{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T13:52:11Z","timestamp":1770904331677,"version":"3.50.1"},"reference-count":71,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T00:00:00Z","timestamp":1653868800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T00:00:00Z","timestamp":1653868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1007\/s10664-022-10144-3","type":"journal-article","created":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T09:03:03Z","timestamp":1653901383000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["How and why we end up with complex methods: a multi-language study"],"prefix":"10.1007","volume":"27","author":[{"given":"Mateus","family":"Lopes","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4900-1330","authenticated-orcid":false,"given":"Andre","family":"Hora","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,30]]},"reference":[{"key":"10144_CR1","doi-asserted-by":"publisher","first-page":"2121","DOI":"10.1007\/s10664-017-9540-2","volume":"23","author":"M Aniche","year":"2018","unstructured":"Aniche M, Bavota G, Treude C, Gerosa MA, van Deursen A (2018) Code smells for Model-View-Controller architectures. Empir Softw Eng 23:2121\u20132147","journal-title":"Empir Softw Eng"},{"key":"10144_CR2","doi-asserted-by":"crossref","unstructured":"Avelino G, Passos L, Hora A, Valente MT (2016) A novel approach for estimating truck factors. In: 24th International Conference on Program Comprehension (ICPC), pp 1\u201310","DOI":"10.1109\/ICPC.2016.7503718"},{"issue":"1","key":"10144_CR3","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.scico.2019.03.001","volume":"176","author":"G Avelino","year":"2019","unstructured":"Avelino G, Passos L, Hora A, Valente MT (2019) Measuring and analyzing code authorship in 1 + 118 open source projects. Sci Comput Program 176 (1):14\u201332","journal-title":"Sci Comput Program"},{"issue":"3","key":"10144_CR4","doi-asserted-by":"publisher","first-page":"68","DOI":"10.5539\/cis.v6n3p68","volume":"6","author":"Y Ayalew","year":"2013","unstructured":"Ayalew Y, Mguniin K (2013) An assessment of changeability of open source software. Computer and Information Science 6(3):68\u201379","journal-title":"Computer and Information Science"},{"key":"10144_CR5","doi-asserted-by":"crossref","unstructured":"Borges H, Hora A, Valente MT (2016) Understanding the factors that impact the popularity of GitHub repositories. In: International conference on software maintenance and evolution (ICSME), pp 334\u2013344","DOI":"10.1109\/ICSME.2016.31"},{"key":"10144_CR6","unstructured":"Bray MW, Brune K, Fisher D, Foreman J, Gerken M (1997) C4 software technology reference guide - a prototype"},{"key":"10144_CR7","doi-asserted-by":"publisher","first-page":"1458","DOI":"10.1007\/s10664-019-09756-z","volume":"25","author":"A Brito","year":"2020","unstructured":"Brito A, Valente MT, Xavier L, Hora A (2020) You broke my code: understanding the motivations for breaking changes in apis. Empir Softw Eng 25:1458\u20131492","journal-title":"Empir Softw Eng"},{"key":"10144_CR8","doi-asserted-by":"crossref","unstructured":"Chatzigeorgiou A, Manakos A (2010) Investigating the evolution of bad smells in object-oriented code. In: International conference on the quality of information and communications technology. IEEE, pp 106\u2013115","DOI":"10.1109\/QUATIC.2010.16"},{"issue":"1","key":"10144_CR9","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s11334-013-0205-z","volume":"10","author":"A Chatzigeorgiou","year":"2014","unstructured":"Chatzigeorgiou A, Manakos A (2014) Investigating the evolution of code smells in object-oriented systems. Innov Syst Softw Eng 