{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,29]],"date-time":"2024-01-29T02:50:18Z","timestamp":1706496618694},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2016,6,3]],"date-time":"2016-06-03T00:00:00Z","timestamp":1464912000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1007\/s11704-016-5131-4","type":"journal-article","created":{"date-parts":[[2016,6,3]],"date-time":"2016-06-03T14:17:37Z","timestamp":1464963457000},"page":"644-656","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Major motivations for extract method refactorings: analysis based on interviews and change histories"],"prefix":"10.1007","volume":"10","author":[{"given":"Wenmei","family":"Liu","sequence":"first","affiliation":[]},{"given":"Hui","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,3]]},"reference":[{"key":"5131_CR1","volume-title":"Dissertation for the Doctoral Degree","author":"WF Opdyke","year":"1992","unstructured":"Opdyke WF. Refactoring object-oriented frameworks. Dissertation for the Doctoral Degree. Champaign: University of Illinois at Urbana-Champaign, 1992"},{"issue":"2","key":"5131_CR2","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1109\/TSE.2004.1265817","volume":"30","author":"T Mens","year":"2004","unstructured":"Mens T, Tourw\u00e9 T. A survey of software refactoring. IEEE Transactions on Software Engineering, 2004, 30(2): 126\u2013139","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"1","key":"5131_CR3","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/TSE.2011.41","volume":"38","author":"E Murphy-Hill","year":"2012","unstructured":"Murphy-Hill E, Parnin C, Black A P. How we refactor, and how we know it. IEEE Trransactions on Softeare Engineering, 2012, 38(1): 5\u201318","journal-title":"IEEE Trransactions on Softeare Engineering"},{"key":"5131_CR4","first-page":"458","volume-title":"Proceedings of IEEE International Conference on Software Maintenance","author":"Z Xing","year":"2006","unstructured":"Xing Z, Stroulia E. Refactoring practice: How it is and how it should be supported \u2014 an eclipse case study. In: Proceedings of IEEE International Conference on Software Maintenance. 2006, 458\u2013468"},{"issue":"3","key":"5131_CR5","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/379377.375233","volume":"26","author":"K Maruyama","year":"2001","unstructured":"Maruyama K. Automated method-extraction refactoring by using block-based slicing. ACM SIGSOFT Software Engineering Notes, 2001, 26(3): 31\u201340","journal-title":"ACM SIGSOFT Software Engineering Notes"},{"key":"5131_CR6","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/2328876.2328883","volume-title":"Proceedings of the 5thWorkshop on Refactoring Tools","author":"T Sharma","year":"2012","unstructured":"Sharma T. Identifying extract-method refactoring candidates automatically. In: Proceedings of the 5thWorkshop on Refactoring Tools. 2012, 50\u201353"},{"key":"5131_CR7","doi-asserted-by":"crossref","first-page":"1757","DOI":"10.1016\/j.jss.2011.05.016","volume":"84","author":"N Tsantalis","year":"2011","unstructured":"Tsantalis N, Chatzigeorgiou A. Identification of extract method refactoring opportunities for the decomposition of methods. Journal of Systems and Software, 2011, 84: 1757\u20131782","journal-title":"Journal of Systems and Software"},{"key":"5131_CR8","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1145\/2597008.2597141","volume-title":"Proceedings of the 22nd International Conference on Program Comprehension","author":"D Silva","year":"2014","unstructured":"Silva D, Terra R, Valente M T. Recommending automated extract method refactorings. In: Proceedings of the 22nd International Conference on Program Comprehension. 2014, 146\u2013156"},{"key":"5131_CR9","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1109\/ICSME.2014.32","volume-title":"Proceedings of the 2014 IEEE International Conference on Software Maintenance and Evolution","author":"F Palomba","year":"2014","unstructured":"Palomba F, Bavota G, Di Penta M, Oliveto R, De Lucia A. Do they really smell bad? a study on developers\u2019 perception of bad code smells. In: Proceedings of the 2014 IEEE International Conference on Software Maintenance and Evolution. 2014, 101\u2013110"},{"key":"5131_CR10","first-page":"287","volume-title":"Proceedings of the 31st International Conference on Software Engineering","author":"E Murphy-Hill","year":"2009","unstructured":"Murphy-Hill E, Parnin C, Black A P. How we refactor, and how we know it. In: Proceedings of the 31st International Conference on Software Engineering. 