{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:19:16Z","timestamp":1740122356650,"version":"3.37.3"},"reference-count":82,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T00:00:00Z","timestamp":1719964800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T00:00:00Z","timestamp":1719964800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1007\/s10664-024-10476-2","type":"journal-article","created":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T12:01:50Z","timestamp":1720008110000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Design smells in multi-language systems and bug-proneness: a survival analysis"],"prefix":"10.1007","volume":"29","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9058-8519","authenticated-orcid":false,"given":"Mouna","family":"Abidi","sequence":"first","affiliation":[]},{"given":"Md\u00a0Saidur","family":"Rahman","sequence":"additional","affiliation":[]},{"given":"Moses","family":"Openja","sequence":"additional","affiliation":[]},{"given":"Foutse","family":"Khomh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,3]]},"reference":[{"key":"10476_CR1","doi-asserted-by":"crossref","unstructured":"Abbes M, Khomh F, Gueheneuc YG, Antoniol G (2011) An empirical study of the impact of two antipatterns, blob and spaghetti code, on program comprehension. In: Software maintenance and reengineering (CSMR), 2011 15th European conference on. IEEE, pp 181\u2013190","DOI":"10.1109\/CSMR.2011.24"},{"key":"10476_CR2","unstructured":"Abidi M, Grichi M, Khomh F (2019a) Behind the scenes: developers\u2019 perception of multilanguage practices. In: Proceedings of the 29th annual international conference on computer science and software engineering. IBM Corp., pp 72\u201381"},{"key":"10476_CR3","doi-asserted-by":"crossref","unstructured":"Abidi M, Grichi M, Khomh F, Gu\u00e9h\u00e9neuc YG (2019b) Code smells for multi-language systems. In: Proceedings of the 24th European conference on pattern languages of programs. ACM, p 12","DOI":"10.1145\/3361149.3361161"},{"key":"10476_CR4","doi-asserted-by":"crossref","unstructured":"Abidi M, Khomh F, Gu\u00e9h\u00e9neuc YG (2019c) Anti-patterns for multi-language systems. In: Proceedings of the 24th European conference on pattern languages of programs. ACM, p 42","DOI":"10.1145\/3361149.3364227"},{"key":"10476_CR5","doi-asserted-by":"crossref","unstructured":"Abidi M, Rahman MS, Openja M, Khomh F (2020) Are multi-language design smells fault-prone? an empirical study. ACM Trans Softw Eng Methodol (TOSEM) 30","DOI":"10.1145\/3432690"},{"key":"10476_CR6","doi-asserted-by":"crossref","unstructured":"Abidi M, Rahman MS, Openja M, Khomh F (2020) Are multi-language design smells fault-prone? an empirical study. ACM Trans Softw Eng Methodol (TOSEM)(to appear). arXiv:2010.14331","DOI":"10.1145\/3379597.3387508"},{"key":"10476_CR7","unstructured":"Alexander C, Ishikawa S, Silverstein M, i Rami\u00f3 JR, Jacobson M, Fiksdahl-King I (1977) A pattern language. Gustavo Gili"},{"key":"10476_CR8","doi-asserted-by":"crossref","unstructured":"Antoniol G, Ayari K, Di Penta M, Khomh F, Gu\u00e9h\u00e9neuc YG (2008) Is it a bug or an enhancement? a text-based approach to classify change requests. In: Proceedings of the 2008 conference of the center for advanced studies on collaborative research: meeting of minds, pp 304\u2013318","DOI":"10.1145\/1463788.1463819"},{"key":"10476_CR9","doi-asserted-by":"crossref","unstructured":"Asuncion HU, Asuncion AU, Taylor RN (2010) Software traceability with topic modeling. In: 2010 ACM\/IEEE 32nd International conference on software engineering, vol 1. IEEE, pp 95\u2013104","DOI":"10.1145\/1806799.1806817"},{"issue":"Jan","key":"10476_CR10","first-page":"993","volume":"3","author":"DM Blei","year":"2003","unstructured":"Blei DM, Ng AY, Jordan MI (2003) Latent dirichlet allocation. J Mach Learn Res 3(Jan):993\u20131022","journal-title":"J Mach Learn