10(1):3\u201318","journal-title":"Innov Syst Softw Eng"},{"key":"10144_CR10","doi-asserted-by":"crossref","unstructured":"Chen Z, Chen L, Ma W, Xu B (2016) Detecting code smells in python programs. In: International conference on software analysis, testing and evolution (SATE), pp 18\u201323","DOI":"10.1109\/SATE.2016.10"},{"key":"10144_CR11","unstructured":"Chi-Square - College of Education - NIU (2021) https:\/\/www.cedu.niu.edu\/~walker\/statistics\/Chi%20Square%202.pdf"},{"key":"10144_CR12","unstructured":"Code Climate (2021) https:\/\/docs.codeclimate.com\/docs\/cyclomatic-complexity"},{"key":"10144_CR13","doi-asserted-by":"crossref","unstructured":"Cruzes DS, Dyba T (2011) Recommended steps for thematic synthesis in software engineering. In: 2011 International symposium on empirical software engineering and measurement (ESEM), pp 275\u2013284","DOI":"10.1109\/ESEM.2011.36"},{"key":"10144_CR14","doi-asserted-by":"crossref","unstructured":"Di Nucci D, Palomba F, Tamburri DA, Serebrenik A, De Lucia A (2018) Detecting code smells using machine learning techniques: Are we there yet?. In: International conference on software analysis, evolution and reengineering (SANER), pp 612\u2013621","DOI":"10.1109\/SANER.2018.8330266"},{"key":"10144_CR15","doi-asserted-by":"crossref","unstructured":"Dias M, Bacchelli A, Gousios G, Cassou D, Ducasse S (2015) Untangling fine-grained code changes. In: International conference on software analysis, evolution, and reengineering (SANER), pp 341\u2013350","DOI":"10.1109\/SANER.2015.7081844"},{"key":"10144_CR16","doi-asserted-by":"crossref","unstructured":"Fard AM, Mesbah A (2013) JSNOSE: Detecting JavaScript Code Smells. In: International working conference on source code analysis and manipulation (SCAM), pp 116\u2013125","DOI":"10.1109\/SCAM.2013.6648192"},{"key":"10144_CR17","doi-asserted-by":"crossref","unstructured":"Fischer M, Pinzger M, Gall H (2003) Populating a release history database from version control and bug tracking systems. In: International conference on software maintenance (ICSM), pp 23\u201332","DOI":"10.1109\/ICSM.2003.1235403"},{"issue":"2","key":"10144_CR18","first-page":"5","volume":"11","author":"FA Fontana","year":"2012","unstructured":"Fontana F A, Braione P, Zanoni M (2012) Automatic detection of bad smells in code: An experimental assessment. J Object Technology 11(2):5\u20131","journal-title":"J Object Technology"},{"key":"10144_CR19","unstructured":"Fowler M (2018) Refactoring: Improving the design of existing code. Addison-Wesley Professional"},{"key":"10144_CR20","doi-asserted-by":"crossref","unstructured":"Grund F, Chowdhury SA, Bradley N, Hall B, Holmes R (2021) CodeShovel: Constructing Method-Level Source Code Histories. In: International conference on software enginnering (ICSE)","DOI":"10.1109\/ICSE43902.2021.00135"},{"key":"10144_CR21","doi-asserted-by":"crossref","unstructured":"Herzig K, Just S, Zeller A (2013) It\u2019s not a bug, it\u2019s a feature: How misclassification impacts bug prediction. In: International conference on software engineering (ICSE), pp 392\u2013401","DOI":"10.1109\/ICSE.2013.6606585"},{"key":"10144_CR22","doi-asserted-by":"crossref","unstructured":"Hora A, Anquetil N, Ducasse S, Allier S (2012) Domain specific warnings: Are they any better?. In: 2012 28th IEEE International conference on software maintenance (ICSM), pp 441\u2013450","DOI":"10.1109\/ICSM.2012.6405305"},{"key":"10144_CR23","doi-asserted-by":"publisher","first-page":"1798","DOI":"10.1007\/s10664-020-09809-8","volume":"25","author":"A Hora","year":"2020","unstructured":"Hora A, Robbes R (2020) Characteristics of method extractions in java: A large scale empirical study. Empir Softw Eng 