{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T04:53:56Z","timestamp":1769748836585,"version":"3.49.0"},"reference-count":77,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. 61772071 and No. 61690205"],"award-info":[{"award-number":["No. 61772071 and No. 61690205"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"U.S. National Science Foundation Award","award":["CCF-1350487"],"award-info":[{"award-number":["CCF-1350487"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1007\/s10664-020-09871-2","type":"journal-article","created":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T15:04:10Z","timestamp":1598627050000},"page":"4315-4347","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Feature requests-based recommendation of software refactorings"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5210-259X","authenticated-orcid":false,"given":"Ally S.","family":"Nyamawe","sequence":"first","affiliation":[]},{"given":"Hui","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Nan","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Qasim","family":"Umer","sequence":"additional","affiliation":[]},{"given":"Zhendong","family":"Niu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,28]]},"reference":[{"key":"9871_CR1","doi-asserted-by":"crossref","unstructured":"Aggarwal CC, Zhai C (2012) A survey of text classification algorithms. In: Zhai C (ed) Aggarwal CC. Springer, Mining text data, pp 163\u2013222","DOI":"10.1007\/978-1-4614-3223-4_6"},{"key":"9871_CR2","doi-asserted-by":"crossref","unstructured":"AlOmar EA, Mkaouer MW, Ouni A (2019) Can refactoring be self-affirmed?: An exploratory study on how developers document their refactoring activities in commit messages. In: Tsantalis N, Cai Y, Demeyer S (eds) Proceedings of the 3rd international workshop on refactoring, IWOR@ICSE 2019, Montreal, QC, Canada, May 28, 2019. IEEE\/ACM, pp 51\u201358","DOI":"10.1109\/IWoR.2019.00017"},{"key":"9871_CR3","doi-asserted-by":"crossref","unstructured":"Alspaugh TA, Scacchi W (2013) Ongoing software development without classical requirements. In: 21st IEEE International requirements engineering conference, RE 2013, Rio de Janeiro-RJ, Brazil, July 15\u201319, 2013. IEEE Computer Society, pp 165\u2013174","DOI":"10.1109\/RE.2013.6636716"},{"issue":"2","key":"9871_CR4","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/s10515-019-00253-7","volume":"26","author":"F Angerer","year":"2019","unstructured":"Angerer F, Grimmer A, Pr\u00e4hofer H, Gr\u00fcnbacher P (2019) Change impact analysis for maintenance and evolution of variable software systems. Autom Softw Eng 26(2):417\u2013461","journal-title":"Autom Softw Eng"},{"key":"9871_CR5","unstructured":"Apache Projects Issues (2020) (Retrived on 12th March 2020). In: https:\/\/issues.apache.org\/jira\/projects\/"},{"key":"9871_CR6","doi-asserted-by":"crossref","unstructured":"Bavota G, Lucia AD, Marcus A, Oliveto R (2014) Recommending refactoring operations in large software systems. In: Robillard MP, Maalej W, Walker RJ, Zimmermann T (eds) Recommendation systems in software engineering. Springer, pp 387\u2013419","DOI":"10.1007\/978-3-642-45135-5_15"},{"issue":"6","key":"9871_CR7","doi-asserted-by":"publisher","first-page":"1617","DOI":"10.1007\/s10664-013-9256-x","volume":"19","author":"G Bavota","year":"2014","unstructured":"Bavota G, Lucia AD, Marcus A, Oliveto R (2014) Automating extract class refactoring: an improved method and its evaluation. Empir Softw Eng 19 (6):1617\u20131664","journal-title":"Empir Softw Eng"},{"key":"9871_CR8","unstructured":"Bugzilla (2019) (Accessed October 2019) https:\/\/www.bugzilla.org\/"},{"key":"9871_CR9","doi-asserted-by":"crossref","unstructured":"Chaparro O, Bavota G, Marcus A, Penta MD (2014) On the impact of refactoring operations on code quality metrics. In: 30th IEEE International conference on software maintenance and evolution, Victoria, BC, Canada, September 