Res"},{"key":"10476_CR11","doi-asserted-by":"crossref","unstructured":"Borrelli A, Nardone V, Di Lucca GA, Canfora G, Di Penta M (2020) Detecting video game-specific bad smells in unity projects. In: Proceedings of the 17th international conference on mining software repositories, pp 198\u2013208","DOI":"10.1145\/3379597.3387454"},{"key":"10476_CR12","volume-title":"AntiPatterns: refactoring software, architectures, and projects in crisis","author":"WH Brown","year":"1998","unstructured":"Brown WH, Malveau RC, McCormick HW, Mowbray TJ (1998) AntiPatterns: refactoring software, architectures, and projects in crisis. John Wiley & Sons Inc"},{"issue":"5","key":"10476_CR13","doi-asserted-by":"publisher","first-page":"3008","DOI":"10.1007\/s10664-018-9665-y","volume":"24","author":"M Castelluccio","year":"2019","unstructured":"Castelluccio M, An L, Khomh F (2019) An empirical study of patch uplift in rapid release development pipelines. Empir Softw Eng 24(5):3008\u20133044. https:\/\/doi.org\/10.1007\/s10664-018-9665-y","journal-title":"Empir Softw Eng"},{"key":"10476_CR14","unstructured":"Cleves M, Gould W, Gould WW, Gutierrez R, Marchenko Y (2008) An introduction to survival analysis using Stata. Stata press"},{"key":"10476_CR15","doi-asserted-by":"crossref","unstructured":"Di Nucci D, Palomba F, Tamburri DA, Serebrenik A, De Lucia A (2018) Detecting code smells using machine learning techniques: are we there yet? In: 2018 ieee 25th international conference on software analysis, evolution and reengineering (saner). IEEE, pp 612\u2013621","DOI":"10.1109\/SANER.2018.8330266"},{"issue":"1","key":"10476_CR16","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1146\/annurev.publhealth.20.1.145","volume":"20","author":"LD Fisher","year":"1999","unstructured":"Fisher LD, Lin DY (1999) Time-dependent covariates in the cox proportional-hazards regression model. Annu Rev Public Health 20(1):145\u2013157","journal-title":"Annu Rev Public Health"},{"key":"10476_CR17","volume-title":"Refactoring: improving the design of existing code","author":"M Fowler","year":"1999","unstructured":"Fowler M, Beck K (1999) Refactoring: improving the design of existing code. Addison-Wesley Professional"},{"key":"10476_CR18","volume-title":"Design patterns: elements of reusable object-oriented software","author":"E Gamma","year":"1995","unstructured":"Gamma E, Helm R, Johnson R, Vlissides J (1995) Design patterns: elements of reusable object-oriented software. Addison-Wesley Longman Publishing Co., Inc, Boston, MA, USA"},{"issue":"6","key":"10476_CR19","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1109\/TPAMI.1984.4767596","volume":"PAMI\u20136","author":"S Geman","year":"1984","unstructured":"Geman S, Geman D (1984) Stochastic relaxation, gibbs distributions, and the bayesian restoration of images. IEEE Trans Pattern Anal Mach Intell PAMI\u20136(6):721\u2013741","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"10476_CR20","unstructured":"Goedicke M, Neumann G, Zdun U (2000) Object system layer. 5th European conference on pattern languages of programms (EuroPLoP \u20192000)"},{"key":"10476_CR21","unstructured":"Goedicke M, Neumann G, Zdun U (2001) Message redirector. 6th European conference on pattern languages of programms (EuroPLoP \u20192001)"},{"issue":"1","key":"10476_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/smr.243","volume":"14","author":"M Goedicke","year":"2002","unstructured":"Goedicke M, Zdun U (2002) Piecemeal legacy migrating with an architectural pattern language: a case study. J Softw Maint Evol: Research and Practice 14(1):1\u201330","journal-title":"J Softw Maint Evol: Research and Practice"},{"key":"10476_CR23","doi-asserted-by":"publisher","first-page":"82541","DOI":"10.1109\/ACCESS.2019.2924075","volume":"7","author":"F Gurcan","year":"2019","unstructured":"Gurcan F, Cagiltay NE (2019) Big data software engineering: analysis of knowledge domains and skill