"crossref","unstructured":"Hart SG, Stavenland LE (1988) Development of NASA-TLX (Task Load Index): results of empirical and theoretical research, pp 139\u2013183","DOI":"10.1016\/S0166-4115(08)62386-9"},{"key":"9317_CR19","unstructured":"Hart SG, Staveland LE (1988) Nasa task load index (tlx) v 1.0. http:\/\/humansystems.arc.nasa.gov\/groups\/TLX\/downloads\/TLX.pdf"},{"key":"9317_CR20","doi-asserted-by":"crossref","unstructured":"Henkel J, Diwan A (2005) Catchup: capturing and replaying refactorings to support api evolution. In: ICSE \u201905: Proceedings of the 27th international conference on Software engineering. ACM, New York, NY, USA, pp 274\u2013283","DOI":"10.1145\/1062455.1062512"},{"key":"9317_CR21","doi-asserted-by":"crossref","unstructured":"Kataoka Y, Ernst MD, Griswold WG, Notkin D (2001) Automated support for program refactoring using invariants. In: Proceedings of the IEEE international conference on software maintenance, ser. ICSM 2001. IEEE Computer Society, Washington, DC, USA, p 736","DOI":"10.1109\/ICSM.2001.972794"},{"key":"9317_CR22","unstructured":"Kemper C, Overbeck C (2005) What\u2019s new with jbuilder. In: JavaOne Sun\u2019s 2005 worldwide java developer conference"},{"key":"9317_CR23","doi-asserted-by":"crossref","unstructured":"Kim M, Notkin D, Grossman D (2007) Automatic inference of structural changes for matching across program versions. In: ICSE \u201907: Proceedings of the 29th international conference on software engineering. IEEE Computer Society, Washington, DC, USA, pp 333\u2013343","DOI":"10.1109\/ICSE.2007.20"},{"key":"9317_CR24","unstructured":"Kim S, Pan K, Whitehead EJ Jr. (2005) When functions change their names: automatic detection of origin relationships. In: WCRE \u201905: Proceedings of the 12th working conference on reverse engineering. IEEE Computer Society, Washington, DC, USA, pp 143\u2013152"},{"issue":"4","key":"9317_CR25","first-page":"303","volume":"3","author":"D Lawrie","year":"2007","unstructured":"Lawrie D, Morrell C, Feild H, Binkley DW (2007) Effective identifier names for comprehension and memory. ISSE 3(4):303\u2013318","journal-title":"ISSE"},{"issue":"140","key":"9317_CR26","first-page":"1","volume":"22","author":"R Likert","year":"1932","unstructured":"Likert R (1932) A technique for the measurement of attitudes. Arch Psychol 22(140):1\u201355","journal-title":"Arch Psychol"},{"key":"9317_CR27","doi-asserted-by":"crossref","unstructured":"Malpohl G, Hunt JJ, Tichy WE (2000) Renaming detection. In: ASE \u201900: Proceedings of the 15th IEEE international conference on Automated software engineering. IEEE Computer Society, Washington, DC, USA, p 73","DOI":"10.1109\/ASE.2000.873652"},{"key":"9317_CR28","doi-asserted-by":"crossref","unstructured":"Meng S, Wang X, Zhang L, Mei H (2012) A history-based matching approach to identification of framework evolution. In: Proceedings of 34th international conference on software engineering, ser. ICSE 2012, pp 353\u2013363","DOI":"10.1109\/ICSE.2012.6227179"},{"key":"9317_CR29","unstructured":"Meyers-Levy J (1989) Gender differences in information processing: a selectivityinterpretation. In: Cafferata P, Tybout A (eds) Cognitive and affective responses to advertising. Lexington Books"},{"key":"9317_CR30","doi-asserted-by":"crossref","unstructured":"Miller R G J (1981) Simultaneous statistical inference, 2nd ed. Springer","DOI":"10.1007\/978-1-4613-8122-8"},{"issue":"2","key":"9317_CR31","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1111\/j.1099-1123.2001.00328.x","volume":"5","author":"E O\u2019Donnell","year":"2001","unstructured":"O\u2019Donnell E, Johnson E (2001) The effects of auditor gender and task complexity on information processing efficiency. Int J Audit 5(2):91\u2013105","journal-title":"Int J Audit"},{"key":"9317_CR32","doi-asserted-by":"crossref","unstructured":"Sch\u00e4fer T, Jonas J, Mezini M (2008) Mining framework usage