{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T08:19:49Z","timestamp":1758269989410,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/icsm.2015.7332506","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T22:44:11Z","timestamp":1448318651000},"page":"521-525","source":"Crossref","is-referenced-by-count":5,"title":["Towards purity-guided refactoring in Java"],"prefix":"10.1109","author":[{"given":"Jiachen","family":"Yang","sequence":"first","affiliation":[]},{"given":"Keisuke","family":"Hotta","sequence":"additional","affiliation":[]},{"given":"Yoshiki","family":"Higo","sequence":"additional","affiliation":[]},{"given":"Shinji","family":"Kusumoto","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Refactoring: Ruby Edition","year":"2009","author":"fields","key":"ref4"},{"article-title":"Agile software development: principles, patterns, and practices","year":"2003","author":"martin","key":"ref3"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455793"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14130-5_22"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1007\/978-3-540-30579-8_14","article-title":"Purity and side effect analysis for java programs","author":"s\u00e4lcianu","year":"2005","journal-title":"Verification Model Checking and Abstract Interpretation"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985803"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1852761.1852775"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1251535.1251548"},{"article-title":"Extreme programming explained: embrace change","year":"2000","author":"beck","key":"ref2"},{"key":"ref9","first-page":"357","article-title":"Joe-e: A security-oriented subset of java","volume":"10","author":"mettler","year":"2010","journal-title":"Internet Society Symposium on Network and Distributed System Security"},{"article-title":"Refactoring: improving the design of existing code","year":"1999","author":"fowler","key":"ref1"}],"event":{"name":"2015 IEEE International Conference on Software Maintenance and Evolution (ICSME)","start":{"date-parts":[[2015,9,29]]},"location":"Bremen, Germany","end":{"date-parts":[[2015,10,1]]}},"container-title":["2015 IEEE International Conference on Software Maintenance and Evolution (ICSME)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7321954\/7332440\/07332506.pdf?arnumber=7332506","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T00:14:05Z","timestamp":1498263245000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7332506\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/icsm.2015.7332506","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}