{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T09:05:58Z","timestamp":1768467958025,"version":"3.49.0"},"reference-count":112,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,6,24]],"date-time":"2022-06-24T00:00:00Z","timestamp":1656028800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,6,24]],"date-time":"2022-06-24T00:00:00Z","timestamp":1656028800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1007\/s10664-022-10142-5","type":"journal-article","created":{"date-parts":[[2022,6,24]],"date-time":"2022-06-24T08:42:24Z","timestamp":1656060144000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Handling uncertainty in SBSE: a possibilistic evolutionary approach for code smells detection"],"prefix":"10.1007","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5238-3902","authenticated-orcid":false,"given":"Sofien","family":"Boutaib","sequence":"first","affiliation":[]},{"given":"Maha","family":"Elarbi","sequence":"additional","affiliation":[]},{"given":"Slim","family":"Bechikh","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Palomba","sequence":"additional","affiliation":[]},{"given":"Lamjed Ben","family":"Said","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,24]]},"reference":[{"issue":"2","key":"10142_CR1","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1080\/03036758.2019.1609052","volume":"49","author":"H Al-Sahaf","year":"2019","unstructured":"Al-Sahaf H, Bi Y, Chen Q, Lensen A, Mei Y, Sun Y, Tran B, Xue B, Zhang M (2019) A survey on evolutionary machine learning. J R Soc N Z 49(2):205\u2013228","journal-title":"J R Soc N Z"},{"key":"10142_CR2","unstructured":"Alcal\u00e1-Fdez J, Fern\u00e1ndez A, Luengo J, Derrac J, Garc\u00eda S, S\u00e1nchez L, Herrera F (2011) Keel data-mining software tool: data set repository, integration of algorithms and experimental analysis framework. J Multiple-Valued Log Soft Comput 17"},{"key":"10142_CR3","doi-asserted-by":"crossref","unstructured":"Amorim L, Costa E, Antunes N, Fonseca B, Ribeiro M (2015) Experience report: Evaluating the effectiveness of decision trees for detecting code smells. In: Proceedings of the 26th International Symposium on Software Reliability Engineering,. IEEE, pp 261\u2013269","DOI":"10.1109\/ISSRE.2015.7381819"},{"issue":"3","key":"10142_CR4","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1002\/stvr.1486","volume":"24","author":"A Arcuri","year":"2014","unstructured":"Arcuri A, Briand L (2014) A Hitchhiker\u2019s guide to statistical tests for assessing randomized algorithms in software engineering. Softw Test Verif Reliab 24 (3):219\u2013250","journal-title":"Softw Test Verif Reliab"},{"key":"10142_CR5","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.infsof.2018.12.009","volume":"108","author":"MI Azeem","year":"2019","unstructured":"Azeem M I, Palomba F, Shi L, Wang Q (2019) Machine Learning Techniques for Code Smell Detection: A Systematic Literature Review and Meta-Analysis. Inf Softw Technol 108:115\u2013138","journal-title":"Inf Softw Technol"},{"key":"10142_CR6","doi-asserted-by":"crossref","unstructured":"Barbez A, Khomh F, Gu\u00e9h\u00e9neuc Y-G (2019) Deep learning anti-patterns from code metrics history. In: Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME 2019). IEEE, pp 114\u2013124","DOI":"10.1109\/ICSME.2019.00021"},{"issue":"3","key":"10142_CR7","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1109\/TSMCC.2011.2157494","volume":"42","author":"RC Barros","year":"2012","unstructured":"Barros R C, Basgalupp M P, De Carvalho A C, Freitas A A (2012) A survey of evolutionary algorithms for decision-tree induction. IEEE Trans Syst Man Cybern 42(3):291\u2013312","journal-title":"IEEE Trans Syst Man Cybern"},{"key":"10142_CR8","doi-asserted-by":"crossref","unstructured":"Behmo R, Marcombes P, Dalalyan A, Prinet V (2010) Towards optimal naive bayes nearest neighbor. In: European conference on computer vision. Springer, pp 171\u2013184","DOI":"10.1007\/978-3-642-15561-1_13"},{"key":"10142_CR9","doi-asserted-by":"crossref","unstructured":"Bessghaier N, Ouni A, Mkaouer M W (2020) On the diffusion and impact of code smells in web applications. In: International Conference on Services Computing. Springer, pp 67\u201384","DOI":"10.1007\/978-3-030-59592-0_5"},{"key":"10142_CR10","unstructured":"Bouchon-Meunier B, Dubois D, Godo L, Prade H (1999) Fuzzy sets in approximate reasoning and information systems, vol 5. Kluwer Academic Publishers"},{"key":"10142_CR11","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/j.fss.2013.07.012","volume":"239","author":"M