{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:09:54Z","timestamp":1773655794548,"version":"3.50.1"},"reference-count":54,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1109\/saner48275.2020.9054864","type":"proceedings-article","created":{"date-parts":[[2020,4,3]],"date-time":"2020-04-03T07:47:32Z","timestamp":1585900052000},"page":"367-377","source":"Crossref","is-referenced-by-count":14,"title":["Refactoring Graphs: Assessing Refactoring over Time"],"prefix":"10.1109","author":[{"given":"Aline","family":"Brito","sequence":"first","affiliation":[]},{"given":"Andre","family":"Hora","sequence":"additional","affiliation":[]},{"given":"Marco Tulio","family":"Valente","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"594","article-title":"On the impact of ref actoring operations on code naturalness","author":"lin","year":"0","journal-title":"International Conference on Software Analysis Evolution and Reengineering (SANER)"},{"key":"ref38","first-page":"151","article-title":"Are refactorings to blame? an empirical study of refactorings in merge conflicts","author":"mahmoudi","year":"0","journal-title":"International Conference on Software Analysis Evolution and Reengineering (SANER)"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1137983.1138001"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2006.23"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2013.08.002"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2010.15"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2009.5306290"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884848"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597108"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025157"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-016-9445-5"},{"key":"ref27","doi-asserted-by":"crossref","DOI":"10.1145\/2382756.2382785","article-title":"Interactive churn metrics: socio-technical variants of code churn","volume":"37","author":"meneely","year":"2012","journal-title":"Software Engineering Notes"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2009.5069492"},{"key":"ref2","first-page":"552","article-title":"A comparative study of manual and automated refactorings","author":"negara","year":"0","journal-title":"European Conference on Object-Oriented Programming (ECOOP)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070529"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2017.8103453"},{"key":"ref22","first-page":"13","article-title":"An apriori-based algorithm for mining frequent substructures from graph data","author":"inokuchi","year":"2000","journal-title":"Proc Principles and Practice of Knowledge Discovery in Databases (PKDD)"},{"key":"ref21","first-page":"721","article-title":"gSpan: graph-based substructure pattern mining","author":"yan","year":"0","journal-title":"International Conference on Data Mining (ICDM)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180212"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2001.989534"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985860"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2016.7503718"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion.2019.00083"},{"key":"ref51","first-page":"13","article-title":"On the customization of batch refactoring","author":"tenorio","year":"0","journal-title":"3rd International Workshop on Refactoring (IWoR)"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351760"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.19"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/IWoR.2019.00009"},{"key":"ref10","author":"fowler","year":"1999","journal-title":"Refactoring Improving the Design of Existing Code"},{"key":"ref11","first-page":"334","article-title":"Understanding the factors that impact the popularity of GitHub repositories","author":"borges","year":"0","journal-title":"International Conference on Software Maintenance and Evolution (ICSME)"},{"key":"ref40","first-page":"1145","article-title":"Improving refactoring speed by 10x","author":"kim","year":"0","journal-title":"The 38th International Conference on Software Engineering (ICSE)"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1016\/j.jss.2018.09.016","article-title":"What's in a GitHub star? Understanding repository starring practices in a social coding platform","volume":"146","author":"silva","year":"2018","journal-title":"Journal of Systems and Software"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.14"},{"key":"ref14","first-page":"404","article-title":"Automated detection of refactorings in evolving components","author":"dig","year":"0","journal-title":"Proceedings of European Conference on Object-Oriented Programming (ECOOP)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882353"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180206"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606617"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2013.6671331"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2593702.2593706"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3133909"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950305"},{"key":"ref6","first-page":"50:1","article-title":"A field study of refac-toring challenges and benefits","author":"kim","year":"0","journal-title":"International Symposium on the Foundations of Software Engineering (FSE)"},{"key":"ref5","first-page":"132","article-title":"A multidimensional empirical study on refactoring activity","author":"tsantalis","year":"0","journal-title":"23th Conference of the Center for Advanced Studies on Collaborative Research (CASCON)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2019.8870183"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2318734"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.73"},{"key":"ref9","author":"cedrim","year":"2018","journal-title":"Understanding and improving batch refactoring in software systems"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.11.073"},{"key":"ref45","first-page":"170:1","article-title":"Intel-liMerge: A refactoring-aware software merging technique","volume":"3","author":"shen","year":"2019","journal-title":"Programming Languages"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950317"},{"key":"ref47","first-page":"751","article-title":"RefDistiller: A refactoring aware code review tool for inspecting manual refactoring edits","author":"alves","year":"0","journal-title":"International Symposium on the Foundations of Software Engineering (FSE)"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.05.024"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.17"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1002\/smr.328"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2012.20"}],"event":{"name":"2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER)","location":"London, ON, Canada","start":{"date-parts":[[2020,2,18]]},"end":{"date-parts":[[2020,2,21]]}},"container-title":["2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9040394\/9054788\/09054864.pdf?arnumber=9054864","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:52:51Z","timestamp":1656453171000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9054864\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2]]},"references-count":54,"URL":"https:\/\/doi.org\/10.1109\/saner48275.2020.9054864","relation":{},"subject":[],"published":{"date-parts":[[2020,2]]}}}