{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T04:49:52Z","timestamp":1770439792968,"version":"3.49.0"},"reference-count":68,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,3,10]],"date-time":"2015-03-10T00:00:00Z","timestamp":1425945600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1007\/s10664-015-9361-0","type":"journal-article","created":{"date-parts":[[2015,3,9]],"date-time":"2015-03-09T06:23:22Z","timestamp":1425882202000},"page":"896-931","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":39,"title":["Evaluating the impact of design pattern and anti-pattern dependencies on changes and faults"],"prefix":"10.1007","volume":"21","author":[{"given":"Fehmi","family":"Jaafar","sequence":"first","affiliation":[]},{"given":"Yann-Ga\u00ebl","family":"Gu\u00e9h\u00e9neuc","sequence":"additional","affiliation":[]},{"given":"Sylvie","family":"Hamel","sequence":"additional","affiliation":[]},{"given":"Foutse","family":"Khomh","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Zulkernine","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,10]]},"reference":[{"key":"9361_CR1","unstructured":"Alencar PSC, Cowan DD, Morales-Germ\u00e1n D, Lichtner KJ, Pereira de Lucena CJ, Nova LC (1995) A formal approach to design pattern definition and application. Tech Rep CS-95-29, Computer Systems Group, University of Waterloo."},{"key":"9361_CR2","doi-asserted-by":"crossref","unstructured":"Antoniol G, Fiutem R, Cristoforetti L (1998) Design pattern recovery in object-oriented software. In: Tilley S, Visaggio G (eds) Proceedings of the 6 t h International Workshop on Program Comprehension, pp 153\u2013160. IEEE Computer Society Press","DOI":"10.1109\/WPC.1998.693342"},{"key":"9361_CR3","doi-asserted-by":"crossref","unstructured":"Aversano L, Canfora G, Cerulo L, Del Grosso C, Di Penta M (2007) An empirical study on the evolution of design patterns. In: Foundations of Software Engineering. ACM Press, New York, NY, pp 385\u2013394","DOI":"10.1145\/1287624.1287680"},{"issue":"5","key":"9361_CR4","first-page":"395","volume":"3","author":"L Aversano","year":"2009","unstructured":"Aversano L, Cerulo L, Di Penta M (2009) Relationship between design patterns defects and crosscutting concern scattering degree: an empirical study. Institu Eng Technol 3(5):395\u2013409","journal-title":"Institu Eng Technol"},{"issue":"10","key":"9361_CR5","doi-asserted-by":"crossref","first-page":"751","DOI":"10.1109\/32.544352","volume":"22","author":"VR Basili","year":"1996","unstructured":"Basili VR, Briand LC, Melo WL (1996) A validation of object-oriented design metrics as quality indicators. IEEE Trans Soft Eng 22(10):751\u2013761","journal-title":"IEEE Trans Soft Eng"},{"key":"9361_CR6","doi-asserted-by":"crossref","unstructured":"Bernstein A, Ekanayake J, Pinzger M (2007) Improving defect prediction using temporal features and non linear models, In: Ninth International Workshop on Principles of Software Evolution, pp 11\u201318. ACM","DOI":"10.1145\/1294948.1294953"},{"key":"9361_CR7","doi-asserted-by":"crossref","unstructured":"Binkley D, Gold N, Harman M, Li Z, Mahdavi K, Wegener J (2008) Dependence anti patterns. In: 4 t h International ERCIM Workshop on Software Evolution and Evolvability, pp 25\u201334","DOI":"10.1109\/ASEW.2008.4686318"},{"key":"9361_CR8","unstructured":"Bouktif S, Antoniol G, Merlo E, Neteler M (2006) A plugin based architecture for software maintenance. Tech. Rep. EPM-RT-2006-03, Department of Computer Science \u00c9cole Polytechnique de Montr\u00e9al"},{"key":"9361_CR9","unstructured":"Brown K (1996) Design reverse-engineering and automated design pattern detection in Smalltalk. Tech. Rep. TR-96-07, Department of Computer Science, University of Illinois at Urbana-Champaign."