{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T14:52:38Z","timestamp":1768488758822,"version":"3.49.0"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1007\/s10664-020-09900-0","type":"journal-article","created":{"date-parts":[[2021,1,15]],"date-time":"2021-01-15T20:06:09Z","timestamp":1610741169000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Investigating design anti-pattern and design pattern mutations and their change- and fault-proneness"],"prefix":"10.1007","volume":"26","author":[{"given":"Zeinab Azadeh","family":"Kermansaravi","sequence":"first","affiliation":[]},{"given":"Md Saidur","family":"Rahman","sequence":"additional","affiliation":[]},{"given":"Foutse","family":"Khomh","sequence":"additional","affiliation":[]},{"given":"Fehmi","family":"Jaafar","sequence":"additional","affiliation":[]},{"given":"Yann-Ga\u00ebl","family":"Gu\u00e9h\u00e9neuc","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,15]]},"reference":[{"key":"9900_CR1","doi-asserted-by":"crossref","unstructured":"Abbes M, Khomh F, Gueheneuc Y-G, Antoniol G (2011) An empirical study of the impact of two antipatterns, blob and spaghetti code, on program comprehension. In: Software maintenance and reengineering (CSMR), 2011 15th European conference on. IEEE, pp 181\u2013190","DOI":"10.1109\/CSMR.2011.24"},{"issue":"4","key":"9900_CR2","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1016\/j.infsof.2011.10.006","volume":"54","author":"A Ampatzoglou","year":"2012","unstructured":"Ampatzoglou A, Frantzeskou G, Stamelos I (2012) A methodology to assess the impact of design patterns on software quality. Inf Softw Technol 54 (4):331\u2013346","journal-title":"Inf Softw Technol"},{"key":"9900_CR3","doi-asserted-by":"crossref","unstructured":"An L, Khomh F (2015) An empirical study of crash-inducing commits in Mozilla Firefox. In: Proceedings of the 11th International conference on predictive models and data analytics in software engineering. ACM, p 5","DOI":"10.1145\/2810146.2810152"},{"issue":"5","key":"9900_CR4","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1109\/TSE.2014.2312942","volume":"40","author":"V Arnaoudova","year":"2014","unstructured":"Arnaoudova V, Eshkevari LM, Di Penta M, Oliveto R, Antoniol G, Gueheneuc Y-G (2014) Repent: Analyzing the nature of identifier renamings. IEEE Trans Softw Eng 40(5):502\u2013532","journal-title":"IEEE Trans Softw Eng"},{"key":"9900_CR5","doi-asserted-by":"crossref","unstructured":"Aversano L, Canfora G, Cerulo L, Del Grosso C, Di Penta M (2007) An empirical study on the evolution of design patterns. In: Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering. ACM, pp 385\u2013394","DOI":"10.1145\/1287624.1287680"},{"key":"9900_CR6","doi-asserted-by":"crossref","unstructured":"Bieman JM, Straw G, Wang H, Munger PW, Alexander RT (2003) Design patterns and change proneness: An examination of five evolving systems. In: Software metrics symposium, 2003. Proceedings. Ninth international. IEEE, pp 40\u201349","DOI":"10.1109\/METRIC.2003.1232454"},{"key":"9900_CR7","unstructured":"Brown WH, Malveau RC, Mowbray TJ (1998) AntiPatterns: refactoring software, architectures, and projects in crisis, Wiley, New York"},{"key":"9900_CR8","doi-asserted-by":"crossref","unstructured":"Canfora G, Cerulo L, Di Penta M, Pacilio F (2010) An exploratory study of factors influencing change entropy. In: 2010 IEEE 18th International conference on program comprehension. IEEE, pp 134\u2013143","DOI":"10.1109\/ICPC.2010.32"},{"key":"9900_CR9","unstructured":"Ducasse S, G\u00eerba T, Marinescu R (2004) Using history information to improve design flaws detection. In: CSMR 2004: 8th european conference on software maintenance and reengineering. Citeseer"},{"key":"9900_CR10","doi-asserted-by":"crossref","unstructured":"Fischer M, Pinzger M, Gall H (2003) Populating a release history database from version control and bug tracking systems. In: Software maintenance, 2003. ICSM 2003. Proceedings. International conference on. IEEE, pp 23\u201332","DOI":"10.1109\/ICSM.2003.1235403"},{"key":"9900_CR11","unstructured":"Fowler M, Beck K (1999) Refactoring: improving the design of existing code. Addison-Wesley Professional"},{"key":"9900_CR12","doi-asserted-by":"crossref","unstructured":"Fukushima T, Kamei Y, McIntosh S, Yamashita K, Ubayashi N (2014) An empirical