2009, 287\u2013297"},{"issue":"8","key":"5131_CR11","doi-asserted-by":"crossref","first-page":"1112","DOI":"10.1109\/TSE.2013.4","volume":"39","author":"H Liu","year":"2013","unstructured":"Liu H, Guo X, Shao W Z. Monitor-based instant software refactoring. IEEE Transactions on Software Engineering, 2013, 39(8): 1112\u20131126","journal-title":"IEEE Transactions on Software Engineering"},{"key":"5131_CR12","first-page":"133","volume-title":"Proceedings of the 22nd IEEE International Requirements Engineering Conference","author":"N Niu","year":"2014","unstructured":"Niu N, Bhowmik T, Liu H, Niu Z. Traceability-enabled refactoring for managing just-in-time requirements. In: Proceedings of the 22nd IEEE International Requirements Engineering Conference. 2014, 133\u2013142"},{"key":"5131_CR13","first-page":"132","volume-title":"Proceedings of the 2013 Conference of the Center for Advanced Studies on Collaborative Research","author":"N Tsantalis","year":"2013","unstructured":"Tsantalis N, Guana V, Stroulia E, Hindle A. A multidimensional empirical study on refactoring activity. In: Proceedings of the 2013 Conference of the Center for Advanced Studies on Collaborative Research. 2013, 132\u2013146"},{"key":"5131_CR14","volume-title":"Extreme Programming and Agile Methods \u2014XP\/Agile Universe 2002","author":"M Fowler","year":"2002","unstructured":"Fowler M. Refactoring: improving the design of existing code. In: Wells D, Williams L, eds. Extreme Programming and Agile Methods \u2014XP\/Agile Universe 2002. 2002"},{"issue":"4","key":"5131_CR15","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/MS.2006.105","volume":"23","author":"G C Murphy","year":"2006","unstructured":"Murphy G C, Kersten M, Findlater L. How are Java software developers using the eclipse IDE? IEEE Software, 2006, 23(4): 76\u201383","journal-title":"IEEE Software"},{"key":"5131_CR16","first-page":"1","volume-title":"Proceedings of the 20th ACM SIGSOFT International Symposium on the Foundations of Software Engineering","author":"M Kim","year":"2012","unstructured":"Kim M, Zimmermann T, Nagappan N. A field study of refactoring challenges and benefits. In: Proceedings of the 20th ACM SIGSOFT International Symposium on the Foundations of Software Engineering. 2012, 1\u201311"},{"key":"5131_CR17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jss.2015.05.024","volume":"107","author":"G Bavota","year":"2015","unstructured":"Bavota G, Lucia A D, Penta M D, Oliveto R, Palomba F. An experimental investigation on the innate relationship between quality and refactoring. Journal of Systems and Software, 2015, 107: 1\u201314","journal-title":"Journal of Systems and Software"},{"issue":"5","key":"5131_CR18","doi-asserted-by":"crossref","first-page":"462","DOI":"10.1109\/TSE.2014.2372760","volume":"41","author":"F Palomba","year":"2015","unstructured":"Palomba F, Bavota G, Penta M D, Oliveto R, Poshyvanyk D, Lucia A D. Mining version histories for detecting code smells. IEEE Transactions on Software Engineering, 2015, 41(5): 462\u2013489","journal-title":"IEEE Transactions on Software Engineering"},{"key":"5131_CR19","first-page":"769","volume-title":"Proceedings of the 37th IEEE\/ACM International Conference on Software Engineering","author":"F Palomba","year":"2015","unstructured":"Palomba F. Textual analysis for code smell detection. In: Proceedings of the 37th IEEE\/ACM International Conference on Software Engineering. 2015, 769\u2013771"},{"issue":"7","key":"5131_CR20","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1109\/TSE.2013.60","volume":"40","author":"G Bavota","year":"2014","unstructured":"Bavota G, Oliveto R, Gethers M, Poshyvanyk D, De Lucia A. Methodbook: recommending move method refactorings via relational topic models. IEEE Transactions on Software Engineering, 2014, 40(7): 671\u2013694","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"1","key":"5131_CR21","volume":"23","year":"2014","unstructured":"Bavota G, Gethers M, Oliveto R, Poshyvanyk D, de Lucia A. Improving software modularization via automated analysis of latent topics and dependencies. ACM Transactions on Software Engineering & Methodology, 2014, 23(1)","journal-title":"ACM Transactions on Software Engineering & Methodology"},{"issue":"6","key":"5131_CR22","doi-asserted-by":"crossref","first-page":"1617","DOI":"10.1007\/s10664-013-9256-x","volume":"19","author":"G Bavota","year":"2014","unstructured":"Bavota G, De Lucia A, Marcus A, Oliveto R. Automating extract class refactoring: an improved method and its evaluation. Empirical Software Engineering, 2014, 19(6): 1617\u20131664","journal-title":"Empirical Software Engineering"},{"key":"5131_CR23","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1145\/353171.353183","volume-title":"Proceedings of the 15th ACM SIGPLAN Conference on Object-oriented Programming, Systems, Languages, and Applications","author":"S Demeyer","year":"2000","unstructured":"Demeyer S, Ducasse S, Nierstrasz O. Finding refactorings via change metrics. In: Proceedings of the 15th ACM SIGPLAN Conference on Object-oriented Programming, Systems, Languages, and Applications. 