},{"key":"9361_CR10","unstructured":"Brown WJ, Malveau RC, Brown WH, McCormick III H.W., Mowbray TJ (1998) Anti Patterns: Refactoring Software, Architectures, and Projects in Crisis, 1 s t edn. Wiley"},{"issue":"6","key":"9361_CR11","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1109\/32.295895","volume":"20","author":"SR Chidamber","year":"1994","unstructured":"Chidamber SR, Kemerer CF (1994) A metrics suite for object oriented design. IEEE Trans Softw Eng 20(6):476\u2013493","journal-title":"IEEE Trans Softw Eng"},{"key":"9361_CR12","doi-asserted-by":"crossref","unstructured":"D\u2019Ambros M, Lanza M, Robbes R (2009) On the relationship between change coupling and software defects In: Proceedings of the 16th Working Conference on Reverse Engineering. IEEE Computer Society, Washington, DC, pp 135\u2013144","DOI":"10.1109\/WCRE.2009.19"},{"key":"9361_CR13","unstructured":"Dasarathy B (1991) Nearest Neighbor ({NN}) Norms: {NN} Pattern Classification Techniques. IEEE Computer Society Press, Washington, DC"},{"key":"9361_CR14","doi-asserted-by":"crossref","unstructured":"Emden EV, Moonen L (2002) Java quality assurance by detecting code smells In: The 9th Working Conference on Reverse Engineering IEEE Computer, pp 97\u2013107. Society Press","DOI":"10.1109\/WCRE.2002.1173068"},{"key":"9361_CR15","doi-asserted-by":"crossref","unstructured":"Gall H, Hajek K, Jazayeri M (1998) Detection of logical coupling based on product release history In: The International Conference on Software Maintenance. IEEE Computer Society, Washington, DC, pp 190\u2013200","DOI":"10.1109\/ICSM.1998.738508"},{"key":"9361_CR16","unstructured":"Gamma E, Helm R, Johnson R, Vlissides J (1994) Design Patterns \u2013 Elements of Reusable Object-Oriented Software, 1 s t edn. Addison-Wesley"},{"key":"9361_CR17","doi-asserted-by":"crossref","unstructured":"Gatrell M, Counsell S (2011) Design patterns and fault-proneness a study of commercial C# software. In: Research Challenges in Information Science (RCIS) pp 1\u20138. IEEE","DOI":"10.1109\/RCIS.2011.6006827"},{"key":"9361_CR18","unstructured":"Gerlec C, Hericko M (2012) Analyzing structural software changes: A case study. In: The 5th Balkan Conference in Informatics, pp 117\u2013120"},{"key":"9361_CR19","doi-asserted-by":"crossref","unstructured":"G\u00eerba T, Ducasse S, Kuhn A, Marinescu R, Daniel R (2007) Using concept analysis to detect co-change patterns In: International Workshop on Principles of Software Evolution. ACM, New York, NY, pp 83\u201389","DOI":"10.1145\/1294948.1294970"},{"key":"9361_CR20","doi-asserted-by":"crossref","unstructured":"Gu\u00e9h\u00e9neuc YG, Albin-Amiot H (2004) Recovering binary class relationships: Putting icing on the UML cake. In: Schmidt DC (ed) Proceedings of the 19 t h Conference on Object-Oriented Programming, Systems, Languages, and Applications pp 301\u2013314. ACM Press","DOI":"10.1145\/1028976.1029002"},{"issue":"5","key":"9361_CR21","doi-asserted-by":"crossref","first-page":"667","DOI":"10.1109\/TSE.2008.48","volume":"34","author":"YG Gu\u00e9h\u00e9neuc","year":"2008","unstructured":"Gu\u00e9h\u00e9neuc YG, Antoniol G (2008) DeMIMA: A multi-layered framework for design pattern identification. IEEE Trans Softw Eng 34(5):667\u2013684","journal-title":"IEEE Trans Softw Eng"},{"key":"9361_CR22","unstructured":"Gu\u00e9h\u00e9neuc YG, Sahraoui