{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T13:06:53Z","timestamp":1774530413349,"version":"3.50.1"},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/mtd.2015.7332620","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T22:48:46Z","timestamp":1448318926000},"page":"16-24","source":"Crossref","is-referenced-by-count":70,"title":["Towards a prioritization of code debt: A code smell Intensity Index"],"prefix":"10.1109","author":[{"given":"Francesca Arcelli","family":"Fontana","sequence":"first","affiliation":[]},{"given":"Vincenzo","family":"Ferme","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Zanoni","sequence":"additional","affiliation":[]},{"given":"Riccardo","family":"Roveda","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18612-2_1"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1985362.1985366"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-014-0175-x"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-09940-8_12"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2012.2204512"},{"key":"ref37","article-title":"Towards assessing software architecture quality by exploiting code smell relations","author":"arcelli fontana","year":"2015","journal-title":"IEEE Proceedings of SAM 2015 workshop co-located with ICSE 2015"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062602"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/WETSoM.2015.14"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s11334-011-0154-3"},{"key":"ref10","author":"lanza","year":"2006","journal-title":"Object-Oriented Metrics in Practice"},{"key":"ref11","article-title":"JCodeOdor: A software quality advisor through design flaws detection","author":"ferme","year":"2013"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2010.46"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SCET.2012.6342082"},{"key":"ref14","year":"2012","journal-title":"CheckStyle"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.50"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IWSC.2012.6227872"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2002.1173068"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2008.4493342"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"396","DOI":"10.1109\/ICSM.2013.56","article-title":"Code smell detection: towards a machine learning-based approach","author":"arcelli fontana","year":"2013","journal-title":"Proc 29th IEEE Intern Conf on Software Maintenance (ICSM 2013) ERA Track"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JCSSE.2011.5930143"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2012.17"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2012.56"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2014.12.027"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.17771\/PUCRio.acad.23946","article-title":"On the detection of architecturally-relevant code anomalies in software systems","author":"mac\u00eda bertr\u00e1n","year":"2013"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2013.01.008"},{"key":"ref5","author":"fowler","year":"1999","journal-title":"Refactoring Improving the Design of Existing Code"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9171-y"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2011.24"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/32.295895"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.256"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/2579281.2579311","article-title":"Technical debt at the crossroads of research and practice: report on the fifth international workshop on managing technical debt","volume":"39","author":"falessi","year":"2014","journal-title":"ACM SIGSOFT Software Engineering Notes"},{"key":"ref20","year":"2012","journal-title":"PMD"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693086"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1879211.1879216"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/METRICS.2005.38"},{"key":"ref23","article-title":"Detecting bad smells in object oriented design using design change propagation probability matrix","author":"rao","year":"2008","journal-title":"Proc Int MultiConference of Engineers and Computer Scientists (IMECS 2008)"},{"key":"ref26","author":"lee","year":"2012","journal-title":"A semantic-based approach for detecting and decomposing god classes"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2007.4362679"}],"event":{"name":"2015 IEEE 7th International Workshop on Managing Technical Debt (MTD)","location":"Bremen, Germany","start":{"date-parts":[[2015,10,2]]},"end":{"date-parts":[[2015,10,2]]}},"container-title":["2015 IEEE 7th International Workshop on Managing Technical Debt (MTD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7321917\/7332613\/07332620.pdf?arnumber=7332620","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T14:52:26Z","timestamp":1602687146000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7332620"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/mtd.2015.7332620","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}