29\u2013October 3, 2014, pp 456\u2013460","DOI":"10.1109\/ICSME.2014.73"},{"issue":"3","key":"9871_CR10","doi-asserted-by":"publisher","first-page":"5432","DOI":"10.1016\/j.eswa.2008.06.054","volume":"36","author":"J Chen","year":"2009","unstructured":"Chen J, Huang H, Tian S, Qu Y (2009) Feature selection for text classification with na\u00efve bayes. Expert Syst Appl 36(3):5432\u20135435","journal-title":"Expert Syst Appl"},{"key":"9871_CR11","unstructured":"Codacy (2019) (Accessed October 2019) https:\/\/github.com\/marketplace\/codacy"},{"key":"9871_CR12","doi-asserted-by":"crossref","unstructured":"Feng W, Sun J, Zhang L, Cao C, Yang Q (2016) A support vector machine based naive bayes algorithm for spam filtering. In: 35th IEEE international performance computing and communications conference, IPCCC 2016, Las Vegas, NV, USA, December 9\u201311, 2016, pp 1\u20138","DOI":"10.1109\/PCCC.2016.7820655"},{"key":"9871_CR13","doi-asserted-by":"crossref","unstructured":"Fokaefs M, Tsantalis N, Chatzigeorgiou A (2007) Jdeodorant: Identification and removal of feature envy bad smells. In: ICSM 2007. IEEE International conference on software maintenance 2007. IEEE, pp 519\u2013520","DOI":"10.1109\/ICSM.2007.4362679"},{"key":"9871_CR14","doi-asserted-by":"crossref","unstructured":"Fokaefs M, Tsantalis N, Stroulia E, Chatzigeorgiou A (2011) Jdeodorant: identification and application of extract class refactorings. In: Proceedings of the 33rd international conference on software engineering, ICSE 2011, Waikiki, Honolulu , HI, USA, May 21\u201328, 2011, pp 1037\u20131039","DOI":"10.1145\/1985793.1985989"},{"issue":"10","key":"9871_CR15","doi-asserted-by":"publisher","first-page":"2241","DOI":"10.1016\/j.jss.2012.04.013","volume":"85","author":"M Fokaefs","year":"2012","unstructured":"Fokaefs M, Tsantalis N, Stroulia E, Chatzigeorgiou A (2012) Identification and application of extract class refactorings in object-oriented systems. J Syst Softw 85(10):2241\u20132260","journal-title":"J Syst Softw"},{"key":"9871_CR16","unstructured":"Fowler M (1999) Refactoring\u2014improving the design of existing code. Addison Wesley object technology series. Addison-Wesley"},{"issue":"3","key":"9871_CR17","doi-asserted-by":"publisher","first-page":"52:1","DOI":"10.1145\/2716262","volume":"47","author":"E Gibaja","year":"2015","unstructured":"Gibaja E, Ventura S (2015) A tutorial on multilabel learning. ACM Comput Surv 47(3):52:1\u201352:38","journal-title":"ACM Comput Surv"},{"key":"9871_CR18","unstructured":"Git Bash Commands (2018) (Retrived on 28th November 2018). In: https:\/\/www.atlassian.com\/git"},{"key":"9871_CR19","unstructured":"GitHub (2019) (Accessed October 2019) https:\/\/github.com\/features"},{"key":"9871_CR20","doi-asserted-by":"crossref","unstructured":"Godbole S, Sarawagi S (2004) Discriminative methods for multi-labeled classification. In: Dai H, Srikant R, Zhang C (eds) Advances in knowledge discovery and data mining, 8th Pacific-Asia Conference, PAKDD 2004, Sydney, Australia, May 26-28, 2004, Proceedings, Springer, Lecture Notes in Computer Science, vol 3056, pp 22\u201330","DOI":"10.1007\/978-3-540-24775-3_5"},{"key":"9871_CR21","doi-asserted-by":"crossref","unstructured":"Heck P, Zaidman A (2013) An analysis of requirements evolution in open source projects: recommendations for issue trackers. In: 13th International workshop on principles of software evolution, IWPSE 2013, Proceedings, August 19\u201320, 2013, Saint Petersburg, pp 43\u201352","DOI":"10.1145\/2501543.2501550"},{"key":"9871_CR22","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1016\/j.infsof.2017.11.012","volume":"95","author":"P Heged\u00fcs","year":"2018","unstructured":"Heged\u00fcs P, K\u00e1d\u00e1r I, Ferenc R, Gyim\u00f3thy T (2018) Empirical evaluation of software maintainability based on a manually validated refactoring dataset. Inf Softw Technol 