sets using lda-based topic modeling. IEEE Access 7:82541\u201382552","journal-title":"IEEE Access"},{"key":"10476_CR24","doi-asserted-by":"crossref","unstructured":"Habchi S, Rouvoy R, Moha N (2019) On the survival of android code smells in the wild. In: 2019 IEEE\/ACM 6th international conference on mobile software engineering and systems (MOBILESoft). IEEE, pp 87\u201398","DOI":"10.1109\/MOBILESoft.2019.00022"},{"issue":"4","key":"10476_CR25","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1109\/TASLP.2015.2405482","volume":"23","author":"M Habibi","year":"2015","unstructured":"Habibi M, Popescu-Belis A (2015) Keyword extraction and clustering for document recommendation in conversations. IEEE\/ACM Trans Audio Speech Lang Process 23(4):746\u2013759","journal-title":"IEEE\/ACM Trans Audio Speech Lang Process"},{"key":"10476_CR26","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0843-6","volume-title":"Java for practitioners: an introduction and reference to Java and object orientation","author":"J Hunt","year":"1999","unstructured":"Hunt J (1999) Java for practitioners: an introduction and reference to Java and object orientation, 1st edn. Springer-Verlag, New York Inc, Secaucus, NJ, USA","edition":"1"},{"issue":"11","key":"10476_CR27","doi-asserted-by":"publisher","first-page":"15169","DOI":"10.1007\/s11042-018-6894-4","volume":"78","author":"H Jelodar","year":"2019","unstructured":"Jelodar H, Wang Y, Yuan C, Feng X, Jiang X, Li Y, Zhao L (2019) Latent dirichlet allocation (lda) and topic modeling: models, applications, a survey. Multimed Tools Appl 78(11):15169\u201315211","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"10476_CR28","doi-asserted-by":"publisher","first-page":"1271","DOI":"10.1007\/s11219-019-09442-9","volume":"27","author":"D Johannes","year":"2019","unstructured":"Johannes D, Khomh F, Antoniol G (2019) A large-scale empirical study of code smells in javascript projects. Softw Qual J 27(3):1271\u20131314","journal-title":"Softw Qual J"},{"key":"10476_CR29","unstructured":"Jones TC (1998) Estimating software costs. McGraw-Hill, Inc"},{"key":"10476_CR30","doi-asserted-by":"crossref","unstructured":"Khomh F, Di Penta M, Gueheneuc YG (2009) An exploratory study of the impact of code smells on software change-proneness. In: Reverse engineering, 2009. WCRE\u201909. 16th working conference on. IEEE, pp 75\u201384","DOI":"10.1109\/WCRE.2009.28"},{"issue":"3","key":"10476_CR31","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s10664-011-9171-y","volume":"17","author":"F Khomh","year":"2012","unstructured":"Khomh F, Di Penta M, Gu\u00e9h\u00e9neuc YG, Antoniol G (2012) An exploratory study of the impact of antipatterns on class change-and fault-proneness. Empir Softw Eng 17(3):243\u2013275","journal-title":"Empir Softw Eng"},{"key":"10476_CR32","doi-asserted-by":"crossref","unstructured":"Khomh F, Vaucher S, Gu\u00e9h\u00e9neuc YG, Sahraoui H (2009) A bayesian approach for the detection of code and design smells. In: Quality software, 2009. QSIC\u201909. 9th international conference on. IEEE, pp 305\u2013314","DOI":"10.1109\/QSIC.2009.47"},{"key":"10476_CR33","doi-asserted-by":"crossref","unstructured":"Kochhar PS, Wijedasa D, Lo D (2016) A large scale study of multiple programming languages and code quality. In: 2016 IEEE 23rd International conference on software analysis, evolution, and reengineering (SANER), vol 1. IEEE, pp 563\u2013573","DOI":"10.1109\/SANER.2016.112"},{"key":"10476_CR34","doi-asserted-by":"crossref","unstructured":"Kondoh G, Onodera T (2008) Finding bugs in java native interface programs. In: Proceedings of the 2008 international symposium on software testing and analysis, ISSTA \u201908. ACM, New York, NY, USA, pp 109\u2013118","DOI":"10.1145\/1390630.1390645"},{"key":"10476_CR35","doi-asserted-by":"crossref","unstructured":"Kontogiannis K, Linos P, Wong K (2006) Comprehension and maintenance of large-scale multi-language software applications. In: Software maintenance, 2006. ICSM\u201906. 