{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T12:05:02Z","timestamp":1777637102805,"version":"3.51.4"},"reference-count":79,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2021,9,18]],"date-time":"2021-09-18T00:00:00Z","timestamp":1631923200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,18]],"date-time":"2021-09-18T00:00:00Z","timestamp":1631923200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100003593","name":"Conselho Nacional de Desenvolvimento Cient\u00edfico e Tecnol\u00f3gico","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002322","name":"Coordena\u00e7\u00e3o de Aperfei\u00e7oamento de Pessoal de N\u00edvel Superior","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004901","name":"Funda\u00e7\u00e3o de Amparo \u00e0 Pesquisa do Estado de Minas Gerais","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004901","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.1007\/s10664-021-10023-3","type":"journal-article","created":{"date-parts":[[2021,9,18]],"date-time":"2021-09-18T03:24:06Z","timestamp":1631935446000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Characterizing refactoring graphs in Java and JavaScript projects"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7088-4935","authenticated-orcid":false,"given":"Aline","family":"Brito","sequence":"first","affiliation":[]},{"given":"Andre","family":"Hora","sequence":"additional","affiliation":[]},{"given":"Marco Tulio","family":"Valente","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,18]]},"reference":[{"key":"10023_CR1","doi-asserted-by":"publisher","first-page":"110821","DOI":"10.1016\/j.jss.2020.110821","volume":"171","author":"EA AlOmar","year":"2021","unstructured":"AlOmar EA, Mkaouer M, Ouni A (2021) Toward the automatic classification of self-affirmed refactoring. J Syst Soft (JSS) 171:110821","journal-title":"J Syst Soft (JSS)"},{"key":"10023_CR2","doi-asserted-by":"crossref","unstructured":"Alves ELG, Song M, Kim M (2014) RefDistiller: A refactoring aware code review tool for inspecting manual refactoring edits. In: 22nd international symposium on foundations of software engineering (FSE), pp 751\u2013754","DOI":"10.1145\/2635868.2661674"},{"key":"10023_CR3","doi-asserted-by":"crossref","unstructured":"Avelino G, Passos L, Hora A, Valente MT (2016) A novel approach for estimating truck factors. In: 24th international conference on program comprehension (ICPC), pp 1\u201310","DOI":"10.1109\/ICPC.2016.7503718"},{"key":"10023_CR4","doi-asserted-by":"crossref","unstructured":"Bacchelli A, Bird C (2013) Expectations, outcomes, and challenges of modern code review. In: 35th international conference on software engineering (ICSE), pp 712\u2013721","DOI":"10.1109\/ICSE.2013.6606617"},{"key":"10023_CR5","doi-asserted-by":"crossref","unstructured":"Bavota G, De Carluccio B, De Lucia A, Di Penta M, Oliveto R, Strollo O (2012) When does a refactoring induce bugs? an empirical study. In: 12th international working conference on source code analysis and manipulation (SCAM), pp 104\u2013113","DOI":"10.1109\/SCAM.2012.20"},{"issue":"C","key":"10023_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jss.2015.05.024","volume":"107","author":"G Bavota","year":"2015","unstructured":"Bavota G, Lucia AD, Penta MD, Oliveto R, Palomba F (2015) An experimental investigation on the innate relationship between quality and refactoring. J Syst Softw 107(C):1\u201314","journal-title":"J Syst Softw"},{"key":"10023_CR7","doi-asserted-by":"crossref","unstructured":"Bibiano A, Soares V, Coutinho D, Fernandes E, Correia J, Santos K, Oliveira A, Garcia A, Gheyi R, BaldoinoFonseca, Ribeiro M, Silva C, Oliveira D (2020) How does incomplete composite refactoring