95:313\u2013327","journal-title":"Inf Softw Technol"},{"issue":"4","key":"9871_CR23","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1007\/s00766-017-0277-7","volume":"23","author":"S Jayatilleke","year":"2018","unstructured":"Jayatilleke S, Lai R, Reed K (2018) A method of requirements change analysis. Requir Eng 23(4):493\u2013508","journal-title":"Requir Eng"},{"issue":"2","key":"9871_CR24","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1080\/0952813X.2012.721010","volume":"25","author":"L Jiang","year":"2013","unstructured":"Jiang L, Cai Z, Zhang H, Wang D (2013) Naive bayes text classifiers: a locally weighted learning approach. J Exp Theor Artif Intell 25(2):273\u2013286","journal-title":"J Exp Theor Artif Intell"},{"key":"9871_CR25","unstructured":"JIRA (2019) (Accessed October 2019) https:\/\/www.atlassian.com\/software\/jira"},{"key":"9871_CR26","doi-asserted-by":"crossref","unstructured":"Kessentini M, Dea TJ, Ouni A (2017) A context-based refactoring recommendation approach using simulated annealing: two industrial case studies. In: Proceedings of the genetic and evolutionary computation conference, GECCO 2017, Berlin, Germany, July 15\u201319, 2017, pp 1303\u20131310","DOI":"10.1145\/3071178.3071334"},{"issue":"1","key":"9871_CR27","first-page":"4","volume":"1","author":"A Khan","year":"2010","unstructured":"Khan A, Baharudin B, Lee LH, Khan K, Tronoh UTP (2010) A review of machine learning algorithms for text-documents classification. J Adv Inf Technol 1(1):4\u201320","journal-title":"J Adv Inf Technol"},{"key":"9871_CR28","doi-asserted-by":"crossref","unstructured":"Kim M, Gee M, Loh A, Rachatasumrit N (2010) Ref-finder: a refactoring reconstruction tool based on logic query templates. In: Proceedings of the 18th ACM SIGSOFT international symposium on foundations of software engineering, 2010, Santa Fe, NM, USA, November 7\u201311, 2010, pp 371\u2013372","DOI":"10.1145\/1882291.1882353"},{"key":"9871_CR29","doi-asserted-by":"crossref","unstructured":"Kim M, Zimmermann T, Nagappan N (2012) A field study of refactoring challenges and benefits. In: 20th ACM SIGSOFT symposium on the foundations of software engineering (FSE-20), SIGSOFT\/FSE\u201912, Cary, NC, USA\u2013November 11\u201316, 2012, p 50","DOI":"10.1145\/2393596.2393655"},{"key":"9871_CR30","doi-asserted-by":"crossref","unstructured":"Lin Y, Peng X, Cai Y, Dig D, Zheng D, Zhao W (2016) Interactive and guided architectural refactoring with search-based recommendation. In: Proceedings of the 24th ACM SIGSOFT international symposium on foundations of software engineering, FSE 2016, Seattle, WA, USA, November 13\u201318, 2016, pp 535\u2013546","DOI":"10.1145\/2950290.2950317"},{"issue":"1","key":"9871_CR31","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1109\/TSE.2011.9","volume":"38","author":"H Liu","year":"2012","unstructured":"Liu H, Ma Z, Shao W, Niu Z (2012) Schedule of bad smell detection and resolution: a new way to save effort. IEEE Trans Software Eng 38 (1):220\u2013235","journal-title":"IEEE Trans Software Eng"},{"issue":"8","key":"9871_CR32","doi-asserted-by":"publisher","first-page":"1112","DOI":"10.1109\/TSE.2013.4","volume":"39","author":"H Liu","year":"2013","unstructured":"Liu H, Guo X, Shao W (2013) Monitor-based instant software refactoring. IEEE Trans Softw Eng 39(8):1112\u20131126","journal-title":"IEEE Trans Softw Eng"},{"key":"9871_CR33","doi-asserted-by":"crossref","unstructured":"Liu H, Xu Z, Zou Y (2018) Deep learning based feature envy detection. In: Proceedings of the 33rd ACM\/IEEE international conference on automated software engineering, ASE 2018, Montpellier, France, September 3\u20137, 2018, pp 385\u2013396","DOI":"10.1145\/3238147.3238166"},{"key":"9871_CR34","doi-asserted-by":"crossref","unstructured":"Loper E, Bird S (2002) NLTK: the natural language toolkit. In: ACL workshop effective tools and methodologies for teaching on