25:1798\u20131833","journal-title":"Empir Softw Eng"},{"key":"10144_CR24","doi-asserted-by":"crossref","unstructured":"Host E W, Ostvold B M (2007) The programmer\u2019s lexicon, volume i: The verbs. In: International working conference on source code analysis and manipulation, pp 193\u2013202","DOI":"10.1109\/SCAM.2007.18"},{"key":"10144_CR25","unstructured":"IBM Rational Asset Analyzer (2021) https:\/\/www.ibm.com\/docs\/en\/raa\/6.1?topic=metrics-cyclomatic-complexityhttps:\/\/www.ibm.com\/docs\/en\/raa\/6.1?topic=metrics-cyclomatic-complexity"},{"key":"10144_CR26","doi-asserted-by":"publisher","first-page":"1261","DOI":"10.1007\/s10664-013-9275-7","volume":"19","author":"A Jbara","year":"2014","unstructured":"Jbara A, Matan A, Feitelson DG (2014) High-mcc functions in the linux kernel. Empir Softw Eng 19:1261\u20131298","journal-title":"Empir Softw Eng"},{"key":"10144_CR27","doi-asserted-by":"publisher","first-page":"1271","DOI":"10.1007\/s11219-019-09442-9","volume":"27","author":"D Johannes","year":"2019","unstructured":"Johannes D, Khomh F, Antoniol G (2019) A large-scale empirical study of code smells in JavaScript projects. Software Quality 27:1271\u20131314","journal-title":"Software Quality"},{"key":"10144_CR28","unstructured":"Kendall MG (1948) Rank correlation methods. Griffin"},{"key":"10144_CR29","doi-asserted-by":"crossref","unstructured":"Khomh F, Di Penta M, Gueheneuc Y (2009) An exploratory study of the impact of code smells on software change-proneness. In: Working conference on reverse engineering, pp 75\u201384","DOI":"10.1109\/WCRE.2009.28"},{"key":"10144_CR30","doi-asserted-by":"crossref","unstructured":"Khomh F, Vaucher S, Gu\u00e9h\u00e9neuc Y, Sahraoui H (2009) A bayesian approach for the detection of code and design smells. In: International conference on quality software, pp 305\u2013314","DOI":"10.1109\/QSIC.2009.47"},{"issue":"2","key":"10144_CR31","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1109\/TSE.2007.70773","volume":"34","author":"S Kim","year":"2008","unstructured":"Kim S, Whitehead, EJ, Zhang Y (2008) Classifying software changes: Clean or buggy?. IEEE Trans Softw Eng 34(2):181\u2013196","journal-title":"IEEE Trans Softw Eng"},{"key":"10144_CR32","doi-asserted-by":"crossref","unstructured":"Lanza M (2001) The evolution matrix: Recovering software evolution using software visualization techniques. International workshop on principles of software evolution (IWPSE)","DOI":"10.1145\/602461.602467"},{"key":"10144_CR33","doi-asserted-by":"crossref","unstructured":"Lehman MM (1996) Laws of software evolution revisited. In: European workshop on software process technology. Springer, pp 108\u2013124","DOI":"10.1007\/BFb0017737"},{"issue":"9","key":"10144_CR34","doi-asserted-by":"publisher","first-page":"1060","DOI":"10.1109\/PROC.1980.11805","volume":"68","author":"MM Lehman","year":"1980","unstructured":"Lehman MM (1980) Programs, life cycles, and laws of software evolution. Proc IEEE 68(9):1060\u20131076","journal-title":"Proc IEEE"},{"key":"10144_CR35","doi-asserted-by":"crossref","unstructured":"Lehman MM, Ramil JF, Wernick PD, Perry DE, Turski WM (1997) Metrics and laws of software evolution-the nineties view. In: International software metrics symposium. IEEE, pp 20\u201332","DOI":"10.1109\/METRIC.1997.637156"},{"key":"10144_CR36","doi-asserted-by":"crossref","unstructured":"Liu H, Gong X, Liao L, Li B (2018) Evaluate how cyclomatic complexity changes in the context of software evolution. In: Annual computer software and applications conference (COMPSAC), vol 02, pp 756\u2013761","DOI":"10.1109\/COMPSAC.2018.10332"},{"key":"10144_CR37","doi-asserted-by":"crossref","unstructured":"Maneerat N, Muenchaisri