{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T10:13:46Z","timestamp":1763201626307},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,9]]},"DOI":"10.1109\/icsm.2010.5609739","type":"proceedings-article","created":{"date-parts":[[2010,11,5]],"date-time":"2010-11-05T22:01:44Z","timestamp":1288994504000},"source":"Crossref","is-referenced-by-count":50,"title":["Playing with refactoring: Identifying extract class opportunities through game theory"],"prefix":"10.1109","author":[{"given":"Gabriele","family":"Bavota","sequence":"first","affiliation":[]},{"given":"Rocco","family":"Oliveto","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"De Lucia","sequence":"additional","affiliation":[]},{"given":"Giuliano","family":"Antoniol","sequence":"additional","affiliation":[]},{"given":"Yann-Gael","family":"Gueheneuc","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2008.4658051"},{"key":"16","author":"baeza-yates","year":"1999","journal-title":"Modern Information Retrieval"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9088-2"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2005.89"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1137983.1137989"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859024"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01680-6_32"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1049\/ic:20040282"},{"key":"1","author":"dresher","year":"1961","journal-title":"The Mathematics of Games of Strategy Theory and Applications"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1137\/0112064"},{"key":"7","author":"deb","year":"2001","journal-title":"Multi-Objective Optimization Using Evolutionary Algorithms"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(01)00189-6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1143997.1144315"},{"key":"4","author":"fowler","year":"1999","journal-title":"Refactoring Improving the Design of Existing Code"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.2307\/1969529"},{"key":"8","doi-asserted-by":"crossref","DOI":"10.3998\/mpub.20269","author":"rapoport","year":"1965","journal-title":"Prisoner's Dilemma"}],"event":{"name":"2010 IEEE 26th International Conference on Software Maintenance (ICSM)","location":"Timi oara, Romania","start":{"date-parts":[[2010,9,12]]},"end":{"date-parts":[[2010,9,18]]}},"container-title":["2010 IEEE International Conference on Software Maintenance"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5604771\/5609528\/05609739.pdf?arnumber=5609739","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T03:08:04Z","timestamp":1559790484000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5609739\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icsm.2010.5609739","relation":{},"subject":[],"published":{"date-parts":[[2010,9]]}}}