{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T14:10:03Z","timestamp":1748700603415,"version":"3.41.0"},"reference-count":45,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/icsm.2015.7332523","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T22:44:11Z","timestamp":1448318651000},"page":"602-605","source":"Crossref","is-referenced-by-count":1,"title":["Code smells in highly configurable software"],"prefix":"10.1109","author":[{"given":"Wolfram","family":"Fenske","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"185","article-title":"#ifdef considered harmful, or portability experience with C News","author":"spencer","year":"1992","journal-title":"Proc Usenix Conf"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2011.12"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MiSE.2013.6595301"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2162049.2162069"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2015.76"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2362536.2362569"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1868294.1868310"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.09.060"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SBES.2010.21"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2578128.2578237"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.97"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1158288"},{"journal-title":"Antipatterns Refactoring Software Architectures and Projects in Crisis","year":"1998","author":"brown","key":"ref11"},{"journal-title":"Generative Programming","year":"2000","author":"czarnecki","key":"ref12"},{"journal-title":"Software Product Lines Practices and Patterns","year":"2001","author":"clements","key":"ref13"},{"article-title":"Feature-Oriented Software Product Lines-Concepts and Implementation","year":"2013","author":"apel","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-4339-8_15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.23"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806819"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2701319.2701321"},{"journal-title":"Framing Software Reuse Lessons from the Real World","year":"1997","author":"bassett","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1960275.1960300"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.50"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICIS.2007.68"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78743-3_20"},{"journal-title":"Object-Oriented Metrics in Practice Using Software Metrics to Characterize Evaluate and Improve the Design of Object-Oriented Systems","year":"2006","author":"lanza","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2451436.2451446"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"949","DOI":"10.1145\/1297846.1297960","article-title":"Detection and correction of design defects in object-oriented designs","author":"moha","year":"2007","journal-title":"OOPSLA"},{"key":"ref8","first-page":"181","article-title":"An empirical study of the impact of two anti patterns, blob and spaghetti code, on program comprehension","author":"abbes","year":"2011","journal-title":"CSMR IEEE"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2009.28"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2002.1173068"},{"journal-title":"Refactoring Improving the Design of Existing Code","year":"1999","author":"fowler","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9171-y"},{"key":"ref20","first-page":"97","article-title":"The 3-tiered methodology","author":"krueger","year":"2007","journal-title":"IEEE SPL"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2003.1199197"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/smr.329"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1201\/9781420068429-c3"},{"journal-title":"Agile Principles Patterns and Practices in C#","year":"2006","author":"martin","key":"ref24"},{"key":"ref42","first-page":"4","article-title":"Laodfill: An open dataset of code smells with public evaluation","author":"palomba","year":"2015","journal-title":"MSR (Data Papers Track) IEEE"},{"journal-title":"Refactoring to Patterns","year":"2004","author":"kerievsky","key":"ref23"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1145\/2517208.2517215","article-title":"Does the discipline of preprocessor annotations matter? A controlled experiment","author":"schulze","year":"2013","journal-title":"GPCE"},{"key":"ref26","first-page":"811","article-title":"Detecting bad smells in Aspectl","volume":"12","author":"piveta","year":"2006","journal-title":"J Univ Comput Sci"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2372760"},{"key":"ref25","first-page":"212","article-title":"Towards a catalogue of refactorings and code smells for Aspectl","author":"monteiro","year":"2006","journal-title":"Transactions on Aspect-Oriented Software Development I"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642990"}],"event":{"name":"2015 IEEE International Conference on Software Maintenance and Evolution (ICSME)","start":{"date-parts":[[2015,9,29]]},"location":"Bremen, Germany","end":{"date-parts":[[2015,10,1]]}},"container-title":["2015 IEEE International Conference on Software Maintenance and Evolution (ICSME)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7321954\/7332440\/07332523.pdf?arnumber=7332523","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T13:52:34Z","timestamp":1748699554000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7332523\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/icsm.2015.7332523","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}