H, Zaidi F (2004) Fingerprinting design patterns In: Proceedings of the 11th Working Conference on Reverse Engineering. IEEE Computer Society, Washington, DC, pp 172\u2013181"},{"key":"9361_CR23","volume-title":"Elements of Software Science (Operating and Programming Systems Series)","author":"MH Halstead","year":"1977","unstructured":"Halstead MH (1977) Elements of Software Science (Operating and Programming Systems Series). Elsevier Science Inc., New York, NY"},{"key":"9361_CR24","doi-asserted-by":"crossref","unstructured":"Hassan AE (2009) Predicting faults using the complexity of code changes In: Proceedings of the 31st International Conference on Software Engineering. IEEE Computer Society, Washington, DC, pp 78\u201388","DOI":"10.1109\/ICSE.2009.5070510"},{"key":"9361_CR25","doi-asserted-by":"crossref","unstructured":"Hassan AE, Holt RC (2005) The top ten list: Dynamic fault prediction In: Proceedings of the 21st IEEE International Conference on Software Maintenance, pp 263\u2013272. IEEE Computer Society","DOI":"10.1109\/ICSM.2005.91"},{"key":"9361_CR26","doi-asserted-by":"crossref","unstructured":"Hosmer DW, Lemeshow S (2000) Applied logistic regression (Wiley Series in probability and statistics) Wiley-Interscience Publication","DOI":"10.1002\/0471722146"},{"key":"9361_CR27","doi-asserted-by":"crossref","unstructured":"Iacob C. (2011) A design pattern mining method for interaction design. In: The 3rd ACM SIGCHI Symposium on Engineering Interactive Computing Systems, pp 217\u2013222. ACM","DOI":"10.1145\/1996461.1996523"},{"key":"9361_CR28","doi-asserted-by":"crossref","unstructured":"Jaafar F, Gu\u00e9h\u00e9neuc YG, Hamel S, Antoniol G (2011) An exploratory study of macro co-changes. In: Proceedings of the 18 t h Working Conference on Reverse Engineering, pp 325\u2013334","DOI":"10.1109\/WCRE.2011.47"},{"key":"9361_CR29","first-page":"1","volume":"59","author":"F Jaafar","year":"2013","unstructured":"Jaafar F, Gu\u00e9h\u00e9neuc YG, Hamel S, Khomh F (2013) Analysing anti-patterns static relationships with design patterns. Electronic Communications of the European Association of Software Science and Technology 59:1\u201326","journal-title":"Electronic Communications of the European Association of Software Science and Technology"},{"key":"9361_CR30","doi-asserted-by":"crossref","unstructured":"Jaafar F., Gu\u00e9h\u00e9neuc YG, Hamel S, Khomh F (2013) Mining the relationship between anti-patterns dependencies and fault-proneness. In: Proceedings of the 20 t h Working Conference on Reverse Engineering:351\u2013360","DOI":"10.1109\/WCRE.2013.6671310"},{"key":"9361_CR31","doi-asserted-by":"crossref","unstructured":"Jahnke JH, Sch\u00e4fer W, Z\u00fcndorf A (1997) Generic fuzzy reasoning nets as a basis for reverse engineering relational database applications. In: Jazayeri M (ed) Proceedings of the 6 t h European Software Engineering Conference pp 193\u2013210. ACM Press.","DOI":"10.1007\/3-540-63531-9_15"},{"key":"9361_CR32","doi-asserted-by":"crossref","unstructured":"Khomh F, Penta MD, Gu\u00e9h\u00e9neuc YG, Antoniol G (2012) An exploratory study of the impact of antipatterns on class change- and fault-proneness. Empirical Software Engineering, pp 243\u2013275","DOI":"10.1007\/s10664-011-9171-y"},{"key":"9361_CR33","doi-asserted-by":"crossref","unstructured":"Kr\u00e4mer C, Prechelt L (1996) Design recovery by automated search for structural design patterns in object-oriented software. In: Wills LM, Baxter I (eds) Proceedings of the 3 r d Working Conference on Reverse Engineering. IEEE