Bounhas","year":"2014","unstructured":"Bounhas M, Hamed M G, Prade H, Serrurier M, Mellouli K (2014) Naive possibilistic classifiers for imprecise or uncertain numerical data. Fuzzy Sets Syst 239:137\u2013156","journal-title":"Fuzzy Sets Syst"},{"key":"10142_CR12","doi-asserted-by":"crossref","unstructured":"Boussaa M, Kessentini W, Kessentini M, Bechikh S, Chikha S B (2013) Competitive Coevolutionary Code-Smells Detection. In: Proceedings of the 5th International Symposium on Search Based Software Engineering, vol 8084. Springer, pp 50\u201365","DOI":"10.1007\/978-3-642-39742-4_6"},{"key":"10142_CR13","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/s10515-017-0215-4","volume":"24","author":"I Boussa\u00efd","year":"2017","unstructured":"Boussa\u00efd I, Siarry P, Ahmed-Nacer M (2017) A survey on search-based model-driven engineering. Autom Softw Eng 24:233\u2013294","journal-title":"Autom Softw Eng"},{"key":"10142_CR14","doi-asserted-by":"publisher","first-page":"114076","DOI":"10.1016\/j.eswa.2020.114076","volume":"166","author":"S Boutaib","year":"2020","unstructured":"Boutaib S, Bechikh S, Palomba F, Elarbi M, Makhlouf M, Said L B (2020) Code smell detection and identification in imbalanced environments. Expert Syst Appl 166:114076","journal-title":"Expert Syst Appl"},{"key":"10142_CR15","doi-asserted-by":"crossref","unstructured":"Boutaib S, Elarbi M, Bechikh S, Hung C-C, Said L B (2021) Software anti-patterns detection under uncertainty using a possibilistic evolutionary approach.. In: EuroGP, pp 181\u2013197","DOI":"10.1007\/978-3-030-72812-0_12"},{"key":"10142_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jss.2019.110497","volume":"162","author":"KM Bowers","year":"2020","unstructured":"Bowers K M, Fredericks E M, Hariri R H, Cheng B H (2020) Providentia: Using search-based heuristics to optimize satisficement and competing concerns between functional and non-functional objectives in self-adaptive systems. J Syst Softw 162:1\u201351","journal-title":"J Syst Softw"},{"key":"10142_CR17","unstructured":"Brindle A (1980) Genetic algorithms for function optimization. Ph.D. Thesis, The Faculty of Graduate Studies University of Alberta"},{"key":"10142_CR18","volume-title":"Practical nonparametric statistics","author":"WJ Conover","year":"1980","unstructured":"Conover W J, Conover W J (1980) Practical nonparametric statistics. Wiley, New York"},{"key":"10142_CR19","unstructured":"de Paulo Sobrinho E V, De Lucia A, de Almeida Maia M (2018) A systematic literature review on bad smells\u20145 w\u2019s: which, when, what, who, where. IEEE Trans Softw Eng"},{"key":"10142_CR20","doi-asserted-by":"crossref","unstructured":"Dhambri K, Sahraoui H, Poulin P (2008) Visual detection of design anomalies. In: Proceedings of the 12th European Conference on Software Maintenance and Reengineering,. IEEE, pp 279\u2013283","DOI":"10.1109\/CSMR.2008.4493326"},{"key":"10142_CR21","doi-asserted-by":"crossref","unstructured":"Di Nucci D, Palomba F, Tamburri D A, Serebrenik A, De Lucia A (2018) Detecting code smells using machine learning techniques: are we there yet?. In: Proceedings of the 25th International Conference on Software Analysis, Evolution and Reengineering. IEEE, pp 612\u2013621","DOI":"10.1109\/SANER.2018.8330266"},{"key":"10142_CR22","doi-asserted-by":"crossref","unstructured":"Du X, Zhou Z, Yin B, Xiao G (2019) Cross-project bug type prediction based on transfer learning. Softw Qual J:1\u201319","DOI":"10.1007\/s11219-019-09467-0"},{"key":"10142_CR23","unstructured":"Dubois D, Prade H (1988) Possibility theory: an approach to computerized processing of uncertainty"},{"issue":"1-3","key":"10142_CR24","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/S0165-0114(83)80099-2","volume":"10","author":"D Dubois","year":"1985","unstructured":"Dubois D, Prade H (1985) Unfair coins and necessity measures: towards a possibilistic interpretation of histograms. Fuzzy Sets Syst 10(1-3):15\u201320","journal-title":"Fuzzy Sets Syst"},{"issue":"6","key":"10142_CR25","first-page":"447","volume":"11","author":"D Dubois","year":"1994","unstructured":"Dubois D, Prade H (1994) La fusion d\u2019informations impr\u00e9cises. Traitement Signal 11(6):447\u2013458","journal-title":"Traitement Signal"},{"issue":"5","key":"10142_CR26","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1016\/0967-0661(94)90346-8","volume":"2","author":"D Dubois","year":"1994","unstructured":"Dubois