affect internal quality attributes. In: 28th international conference on program comprehension (ICPC), pp 149\u2013159","DOI":"10.1145\/3387904.3389264"},{"key":"10023_CR8","doi-asserted-by":"crossref","unstructured":"Bibiano AC, Garcia EFDOA, Kalinowski M, Fonseca B, Oliveira R, Oliveira A, Cedrim D (2019) A quantitative study on characteristics and effect of batch refactoring on code smells. In: 13th international symposium on empirical software engineering and measurement (ESEM), pp 1\u201311","DOI":"10.1109\/ESEM.2019.8870183"},{"key":"10023_CR9","doi-asserted-by":"crossref","unstructured":"Borges H, Hora A, Valente MT (2016) Understanding the factors that impact the popularity of GitHub repositories. In: 32nd international conference on software maintenance and evolution (ICSME), pp 334\u2013344","DOI":"10.1109\/ICSME.2016.31"},{"key":"10023_CR10","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.jss.2018.09.016","volume":"146","author":"H Borges","year":"2018","unstructured":"Borges H, Valente MT (2018) What\u2019s in a GitHub star? Understanding repository starring practices in a social coding platform. J Syst Softw 146:112\u2013129","journal-title":"J Syst Softw"},{"key":"10023_CR11","doi-asserted-by":"crossref","unstructured":"Brito A, Hora A, Valente MT (2020) Refactoring graphs: Assessing refactoring over time. In: International conference on software analysis, evolution and reengineering (SANER), pp 367\u2013377","DOI":"10.1109\/SANER48275.2020.9054864"},{"key":"10023_CR12","doi-asserted-by":"crossref","unstructured":"Brito A, Xavier L, Hora A, Valente MT (2018) APIDiff: Detecting API breaking changes. In: 25th international conference on software analysis, evolution and reengineering (saner), tool track, pp 507\u2013511","DOI":"10.1109\/SANER.2018.8330249"},{"key":"10023_CR13","doi-asserted-by":"crossref","unstructured":"Brito R, Valente MT (2020) RefDiff4Go: Detecting refactorings in Go. In: 14th brazilian symposium on software components, architectures, and reuse (SBCARS), pp 101\u2013110","DOI":"10.1145\/3425269.3425274"},{"key":"10023_CR14","unstructured":"Brito R, Valente MT (2021) RAID - Refactoring aware and intelligent diffs. In: 29th international conference on program comprehension (ICPC), pp 265\u2013275"},{"key":"10023_CR15","doi-asserted-by":"crossref","unstructured":"Catolino G, Palomba F, Tamburri DA, Serebrenik A, Ferrucci F (2020) Refactoring community smells in the wild: The practitioner\u2019s field manual. In: 42nd international conference on software engineering: companion proceedings (ICSE), pp 25\u201334","DOI":"10.1145\/3377815.3381380"},{"key":"10023_CR16","unstructured":"Cedrim D (2018) Understanding and improving batch refactoring in software systems. Ph.D. thesis, PUC-Rio"},{"key":"10023_CR17","doi-asserted-by":"crossref","unstructured":"Chaparro O, Bavota G, Marcus A, Penta MD (2014) On the impact of refactoring operations on code quality metrics. In: 30th international conference on software maintenance and evolution (ICSME), pp 456\u2013460","DOI":"10.1109\/ICSME.2014.73"},{"key":"10023_CR18","doi-asserted-by":"crossref","unstructured":"Chen TH, Nagappan M, Shihab E, Hassan AE (2014) An empirical study of dormant bugs. In: 11th working conference on mining software repositories (MSR)","DOI":"10.1145\/2597073.2597108"},{"key":"10023_CR19","doi-asserted-by":"crossref","unstructured":"Cruzes DS, Dyba T (2011) Recommended steps for thematic synthesis in software engineering. In: 5th international symposium on empirical software engineering and measurement (ESEM), pp 275\u2013284","DOI":"10.1109\/ESEM.2011.36"},{"issue":"7","key":"10023_CR20","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1109\/TSE.2016.2616306","volume":"43","author":"DA