P (2011) Bad-smell prediction from software design model using machine learning techniques. In: International joint conference on computer science and software engineering (JCSSE), pp 331\u2013336","DOI":"10.1109\/JCSSE.2011.5930143"},{"issue":"3","key":"10144_CR38","doi-asserted-by":"publisher","first-page":"245","DOI":"10.2307\/1907187","volume":"13","author":"HB Mann","year":"1945","unstructured":"Mann HB (1945) Nonparametric tests against trend. Econometrica 13(3):245\u2013259","journal-title":"Econometrica"},{"key":"10144_CR39","unstructured":"Martin RC (2009) Clean code: a handbook of agile software craftsmanship. Pearson Education"},{"issue":"4","key":"10144_CR40","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1109\/TSE.1976.233837","volume":"SE-2","author":"TJ McCabe","year":"1976","unstructured":"McCabe TJ (1976) A complexity measure. IEEE Trans Softw Eng SE-2(4):308\u2013320","journal-title":"IEEE Trans Softw Eng"},{"key":"10144_CR41","unstructured":"Microsoft Visual Studio (2021) https:\/\/docs.microsoft.com\/en-us\/visualstudio\/code-quality\/code-metrics-cyclomatic-complexityhttps:\/\/docs.microsoft.com\/en-us\/visualstudio\/code-quality\/code-metrics-cyclomatic-complexity"},{"issue":"1","key":"10144_CR42","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/TSE.2009.50","volume":"36","author":"N Moha","year":"2010","unstructured":"Moha N, Gueheneuc Y, Duchien L, Le Meur A (2010) Decor: A method for the specification and detection of code and design smells. IEEE Trans Softw Eng 36(1):20\u201336","journal-title":"IEEE Trans Softw Eng"},{"key":"10144_CR43","doi-asserted-by":"crossref","unstructured":"Olbrich S, Cruzes DS, Basili V, Zazworka N (2009) The evolution and impact of code smells: A case study of two open source systems. In: International symposium on empirical software engineering and measurement. IEEE, pp 390\u2013400","DOI":"10.1109\/ESEM.2009.5314231"},{"key":"10144_CR44","doi-asserted-by":"crossref","unstructured":"Olbrich SM, Cruzes DS, Sj\u00f8berg DIK (2010) Are all code smells harmful? a study of god classes and brain classes in the evolution of three open source systems. In: International conference on software maintenance. IEEE, pp 1\u201310","DOI":"10.1109\/ICSM.2010.5609564"},{"key":"10144_CR45","doi-asserted-by":"crossref","unstructured":"Palomba F, Bavota G, Di Penta M, Oliveto R, De Lucia A, Poshyvanyk D (2013) Detecting bad smells in source code using change history information. In: International conference on automated software engineering (ASE), pp 268\u2013278","DOI":"10.1109\/ASE.2013.6693086"},{"key":"10144_CR46","doi-asserted-by":"crossref","unstructured":"Palomba F, Bavota G, Di Penta M, Oliveto R, De Lucia A (2014) Do they really smell bad? a study on developers\u2019 perception of bad code smells. In: International conference on software maintenance and evolution. IEEE, pp 101\u2013110","DOI":"10.1109\/ICSME.2014.32"},{"key":"10144_CR47","unstructured":"Perforce (2021) https:\/\/www.perforce.com\/blog\/qac\/what-cyclomatic-complexity"},{"key":"10144_CR48","doi-asserted-by":"crossref","unstructured":"Peters R, Zaidman A (2012) Evaluating the lifespan of code smells using software repository mining. In: European conference on software maintenance and reengineering, pp 411\u2013416","DOI":"10.1109\/CSMR.2012.79"},{"key":"10144_CR49","doi-asserted-by":"crossref","unstructured":"Ratzinger J, Sigmund T, Gall HC (2008) On the relation of refactorings and software defect prediction. In: International working conference on mining software repositories, pp 35\u201338","DOI":"10.1145\/1370750.1370759"},{"key":"10144_CR50","doi-asserted-by":"crossref","unstructured":"Robles G, Herraiz I, German