Computer Society Press, pp 208\u2013215.","DOI":"10.1109\/WCRE.1996.558905"},{"key":"9361_CR34","doi-asserted-by":"crossref","unstructured":"Kullbach B, Winter A (1999) Querying as an enabling technology in software reengineering. In: Nesi P, Verhoef C (eds) Proceedings of the 3 r d Conference on Software Maintenance and Reengineering. IEEE Computer Society Press, pp 42\u201350.","DOI":"10.1109\/CSMR.1999.756681"},{"key":"9361_CR35","unstructured":"Lanza M, Marinescu R (2006) Object-Oriented Metrics in Practice. Springer-Verlag"},{"key":"9361_CR36","unstructured":"Lethbridge NAT (1998) Extracting concepts from file names; a new file clustering criterion In: Proceedings of the International Conference on Software Engineering, pp 84\u201393"},{"key":"9361_CR37","doi-asserted-by":"crossref","unstructured":"Marcus A, Poshyvanyk D, Ferenc R (2008) Using the conceptual cohesion of classes for fault prediction in object-oriented systems. IEEE Transactions On Software Engineering, pp 287\u2013300","DOI":"10.1109\/TSE.2007.70768"},{"key":"9361_CR38","doi-asserted-by":"crossref","unstructured":"Marinescu R, Marinescu C (2011) Are the clients of flawed classes (also) defect prone? In: Proceedings of the IEEE 11th International Working Conference on Source Code Analysis and Manipulation. IEEE Computer Society, Washington, DC, pp 65\u201374","DOI":"10.1109\/SCAM.2011.9"},{"key":"9361_CR39","doi-asserted-by":"crossref","unstructured":"McCabe TJ (1976) A complexity measure In: Proceedings of the 2Nd International Conference on Software Engineering. IEEE Computer Society Press, Los Alamitos, CA, pp 407\u2013417","DOI":"10.1109\/TSE.1976.233837"},{"key":"9361_CR40","doi-asserted-by":"crossref","unstructured":"Moha N, Gu\u00e9h\u00e9neuc YG, Duchien L, Le Meur AF (2010) DECOR: A method for the specification and detection of code and design smells. Trans Softw Eng:20\u201336","DOI":"10.1109\/TSE.2009.50"},{"key":"9361_CR41","doi-asserted-by":"crossref","unstructured":"Moser R, Pedrycz W, Succi G (2008) A comparative analysis of the efficiency of change metrics and static code attributes for defect prediction In: The 30th International Conference on Software Engineering. ACM, New York, NY, pp 181\u2013190","DOI":"10.1145\/1368088.1368114"},{"key":"9361_CR42","doi-asserted-by":"crossref","unstructured":"Nagappan N, Ball T (2005) Use of relative code churn measures to predict system defect density In: The 27th International Conference on Software Engineering, ACM","DOI":"10.1109\/ICSE.2005.1553571"},{"key":"9361_CR43","doi-asserted-by":"crossref","unstructured":"Neuhaus S, Zimmermann T, Holler C, Zeller A (2007) Predicting vulnerable software components. In: The 14th Conference on Computer and Communications Security. ACM, pp 529\u2013540","DOI":"10.1145\/1315245.1315311"},{"key":"9361_CR44","unstructured":"Oliveto R, Gethers M, Bavota G, Poshyvanyk D, De Lucia A (2011) Identifying method friendships to remove the feature envy bad smell (nier track) In: Proceedings of the 33rd International Conference on Software Engineering. ACM, New York, NY, pp 820\u2013823"},{"key":"9361_CR45","doi-asserted-by":"crossref","unstructured":"Ostrand T, Weyuker E, Bell R (2005) Predicting the location and number of faults in large software systems. IEEE Transactions on Software Engineering, pp 340\u2013355","DOI":"10.1109\/TSE.2005.49"},{"key":"9361_CR46","unstructured":"Pedersen T (1996) Fishing for exactness In: Proceedings of the South-Central SAS Users Group Conference cmp-lg\/9608010, pp 188\u2013200"},{"key":"9361_CR47","doi-asserted-by":"crossref","unstructured":"Pietrzak