D, Prade H (1994) Possibility theory and data fusion in poorly informed environments. Control Eng Pract 2(5):811\u2013823","journal-title":"Control Eng Pract"},{"key":"10142_CR27","doi-asserted-by":"crossref","unstructured":"Dubois D, Prade H (2000) Possibility theory in information fusion. In: Proceedings of the 3rd international conference on information fusion, vol 1. IEEE, pp 6\u2013P19","DOI":"10.1109\/IFIC.2000.862412"},{"key":"10142_CR28","volume-title":"Linear operators","author":"N Dunford","year":"1971","unstructured":"Dunford N, Schwartz JT, WG B, RG B (1971) Linear operators. Wiley-Interscience, New York"},{"issue":"1","key":"10142_CR29","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.swevo.2011.02.001","volume":"1","author":"AE Eiben","year":"2011","unstructured":"Eiben A E, Smit S K (2011) Parameter tuning for configuring and analyzing evolutionary algorithms. Swarm Evol Comput 1(1):19\u201331","journal-title":"Swarm Evol Comput"},{"key":"10142_CR30","unstructured":"Emden E V, Moonen L (2002) Java quality assurance by detecting code smells. In: Proceedings of the 9th Working Conference on Reverse Engineering. IEEE, pp 97\u2013106"},{"key":"10142_CR31","doi-asserted-by":"crossref","unstructured":"Erni K, Lewerentz C (1996) Applying design-metrics to object-oriented frameworks. In: Proceedings of the 3rd international software metrics symposium. IEEE, pp 64\u201374","DOI":"10.1109\/METRIC.1996.492444"},{"key":"10142_CR32","doi-asserted-by":"crossref","unstructured":"Fernandes E, Oliveira J, Vale G, Paiva T, Figueiredo E (2016) A review-based comparative study of bad smell detection tools. In: Proceedings of the 20th Conference on Evaluation and Assessment in Software Engineering. ACM, p 18","DOI":"10.1145\/2915970.2915984"},{"issue":"2","key":"10142_CR33","first-page":"5","volume":"11","author":"FA Fontana","year":"2012","unstructured":"Fontana F A, Braione P, Zanoni M (2012) Automatic detection of bad smells in code: An experimental assessment. J Object Technol 11(2):5\u20131","journal-title":"J Object Technol"},{"key":"10142_CR34","doi-asserted-by":"crossref","unstructured":"Fontana F A, Dietrich J, Walter B, Yamashita A, Zanoni M (2016) Antipattern and code smell false positives: Preliminary conceptualization and classification. In: 2016 IEEE 23rd international conference on software analysis, evolution, and reengineering (SANER), vol 1. IEEE, pp 609\u2013613","DOI":"10.1109\/SANER.2016.84"},{"issue":"3","key":"10142_CR35","doi-asserted-by":"publisher","first-page":"1143","DOI":"10.1007\/s10664-015-9378-4","volume":"21","author":"FA Fontana","year":"2016","unstructured":"Fontana F A, M\u00e4ntyl\u00e4 M V, Zanoni M, Marino A (2016) Comparing and experimenting machine learning techniques for code smell detection. Empir Softw Eng 21(3):1143\u20131191","journal-title":"Empir Softw Eng"},{"key":"10142_CR36","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.knosys.2017.04.014","volume":"128","author":"FA Fontana","year":"2017","unstructured":"Fontana F A, Zanoni M (2017) Code smell severity classification using machine learning techniques. Knowl-Based Syst 128:43\u201358","journal-title":"Knowl-Based Syst"},{"key":"10142_CR37","unstructured":"Foundation A S (2004) Apache commons cli. http:\/\/commons.apache.org\/cli\/ [Accessed 19-April-2021]"},{"key":"10142_CR38","unstructured":"Fowler M, Beck K (1999) Refactoring: improving the design of existing code. Addison-Wesely"},{"issue":"2-3","key":"10142_CR39","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1023\/A:1007465528199","volume":"29","author":"N Friedman","year":"1997","unstructured":"Friedman N, Geiger D, Goldszmidt M (1997) Bayesian network classifiers. Mach Learn 29(2-3):131\u2013163","journal-title":"Mach Learn"},{"key":"10142_CR40","doi-asserted-by":"crossref","unstructured":"Fu S, Shen B (2015) Code Bad Smell Detection through Evolutionary Data Mining. In: Proceedings of the ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement. IEEE, pp 1\u20139","DOI":"10.1109\/ESEM.2015.7321194"},{"key":"10142_CR41","unstructured":"Gopalan R (2012) Automatic detection of code smells in java source code. Ph.D. Thesis, University of Western Australia"},{"key":"10142_CR42","doi-asserted-by":"crossref","unstructured":"Hadj-Kacem M, Bouassida N (2019) Deep representation learning for code smells detection using variational auto-encoder. In: Proceedings of the International Joint Conference on Neural Networks (IJCNN). IEEE, pp 1\u20138","DOI":"10.1109\/IJCNN.2019.8851854"},{"key":"10142_CR43","doi-asserted-by":"crossref","unstructured":"Hassaine S, Khomh F, Gu\u00e9h\u00e9neuc Y-G, Hamel S (2010) IDS: An immune-inspired approach for the detection of software design smells. In: Proceedings of the 7th International Conference on Quality of Information and Communications Technology. IEEE, pp 343\u2013348","DOI":"10.1109\/QUATIC.2010.61"},{"key":"10142_CR44","unstructured":"Henderson-Sellers B (1995) Object-oriented metrics: measures of complexity. Prentice-Hall, Inc."