da Cost","year":"2017","unstructured":"da Cost DA, McIntosh S, Shang W, Kulesza U, Coelho R, Hassan AE (2017) A framework for evaluating the results of the SZZ approach for identifying bug-introducing changes. Trans Soft Eng 43(7):641\u2013657","journal-title":"Trans Soft Eng"},{"key":"10023_CR21","doi-asserted-by":"crossref","unstructured":"Di Penta M, Bavota G, Zampetti F (2020) On the relationship between refactoring actions and bugs: A differentiated replication. In: 28th european software engineering conference and symposium on the foundations of software engineering (FSE), pp 556\u2013567","DOI":"10.1145\/3368089.3409695"},{"key":"10023_CR22","doi-asserted-by":"crossref","unstructured":"Dig D, Comertoglu C, Marinov D, Johnson R (2006) Automated detection of refactorings in evolving components. In: 20th european conference on object-oriented programming (ECOOP), pp 404\u2013428","DOI":"10.1007\/11785477_24"},{"key":"10023_CR23","doi-asserted-by":"crossref","unstructured":"Dig D, Johnson R (2005) How do APIs evolve? a story of refactoring. In: 22nd international conference on software maintenance (ICSM), pp 83\u2013107","DOI":"10.1002\/smr.328"},{"key":"10023_CR24","doi-asserted-by":"crossref","unstructured":"Fernandes E (2019) Stuck in the middle: Removing obstacles to new program features through batch refactoring. In: 41st international conference on software engineering: companion proceedings (ICSE), pp 206\u2013209","DOI":"10.1109\/ICSE-Companion.2019.00083"},{"key":"10023_CR25","doi-asserted-by":"crossref","unstructured":"Fernandes E, Uch\u00f4a A., Bibiano AC, Garcia A (2019) On the alternatives for composing batch refactoring. In: 3rd international workshop on refactoring (IWOR), pp 9\u201312","DOI":"10.1109\/IWoR.2019.00009"},{"key":"10023_CR26","volume-title":"Refactoring: Improving the design of existing code","author":"M Fowler","year":"1999","unstructured":"Fowler M (1999) Refactoring: Improving the design of existing code. Addison-Wesley, Reading, MA"},{"key":"10023_CR27","doi-asserted-by":"crossref","unstructured":"Ge X, Sarkar S, Murphy-Hill E (2014) Towards refactoring-aware code review. In: 7th international workshop on cooperative and human aspects of software engineering (CHASE). ACM, pp 99\u2013102","DOI":"10.1145\/2593702.2593706"},{"key":"10023_CR28","doi-asserted-by":"crossref","unstructured":"Ge X, Sarkar S, Witschey J, Murphy-Hill E (2017) Refactoring-aware code review. In: Symposium on visual languages and human-centric computing (VL\/HCC), pp 71\u201379","DOI":"10.1109\/VLHCC.2017.8103453"},{"key":"10023_CR29","doi-asserted-by":"crossref","unstructured":"G\u00f3mez VU, Ducasse S, D\u2019Hondt T (2010) Visually supporting source code changes integration: the Torch dashboard. In: 17th working conference on reverse engineering (WCRE)","DOI":"10.1109\/WCRE.2010.15"},{"issue":"P3","key":"10023_CR30","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1016\/j.scico.2013.08.002","volume":"98","author":"VU G\u00f3mez","year":"2015","unstructured":"G\u00f3mez VU, Ducasse S, D\u2019Hondt T (2015) Visually characterizing source code changes. Sci Comput Program 98(P3):376\u2013393","journal-title":"Sci Comput Program"},{"key":"10023_CR31","doi-asserted-by":"crossref","unstructured":"Grund F, Chowdhury S, Bradley N, Hall B, Holmes R (2021) CodeShovel: Constructing method-level source code histories. In: 43rd international conference on software engineering: Companion proceedings (ICSE), pp 1510\u20131522","DOI":"10.1109\/ICSE43902.2021.00135"},{"key":"10023_CR32","doi-asserted-by":"crossref","unstructured":"Hattori L, Lanza M (2009) Mining the history of synchronous changes to refine code ownership. In: 