changes from instantiation code. In: ICSE \u201908: Proceedings of the 30th international conference on software engineering. ACM, New York, NY, USA, pp 471\u2013480","DOI":"10.1145\/1368088.1368153"},{"key":"9317_CR33","doi-asserted-by":"crossref","unstructured":"Sharif B, Maletic JI (2010) An eye tracking study on camelcase and underscore identifier styles. In: Proceedings of the 2010 IEEE 18th international conference on program comprehension, ser. ICPC \u201910. IEEE Computer Society, Washington, DC, USA, pp 196\u2013205","DOI":"10.1109\/ICPC.2010.41"},{"key":"9317_CR34","doi-asserted-by":"crossref","unstructured":"Sharafi Z, Soh Z , Gu\u00e9h\u00e9neuc Y-G, Antoniol G (2012) Women and men - different but equal: on the impact of identifier style on source code reading. In: ICPC, pp 27\u201336","DOI":"10.1109\/ICPC.2012.6240505"},{"key":"9317_CR35","doi-asserted-by":"crossref","unstructured":"Wei\u00dfgerber P, Diehl S (2006) Identifying refactorings from source-code changes. In: ASE \u201906: Proceedings of the 21st IEEE\/ACM international conference on automated software engineering. IEEE Computer Society, Washington, DC, USA, pp 231\u2013240","DOI":"10.1109\/ASE.2006.41"},{"key":"9317_CR36","doi-asserted-by":"crossref","unstructured":"Wohlin C, Runeson P, H\u00f6st M (1999) Experimentation in software engineering: an introduction. Springer","DOI":"10.1007\/978-1-4615-4625-2_1"},{"key":"9317_CR37","doi-asserted-by":"crossref","unstructured":"Wu W, Gu\u00e9h\u00e9neuc Y-G, Antoniol G, Kim M (2010) Aura: a hybrid approach to identify framework evolution. In: Proceedings of the 32nd ACM\/IEEE international conference on software engineering, vol 1, ser. ICSE \u201910. ACM, New York, NY, USA, pp 325\u2013334. [Online]. Available: doi: 10.1145\/1806799.1806848","DOI":"10.1145\/1806799.1806848"},{"key":"9317_CR38","doi-asserted-by":"crossref","unstructured":"Xing Z, Stroulia E (2006) Refactoring detection based on umldiff change-facts queries. In: WCRE \u201906: Proceedings of the 13th Working Conference on Reverse Engineering. IEEE Computer Society, Washington, DC, USA, pp 263\u2013274","DOI":"10.1109\/WCRE.2006.48"},{"issue":"12","key":"9317_CR39","doi-asserted-by":"crossref","first-page":"818","DOI":"10.1109\/TSE.2007.70747","volume":"33","author":"Z Xing","year":"2007","unstructured":"Xing Z, Stroulia E (2007) API-evolution support with diff-CatchUp. IEEE Trans Softw Eng 33(12): 818\u2013836","journal-title":"IEEE Trans Softw Eng"},{"key":"9317_CR40","doi-asserted-by":"crossref","unstructured":"Yusuf S, Kagdi H, Maletic JI (2007) Assessing the comprehension of uml class diagrams via eye tracking. In: Proceedings of the 15th IEEE international conference on program comprehension, ser. ICPC \u201907. IEEE Computer Society, Washington, DC, USA, pp 113\u2013122","DOI":"10.1109\/ICPC.2007.10"},{"issue":"5","key":"9317_CR41","doi-asserted-by":"crossref","first-page":"1213","DOI":"10.1109\/TSE.2011.79","volume":"38","author":"C Zhang","year":"2012","unstructured":"Zhang C, Budgen D (2012) What do we know about the effectiveness of software design patterns? Trans Softw Eng 38(5): 1213\u20131231. [Online]. Available: http:\/\/ieeexplore.ieee.org\/xpl\/login.jsp?tp=&arnumber=5975176","journal-title":"Trans Softw Eng"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-014-9317-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-014-9317-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-014-9317-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,13]],"date-time":"2019-08-13T01:20:08Z","timestamp":1565659208000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-014-9317-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7,22]]},"references-count":41,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,8]]}},"alternative-id":["9317"],"URL":"https:\/\/doi.org\/10.1007\/s10664-014-9317-9","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,7,22]]}}}