{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T06:33:47Z","timestamp":1761978827040,"version":"build-2065373602"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,7]],"date-time":"2025-09-07T00:00:00Z","timestamp":1757203200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,7]],"date-time":"2025-09-07T00:00:00Z","timestamp":1757203200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,7]]},"DOI":"10.1109\/icsme64153.2025.00068","type":"proceedings-article","created":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T17:08:56Z","timestamp":1761930536000},"page":"679-684","source":"Crossref","is-referenced-by-count":0,"title":["AI Mentor System: Building a Technical Debt Dashboard for Low Code"],"prefix":"10.1109","author":[{"given":"Alexandre","family":"Lemos","sequence":"first","affiliation":[{"name":"OutSystems,Lisbon,Portugal"}]},{"given":"Joana","family":"Coutinho","sequence":"additional","affiliation":[{"name":"OutSystems,Lisbon,Portugal"}]}],"member":"263","reference":[{"volume-title":"Natural language to sql in low-code platforms","year":"2023","author":"Aparicio","key":"ref1"},{"volume-title":"OutSystems","year":"2025","key":"ref2"},{"volume-title":"New research from sonar on cost of technical debt","year":"2023","author":"Gupta","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICST60714.2024.00041"},{"article-title":"Mentor: Your ai partner for app generation","volume-title":"OutSystems","year":"2024","key":"ref5"},{"volume-title":"SonarQube in action","year":"2013","author":"Campbell","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.76"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME58846.2023.00072"},{"article-title":"Code analysis patterns","volume-title":"OutSystems","year":"2024","key":"ref9"},{"volume-title":"The generative software cycle is here: Meet mentor","year":"2024","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3473928"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME58846.2023.00061"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.18178\/wcse.2017.06.030"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TechDebt.2019.00016"},{"key":"ref15","first-page":"332","article-title":"What developers want and need from program analysis: an empirical study","volume-title":"Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering, ASE 2016, Singapore, September 3\u20137, 2016","author":"Christakis","year":"2016"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606613"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3623321"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME58846.2023.00038"},{"issue":"7","key":"ref19","doi-asserted-by":"crossref","first-page":"1165","DOI":"10.1016\/j.infsof.2013.01.008","article-title":"Software clone detection: A systematic review","volume":"55","author":"Rattan","year":"2013","journal-title":"Information and Software Technology"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884877"},{"volume-title":"Behind the intent of extract method refactoring: A systematic literature review","year":"2023","author":"AlOmar","key":"ref21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2018.00021"},{"volume-title":"Automated refactoring in software automation platforms","year":"2022","author":"Pina Fernandes","key":"ref23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME58846.2023.00064"},{"issue":"6","key":"ref25","first-page":"645","article-title":"\u201dcloning considered harmful","volume":"13","author":"Kapser","year":"2008","journal-title":"considered harmful: patterns of cloning in software,\u201d Empir. Softw. Eng."},{"volume-title":"Automated detection and correction of python code style violations","year":"2024","author":"Thakoersingh","key":"ref26"},{"volume-title":"Your tool for style guide enforcement.","author":"Cordasco","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME58944.2024.00058"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MODELS-C53483.2021.00065"}],"event":{"name":"2025 IEEE International Conference on Software Maintenance and Evolution (ICSME)","start":{"date-parts":[[2025,9,7]]},"location":"Auckland, New Zealand","end":{"date-parts":[[2025,9,12]]}},"container-title":["2025 IEEE International Conference on Software Maintenance and Evolution (ICSME)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11185055\/11185853\/11185858.pdf?arnumber=11185858","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T06:31:06Z","timestamp":1761978666000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11185858\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,7]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/icsme64153.2025.00068","relation":{},"subject":[],"published":{"date-parts":[[2025,9,7]]}}}