natural language processing and computational linguistics (ETMTNLP), pp 63\u201370","DOI":"10.3115\/1118108.1118117"},{"issue":"3","key":"9871_CR35","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/s00766-013-0197-0","volume":"19","author":"A Mahmoud","year":"2014","unstructured":"Mahmoud A, Niu N (2014) Supporting requirements to code traceability through refactoring. Requir Eng 19(3):309\u2013329","journal-title":"Requir Eng"},{"key":"9871_CR36","volume-title":"Foundations of statistical natural language processing","author":"CD Manning","year":"2001","unstructured":"Manning CD, Sch\u00fctze H (2001) Foundations of statistical natural language processing. MIT Press, Cambridge"},{"key":"9871_CR37","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809071","volume-title":"Introduction to information retrieval","author":"CD Manning","year":"2008","unstructured":"Manning CD, Raghavan P, Sch\u00fctze H (2008) Introduction to information retrieval. Cambridge University Press, Cambridge"},{"issue":"5","key":"9871_CR38","doi-asserted-by":"publisher","first-page":"056101:1","DOI":"10.1007\/s11432-017-9355-3","volume":"61","author":"H Mei","year":"2018","unstructured":"Mei H, Zhang L (2018) Can big data bring a breakthrough for software automation? Science China Inf Sci 61(5):056101:1\u2013056101:3","journal-title":"Science China Inf Sci"},{"issue":"2","key":"9871_CR39","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/TSE.2004.1265817","volume":"30","author":"T Mens","year":"2004","unstructured":"Mens T, Tourw\u00e9 T (2004) A survey of software refactoring. IEEE Trans Softw Eng 30(2):126\u2013139","journal-title":"IEEE Trans Softw Eng"},{"issue":"1","key":"9871_CR40","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/TSE.2009.50","volume":"36","author":"N Moha","year":"2010","unstructured":"Moha N, Gu\u00e9h\u00e9neuc Y, Duchien L, Meur AL (2010) DECOR: a method for the specification and detection of code and design smells. IEEE Trans Softw Eng 36(1):20\u201336","journal-title":"IEEE Trans Softw Eng"},{"key":"9871_CR41","first-page":"3","volume":"6","author":"M Mohan","year":"2018","unstructured":"Mohan M, Greer D (2018) A survey of search-based refactoring for software maintenance. J Softw Eng R&D 6:3","journal-title":"J Softw Eng R&D"},{"issue":"1","key":"9871_CR42","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/TSE.2011.41","volume":"38","author":"ER Murphy-Hill","year":"2012","unstructured":"Murphy-Hill ER, Parnin C, Black AP (2012) How we refactor, and how we know it. IEEE Trans Software Eng 38(1):5\u201318","journal-title":"IEEE Trans Software Eng"},{"issue":"2","key":"9871_CR43","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/s10515-017-0229-y","volume":"25","author":"ZA Nizamani","year":"2018","unstructured":"Nizamani ZA, Liu H, Chen DM, Niu Z (2018) Automatic approval prediction for software enhancement requests. Autom Softw Eng 25(2):347\u2013381","journal-title":"Autom Softw Eng"},{"key":"9871_CR44","doi-asserted-by":"crossref","unstructured":"Niu N, Bhowmik T, Liu H, Niu Z (2014) Traceability-enabled refactoring for managing just-in-time requirements. In: IEEE 22nd international requirements engineering conference, RE 2014, Karlskrona, Sweden, August, 25\u201329, 2014, pp 133\u2013142","DOI":"10.1109\/RE.2014.6912255"},{"key":"9871_CR45","doi-asserted-by":"publisher","first-page":"49460","DOI":"10.1109\/ACCESS.2018.2868990","volume":"6","author":"AS Nyamawe","year":"2018","unstructured":"Nyamawe AS, Liu H, Niu Z, Wang W, Niu N (2018) Recommending refactoring solutions based on traceability and code metrics. IEEE Access 6:49460\u201349475","journal-title":"IEEE Access"},{"key":"9871_CR46","doi-asserted-by":"crossref","unstructured":"Nyamawe AS, Liu H, Niu N, Umer Q, Niu Z (2019) Automated recommendation of software refactorings based on feature requests. In: Damian D E, Perini A, Lee S (eds) 27th IEEE International