22nd IEEE international conference on. IEEE, pp 497\u2013500","DOI":"10.1109\/ICSM.2006.20"},{"issue":"5","key":"10476_CR36","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1007\/s10664-008-9080-x","volume":"13","author":"AG Koru","year":"2008","unstructured":"Koru AG, El Emam K, Zhang D, Liu H, Mathew D (2008) Theory of relative defect proneness. Empir Softw Eng 13(5):473","journal-title":"Empir Softw Eng"},{"key":"10476_CR37","doi-asserted-by":"crossref","unstructured":"Kullbach B, Winter A, Dahm P, Ebert J (1998) Program comprehension in multilanguage systems. In: Reverse engineering, 1998. Proceedings. Fifth working conference on. IEEE, pp 135\u2013143","DOI":"10.1109\/WCRE.1998.723183"},{"issue":"10","key":"10476_CR38","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1145\/1639949.1640105","volume":"44","author":"B Lee","year":"2009","unstructured":"Lee B, Hirzel M, Grimm R, McKinley KS (2009) Debug all your code: portable mixedenvironment debugging. SIGPLAN Not 44(10):207\u2013226","journal-title":"SIGPLAN Not"},{"key":"10476_CR39","doi-asserted-by":"crossref","unstructured":"Lenarduzzi V, Saarim\u00e4ki N, Taibi D (2019) The technical debt dataset. In: Proceedings of the fifteenth international conference on predictive models and data analytics in software engineering, pp 2\u201311","DOI":"10.1145\/3345629.3345630"},{"key":"10476_CR40","doi-asserted-by":"crossref","unstructured":"Li S, Tan G (2009) Finding bugs in exceptional situations of jni programs. In: Proceedings of the 16th ACM conference on computer and communications security, CCS \u201909. ACM, New York, NY, USA, pp 442\u2013452","DOI":"10.1145\/1653662.1653716"},{"key":"10476_CR41","volume-title":"Java native interface: programmer\u2019s guide and reference","author":"S Liang","year":"1999","unstructured":"Liang S (1999) Java native interface: programmer\u2019s guide and reference, 1st edn. Addison-Wesley Longman Publishing Co., Inc, Boston, MA, USA","edition":"1"},{"key":"10476_CR42","doi-asserted-by":"crossref","unstructured":"Lima R, Souza J, Fonseca B, Teixeira L, Gheyi R, Ribeiro M, Garcia A, de Mello R (2020) Understanding and detecting harmful code. In: Proceedings of the 34th Brazilian symposium on software engineering, pp 223\u2013232","DOI":"10.1145\/3422392.3422420"},{"key":"10476_CR43","doi-asserted-by":"crossref","unstructured":"Lin D (1989) Goodness-of-fit tests and robust statistical inference for the Cox proportional hazards model. University of Michigan","DOI":"10.2307\/2290085"},{"key":"10476_CR44","doi-asserted-by":"crossref","unstructured":"Linares-V\u00e1squez M, Klock S, McMillan C, Saban\u00e9 A, Poshyvanyk D, Gu\u00e9h\u00e9neuc YG (2014) Domain matters: bringing further evidence of the relationships among antipatterns, application domains, and quality-related metrics in java mobile apps. In: Proceedings of the 22nd international conference on program comprehension. ACM, pp 232\u2013243","DOI":"10.1145\/2597008.2597144"},{"key":"10476_CR45","doi-asserted-by":"crossref","unstructured":"Linos PK (1995) Polycare: a tool for re-engineering multi-language program integrations. In: Proceedings of First IEEE international conference on engineering of complex computer systems. ICECCS\u201995. IEEE, pp 338\u2013341","DOI":"10.1109\/ICECCS.1995.479355"},{"key":"10476_CR46","doi-asserted-by":"crossref","unstructured":"Linos PK, Chen Zh, Berrier S, O\u2019Rourke B (2003) A tool for understanding multilanguage program dependencies. In: Program comprehension, 2003. 