},{"issue":"2","key":"10142_CR45","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1080\/03081078308960805","volume":"9","author":"M Higashi","year":"1983","unstructured":"Higashi M, Klir G J (1983) On the notion of distance representing information closeness: Possibility and probability distributions. Int J Gen Syst 9 (2):103\u2013115","journal-title":"Int J Gen Syst"},{"issue":"1","key":"10142_CR46","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1038\/scientificamerican0792-66","volume":"267","author":"JH Holland","year":"1992","unstructured":"Holland J H (1992) Genetic algorithms. Sci Amer 267(1):66\u201373","journal-title":"Sci Amer"},{"issue":"2","key":"10142_CR47","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1111\/1467-9868.00338","volume":"64","author":"C Holmes","year":"2002","unstructured":"Holmes C, Adams N (2002) A probabilistic nearest neighbour method for statistical pattern recognition. J R Stat Soc Ser B (Stat Methodol) 64 (2):295\u2013306","journal-title":"J R Stat Soc Ser B (Stat Methodol)"},{"key":"10142_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.infsof.2017.06.004","volume":"95","author":"S Hosseini","year":"2018","unstructured":"Hosseini S, Turhan B, M\u00e4ntyl\u00e4 M (2018) A benchmark study on the effectiveness of search-based data selection and feature selection for cross project defect prediction. Inf Softw Technol 95:1\u201317","journal-title":"Inf Softw Technol"},{"key":"10142_CR49","doi-asserted-by":"crossref","unstructured":"Jenhani I (2010) From possibilistic similarity measures to possibilistic decision trees. Ph.D. Thesis, Artois","DOI":"10.1007\/978-3-642-10728-3_6"},{"key":"10142_CR50","doi-asserted-by":"crossref","unstructured":"Jenhani I, Amor N B, Benferhat S, Elouedi Z (2008) Sim-pdt: A similarity based possibilistic decision tree approach. In: Proceedings of the International Symposium on Foundations of Information and Knowledge Systems. Springer, pp 348\u2013364","DOI":"10.1007\/978-3-540-77684-0_23"},{"issue":"3","key":"10142_CR51","doi-asserted-by":"publisher","first-page":"784","DOI":"10.1016\/j.ijar.2007.12.002","volume":"48","author":"I Jenhani","year":"2008","unstructured":"Jenhani I, Amor N B, Elouedi Z (2008) Decision trees as possibilistic classifiers. Int J Approx Reason 48(3):784\u2013807","journal-title":"Int J Approx Reason"},{"key":"10142_CR52","doi-asserted-by":"crossref","unstructured":"Jenhani I, Amor N B, Elouedi Z, Benferhat S, Mellouli K (2007) Information affinity: A new similarity measure for possibilistic uncertain information. In: Proceedings of the European Conference on Symbolic and Quantitative Approaches to Reasoning and Uncertainty. Springer, pp 840\u2013852","DOI":"10.1007\/978-3-540-75256-1_73"},{"key":"10142_CR53","doi-asserted-by":"crossref","unstructured":"Jenhani I, Benferhat S, Elouedi Z (2009) On the use of clustering in possibilistic decision tree induction. In: Proceedings of the European Conference on Symbolic and Quantitative Approaches to Reasoning and Uncertainty. Springer, pp 505\u2013517","DOI":"10.1007\/978-3-642-02906-6_44"},{"key":"10142_CR54","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1109\/TEVC.2014.2308294","volume":"19","author":"G Karafotias","year":"2015","unstructured":"Karafotias G, Hoogendoorn M, Eiben A E (2015) Parameter control in evolutionary algorithms: Trends and challenges. IEEE Trans Evol Comput 19:167\u2013187","journal-title":"IEEE Trans Evol Comput"},{"key":"10142_CR55","doi-asserted-by":"crossref","unstructured":"Kessentini M, Sahraoui H, Boukadoum M, Wimmer M (2011) Search-Based Design Defects Detection by Example. In: Proceedings of the 14th International Conference on Fundamental Approaches to Software Engineering, vol 6603. Springer, pp 401\u2013415","DOI":"10.1007\/978-3-642-19811-3_28"},{"issue":"9","key":"10142_CR56","doi-asserted-by":"publisher","first-page":"841","DOI":"10.1109\/TSE.2014.2331057","volume":"40","author":"W Kessentini","year":"2014","unstructured":"Kessentini