requirements engineering conference, RE 2019, Jeju Island, Korea (South), September 23\u201327, 2019. IEEE , pp 187\u2013198","DOI":"10.1109\/RE.2019.00029"},{"key":"9871_CR47","doi-asserted-by":"crossref","unstructured":"Ouni A, Kessentini M, Sahraoui HA, Hamdi MS (2013) The use of development history in software refactoring using a multi-objective evolutionary algorithm. In: Genetic and evolutionary computation conference, GECCO \u201913, Amsterdam, The Netherlands, July 6\u201310, 2013, pp 1461\u20131468","DOI":"10.1145\/2463372.2463554"},{"key":"9871_CR48","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.jss.2015.03.040","volume":"105","author":"A Ouni","year":"2015","unstructured":"Ouni A, Kessentini M, Sahraoui HA, Inoue K, Hamdi MS (2015) Improving multi-objective code-smells correction using development history. J Syst Softw 105:18\u201339","journal-title":"J Syst Softw"},{"issue":"3","key":"9871_CR49","doi-asserted-by":"publisher","first-page":"23:1","DOI":"10.1145\/2932631","volume":"25","author":"A Ouni","year":"2016","unstructured":"Ouni A, Kessentini M, Sahraoui HA, Inoue K, Deb K (2016) Multi-criteria code refactoring using search-based software engineering: an industrial case study. ACM Trans Softw Eng Methodol 25(3):23:1\u201323:53","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"9871_CR50","doi-asserted-by":"crossref","unstructured":"Ouni A, Kessentini M, Cinn\u00e9ide M\u00d3, Sahraoui HA, Deb K, Inoue K (2017) MORE: a multi-objective refactoring recommendation approach to introducing design patterns and fixing code smells. J Softw: Evol Process 29(5)","DOI":"10.1002\/smr.1843"},{"key":"9871_CR51","doi-asserted-by":"crossref","unstructured":"Palomba F, Salza P, Ciurumelea A, Panichella S, Gall HC, Ferrucci F, Lucia AD (2017) Recommending and localizing change requests for mobile apps based on user reviews. In: Uchitel S, Orso A, Robillard M P (eds) Proceedings of the 39th international conference on software engineering, ICSE 2017, Buenos Aires, Argentina, May 20\u201328, 2017. IEEE\/ACM, pp 106\u2013117","DOI":"10.1109\/ICSE.2017.18"},{"key":"9871_CR52","doi-asserted-by":"crossref","unstructured":"Palomba F, Zaidman A, Oliveto R, Lucia AD (2017) An exploratory study on the relationship between changes and refactoring. In: Proceedings of the 25th international conference on program comprehension, ICPC 2017, Buenos Aires, Argentina, May 22\u201323, 2017, pp 176\u2013185","DOI":"10.1109\/ICPC.2017.38"},{"key":"9871_CR53","doi-asserted-by":"crossref","unstructured":"Pantiuchina J, Bavota G, Tufano M, Poshyvanyk D (2018) Towards just-in-time refactoring recommenders. In: Proceedings of the 26th conference on program comprehension, ICPC 2018, Gothenburg, Sweden, May 27\u201328, 2018, pp 312\u2013315","DOI":"10.1145\/3196321.3196365"},{"key":"9871_CR54","unstructured":"PMDCodacy (2019) (Accessed October 2019) https:\/\/github.com\/codacy\/codacy-pmdjava"},{"issue":"3","key":"9871_CR55","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1108\/00330330610681286","volume":"40","author":"MF Porter","year":"2006","unstructured":"Porter MF (2006) An algorithm for suffix stripping. Program 40 (3):211\u2013218","journal-title":"Program"},{"key":"9871_CR56","doi-asserted-by":"crossref","unstructured":"Rath M, Rendall J, Guo JLC, Cleland-Huang J, M\u00e4der P (2018) Traceability in the wild: automatically augmenting incomplete trace links. In: Chaudron M, Crnkovic I, Chechik M, Harman M (eds) Proceedings of the 40th international conference on software engineering, ICSE 2018, Gothenburg, Sweden, May 27\u2013June 03, 2018. ACM, pp 834\u2013845","DOI":"10.1145\/3180155.3180207"},{"key":"9871_CR57","doi-asserted-by":"crossref","unstructured":"Ratzinger J, Sigmund T, Vorburger P, Gall HC (2007) Mining software evolution to predict refactoring. In: Proceedings of the first international symposium on empirical software engineering