study of just-in-time defect prediction using cross-project models. In: Proceedings of the 11th working conference on mining software repositories. ACM, pp 172\u2013181","DOI":"10.1145\/2597073.2597075"},{"key":"9900_CR13","volume-title":"Design patterns: elements of reusable object-oriented software","author":"E Gamma","year":"1995","unstructured":"Gamma E (1995) Design patterns: elements of reusable object-oriented software. Pearson Education, India"},{"key":"9900_CR14","doi-asserted-by":"crossref","unstructured":"Gatrell M, Counsell S, Hall T (2009) Design patterns and change proneness: a replication using proprietary c# software. In: Reverse engineering, 2009. WCRE\u201909. 16th working conference on. IEEE, pp 160\u2013164","DOI":"10.1109\/WCRE.2009.31"},{"issue":"5","key":"9900_CR15","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1109\/TSE.2008.48","volume":"34","author":"Y-G Gu\u00e9h\u00e9neuc","year":"2008","unstructured":"Gu\u00e9h\u00e9neuc Y-G, Antoniol G (2008) Demima: A multilayered approach for design pattern identification. IEEE Trans Softw Eng 34(5):667\u2013684","journal-title":"IEEE Trans Softw Eng"},{"key":"9900_CR16","unstructured":"Gueheneuc Y-G, Sahraoui H, Zaidi F (2004) Fingerprinting design patterns. In: Reverse engineering, 2004. Proceedings. 11th Working conference on. IEEE, pp 172\u2013181"},{"key":"9900_CR17","doi-asserted-by":"crossref","unstructured":"Hassan AE (2009) Predicting faults using the complexity of code changes. In: Proceedings of the 31st international conference on software engineering. IEEE Computer Society, pp 78\u201388","DOI":"10.1109\/ICSE.2009.5070510"},{"key":"9900_CR18","doi-asserted-by":"crossref","unstructured":"Iacob C (2011) A design pattern mining method for interaction design. In: Proceedings of the 3rd ACM SIGCHI symposium on Engineering interactive computing systems. ACM, pp 217\u2013222","DOI":"10.1145\/1996461.1996523"},{"key":"9900_CR19","first-page":"26","volume":"2","author":"F Jaafar","year":"2013","unstructured":"Jaafar F, Gu\u00e9h\u00e9neuc Y-G, Hamel S (2013a) Analysing anti-patterns static relationships with design patterns. Proc PPAP 2:26","journal-title":"Proc PPAP"},{"key":"9900_CR20","doi-asserted-by":"crossref","unstructured":"Jaafar F, Gu\u00e9h\u00e9neuc Y-G, Hamel S, Khomh F (2013b) Mining the relationship between anti-patterns dependencies and fault-proneness. In: 2013 20th Working conference on reverse engineering (WCRE). IEEE, pp 351\u2013360","DOI":"10.1109\/WCRE.2013.6671310"},{"key":"9900_CR21","doi-asserted-by":"crossref","unstructured":"Jaafar F, Khomh F, Gu\u00e9h\u00e9neuc Y-G, Zulkernine M (2014) Anti-pattern mutations and fault-proneness. In: Quality software (QSIC), 2014 14th International conference on. IEEE, pp 246\u2013255","DOI":"10.1109\/QSIC.2014.45"},{"issue":"6","key":"9900_CR22","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1109\/TSE.2012.70","volume":"39","author":"Y Kamei","year":"2013","unstructured":"Kamei Y, Shihab E, Adams B, Hassan AE, Mockus A, Sinha A, Ubayashi N (2013) A large-scale empirical study of just-in-time quality assurance. IEEE Trans Softw Eng 39(6):757\u2013773","journal-title":"IEEE Trans Softw Eng"},{"issue":"3","key":"9900_CR23","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s10664-011-9171-y","volume":"17","author":"F Khomh","year":"2012","unstructured":"Khomh F, Di Penta M, Gu\u00e9h\u00e9neuc Y-G, Antoniol G (2012) An exploratory study of the impact of antipatterns on class change-and fault-proneness. Empir Softw Eng 17(3):243\u2013275","journal-title":"Empir Softw Eng"},{"key":"9900_CR24","unstructured":"Khomh F, Gu\u00e9h\u00e9neuc Y-G (2007) Perception and reality: What are design patterns good for?. In: Proceedings of 11th ECOOP workshop on quantitative approaches in object oriented software engineering (QAOOSE). Springer, p 7"},{"key":"9900_CR25","doi-asserted-by":"crossref","unstructured":"Khomh F, Gu\u00e9h\u00e9neuc Y-G (2008) Do design patterns impact software quality positively?. In: Software maintenance and reengineering, 2008. CSMR 2008. 