W, Kessentini M, Sahraoui H, Bechikh S, Ouni A (2014) A Cooperative Parallel Search-Based Software Engineering Approach for Code-Smells Detection. IEEE Trans Softw Eng 40(9):841\u2013861","journal-title":"IEEE Trans Softw Eng"},{"key":"10142_CR57","doi-asserted-by":"crossref","unstructured":"Khomh F, Vaucher S, Gu\u00e9h\u00e9neuc Y-G, Sahraoui H (2009) A bayesian approach for the detection of code and design smells. In: Proceedings of the 9th International Conference on Quality Software. IEEE, pp 305\u2013314","DOI":"10.1109\/QSIC.2009.47"},{"issue":"4","key":"10142_CR58","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1016\/j.jss.2010.11.921","volume":"84","author":"F Khomh","year":"2011","unstructured":"Khomh F, Vaucher S, Gu\u00e9h\u00e9neuc Y-G, Sahraoui H (2011) BDTEX: A GQM-based Bayesian approach for the detection of antipatterns. J Syst Softw 84(4):559\u2013572","journal-title":"J Syst Softw"},{"key":"10142_CR59","doi-asserted-by":"crossref","unstructured":"Klement E P, Mesiar R, Pap E (2000) Triangular norms","DOI":"10.1007\/978-94-015-9540-7"},{"issue":"4","key":"10142_CR60","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.entcs.2005.02.059","volume":"141","author":"J Kreimer","year":"2005","unstructured":"Kreimer J (2005) Adaptive detection of design flaws. Electron Notes Theor Comput Sci 141(4):117\u2013136","journal-title":"Electron Notes Theor Comput Sci"},{"key":"10142_CR61","doi-asserted-by":"crossref","unstructured":"Kr\u0119towski M, Grze\u015b M (2005) Global learning of decision trees by an evolutionary algorithm. In: Information Processing and Security Systems. Springer, pp 401\u2013410","DOI":"10.1007\/0-387-26325-X_36"},{"issue":"3","key":"10142_CR62","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1002\/int.20139","volume":"21","author":"T Kroupa","year":"2006","unstructured":"Kroupa T (2006) Application of the choquet integral to measures of information in possibility theory. Int J Intell Syst 21(3):349\u2013359","journal-title":"Int J Intell Syst"},{"key":"10142_CR63","doi-asserted-by":"crossref","unstructured":"Langelier G, Sahraoui H, Poulin P (2005) Visualization-based analysis of quality for large-scale software systems. In: Proceedings of the 20th IEEE\/ACM international Conference on Automated software engineering. ACM, pp 214\u2013223","DOI":"10.1145\/1101908.1101941"},{"key":"10142_CR64","unstructured":"Lanza M, Marinescu R (2007) Object-oriented metrics in practice: using software metrics to characterize, evaluate, and improve the design of object-oriented systems. Springer Science & Business Media"},{"key":"10142_CR65","unstructured":"Lanza M, Marinescu R (2007) Object-oriented metrics in practice: using software metrics to characterize, evaluate, and improve the design of object-oriented systems. Springer Science & Business Media"},{"key":"10142_CR66","doi-asserted-by":"crossref","unstructured":"Li K, Xiang Z, Chen T, Tan K C (2020) Bilo-cpdp: Bi-level programming for automated model discovery in cross-project defect prediction. In: 2020 35th IEEE\/ACM International Conference on Automated Software Engineering (ASE). IEEE, pp 573\u2013584","DOI":"10.1145\/3324884.3416617"},{"key":"10142_CR67","unstructured":"Liu H, Jin J, Xu Z, Bu Y, Zou Y, Zhang L (2019) Deep learning based code smell detection. IEEE Trans Softw Eng"},{"issue":"10","key":"10142_CR68","doi-asserted-by":"publisher","first-page":"1602","DOI":"10.1016\/j.compchemeng.2009.04.005","volume":"33","author":"CY Ma","year":"2009","unstructured":"Ma C Y, Wang X Z (2009) Inductive data mining based on genetic programming: Automatic generation of decision trees from data for process historical data analysis. Comput Chem Eng 33(10):1602\u20131616","journal-title":"Comput Chem Eng"},{"key":"10142_CR69","doi-asserted-by":"crossref","unstructured":"Maiga A, Ali N, Bhattacharya N, Sabane A, Gueheneuc Y-G, Aimeur E (2012a) SMURF: A SVM-based incremental anti-pattern detection approach. In: Proceedings of the 19th Working conference on Reverse engineering,. IEEE, pp 466\u2013475","DOI":"10.1109\/WCRE.2012.56"},{"key":"10142_CR70","doi-asserted-by":"crossref","unstructured":"Maiga A, Ali N, Bhattacharya N, Saban\u00e9 A, Gu\u00e9h\u00e9neuc Y-G, Antoniol G, A\u00efmeur E (2012b) Support vector machines for anti-pattern detection. In: Proceedings of the 27th IEEE\/ACM International Conference on Automated Software Engineering. IEEE, pp 278\u2013281","DOI":"10.1145\/2351676.2351723"},{"key":"10142_CR71","unstructured":"Mansoor