and measurement, ESEM 2007, September 20\u201321, 2007, Madrid, pp 354\u2013363","DOI":"10.1109\/ESEM.2007.9"},{"key":"9871_CR58","doi-asserted-by":"crossref","unstructured":"Runeson P, Alexandersson M, Nyholm O (2007) Detection of duplicate defect reports using natural language processing. In: 29th International conference on software engineering (ICSE 2007), Minneapolis, MN, USA, May 20\u201326, 2007. IEEE Computer Society, pp 499\u2013510","DOI":"10.1109\/ICSE.2007.32"},{"issue":"2\/3","key":"9871_CR59","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1023\/A:1007649029923","volume":"39","author":"RE Schapire","year":"2000","unstructured":"Schapire RE, Singer Y (2000) Boostexter: a boosting-based system for text categorization. Mach Learn 39(2\/3):135\u2013168","journal-title":"Mach Learn"},{"key":"9871_CR60","unstructured":"Scikit-learn (Accessed October 2019) https:\/\/scikit-learn.org\/stable\/"},{"key":"9871_CR61","doi-asserted-by":"crossref","unstructured":"Silva D, Tsantalis N, Valente MT (2016) Why we refactor? Confessions of GitHub contributors. In: Proceedings of the 24th ACM SIGSOFT international symposium on foundations of software engineering, FSE 2016, Seattle, WA, USA, November 13\u201318, 2016, pp 858\u2013870","DOI":"10.1145\/2950290.2950305"},{"key":"9871_CR62","doi-asserted-by":"crossref","unstructured":"Silva D, Valente MT (2017) Refdiff: detecting refactorings in version histories. In: Proceedings of the 14th international conference on mining software repositories, MSR 2017, Buenos Aires, Argentina, May 20\u201328, 2017, pp 269\u2013279","DOI":"10.1109\/MSR.2017.14"},{"key":"9871_CR63","doi-asserted-by":"crossref","unstructured":"Simon F, Steinbr\u00fcckner F, Lewerentz C (2001) Metrics based refactoring. In: Fifth conference on software maintenance and reengineering, CSMR 2001, Lisbon, Portugal, March 14\u201316, 2001, pp 30\u201338","DOI":"10.1109\/CSMR.2001.914965"},{"key":"9871_CR64","doi-asserted-by":"crossref","unstructured":"Soares G, Catao B, Varjao C, Aguiar S, Gheyi R, Massoni T (2011) Analyzing refactorings on software repositories. In: 25th Brazilian symposium on software engineering, SBES 2011, Sao Paulo, Brazil, September 28\u201330, 2011. IEEE Computer Society, pp 164\u2013173","DOI":"10.1109\/SBES.2011.21"},{"key":"9871_CR65","doi-asserted-by":"crossref","unstructured":"Sun C, Lo D, Wang X, Jiang J, Khoo S (2010) A discriminative model approach for accurate duplicate bug report retrieval. In: Kramer J, Bishop J, Devanbu P T, Uchitel S (eds) Proceedings of the 32nd ACM\/IEEE international conference on software engineering\u2014volume 1, ICSE 2010, Cape Town, South Africa, 1\u20138 May 2010. ACM, pp 45\u201354","DOI":"10.1145\/1806799.1806811"},{"key":"9871_CR66","unstructured":"Tan L, Bockisch C (2019) A survey of refactoring detection tools. In: Krusche S, Schneider K, Kuhrmann M, Heinrich R, Jung R, Konersmann M, Schmieders E, Helke S, Schaefer I, Vogelsang A, Annigh\u00f6fer B, Schweiger A, Reich M, van Hoorn A (eds) Proceedings of the workshops of the software engineering conference 2019, Stuttgart, Germany, February 19, 2019, CEUR-WS.org, CEUR Workshop Proceedings, vol 2308, pp 100\u2013105"},{"key":"9871_CR67","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.jss.2017.11.073","volume":"138","author":"R Terra","year":"2018","unstructured":"Terra R, Valente MT, Miranda S, Sales V (2018) JMove: a novel heuristic and tool to detect move method refactoring opportunities. J Syst Softw 138:19\u201336","journal-title":"J Syst Softw"},{"key":"9871_CR68","doi-asserted-by":"crossref","unstructured":"Thung F, Wang S, Lo D, Lawall JL (2013) Automatic recommendation of API methods from feature requests. In: 2013 28th IEEE\/ACM international conference on automated software engineering, ASE 2013, Silicon Valley, CA, USA, November 11\u201315, 2013, pp 