6th international working conference on mining software repositories (MSR), pp 141\u2013150","DOI":"10.1109\/MSR.2009.5069492"},{"key":"10023_CR33","doi-asserted-by":"crossref","unstructured":"Hayashi S, Thangthumachit S, Saeki M (2013) Rediffs: Refactoring-aware difference viewer for Java. In: 20th working conference on reverse engineering (WCRE), pp 487\u2013488","DOI":"10.1109\/WCRE.2013.6671331"},{"key":"10023_CR34","doi-asserted-by":"crossref","unstructured":"Higo Y, Hayashi S, Kusumoto S (2020) On tracking Java methods with git mechanisms. J Syst Soft (JSS) pp 165","DOI":"10.1016\/j.jss.2020.110571"},{"key":"10023_CR35","volume-title":"Applied statistics for the behavioral sciences","author":"D Hinkle","year":"2003","unstructured":"Hinkle D, Wiersma W, Jurs S (2003) Applied statistics for the behavioral sciences. Houghton Mifflin, Boston"},{"key":"10023_CR36","doi-asserted-by":"publisher","first-page":"1798","DOI":"10.1007\/s10664-020-09809-8","volume":"25","author":"A Hora","year":"2020","unstructured":"Hora A, Robbes R (2020) Characteristics of method extractions in Java: A large scale empirical study. Empir Softw Eng 25:1798\u20131833","journal-title":"Empir Softw Eng"},{"key":"10023_CR37","doi-asserted-by":"crossref","unstructured":"Hora A, Silva D, Robbes R, Valente MT (2018) Assessing the threat of untracked changes in software evolution. In: 40th international conference on software engineering (ICSE), pp 1102\u20131113","DOI":"10.1145\/3180155.3180212"},{"key":"10023_CR38","doi-asserted-by":"crossref","unstructured":"Iammarino M, Zampetti F, Aversano L, Penta MD (2019) Self-admitted technical debt removal and refactoring actions: Co-occurrence or more?. In: 35th international conference on software maintenance and evolution (ICSME), pp 186\u2013190","DOI":"10.1109\/ICSME.2019.00029"},{"key":"10023_CR39","doi-asserted-by":"crossref","unstructured":"Jiang Y, Liu H, Niu N, Zhang L, Hu Y (2021) Extracting concise bug-fixing patches from human-written patches in version control systems. In: 43rd international conference on software engineering (ICSE), pp 1\u201313","DOI":"10.1109\/ICSE43902.2021.00069"},{"issue":"9","key":"10023_CR40","doi-asserted-by":"publisher","first-page":"1245","DOI":"10.1109\/TSE.2013.19","volume":"39","author":"HC Jiau","year":"2013","unstructured":"Jiau HC, Mar LW, Chen JC (2013) OBEY: Optimal batched refactoring plan execution for class responsibility redistribution. Trans Soft Eng 39 (9):1245\u20131263","journal-title":"Trans Soft Eng"},{"key":"10023_CR41","doi-asserted-by":"crossref","unstructured":"Kim J, Batory D, Dig D, Azanza M (2016) Improving refactoring speed by 10x. In: 38th international conference on software engineering (ICSE), pp 1145\u20131156","DOI":"10.1145\/2884781.2884802"},{"key":"10023_CR42","doi-asserted-by":"crossref","unstructured":"Kim M, Gee M, Loh A, Rachatasumrit N (2010) Ref-finder: A refactoring reconstruction tool based on logic query templates. In: 8th international symposium on foundations of software engineering (FSE), pp 371\u2013372","DOI":"10.1145\/1882291.1882353"},{"key":"10023_CR43","doi-asserted-by":"crossref","unstructured":"Kim M, Zimmermann T, Nagappan N (2012) A field study of refactoring challenges and benefits. In: 20th international symposium on the foundations of software engineering (FSE), pp 50:1\u201350:11","DOI":"10.1145\/2393596.2393655"},{"issue":"7","key":"10023_CR44","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1109\/TSE.2014.2318734","volume":"40","author":"M Kim","year":"2014","unstructured":"Kim M, Zimmermann T, Nagappan N (2014) An empirical study of refactoring challenge and benefits at Microsoft. Trans Soft Eng 40(7):633\u2013649","journal-title":"Trans