U, Kessentini M, Bechikh S, Deb K (2013) Code-smells detection using good and bad software design examples. Technical report, Technical Report"},{"issue":"2","key":"10142_CR72","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1007\/s11219-016-9309-7","volume":"25","author":"U Mansoor","year":"2017","unstructured":"Mansoor U, Kessentini M, Maxim B R, Deb K (2017) Multi-objective code-smells detection using good and bad design examples. Softw Qual J 25(2):529\u2013552","journal-title":"Softw Qual J"},{"key":"10142_CR73","doi-asserted-by":"crossref","unstructured":"Mantyla M V, Vanhanen J, Lassenius C (2004) Bad smells-humans as code critics. In: 20th IEEE International Conference on Software Maintenance, 2004. Proceedings. IEEE, pp 399\u2013408","DOI":"10.1109\/ICSM.2004.1357825"},{"key":"10142_CR74","unstructured":"Marinescu R (2002) Measurement and quality in object oriented design. Ph.D. Thesis, Politehnica University of Timisoara"},{"key":"10142_CR75","doi-asserted-by":"crossref","unstructured":"Marinescu R (2004) Detection strategies: Metrics-based rules for detecting design flaws. In: Proceedings of the 20th IEEE International Conference on Software Maintenance. IEEE, pp 350\u2013359","DOI":"10.1109\/ICSM.2004.1357820"},{"key":"10142_CR76","unstructured":"Martin R C (2002) Agile software development: principles, patterns, and practices. Prentice Hall"},{"issue":"1","key":"10142_CR77","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/TSE.2009.50","volume":"36","author":"N Moha","year":"2010","unstructured":"Moha N, Gueheneuc Y G, Duchien L, Meur A F L (2010) DECOR: A Method for the Specification and Detection of Code and Design Smells. IEEE Trans Softw Eng 36(1):20\u201336","journal-title":"IEEE Trans Softw Eng"},{"key":"10142_CR78","doi-asserted-by":"crossref","unstructured":"Oliveto R, Khomh F, Antoniol G, Gu\u00e9h\u00e9neuc Y-G (2010) Numerical signatures of antipatterns: An approach based on b-splines. In: Proceedings of the 14th European Conference on Software maintenance and reengineering. IEEE, pp 248\u2013251","DOI":"10.1109\/CSMR.2010.47"},{"key":"10142_CR79","unstructured":"Ouni A (2014) A mono-and multi-objective approach for recommending software refactoring. Ph.D. Thesis, Faculty of arts and sciences of Montreal"},{"issue":"1","key":"10142_CR80","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s10515-011-0098-8","volume":"20","author":"A Ouni","year":"2013","unstructured":"Ouni A, Kessentini M, Sahraoui H, Boukadoum M (2013) Maintainability defects detection and correction: a multi-objective approach. Autom Softw Eng 20(1):47\u201379","journal-title":"Autom Softw Eng"},{"key":"10142_CR81","doi-asserted-by":"crossref","unstructured":"Palomba F, Bavota G, Di Penta M, Oliveto R, De Lucia A (2014) Do they really smell bad? a study on developers\u2019 perception of bad code smells. In: 2014 IEEE International Conference on Software Maintenance and Evolution. IEEE, pp 101\u2013110","DOI":"10.1109\/ICSME.2014.32"},{"issue":"5","key":"10142_CR82","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1109\/TSE.2014.2372760","volume":"41","author":"F Palomba","year":"2015","unstructured":"Palomba F, Bavota G, Di Penta M, Oliveto R, Poshyvanyk D, De Lucia A (2015) Mining version histories for detecting code smells. IEEE Trans Softw Eng 41(5):462\u2013489","journal-title":"IEEE Trans Softw Eng"},{"key":"10142_CR83","doi-asserted-by":"crossref","unstructured":"Palomba F, Bavota G, Penta M D, Oliveto R, Lucia A D, Poshyvanyk D (2013) Detecting bad smells in source code using change history information. In: Proceedings of the 28th IEEE\/ACM International Conference on Automated Software Engineering. IEEE Press, pp 268\u2013278","DOI":"10.1109\/ASE.2013.6693086"},{"issue":"10","key":"10142_CR84","doi-asserted-by":"publisher","first-page":"977","DOI":"10.1109\/TSE.2017.2752171","volume":"44","author":"F Palomba","year":"2017","unstructured":"Palomba F, Panichella A, Zaidman A, Oliveto R, De Lucia A (2017) The scent of a smell: An extensive comparison between textual and structural smells. IEEE Trans Softw Eng 44(10):977\u20131000","journal-title":"IEEE Trans Softw Eng"},{"issue":"2","key":"10142_CR85","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/TNN.2010.2091281","volume":"22","author":"SJ Pan","year":"2010","unstructured":"Pan S J, Tsang I W, Kwok J T, Yang Q (2010) Domain adaptation via transfer component analysis. IEEE Trans Neural Netw 22(2):199\u2013210","journal-title":"IEEE Trans Neural