12th European conference on. IEEE, pp 274\u2013278","DOI":"10.1109\/CSMR.2008.4493325"},{"key":"9900_CR26","doi-asserted-by":"crossref","unstructured":"Khomh F, Gu\u00e9h\u00e9neuc Y-G, Antoniol G (2009) Playing roles in design patterns: An empirical descriptive and analytic study. In: IEEE International conference on software maintenance, 2009. ICSM 2009. IEEE, pp 83\u201392","DOI":"10.1109\/ICSM.2009.5306327"},{"key":"9900_CR27","doi-asserted-by":"crossref","unstructured":"Kramer C, Prechelt L (1996) Design recovery by automated search for structural design patterns in object-oriented software. In: Reverse engineering, 1996., Proceedings of the Third working conference on. IEEE, pp 208\u2013215","DOI":"10.1109\/WCRE.1996.558905"},{"key":"9900_CR28","volume-title":"Object-oriented metrics in practice: using software metrics to characterize, evaluate, and improve the design of object-oriented systems","author":"M Lanza","year":"2007","unstructured":"Lanza M, Marinescu R (2007) Object-oriented metrics in practice: using software metrics to characterize, evaluate, and improve the design of object-oriented systems. Springer Science & Business Media, New York"},{"issue":"4","key":"9900_CR29","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1145\/505482.505492","volume":"26","author":"J Long","year":"2001","unstructured":"Long J (2001) Software reuse antipatterns. ACM SIGSOFT Softw Eng Notes 26(4):68\u201376","journal-title":"ACM SIGSOFT Softw Eng Notes"},{"key":"9900_CR30","doi-asserted-by":"crossref","unstructured":"M\u00e4ntyl\u00e4 M, Vanhanen J, Lassenius C (2003) A taxonomy and an initial empirical study of bad smells in code. In: Software maintenance, 2003. ICSM 2003. Proceedings. International conference on., pp 381\u2013384","DOI":"10.1109\/ICSM.2003.1235447"},{"key":"9900_CR31","unstructured":"Marinescu R, Lanza M (2006) Object-oriented metrics in practice"},{"key":"9900_CR32","volume-title":"Markov chains and stochastic stability","author":"SP Meyn","year":"2012","unstructured":"Meyn SP, Tweedie RL (2012) Markov chains and stochastic stability. Springer Science & Business Media, New York"},{"issue":"1","key":"9900_CR33","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/TSE.2009.50","volume":"36","author":"N Moha","year":"2010","unstructured":"Moha N, Gueheneuc Y-G, Duchien L, Le Meur A-F (2010) Decor: A method for the specification and detection of code and design smells. IEEE Trans Softw Eng 36(1):20\u201336","journal-title":"IEEE Trans Softw Eng"},{"key":"9900_CR34","doi-asserted-by":"crossref","unstructured":"Olbrich S, Cruzes DS, Basili V, Zazworka N (2009) The evolution and impact of code smells: A case study of two open source systems. In: Proceedings of the 2009 3rd international symposium on empirical software engineering and measurement. IEEE Computer Society, pp 390\u2013400","DOI":"10.1109\/ESEM.2009.5314231"},{"key":"9900_CR35","unstructured":"Rapu D, Ducasse S, G\u00eerba T, Marinescu R (2004) Using history information to improve design flaws detection. In: Software maintenance and reengineering, 2004. CSMR 2004. Proceedings. Eighth European Conference on. IEEE, pp 223\u2013232"},{"key":"9900_CR36","volume-title":"Object-oriented design heuristics, vol 335","author":"AJ Riel","year":"1996","unstructured":"Riel AJ (1996) Object-oriented design heuristics, vol 335. Addison-Wesley, Reading"},{"key":"9900_CR37","doi-asserted-by":"crossref","unstructured":"Romano D, Raila P, Pinzger M, Khomh F (2012) Analyzing the impact of antipatterns on change-proneness using fine-grained source code changes. In: 2012 19th Working conference on reverse engineering (WCRE). IEEE, pp 437\u2013446","DOI":"10.1109\/WCRE.2012.53"},{"key":"9900_CR38","unstructured":"srcML (2016) http:\/\/www.srcml.org, 2016, online; Accessed March 31st"},{"issue":"10","key":"9900_CR39","doi-asserted-by":"publisher","first-page":"9041","DOI":"10.1016\/j.eswa.2012.02.049","volume":"39","author":"D Settas","year":"2012","unstructured":"Settas D, Cerone A, Fenz S (2012) Enhancing ontology-based antipattern detection using bayesian networks. Expert Syst Appl 39(10):9041\u20139053","journal-title":"Expert Syst Appl"},{"key":"9900_CR40","doi-asserted-by":"crossref","unstructured":"\u015aliwerski J, Zimmermann T, Zeller A (2005) When do changes induce fixes?. In: ACM sigsoft software engineering notes, vol 30. ACM, pp 1\u20135","DOI":"10.1145\/1083142.1083147"},{"issue":"1","key":"9900_CR41","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1046\/j.1365-2575.2002.00117.x","volume":"12","author":"I Stamelos","year":"2002","unstructured":"Stamelos