Soft Eng"},{"key":"10023_CR45","doi-asserted-by":"crossref","unstructured":"Kim S, Zimmermann T, Pan K, Whitehead EJJ (2006) Automatic identification of bug-introducing changes. In: 21st international conference on automated software engineering (ASE), pp 81\u201390","DOI":"10.1109\/ASE.2006.23"},{"key":"10023_CR46","unstructured":"Leung C (2010) Technical notes on extending gSpan to directed graphs. Tech. rep., Singapore Management University"},{"key":"10023_CR47","doi-asserted-by":"crossref","unstructured":"Lin B, Nagy C, Bavota G, Lanza M (2019) On the impact of refactoring operations on code naturalness. In: 26th international conference on software analysis, evolution and reengineering (SANER), pp 594\u2013598","DOI":"10.1109\/SANER.2019.8667992"},{"key":"10023_CR48","doi-asserted-by":"crossref","unstructured":"Lin Y, Peng X, Cai Y, Dig D, Zheng D, Zhao W (2016) Interactive and guided architectural refactoring with search-based recommendation. In: 24th international symposium on foundations of software engineering (FSE), pp 535\u2013546","DOI":"10.1145\/2950290.2950317"},{"key":"10023_CR49","doi-asserted-by":"crossref","unstructured":"Mahmoudi M, Nadi S, Tsantalis N (2019) Are refactorings to blame? an empirical study of refactorings in merge conflicts. In: 26th international conference on software analysis, evolution and reengineering (SANER), pp 151\u2013162","DOI":"10.1109\/SANER.2019.8668012"},{"issue":"85","key":"10023_CR50","first-page":"85:1","volume":"1","author":"D Mazinanian","year":"2017","unstructured":"Mazinanian D, Ketkar A, Tsantalis N, Dig D (2017) Understanding the use of lambda expressions in Java. Program Lang 1(85):85:1\u201385:31","journal-title":"Program Lang"},{"key":"10023_CR51","doi-asserted-by":"crossref","unstructured":"Meananeatra P (2012) Identifying refactoring sequences for improving software maintainability. In: 27th international conference on automated software engineering (ASE), pp 406\u2013409","DOI":"10.1145\/2351676.2351760"},{"key":"10023_CR52","doi-asserted-by":"crossref","unstructured":"Meneely A, Williams O (2012) Interactive churn metrics: socio-technical variants of code churn. Softw Eng Notes 37(6)","DOI":"10.1145\/2382756.2382785"},{"key":"10023_CR53","doi-asserted-by":"crossref","unstructured":"Murphy-Hill E, Parnin C, Black AP (2009) How we refactor, and how we know it. In: 31st international conference on software engineering (ICSE), pp 287\u2013297","DOI":"10.1109\/ICSE.2009.5070529"},{"key":"10023_CR54","doi-asserted-by":"crossref","unstructured":"Negara S, Chen N, Vakilian M, Johnson RE, Dig D (2013) A comparative study of manual and automated refactorings. In: 27th european conference on object-oriented programming (ECOOP), pp 552\u2013576","DOI":"10.1007\/978-3-642-39038-8_23"},{"key":"10023_CR55","doi-asserted-by":"crossref","unstructured":"Neto EC, da Costa DA, Kulesza U (2018) The impact of refactoring changes on the SZZ algorithm: An empirical study. In: 25th international conference on software analysis, evolution and reengineering (SANER), pp 380\u2013390","DOI":"10.1109\/SANER.2018.8330225"},{"key":"10023_CR56","doi-asserted-by":"crossref","unstructured":"Paixao M, Uch\u00f4a A., Bibiano AC, Oliveira D, Garcia A, Krinke J, Arvonio E (2020) Behind the intents: An in-depth empirical study on software refactoring in modern code review. In: 17th international conference on mining software repositories (MSR), pp 125\u2013136","DOI":"10.1145\/3379597.3387475"},{"key":"10023_CR57","doi-asserted-by":"crossref","unstructured":"Palomba F, Zaidman A, Oliveto R, Lucia AD (2017) An exploratory study on the relationship between changes and refactoring. In: 25th international conference on program