DM, Izquierdo-Cortazar D (2012) Modification and developer metrics at the function level: Metrics for the study of the evolution of a software project. In: International workshop on emerging trends in software metrics (WETSoM), pp 49\u201355","DOI":"10.1109\/WETSoM.2012.6226993"},{"key":"10144_CR51","doi-asserted-by":"crossref","unstructured":"Saboury A, Musavi P, Khomh F, Antoniol G (2017) An empirical study of code smells in JavaScript projects. In: International conference on software analysis, evolution and reengineering (SANER), pp 294\u2013305","DOI":"10.1109\/SANER.2017.7884630"},{"issue":"1","key":"10144_CR52","first-page":"1","volume":"1","author":"D Silva","year":"2020","unstructured":"Silva D, da Silva JP, Santos G, Terra R, Valente MT (2020) Refdiff 2.0: A multi-language refactoring detection tool. IEEE Trans Softw Eng 1 (1):1\u201317","journal-title":"IEEE Trans Softw Eng"},{"key":"10144_CR53","doi-asserted-by":"crossref","unstructured":"Silva D, Tsantalis N, Valente MT (2016) Why we refactor? confessions of GitHub contributors. In: International symposium on the foundations of software engineering, pp 858\u2013870","DOI":"10.1145\/2950290.2950305"},{"key":"10144_CR54","doi-asserted-by":"crossref","unstructured":"Silva D, Valente MT (2017) RefDiff: detecting refactorings in version histories. In: International conference on mining software repositories, pp 269\u2013279","DOI":"10.1109\/MSR.2017.14"},{"key":"10144_CR55","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.jss.2018.09.016","volume":"146","author":"H Silva","year":"2018","unstructured":"Silva H, Valente M T (2018) What\u2019s in a GitHub star? understanding repository starring practices in a social coding platform. J Syst Softw 146:112\u2013129","journal-title":"J Syst Softw"},{"issue":"8","key":"10144_CR56","doi-asserted-by":"publisher","first-page":"1144","DOI":"10.1109\/TSE.2012.89","volume":"39","author":"DIK Sj\u00f8berg","year":"2013","unstructured":"Sj\u00f8berg DIK, Yamashita A, Anda BCD, Mockus A, Dyb\u00e5 T (2013) Quantifying the effect of code smells on maintenance effort. IEEE Trans Softw Eng 39(8):1144\u20131156","journal-title":"IEEE Trans Softw Eng"},{"key":"10144_CR57","doi-asserted-by":"crossref","unstructured":"Skolka P, Staicu C-A, Pradel M (2019) Anything to Hide? Studying Minified and Obfuscated Code in the Web. In: The world wide web conference, pp 1735\u20131746","DOI":"10.1145\/3308558.3313752"},{"key":"10144_CR58","unstructured":"SonarQube (2021) https:\/\/docs.sonarqube.org\/latest\/user-guide\/metric-definitions"},{"key":"10144_CR59","doi-asserted-by":"crossref","unstructured":"Spadini D, Aniche M, Bacchelli A (2018) Pydriller: Python framework for mining software repositories. In: Joint meeting on european software engineering conference and symposium on the foundations of software engineering, pp 908\u2013911","DOI":"10.1145\/3236024.3264598"},{"key":"10144_CR60","doi-asserted-by":"crossref","unstructured":"Stroggylos K, Spinellis D (2007) Refactoring\u2013does it improve software quality?. In: International workshop on software quality (WoSQ\u201907: ICSE Workshops 2007), pp 10\u201310","DOI":"10.1109\/WOSQ.2007.11"},{"key":"10144_CR61","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.infsof.2017.08.008","volume":"92","author":"D Taibi","year":"2017","unstructured":"Taibi D, Janes A, Lenarduzzi V (2017) How developers perceive smells in source code: A replicated study. Inf Softw Technol 92:223\u2013235","journal-title":"Inf Softw Technol"},{"key":"10144_CR62","doi-asserted-by":"crossref","unstructured":"Tsantalis N, Mansouri M, Eshkevari LM, Mazinanian D, Dig D (2018) Accurate and efficient refactoring detection in