B, Walter B (2006) Leveraging code smell detection with inter-smell relations. Extreme Programming and Agile Processes in Software Engineering, pp 75\u201384","DOI":"10.1007\/11774129_8"},{"issue":"3","key":"9361_CR48","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1023\/A:1008608825390","volume":"5","author":"A Quilici","year":"1997","unstructured":"Quilici A, Yang Q, Woods S (1997) Applying plan recognition algorithms to program understanding. J Autom Softw Eng 5(3):347\u2013372.","journal-title":"J Autom Softw Eng"},{"key":"9361_CR49","doi-asserted-by":"crossref","unstructured":"Ratiu D, Ducasse S, G\u00eerba T, Marinescu R (2004) Using history information to improve design flaws detection. In: Proceedings of the Eighth Euromicro Working Conference on Software Maintenance and Reengineering. IEEE Computer Society, pp 223\u2013233","DOI":"10.1109\/CSMR.2004.1281423"},{"key":"9361_CR50","doi-asserted-by":"crossref","unstructured":"Romano D, Raila P, Pinzger M, Khomh F (2012) Analyzing the impact of antipatterns on change-proneness using fine-grained source code changes Working Conference on Reverse Engineering, pp 437\u2013 446","DOI":"10.1109\/WCRE.2012.53"},{"issue":"8","key":"9361_CR51","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1002\/pds.1001","volume":"13","author":"KJ Rothman","year":"2004","unstructured":"Rothman KJ, Lanes S, Sacks ST (2004) The reporting odds ratio and its advantages over the proportional reporting ratio. Pharmacoepidemiol Drug Safety 13(8):519\u2013523","journal-title":"Pharmacoepidemiol Drug Safety"},{"issue":"10","key":"9361_CR52","doi-asserted-by":"crossref","first-page":"9041","DOI":"10.1016\/j.eswa.2012.02.049","volume":"39","author":"D Settas","year":"2012","unstructured":"Settas D, Cerone A, Fenz S (2012) Enhancing ontology-based antipattern detection using bayesian networks. Expert Syst Appl 39(10):9041\u20139053","journal-title":"Expert Syst Appl"},{"key":"9361_CR53","unstructured":"Sheskin DJ (2007) Handbook of Parametric and Nonparametric Statistical Procedures. Chapman & Hall\/CRC"},{"issue":"4","key":"9361_CR54","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1082983.1083147","volume":"30","author":"J Sliwerski","year":"2005","unstructured":"Sliwerski J, Zimmermann T, Zeller A (2005) When do changes induce fixes?. SIGSOFT Softw Eng Notes 30(4):1\u20135","journal-title":"SIGSOFT Softw Eng Notes"},{"issue":"4","key":"9361_CR55","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1109\/TSE.2003.1191795","volume":"29","author":"R Subramanyam","year":"2003","unstructured":"Subramanyam R, Krishnan MS (2003) Empirical analysis of ck metrics for object-oriented design complexity: Implications for software defects. IEEE Trans Softw Eng 29(4):297\u2013310","journal-title":"IEEE Trans Softw Eng"},{"key":"9361_CR56","unstructured":"Tatsubori M, Chiba S (1998) Programming support of design patterns with compile-time reflection. In: Fabre JC, Chiba S (eds) Proceedings of the 1 s t OOPSLA workshop on Reflective Programming in C++ and Java. Center for Computational Physics, University of Tsukuba, pp 56\u201360. UTCCP Report 98-4"},{"issue":"11","key":"9361_CR57","doi-asserted-by":"crossref","first-page":"896","DOI":"10.1109\/TSE.2006.112","volume":"32","author":"N Tsantalis","year":"2006","unstructured":"Tsantalis N, Chatzigeorgiou A, Stephanides G, Halkidis S (2006) Design pattern detection using similarity scoring. IEEE Trans Softw Eng 32(11):896\u2013909","journal-title":"IEEE Trans Softw Eng"},{"key":"9361_CR58","doi-asserted-by":"crossref","unstructured":"Vokac M (2004) Defect frequency and design patterns: An empirical study of industrial code. IEEE Transaction on Software Engineering, pp 904\u2013917","DOI":"10.1109\/TSE.2004.99"},{"key":"9361_CR59","unstructured":"Webster BF (1995) Pitfalls of Object Oriented Development, 1 s t edn. M & T Books."