11th IEEE International workshop on. IEEE, pp 64\u201372","DOI":"10.1109\/WPC.2003.1199190"},{"key":"10476_CR47","volume-title":"Java coding guidelines: 75 recommendations for reliable and secure programs","author":"F Long","year":"2013","unstructured":"Long F, Mohindra D, Seacord RC, Sutherland DF, Svoboda D (2013) Java coding guidelines: 75 recommendations for reliable and secure programs. Addison-Wesley"},{"key":"10476_CR48","unstructured":"McCallum A (2019) A machine learning for language toolkit; 2002. http:\/\/mallet.cs.umass.edu\/. Accessed 05 Apr 2015. [WebCite Cache ID 6XZgiQKil]"},{"key":"10476_CR49","doi-asserted-by":"crossref","unstructured":"Mockus A, Votta LG (2000) Identifying reasons for software changes using historic databases. In: icsm, pp 120\u2013130","DOI":"10.1109\/ICSM.2000.883028"},{"key":"10476_CR50","doi-asserted-by":"publisher","unstructured":"Morales R, McIntosh S, Khomh F (2015) Do code review practices impact design quality? a case study of the qt, vtk, and itk projects. In: 2015 IEEE 22nd international conference on software analysis, evolution, and reengineering (SANER), pp 171\u2013180. https:\/\/doi.org\/10.1109\/SANER.2015.7081827","DOI":"10.1109\/SANER.2015.7081827"},{"key":"10476_CR51","doi-asserted-by":"crossref","unstructured":"Muse BA, Rahman MM, Nagy C, Cleve A, Khomh F, Antoniol G (2020) On the prevalence, impact, and evolution of sql code smells in data-intensive systems. In: Proceedings of the 17th international conference on mining software repositories, pp 327\u2013338","DOI":"10.1145\/3379597.3387467"},{"key":"10476_CR52","doi-asserted-by":"crossref","unstructured":"Mushtaq Z, Rasool G (2015) Multilingual source code analysis: state of the art and challenges. In: Open source systems & technologies (ICOSST), 2015 International conference on. IEEE, pp 170\u2013175","DOI":"10.1109\/ICOSST.2015.7396422"},{"key":"10476_CR53","doi-asserted-by":"crossref","unstructured":"Mushtaq Z, Rasool G (2015) Multilingual source code analysis: state of the art and challenges. In: 2015 International conference on open source systems technologies (ICOSST), pp 170\u2013175","DOI":"10.1109\/ICOSST.2015.7396422"},{"key":"10476_CR54","doi-asserted-by":"crossref","unstructured":"Neitsch A, Wong K, Godfrey MW (2012) Build system issues in multilanguage software. In: Software maintenance (ICSM), 2012 28th IEEE international conference on. IEEE, pp 140\u2013149","DOI":"10.1109\/ICSM.2012.6405265"},{"key":"10476_CR55","doi-asserted-by":"crossref","unstructured":"Olbrich S, Cruzes DS, Basili V, Zazworka N (2009) The evolution and impact of code smells: A case study of two open source systems. In: Proceedings of the 2009 3rd international symposium on empirical software engineering and measurement. IEEE Computer Society, pp 390\u2013400","DOI":"10.1109\/ESEM.2009.5314231"},{"key":"10476_CR56","doi-asserted-by":"crossref","unstructured":"Palomba F, Bavota G, Di Penta M, Oliveto R, De Lucia A (2014a) Do they really smell bad? a study on developers\u2019 perception of bad code smells. In: 2014 IEEE international conference on software maintenance and evolution. IEEE, pp 101\u2013110","DOI":"10.1109\/ICSME.2014.32"},{"issue":"5","key":"10476_CR57","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1109\/TSE.2014.2372760","volume":"41","author":"F Palomba","year":"2014","unstructured":"Palomba F, Bavota G, Di Penta M, Oliveto R, Poshyvanyk D, De Lucia A (2014b) Mining version histories for detecting code smells. IEEE Trans Softw Eng 41(5):462\u2013489","journal-title":"IEEE Trans Softw Eng"},{"issue":"10","key":"10476_CR58","doi-asserted-by":"publisher","first-page":"977","DOI":"10.1109\/TSE.2017.2752171","volume":"44","author":"F Palomba","year":"2017","unstructured":"Palomba F, Panichella A, Zaidman A, Oliveto R, De Lucia A (2017) The scent of a smell: an extensive comparison between textual and structural smells. IEEE Trans Softw Eng 44(10):977\u20131000","journal-title":"IEEE Trans Softw Eng"},{"key":"10476_CR59","doi-asserted-by":"crossref","unstructured":"Pfeiffer RH, Wa\u0327sowski A (2012) Texmo: a multi-language development environment. In: Proceedings of the 8th European conference on modelling foundations and applications, ECMFA\u201912. Springer-Verlag, Berlin, Heidelberg, pp 178\u2013193","DOI":"10.1007\/978-3-642-31491-9_15"},{"key":"10476_CR60","doi-asserted-by":"publisher","unstructured":"Politowski C, Khomh F, Romano S, Scanniello G, Petrillo F, Gu\u00e9h\u00e9neuc YG, Maiga A (2020) A large scale empirical study of the impact of spaghetti code and blob anti-patterns on program comprehension. Inf Softw Technol 122. https:\/\/doi.org\/10.1016\/j.infsof.2020.106278. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0950584920300288","DOI":"10.1016\/j.infsof.2020.106278"},{"key":"10476_CR61","unstructured":"Porter MF (2001) Snowball: a language for stemming algorithms"},{"key":"10476_CR62","doi-asserted-by":"crossref","unstructured":"Radu A, Nadi S (2019) A dataset of non-functional bugs. In: 2019 IEEE\/ACM 16th International conference on mining software repositories (MSR). IEEE, pp 399\u2013403","DOI":"10.1109\/MSR.2019.00066"},{"key":"10476_CR63","doi-asserted-by":"crossref","unstructured":"Ray B, Posnett D, Filkov V, Devanbu P (2014) A large scale study of programming languages and code quality in github. In: Proceedings of the 22nd ACM SIGSOFT International symposium on foundations of software engineering. ACM, pp 155\u2013165","DOI":"10.1145\/2635868.2635922"},{"key":"10476_CR64","doi-asserted-by":"crossref","unstructured":"Romano D, Raila P, Pinzger M, Khomh F (2012) Analyzing the impact of antipatterns on change-proneness using fine-grained source code changes. In: Reverse engineering (WCRE), 2012 19th Working conference on. IEEE, pp 437\u2013446","DOI":"10.1109\/WCRE.2012.53"},{"issue":"3","key":"10476_CR65","doi-asserted-by":"publisher","first-page":"1192","DOI":"10.1007\/s10664-015-9379-3","volume":"21","author":"C Rosen","year":"2016","unstructured":"Rosen C, Shihab E (2016) What are mobile developers asking about? a large scale study using stack overflow. Empir Softw Eng 21(3):1192\u20131223","journal-title":"Empir Softw Eng"},{"key":"10476_CR66","doi-asserted-by":"crossref","unstructured":"Saboury A, Musavi P, Khomh F, Antoniol G (2017) An empirical study of code smells in javascript projects. In: 2017 IEEE 24th international conference on software analysis, evolution and reengineering (SANER). IEEE, pp 294\u2013305","DOI":"10.1109\/SANER.2017.7884630"},{"issue":"9","key":"10476_CR67","doi-asserted-by":"publisher","first-page":"902","DOI":"10.1016\/j.infsof.2010.05.001","volume":"52","author":"I Samoladas","year":"2010","unstructured":"Samoladas I, Angelis L, Stamelos I (2010) Survival analysis on the duration of open source projects. Inf Softw Technol 52(9):902\u2013922","journal-title":"Inf Softw Technol"},{"key":"10476_CR68","doi-asserted-by":"crossref","unstructured":"Selim GM, Barbour L, Shang W, Adams B, Hassan AE, Zou Y (2010) Studying the impact of clones on software defects. In: 2010 17th Working conference on reverse engineering. IEEE, pp 13\u201321","DOI":"10.1109\/WCRE.2010.11"},{"key":"10476_CR69","doi-asserted-by":"crossref","unstructured":"Soh Z, Yamashita A, Khomh F, Gu\u00e9h\u00e9neuc YG (2016) Do code smells impact the effort of different maintenance programming activities? In: 2016 IEEE 23rd International conference on software analysis, evolution, and reengineering (SANER), vol 1. IEEE, pp 393\u2013402","DOI":"10.1109\/SANER.2016.103"},{"key":"10476_CR70","doi-asserted-by":"crossref","unstructured":"Spadini D, Aniche M, Bacchelli A (2018) Pydriller: python framework for mining software repositories. In: Proceedings of the 2018 26th ACM joint meeting on European software engineering conference and symposium on the foundations of software engineering. ACM, pp 908\u2013911","DOI":"10.1145\/3236024.3264598"},{"issue":"4","key":"10476_CR71","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1016\/S0306-4573(01)00045-0","volume":"38","author":"CM Tan","year":"2002","unstructured":"Tan CM, Wang YF, Lee CD (2002) The use of bigrams to enhance text categorization. Inf Process