{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T10:09:04Z","timestamp":1755598144925},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/scam.2015.7335411","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T17:49:26Z","timestamp":1448300966000},"page":"151-160","source":"Crossref","is-referenced-by-count":4,"title":["How do Java methods grow?"],"prefix":"10.1109","author":[{"given":"Daniela","family":"Steidl","sequence":"first","affiliation":[]},{"given":"Florian","family":"Deissenboeck","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2000.883030"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591176"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597111"},{"key":"ref13","article-title":"Growth, Evolution, and Structural Change in Open Source Software","author":"godfrey","year":"2001","journal-title":"Proc Int l Workshop Principles on Software Evolution"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/512035.512062"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2312942"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70731"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IWPSE.2003.1231219"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2012.79"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.59"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-011-9144-9"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2013.6613836"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134349"},{"journal-title":"The Tipping Point How Little Things Can Make a Big Difference Back Bay Books","year":"2002","author":"gladwell","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/QUATIC.2007.8"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/WETSoM.2012.6226993"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2015.7081865"},{"journal-title":"Clean code a handbook of agile software craftsmanship","year":"2008","author":"martin","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/smr.325"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/32.895984"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11334-013-0205-z"},{"key":"ref22","article-title":"Automated Detection of Refactorings in Evolving Components","author":"danny","year":"2006","journal-title":"European Conference on Object-Oriented Programming"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591068"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-010-9143-7"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2597008.2597805"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.95"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ISESE.2004.1334889"}],"event":{"name":"2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM)","start":{"date-parts":[[2015,9,27]]},"location":"Bremen, Germany","end":{"date-parts":[[2015,9,28]]}},"container-title":["2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7321933\/7335391\/07335411.pdf?arnumber=7335411","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T18:17:51Z","timestamp":1490379471000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7335411\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/scam.2015.7335411","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}