},{"key":"9361_CR60","doi-asserted-by":"crossref","unstructured":"Wuyts R (1998) Declarative reasoning about the structure of object-oriented systems. Proceedings of Technology of Object-Oriented Systems (TOOLS\u201998), pp 112\u2013124","DOI":"10.1109\/TOOLS.1998.711007"},{"key":"9361_CR61","doi-asserted-by":"crossref","unstructured":"Yamashita A, Moonen L (2012) Do code smells reflect important maintainability aspects? In: Software Maintenance (ICSM), 2012 28th IEEE International Conference on. IEEE, pp 306\u2013315","DOI":"10.1109\/ICSM.2012.6405287"},{"issue":"12","key":"9361_CR62","doi-asserted-by":"crossref","first-page":"2223","DOI":"10.1016\/j.infsof.2013.08.002","volume":"55","author":"A Yamashita","year":"2013","unstructured":"Yamashita A, Moonen L (2013) To what extent can maintenance problems be predicted by code smell detection? - an empirical study. Info Softw Technol 55(12):2223\u20132242","journal-title":"Info Softw Technol"},{"key":"9361_CR63","volume-title":"Case Study Research: Design and Methods - Third Edition","author":"RK Yin","year":"2002","unstructured":"Yin RK (2002) Case Study Research: Design and Methods - Third Edition. SAGE Publications, London"},{"key":"9361_CR64","doi-asserted-by":"crossref","unstructured":"Ying ATT, Murphy GC, Ng R, Chu-Carroll MC (2004) Predicting source code changes by mining change history, vol 30, pp 574\u2013586","DOI":"10.1109\/TSE.2004.52"},{"key":"9361_CR65","volume-title":"Case study research: design and methods","author":"RK Yinn","year":"2002","unstructured":"Yinn RK (2002) Case study research: design and methods. SAGE, London, England"},{"key":"9361_CR66","doi-asserted-by":"crossref","unstructured":"Zimmermann T, Nagappan N (2008) Predicting defects using network analysis on dependency graphs. In: Proceedings of the 30th International Conference on Software Engineering, pp 531\u2013540. ACM","DOI":"10.1145\/1368088.1368161"},{"key":"9361_CR67","doi-asserted-by":"crossref","unstructured":"Zimmermann T, Premraj R, Zeller A (2007) Predicting defects for eclipse In: Proceedings of the Third International Workshop on Predictor Models in Software Engineering. IEEE Computer Society, Washington, DC, pp 9\u201316","DOI":"10.1109\/PROMISE.2007.10"},{"key":"9361_CR68","doi-asserted-by":"crossref","unstructured":"Zimmermann T, Weisgerber P, Diehl S, Zeller A (2004) Mining version histories to guide software changes. In: Proceedings of the 26th International Conference on Software Engineering, pp 563\u2013572. IEEE Computer Society","DOI":"10.1109\/ICSE.2004.1317478"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-015-9361-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-015-9361-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-015-9361-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,21]],"date-time":"2019-08-21T19:28:52Z","timestamp":1566415732000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-015-9361-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3,10]]},"references-count":68,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,6]]}},"alternative-id":["9361"],"URL":"https:\/\/doi.org\/10.1007\/s10664-015-9361-0","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,3,10]]}}}