Manage 38(4):529\u2013546","journal-title":"Inf Process Manage"},{"key":"10476_CR72","unstructured":"Tan G, Chakradhar S, Srivaths R, Wang RD (2006) Safe java native interface. In: In Proceedings of the 2006 IEEE international symposium on secure software engineering, pp 97\u2013106"},{"key":"10476_CR73","unstructured":"Tan G, Croft J (2008) An empirical security study of the native code in the jdk. In: Proceedings of the 17th conference on security symposium, SS\u201908. USENIX Association, Berkeley, CA, USA, pp 365\u2013377"},{"key":"10476_CR74","doi-asserted-by":"crossref","unstructured":"Thomas SW (2011) Mining software repositories using topic models. In: Proceedings of the 33rd international conference on software engineering, pp 1138\u20131139","DOI":"10.1145\/1985793.1986020"},{"key":"10476_CR75","unstructured":"Thongtanunam P, Hassan AE (2020) Review dynamics and their impact on software quality. IEEE Trans Softw Eng"},{"key":"10476_CR76","unstructured":"Till Q (2019) How to ship product with a quarterly product roadmap and sprintbased execution. In: website. https:\/\/www.getshipit.com\/blog\/how-to-ship-product-with-a-quarterly-product-roadmap\/"},{"key":"10476_CR77","doi-asserted-by":"crossref","unstructured":"Tomassetti F, Torchiano M (2014) An empirical assessment of polyglot-ism in github. In: Proceedings of the 18th international conference on evaluation and assessment in software engineering, EASE \u201914. ACM, New York, NY, USA, pp 17:1\u201317:4","DOI":"10.1145\/2601248.2601269"},{"key":"10476_CR78","doi-asserted-by":"crossref","unstructured":"Treude C, Wagner M (2019) Predicting good configurations for github and stack overflowtopic models. In: 2019 IEEE\/ACM 16th International conference on mining software repositories (MSR), pp 84\u201395","DOI":"10.1109\/MSR.2019.00022"},{"issue":"11","key":"10476_CR79","doi-asserted-by":"publisher","first-page":"1063","DOI":"10.1109\/TSE.2017.2653105","volume":"43","author":"M Tufano","year":"2017","unstructured":"Tufano M, Palomba F, Bavota G, Oliveto R, Di Penta M, De Lucia A, Poshyvanyk D (2017) When and why your code starts to smell bad (and whether the smells go away). IEEE Trans Softw Eng 43(11):1063\u20131088","journal-title":"IEEE Trans Softw Eng"},{"key":"10476_CR80","doi-asserted-by":"crossref","unstructured":"Yamashita A, Moonen L (2012) Do code smells reflect important maintainability aspects? In: Software maintenance (ICSM), 2012 28th IEEE International conference on. IEEE, pp 306\u2013315","DOI":"10.1109\/ICSM.2012.6405287"},{"key":"10476_CR81","doi-asserted-by":"crossref","unstructured":"Yamashita A, Moonen L (2013) Do developers care about code smells? an exploratory survey. In: 2013 20th Working conference on reverse engineering (WCRE). IEEE, pp 242\u2013251","DOI":"10.1109\/WCRE.2013.6671299"},{"key":"10476_CR82","unstructured":"Yin RK (2002) Applications of case study research 2nd edn. Applied Social Research Methods Series, vol 34. Sage Publications, Inc"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-024-10476-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-024-10476-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-024-10476-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T03:46:37Z","timestamp":1725594397000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-024-10476-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,3]]},"references-count":82,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["10476"],"URL":"https:\/\/doi.org\/10.1007\/s10664-024-10476-2","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"type":"print","value":"1382-3256"},{"type":"electronic","value":"1573-7616"}],"subject":[],"published":{"date-parts":[[2024,7,3]]},"assertion":[{"value":"11 March 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 July 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not Applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"106"}}