Netw"},{"key":"10142_CR86","unstructured":"Pearl J (1982) Reverend bayes on inference engines: A distributed hierarchical approach. In: Proceedings of the Second AAAI Conference on Artificial Intelligence. AAAI Press, pp 133\u2013136"},{"key":"10142_CR87","unstructured":"Pearl J (1985) Bayesian netwcrks: A model cf self-activated memory for evidential reasoning. In: Proceedings of the 7th Conference of the Cognitive Science Society. University of California, Irvine, pp 15\u201317"},{"key":"10142_CR88","doi-asserted-by":"crossref","unstructured":"Pecorelli F, Di Nucci D, De Roover C, De Lucia A (2020) A large empirical assessment of the role of data balancing in machine-learning-based code smell detection. J Syst Softw:110693","DOI":"10.1016\/j.jss.2020.110693"},{"key":"10142_CR89","doi-asserted-by":"crossref","unstructured":"Pecorelli F, Palomba F, Di Nucci D, De Lucia A (2019) Comparing Heuristic and Machine Learning Approaches for Metric-Based Code Smell Detection. In: Proceedings of the IEEE\/ACM International Conference on Program Comprehension. IEEE, p 12","DOI":"10.1109\/ICPC.2019.00023"},{"key":"10142_CR90","doi-asserted-by":"crossref","unstructured":"Pecorelli F, Palomba F, Khomh F, De Lucia A (2020) Developer-driven code smell prioritization. In: Proceedings of the 17th International Conference on Mining Software Repositories, pp 220\u2013231","DOI":"10.1145\/3379597.3387457"},{"key":"10142_CR91","doi-asserted-by":"crossref","unstructured":"Qing H, Biwen L, Beijun S, Xia Y (2015) Cross-project software defect prediction using feature-based transfer learning. In: Proceedings of the 7th Asia-Pacific Symposium on Internetware, pp 74\u201382","DOI":"10.1145\/2875913.2875944"},{"key":"10142_CR92","doi-asserted-by":"crossref","unstructured":"Quinlan J R (1987) Decision trees as probabilistic classifiers. In: Proceedings of the Fourth International Workshop on Machine Learning. Elsevier, pp 31\u201337","DOI":"10.1016\/B978-0-934613-41-5.50007-6"},{"key":"10142_CR93","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1016\/j.jss.2018.12.015","volume":"149","author":"A Ramirez","year":"2018","unstructured":"Ramirez A, Romero J R, Ventura S (2018) A survey of many-objective optimisation in search-based software engineering. J Syst Softw 149:382\u2013395","journal-title":"J Syst Softw"},{"key":"10142_CR94","unstructured":"Rapu D, Ducasse S, G\u00eerba T, Marinescu R (2004) Using history information to improve design flaws detection. In: Proceedings of the 8th European Conference on Software Maintenance and Reengineering,. IEEE, pp 223\u2013232"},{"issue":"1","key":"10142_CR95","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2675067","volume":"24","author":"D Sahin","year":"2014","unstructured":"Sahin D, Kessentini M, Bechikh S, Deb K (2014) Code-Smell Detection as a Bilevel Problem. ACM Trans Softw Eng Methodol 24(1):1\u201344","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"10142_CR96","doi-asserted-by":"crossref","unstructured":"Saidani I, Ouni A, Mkaouer M W (2020) Web service api anti-patterns detection as a multi-label learning problem. In: International Conference on Web Services. Springer, pp 114\u2013132","DOI":"10.1007\/978-3-030-59618-7_8"},{"issue":"1-2","key":"10142_CR97","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/S0888-613X(98)00012-7","volume":"18","author":"R Sang\u00fcesa","year":"1998","unstructured":"Sang\u00fcesa R, Cab\u00f3s J, Cortes U (1998) Possibilistic conditional independence: A similarity-based measure and its application to causal network learning. Int J Approx Reason 18(1-2):145\u2013167","journal-title":"Int J Approx Reason"},{"key":"10142_CR98","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.jss.2017.12.034","volume":"138","author":"T Sharma","year":"2018","unstructured":"Sharma T, Spinellis D (2018) A survey on software smells. J Syst Softw 138:158\u2013173","journal-title":"J Syst Softw"},{"key":"10142_CR99","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.infsof.2017.08.008","volume":"92","author":"D Taibi","year":"2017","unstructured":"Taibi D, Janes A, Lenarduzzi V (2017) How developers perceive smells in source code: A replicated study. Inf Softw Technol 92:223\u2013235","journal-title":"Inf Softw Technol"},{"issue":"1","key":"10142_CR100","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/TKDE.2009.175","volume":"23","author":"S Tsang","year":"2009","unstructured":"Tsang S, Kao B, Yip K Y, Ho W-S, Lee S D (2009) Decision trees for uncertain data. IEEE