2000, 166\u2013177"},{"key":"5131_CR24","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1145\/1101908.1101919","volume-title":"Proceedings of the 20th IEEE\/ACMInternational Conference on Automated Software Engineering","author":"Z Xing","year":"2005","unstructured":"Xing Z, Stroulia E. UMIDiff: an algorithm for object-oriented design differencing. In: Proceedings of the 20th IEEE\/ACMInternational Conference on Automated Software Engineering. 2005, 54\u201365"},{"key":"5131_CR25","first-page":"263","volume-title":"Proceedings of the 13th Working Conference on Reverse Engineering","author":"Z Xing","year":"2006","unstructured":"Xing Z, Stroulia E. Refactoring detection based on UMLDiff changefacts queries. In: Proceedings of the 13th Working Conference on Reverse Engineering. 2006, 263\u2013274"},{"key":"5131_CR26","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1109\/ASE.2006.41","volume-title":"Proceedings of the 21st IEEE\/ACM International Conference on Automated Software Engineering","author":"P Weissgerber","year":"2006","unstructured":"Weissgerber P, Diehl S. Identifying refactorings from source-code changes. In: Proceedings of the 21st IEEE\/ACM International Conference on Automated Software Engineering. 2006, 231\u2013240"},{"key":"5131_CR27","first-page":"404","volume-title":"Proceedings of the 20th European Conference on Object-Oriented Programming","author":"D Dig","year":"2006","unstructured":"Dig D, Comertoglu C, Marinov D, Johnson R. Automated detection of refactorings in evolving components. In: Proceedings of the 20th European Conference on Object-Oriented Programming. 2006, 404\u2013428"},{"key":"5131_CR28","first-page":"21","volume-title":"Proceedings of the Compression and Complexity of Sequences","author":"A Z Broder","year":"1997","unstructured":"Broder A Z. On the resemblance and containment of documents. In: Proceedings of the Compression and Complexity of Sequences. 1997, 21\u201329"},{"key":"5131_CR29","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/ICSM.2010.5609577","volume-title":"Proceedings of the 2010 IEEE International Conference on Software Maintenance","author":"K Prete","year":"2010","unstructured":"Prete K, Rachatasumrit N, Sudan N, Kim M. Template-based reconstruction of complex refactorings. In: Proceedings of the 2010 IEEE International Conference on Software Maintenance. 2010, 1\u201310"},{"issue":"2","key":"5131_CR30","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1109\/TSE.2005.28","volume":"31","author":"M Godfrey","year":"2005","unstructured":"Godfrey M, Zou L. Using origin analysis to detect merging and splitting of source code entities. IEEE Transactions on Software Engineering, 2005, 31(2): 166\u2013181","journal-title":"IEEE Transactions on Software Engineering"},{"key":"5131_CR31","first-page":"143","volume-title":"Proceedings of the 12th Working Conference on Reverse Engineering","author":"S Kim","year":"2005","unstructured":"Kim S, Pan K, Whitehead E. When functions change their names: automatic detection of origin relationships. In: Proceedings of the 12th Working Conference on Reverse Engineering. 2005, 143\u2013152"},{"key":"5131_CR32","first-page":"73","volume-title":"Proceedings of the 15th IEEE International Conference on Automated Software Engineering","author":"G Malpohl","year":"2000","unstructured":"Malpohl G, Hunt J, Tichy W. Renaming detection. In: Proceedings of the 15th IEEE International Conference on Automated Software Engineering. 2000, 73\u201380"},{"issue":"11","key":"5131_CR33","doi-asserted-by":"crossref","first-page":"725","DOI":"10.1109\/TSE.2007.70731","volume":"33","author":"B Fluri","year":"2007","unstructured":"Fluri B, Wursch M, Pinzger M, Gall H. Change distilling: tree differencing for fine-grained source code change extraction. IEEE Transactions on Software Engineering, 2007, 33(11): 725\u2013743","journal-title":"IEEE Transactions on Software Engineering"},{"key":"5131_CR34","first-page":"333","volume-title":"Proceedings of the 29th International Conference on Software Engineering","author":"M Kim","year":"2007","unstructured":"Kim M, Notkin D, Grossman D. Automatic inference of structural changes for matching across program versions. In: Proceedings of the 29th International Conference on Software Engineering. 