comprehension (ICPC), pp 176\u2013185","DOI":"10.1109\/ICPC.2017.38"},{"issue":"4","key":"10023_CR58","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3408302","volume":"37","author":"J Pantiuchina","year":"2020","unstructured":"Pantiuchina J, Zampetti F, Scalabrino S, Piantadosi V, Oliveto R, Bavota G, Penta MD (2020) Why developers refactor source code: A mining-based study. ACM Trans Softw Eng Methodol 37(4):1\u201332","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"10023_CR59","doi-asserted-by":"crossref","unstructured":"Peruma A, Mkaouer M, Decker M, Newman C (2018) An empirical investigation of how and why developers rename identifiers. In: 2nd international workshop on refactoring (IWoR), pp 26\u201333","DOI":"10.1145\/3242163.3242169"},{"key":"10023_CR60","doi-asserted-by":"crossref","unstructured":"Rahman F, Devanbu P (2011) Ownership, experience and defects: a fine-grained study of authorship. In: 33rd international conference on software engineering (ICSE), pp 491\u2013500","DOI":"10.1145\/1985793.1985860"},{"key":"10023_CR61","doi-asserted-by":"crossref","unstructured":"Rahman F, Posnett D, Hindle A, Barr E, Devanbu P (2011) BugCache for inspections: hit or miss?. In: 19th international symposium on the foundations of software engineering (FSE), pp 322\u2013331","DOI":"10.1145\/2025113.2025157"},{"key":"10023_CR62","doi-asserted-by":"crossref","unstructured":"Ray B, Hellendoorn V, Godhane S, Tu Z, Bacchelli A, Devanbu P (2016) On the naturalness of buggy code. In: 38th international conference on software engineering (ICSE), pp 428\u2013439","DOI":"10.1145\/2884781.2884848"},{"issue":"170","key":"10023_CR63","first-page":"170:1","volume":"3","author":"B Shen","year":"2019","unstructured":"Shen B, Zhang W, Zhao H, Liang G, Jin Z, Wang Q (2019) IntelliMerge: A refactoring-aware software merging technique. Program Lang 3(170):170:1\u2013170:28","journal-title":"Program Lang"},{"issue":"1","key":"10023_CR64","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TSE.2021.3088759","volume":"1","author":"D Silva","year":"2021","unstructured":"Silva D, da Silva JP, Santos G, Terra R, Valente MT (2021) RefDiff 2.0: A multi-language refactoring detection tool. IEEE Trans Softw Eng 1 (1):1\u201317","journal-title":"IEEE Trans Softw Eng"},{"key":"10023_CR65","doi-asserted-by":"crossref","unstructured":"Silva D, Tsantalis N, Valente MT (2016) Why we refactor? Confessions of GitHub contributors. In: 24th international symposium on the foundations of software engineering (FSE), pp 858\u2013870","DOI":"10.1145\/2950290.2950305"},{"key":"10023_CR66","doi-asserted-by":"crossref","unstructured":"Silva D, Valente MT (2017) RefDiff: Detecting refactorings in version histories. In: 14th international conference on mining software repositories (MSR), pp 269\u2013279","DOI":"10.1109\/MSR.2017.14"},{"key":"10023_CR67","doi-asserted-by":"crossref","unstructured":"Sousa L, Cedrim D, Garcia A, Oizumi W, Bibiano AC, Oliveira D, Kim M, Oliveira A (2020) Characterizing and identifying composite refactorings: Concepts, heuristics and patterns. In: 17th international conference on mining software repositories (MSR), pp 186\u2013197","DOI":"10.1145\/3379597.3387477"},{"key":"10023_CR68","doi-asserted-by":"crossref","unstructured":"Spadini D, Aniche M, Bacchelli A (2018) PyDriller: Python framework for mining software repositories. In: 26th software engineering conference and symposium on the foundations of software engineering (FSE), pp 908\u2013911","DOI":"10.1145\/3236024.3264598"},{"issue":"3","key":"10023_CR69","doi-asserted-by":"publisher","first-page":"1372","DOI":"10.1007\/s10664-016-9445-5","volume":"22","author":"D Spinellis","year":"2017","unstructured":"Spinellis