I, Angelis L, Oikonomou A, Bleris GL (2002) Code quality analysis in open source software development. Inf Syst J 12(1):43\u201360","journal-title":"Inf Syst J"},{"key":"9900_CR42","doi-asserted-by":"publisher","first-page":"b4567","DOI":"10.1136\/bmj.b4567","volume":"339","author":"P Strazzullo","year":"2009","unstructured":"Strazzullo P, D\u2019Elia L, Kandala N-B, Cappuccio FP (2009) Salt intake, stroke, and cardiovascular disease: meta-analysis of prospective studies. Bmj 339:b4567","journal-title":"Bmj"},{"key":"9900_CR43","doi-asserted-by":"crossref","unstructured":"Taba SES, Khomh F, Zou Y, Hassan AE, Nagappan M (2013) Predicting bugs using antipatterns. In: Software maintenance (ICSM), 2013 29th IEEE International conference on. IEEE, pp 270\u2013279","DOI":"10.1109\/ICSM.2013.38"},{"key":"9900_CR44","doi-asserted-by":"crossref","unstructured":"Tichelaar S, Ducasse S, Demeyer S, Nierstrasz O (2000) A meta-model for language-independent refactoring. In: Proceedings international symposium on principles of software evolution. IEEE, pp 154\u2013164","DOI":"10.1109\/ISPSE.2000.913233"},{"issue":"11","key":"9900_CR45","doi-asserted-by":"publisher","first-page":"896","DOI":"10.1109\/TSE.2006.112","volume":"32","author":"N Tsantalis","year":"2006","unstructured":"Tsantalis N, Chatzigeorgiou A, Stephanides G, Halkidis ST (2006) Design pattern detection using similarity scoring. IEEE Trans Softw Eng 32(11):896\u2013909","journal-title":"IEEE Trans Softw Eng"},{"key":"9900_CR46","doi-asserted-by":"crossref","unstructured":"Van Emden E, Moonen L (2002) Java quality assurance by detecting code smells. In: Reverse engineering, 2002. Proceedings. Ninth working conference on, pp 97\u2013106","DOI":"10.1109\/WCRE.2002.1173068"},{"key":"9900_CR47","doi-asserted-by":"crossref","unstructured":"Vaucher S, Khomh F, Moha N, Gu\u00e9h\u00e9neuc Y-G (2009) Tracking design smells: Lessons from a study of god classes. In: 16th Working conference on reverse engineering (WCRE 2009), IEEE Computer Society Press (WCRE\u201909)","DOI":"10.1109\/WCRE.2009.23"},{"key":"9900_CR48","first-page":"11","volume-title":"Design patterns: elements of reusable object-oriented software, vol 49","author":"J Vlissides","year":"1995","unstructured":"Vlissides J, Helm R, Johnson R, Gamma E (1995) Design patterns: elements of reusable object-oriented software, vol 49. Addison-Wesley, Reading, p 11"},{"issue":"12","key":"9900_CR49","doi-asserted-by":"publisher","first-page":"904","DOI":"10.1109\/TSE.2004.99","volume":"30","author":"M Vok\u00e1\u010d","year":"2004","unstructured":"Vok\u00e1\u010d M (2004) Defect frequency and design patterns: An empirical study of industrial code. IEEE Trans Softw Eng 30(12):904\u2013917","journal-title":"IEEE Trans Softw Eng"},{"key":"9900_CR50","unstructured":"Webster BF (1995) Pitfalls of object oriented development. M&T Books"},{"key":"9900_CR51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29044-2","volume-title":"Experimentation in software engineering","author":"C Wohlin","year":"2012","unstructured":"Wohlin C, Runeson P, H\u00f6st M, Ohlsson MC, Regnell B, Wessl\u00e9n A (2012) Experimentation in software engineering. Springer Science & Business Media, New York"},{"key":"9900_CR52","unstructured":"Yamashita AF, Moonen L (2013) Do developers care about code smells? an exploratory survey. In: WCRE, vol 13, pp 242\u2013251"},{"key":"9900_CR53","volume-title":"Case study research: design and methods","author":"RK Yin","year":"2013","unstructured":"Yin RK (2013) Case study research: design and methods. Sage publications, Newbury Park"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-020-09900-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-020-09900-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-020-09900-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,19]],"date-time":"2021-02-19T23:02:05Z","timestamp":1613775725000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-020-09900-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":53,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["9900"],"URL":"https:\/\/doi.org\/10.1007\/s10664-020-09900-0","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2 October 2020","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 January 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"9"}}