2007, 333\u2013343"},{"key":"5131_CR35","volume-title":"Duplication, Redundancy, and Similarity in Software","author":"R Koschke","year":"2007","unstructured":"Koschke R. Survey of research on software clones. In: Koschke R, Merlo E, Walenstein A, eds. Duplication, Redundancy, and Similarity in Software. 2007"},{"key":"5131_CR36","first-page":"455","volume-title":"Proceedings of the 9th Joint Meeting on Foundations of Software Engineering","author":"T Wang","year":"2013","unstructured":"Wang T, Harman M, Jia Y, Krinke J. Searching for better configurations: a rigorous approach to clone evaluation. In: Proceedings of the 9th Joint Meeting on Foundations of Software Engineering. 2013, 455\u2013465"},{"key":"5131_CR37","doi-asserted-by":"crossref","first-page":"470","DOI":"10.1016\/j.scico.2009.02.007","volume":"74","author":"C K Roy","year":"2009","unstructured":"Roy C K, Cordy J R, Koschke R. Comparison and evaluation of code clone detection techniques and tools: a qualitative approach. Science of Computer Programming, 2009, 74: 470\u2013495","journal-title":"Science of Computer Programming"},{"key":"5131_CR38","volume-title":"Proceedings of the 3rd International Workshop on Software Clones","author":"Y Jia","year":"2009","unstructured":"Jia Y, Binkley D, Harman M, Krinke J, Matsushita M. KClone: a proposed approach to fast precise code clone detection. In: Proceedings of the 3rd International Workshop on Software Clones. 2009"},{"key":"5131_CR39","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1109\/WCRE.2000.891457","volume-title":"Proceedings of the 7th Working Conference on Reverse Engineering","author":"M Balazinska","year":"2000","unstructured":"Balazinska M, Merlo E, Dagenais M, Lague B, Kontogiannis K. Advanced clone-analysis to support object-oriented system refactoring. In: Proceedings of the 7th Working Conference on Reverse Engineering. 2000, 98\u2013107"},{"key":"5131_CR40","first-page":"368","volume-title":"Proceedings of the International Conference on Software Maintenance","author":"ID Baxter","year":"1998","unstructured":"Baxter ID, Yahin A, Moura L, Anna SM, Bier L. Clone detection using abstract syntax trees. In: Proceedings of the International Conference on Software Maintenance. 1998, 368\u2013377"},{"key":"5131_CR41","first-page":"595","volume-title":"Proceedings of the 31st IEEE International Conference on Software Engineering","author":"G Canfora","year":"2009","unstructured":"Canfora G, Cerulo L, Di Penta M. Ldiff: An enhanced line differencing tool. In: Proceedings of the 31st IEEE International Conference on Software Engineering. 2009, 595\u2013598"},{"key":"5131_CR42","first-page":"484","volume-title":"Proceedings of the 29th IEEE International Conference on Software Maintenance","author":"M Asaduzzaman","year":"2013","unstructured":"Asaduzzaman M, Roy C, Schneider K, Di Penta M. Lhdiff: Tracking source code lines to support software maintenance activities. In: Proceedings of the 29th IEEE International Conference on Software Maintenance. 2013, 484\u2013487"},{"key":"5131_CR43","volume-title":"Technical Report","author":"Y Liu","year":"2014","unstructured":"Liu Y, Liu H. Automated detection of extract method refactorings. Technical Report. 2014"},{"key":"5131_CR44","first-page":"1","volume-title":"Proceedings of the 2nd Workshop on Refactoring Tools","author":"E Murphy-Hill","year":"2008","unstructured":"Murphy-Hill E, Black A P, Dig D, Parnin C. Gathering refactoring data: a comparison of four methods. In: Proceedings of the 2nd Workshop on Refactoring Tools. 2008, 1\u20135"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-016-5131-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11704-016-5131-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-016-5131-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T01:39:37Z","timestamp":1656639577000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11704-016-5131-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,3]]},"references-count":44,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,8]]}},"alternative-id":["5131"],"URL":"https:\/\/doi.org\/10.1007\/s11704-016-5131-4","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,6,3]]}}}