D (2017) A repository of Unix history and evolution. Empir Softw Eng 22(3):1372\u20131404","journal-title":"Empir Softw Eng"},{"key":"10023_CR70","doi-asserted-by":"crossref","unstructured":"Sz\u00f3ke G, Nagy C, Ferenc R, Gyim\u00f3thy T (2016) Designing and developing automated refactoring transformations: An experience report. In: 23rd international conference on software analysis, evolution, and reengineering (SANER), pp 693\u2013697","DOI":"10.1109\/SANER.2016.17"},{"key":"10023_CR71","unstructured":"Tenorio D, Bibiano AC, Garcia A (2019) On the customization of batch refactoring. In: 3rd international workshop on refactoring (IWOR), pp 13\u201316"},{"key":"10023_CR72","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.jss.2017.11.073","volume":"138","author":"R Terra","year":"2018","unstructured":"Terra R, Valente MT, Miranda S, Sales V (2018) JMove: A novel heuristic and tool to detect move method refactoring opportunities. J Syst Soft 138:19\u201336","journal-title":"J Syst Soft"},{"key":"10023_CR73","unstructured":"Tsantalis N, Guana V, Stroulia E, Hindle A (2013) A multidimensional empirical study on refactoring activity. In: 23th conference of the center for advanced studies on collaborative research (CASCON), pp 132\u2013146"},{"key":"10023_CR74","doi-asserted-by":"crossref","unstructured":"Tsantalis N, Ketkar A, Dig D (2020) RefactoringMiner 2.0 IEEE Trans Softw Eng","DOI":"10.1109\/TSE.2020.3007722"},{"key":"10023_CR75","doi-asserted-by":"crossref","unstructured":"Tsantalis N, Mansouri M, Eshkevari LM, Mazinanian D, Dig D (2018) Accurate and efficient refactoring detection in commit history. In: 40th international conference on software engineering (ICSE), pp 483\u2013494","DOI":"10.1145\/3180155.3180206"},{"key":"10023_CR76","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.scico.2019.05.002","volume":"180","author":"C Vassallo","year":"2019","unstructured":"Vassallo C, Grano G, Palomba F, Gall H, Bacchelli A (2019) A large-scale empirical exploration on refactoring activities in open source software projects. Sci Comput Program 180:1\u201315","journal-title":"Sci Comput Program"},{"key":"10023_CR77","doi-asserted-by":"crossref","unstructured":"Wang Y (2009) What motivate software engineers to refactor source code? evidences from professional developers. In: International conference on software maintenance (ICSM), pp 413\u2013416","DOI":"10.1109\/ICSM.2009.5306290"},{"key":"10023_CR78","unstructured":"Yan X, Han J (2002) gSpan: graph-based substructure pattern mining. In: 2nd international conference on data mining (ICDM), pp 721\u2013724"},{"key":"10023_CR79","doi-asserted-by":"crossref","unstructured":"Zimmermann T, Kim S, Zeller A, Whitehead Jr. EJ (2006) Mining version archives for co-changed lines. In: 3rd international workshop on mining software repositories (MSR), pp 72\u201375","DOI":"10.1145\/1137983.1138001"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-021-10023-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-021-10023-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-021-10023-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,9]],"date-time":"2023-11-09T00:20:18Z","timestamp":1699489218000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-021-10023-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,18]]},"references-count":79,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,11]]}},"alternative-id":["10023"],"URL":"https:\/\/doi.org\/10.1007\/s10664-021-10023-3","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,18]]},"assertion":[{"value":"20 July 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 September 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"125"}}