commit history. In: International conference on software engineering, pp 483\u2013494","DOI":"10.1145\/3180155.3180206"},{"key":"10144_CR63","doi-asserted-by":"crossref","unstructured":"Tufano M, Palomba F, Bavota G, Oliveto R, Di Penta M, De Lucia A, Poshyvanyk D (2015) When and why your code starts to smell bad. In: International conference on software engineering, vol 1. IEEE, pp 403\u2013414","DOI":"10.1109\/ICSE.2015.59"},{"issue":"11","key":"10144_CR64","doi-asserted-by":"publisher","first-page":"1063","DOI":"10.1109\/TSE.2017.2653105","volume":"43","author":"M Tufano","year":"2017","unstructured":"Tufano M, Palomba F, Bavota G, Oliveto R, Di Penta M, De Lucia A, Poshyvanyk D (2017) When and why your code starts to smell bad (and whether the smells go away). IEEE Trans Softw Eng 43(11):1063\u20131088","journal-title":"IEEE Trans Softw Eng"},{"key":"10144_CR65","doi-asserted-by":"crossref","unstructured":"van Emden E, Moonen L (2002) Java quality assurance by detecting code smells. In: Working conference on reverse engineering, 2002. Proceedings., pp 97\u2013106","DOI":"10.1109\/WCRE.2002.1173068"},{"key":"10144_CR66","doi-asserted-by":"crossref","unstructured":"Vavrov\u00e1 N, Zaytsev V (2017) Does Python Smell Like Java? Tool Support for Design Defect Discovery in Python. Computing Research Repository, abs\/1703.10882","DOI":"10.22152\/programming-journal.org\/2017\/1\/11"},{"key":"10144_CR67","doi-asserted-by":"crossref","unstructured":"Yamashita A, Moonen L (2012) Do code smells reflect important maintainability aspects?. In: International conference on software maintenance (ICSM), pp 306\u2013315","DOI":"10.1109\/ICSM.2012.6405287"},{"key":"10144_CR68","doi-asserted-by":"crossref","unstructured":"Yamashita A, Moonen L (2013) Exploring the impact of inter-smell relations on software maintainability: An empirical study. In: International conference on software engineering (ICSE), pp 682\u2013691","DOI":"10.1109\/ICSE.2013.6606614"},{"key":"10144_CR69","doi-asserted-by":"crossref","unstructured":"Yamashita A, Moonen L (2013) Do developers care about code smells? an exploratory survey. In: Working conference on reverse engineering (WCRE). IEEE, pp 242\u2013251","DOI":"10.1109\/WCRE.2013.6671299"},{"issue":"1","key":"10144_CR70","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1016\/S0022-1694(01)00594-7","volume":"259","author":"S Yue","year":"2002","unstructured":"Yue S, Pilon P, Cavadias G (2002) Power of the mann\u2013kendall and spearman\u2019s rho tests for detecting monotonic trends in hydrological series. J Hydrol 259(1):254\u2013271","journal-title":"J Hydrol"},{"key":"10144_CR71","doi-asserted-by":"crossref","unstructured":"Zimmermann T, Premraj R, Zeller A (2007) Predicting defects for eclipse. In: International workshop on predictor models in software engineering (PROMISE\u201907: ICSE Workshops 2007), pp 9\u20139","DOI":"10.1109\/PROMISE.2007.10"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-022-10144-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-022-10144-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-022-10144-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,26]],"date-time":"2022-07-26T05:13:35Z","timestamp":1658812415000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-022-10144-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,30]]},"references-count":71,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["10144"],"URL":"https:\/\/doi.org\/10.1007\/s10664-022-10144-3","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,30]]},"assertion":[{"value":"2 March 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 May 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"115"}}