Trans Knowl Data Eng 23(1):64\u201378","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"3","key":"10142_CR101","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1109\/TSE.2009.1","volume":"35","author":"N Tsantalis","year":"2009","unstructured":"Tsantalis N, Chatzigeorgiou A (2009) Identification of Move Method Refactoring Opportunities. IEEE Trans Softw Eng 35(3):347\u2013367","journal-title":"IEEE Trans Softw Eng"},{"key":"10142_CR102","doi-asserted-by":"publisher","first-page":"1757","DOI":"10.1016\/j.jss.2011.05.016","volume":"84","author":"N Tsantalis","year":"2011","unstructured":"Tsantalis N, Chatzigeorgiou A (2011) Identification of extract method refactoring opportunities for the decomposition of methods. J Syst Softw 84:1757\u20131782","journal-title":"J Syst Softw"},{"issue":"11","key":"10142_CR103","doi-asserted-by":"publisher","first-page":"1063","DOI":"10.1109\/TSE.2017.2653105","volume":"43","author":"M Tufano","year":"2017","unstructured":"Tufano M, Palomba F, Bavota G, Oliveto R, Di Penta M, De Lucia A, Poshyvanyk D (2017) When and why your code starts to smell bad (and whether the smells go away). IEEE Trans Softw Eng 43(11):1063\u20131088","journal-title":"IEEE Trans Softw Eng"},{"key":"10142_CR104","unstructured":"Van Rijsbergen CJ (1979) Information retrieval"},{"issue":"2","key":"10142_CR105","first-page":"101","volume":"25","author":"A Vargha","year":"2000","unstructured":"Vargha A, Delaney H D (2000) A critique and improvement of the cl common language effect size statistics of mcgraw and wong. J Educ Behav Stat 25 (2):101\u2013132","journal-title":"J Educ Behav Stat"},{"key":"10142_CR106","doi-asserted-by":"crossref","unstructured":"Vaucher S, Khomh F, Moha N, Gu\u00e9h\u00e9neuc Y-G (2009) Tracking design smells: Lessons from a study of god classes. In: Proceedings of the 16th Working Conference on Reverse Engineering,. IEEE, pp 145\u2013154","DOI":"10.1109\/WCRE.2009.23"},{"key":"10142_CR107","doi-asserted-by":"crossref","unstructured":"Whittle J, Sawyer P, Bencomo N, Cheng B H, Bruel J-M (2009) Relax: Incorporating uncertainty into the specification of self-adaptive systems. In: Proceedings of the 17th International Requirements Engineering Conference. IEEE, pp 79\u201388","DOI":"10.1109\/RE.2009.36"},{"key":"10142_CR108","unstructured":"Wirfs-Brock R, McKean A (2003) Object design: roles, responsibilities, and collaborations. Addison-Wesley Professional"},{"key":"10142_CR109","doi-asserted-by":"crossref","unstructured":"Yamashita A, Moonen L (2013) Do developers care about code smells? an exploratory survey. In: 2013 20th Working Conference on Reverse Engineering (WCRE). IEEE, pp 242\u2013251","DOI":"10.1109\/WCRE.2013.6671299"},{"issue":"1","key":"10142_CR110","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/0165-0114(78)90029-5","volume":"1","author":"LA Zadeh","year":"1978","unstructured":"Zadeh L A (1978) Fuzzy sets as a basis for a theory of possibility. Fuzzy Sets Syst 1(1):3\u201328","journal-title":"Fuzzy Sets Syst"},{"key":"10142_CR111","doi-asserted-by":"crossref","unstructured":"Zhu Z, Li Y, Tong H, Wang Y (2020) Cooba: Cross-project bug localization via adversarial transfer learning. In: Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, IJCAI, pp 3565\u20133571","DOI":"10.24963\/ijcai.2020\/493"},{"key":"10142_CR112","doi-asserted-by":"crossref","unstructured":"Zimmermann T, Nagappan N, Gall H, Giger E, Murphy B (2009) Cross-project defect prediction: a large scale experiment on data vs. domain vs. process. In: Proceedings of the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering, pp 91\u2013100","DOI":"10.1145\/1595696.1595713"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-022-10142-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-022-10142-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-022-10142-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,14]],"date-time":"2022-10-14T12:09:23Z","timestamp":1665749363000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-022-10142-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,24]]},"references-count":112,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,11]]}},"alternative-id":["10142"],"URL":"https:\/\/doi.org\/10.1007\/s10664-022-10142-5","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,24]]},"assertion":[{"value":"22 February 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 June 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of interest"}}],"article-number":"124"}}