290\u2013300","DOI":"10.1109\/ASE.2013.6693088"},{"key":"9871_CR69","doi-asserted-by":"crossref","unstructured":"Thung F, Kochhar PS, Lo D (2014) Dupfinder: integrated tool support for duplicate bug report detection. In: Crnkovic I, Chechik M, Gr\u00fcnbacher P (eds) ACM\/IEEE international conference on automated software engineering, ASE \u201914, Vasteras, Sweden\u2013September 15\u201319, 2014. ACM, pp 871\u2013874","DOI":"10.1145\/2642937.2648627"},{"issue":"3","key":"9871_CR70","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1109\/TSE.2009.1","volume":"35","author":"N Tsantalis","year":"2009","unstructured":"Tsantalis N, Chatzigeorgiou A (2009) Identification of move method refactoring opportunities. IEEE Trans Softw Eng 35(3):347\u2013367","journal-title":"IEEE Trans Softw Eng"},{"key":"9871_CR71","doi-asserted-by":"crossref","unstructured":"Tsantalis N, Chatzigeorgiou A (2011) Ranking refactoring suggestions based on historical volatility. In: 15th European conference on software maintenance and reengineering, CSMR 2011, 1\u20134 March, 2011, Oldenburg, pp 25\u201334","DOI":"10.1109\/CSMR.2011.7"},{"key":"9871_CR72","doi-asserted-by":"crossref","unstructured":"Tsantalis N, Mansouri M, Eshkevari LM, Mazinanian D, Dig D (2018) Accurate and efficient refactoring detection in commit history. In: Proceedings of the 40th international conference on software engineering, ICSE 2018, Gothenburg, Sweden, May 27\u2013June 03, 2018, pp 483\u2013494","DOI":"10.1145\/3180155.3180206"},{"issue":"1","key":"9871_CR73","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.ipm.2013.08.006","volume":"50","author":"AK Uysal","year":"2014","unstructured":"Uysal AK, G\u00fcnal S (2014) The impact of preprocessing on text classification. Inf Process Manag 50(1):104\u2013112","journal-title":"Inf Process Manag"},{"issue":"3","key":"9871_CR74","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1007\/s10515-014-0175-x","volume":"23","author":"SA Vidal","year":"2014","unstructured":"Vidal SA, Marcos CA, Pace JAD (2014) An approach to prioritize code smells for refactoring. Autom Softw Eng 23(3):501\u2013532","journal-title":"Autom Softw Eng"},{"key":"9871_CR75","doi-asserted-by":"crossref","unstructured":"Xu S, Sivaraman A, Khoo S, Xu J (2017) GEMS: an extract method refactoring recommender. In: 28th IEEE International symposium on software reliability engineering, ISSRE 2017, Toulouse, France, October 23\u201326, 2017, pp 24\u201334","DOI":"10.1109\/ISSRE.2017.35"},{"key":"9871_CR76","doi-asserted-by":"crossref","unstructured":"Yue R, Gao Z, Meng N, Xiong Y, Wang X, Morgenthaler J D (2018) Automatic clone recommendation for refactoring based on the present and the past. In: 2018 IEEE international conference on software maintenance and evolution, ICSME 2018, Madrid, Spain, September 23\u201329, 2018, pp 115\u2013126","DOI":"10.1109\/ICSME.2018.00021"},{"issue":"8","key":"9871_CR77","doi-asserted-by":"publisher","first-page":"1819","DOI":"10.1109\/TKDE.2013.39","volume":"26","author":"M Zhang","year":"2014","unstructured":"Zhang M, Zhou Z (2014) A review on multi-label learning algorithms. IEEE Trans Knowl Data Eng 26(8):1819\u20131837","journal-title":"IEEE Trans Knowl Data Eng"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-020-09871-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-020-09871-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-020-09871-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,28]],"date-time":"2021-08-28T00:15:19Z","timestamp":1630109719000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-020-09871-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,28]]},"references-count":77,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2020,9]]}},"alternative-id":["9871"],"URL":"https:\/\/doi.org\/10.1007\/s10664-020-09871-2","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,28]]},"assertion":[{"value":"28 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}