{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T22:32:09Z","timestamp":1761863529575,"version":"3.37.3"},"reference-count":56,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2016,6,1]],"date-time":"2016-06-01T00:00:00Z","timestamp":1464739200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61272169","61472034"],"award-info":[{"award-number":["61272169","61472034"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004602","name":"Program for New Century Excellent Talents in University","doi-asserted-by":"publisher","award":["NCET-13-0041"],"award-info":[{"award-number":["NCET-13-0041"]}],"id":[{"id":"10.13039\/501100004602","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010026","name":"Beijing Higher Education Young Elite Teacher Project","doi-asserted-by":"crossref","award":["YETP1183"],"award-info":[{"award-number":["YETP1183"]}],"id":[{"id":"10.13039\/501100010026","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61370137"],"award-info":[{"award-number":["61370137"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Strategic Basic Research Program (\u201c973\u201d Program)"},{"name":"Ministry of Science and Technology of China","award":["2012CB720702"],"award-info":[{"award-number":["2012CB720702"]}]},{"name":"The 111 Project of Beijing Institute of Technology"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2016,6,1]]},"DOI":"10.1109\/tse.2015.2503740","type":"journal-article","created":{"date-parts":[[2015,11,25]],"date-time":"2015-11-25T14:07:00Z","timestamp":1448460420000},"page":"544-558","source":"Crossref","is-referenced-by-count":34,"title":["Dynamic and Automatic Feedback-Based Threshold Adaptation for Code Smell Detection"],"prefix":"10.1109","volume":"42","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6223-2542","authenticated-orcid":false,"given":"Hui","family":"Liu","sequence":"first","affiliation":[]},{"given":"Qiurong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhendong","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806848"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.4"},{"key":"ref33","first-page":"109","article-title":"Relative thresholds: Case study to incorporate metrics in the detection of bad smells","author":"crespo","year":"0","journal-title":"ECOOP Workshop on Quantative Approaches in Object-Oriented Software Engineering"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TOOLS.2001.941671"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351723"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2012.56"},{"key":"ref37","first-page":"455","author":"wang","year":"0","journal-title":"Proc 9th Joint Meeting Found Softw Eng"},{"key":"ref36","first-page":"993","author":"blei","year":"2003","journal-title":"J Mach Learn Res"},{"key":"ref35","first-page":"522","author":"panichella","year":"0","journal-title":"Proc Int Conf Softw Eng"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2005.53"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2006.22"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.50"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1314493.1314496"},{"article-title":"Refactoring object-oriented frameworks","year":"1992","author":"opdyke","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.1265817"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1995.514697"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70725"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1999.792593"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609665"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2009.02.007"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2003.1192416"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2009.20"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1999.792645"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(93)90077-B"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2009.161"},{"key":"ref55","first-page":"1993","author":"geisser","year":"0","journal-title":"Predictive Inference"},{"year":"0","key":"ref54"},{"year":"0","key":"ref53"},{"year":"2007","author":"lincke","key":"ref52"},{"journal-title":"Object-Oriented Metrics in Practice","year":"2006","author":"lanza","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/METRICS.2005.38"},{"journal-title":"A Field Guide to Genetic Programming","year":"2008","author":"poli","key":"ref40"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70745"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.1"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.09.017"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.11.918"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609739"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.05.016"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227183"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2004.1357820"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/WETSoM.2013.6619338"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.05.044"},{"key":"ref5","first-page":"167","article-title":"Are automatically-detected code anomalies relevant to architectural modularity? an exploratory analysis of evolving systems","author":"macia","year":"0","journal-title":"ACM Proc of the 11th Annual Intl Conf on Aspect-oriented Software Development"},{"key":"ref8","first-page":"1999","author":"fowler","year":"0","journal-title":"Refactoring Improving the Design of Existing Code"},{"key":"ref7","article-title":"KClone: A proposed approach to fast precise code clone detection","author":"jia","year":"0","journal-title":"3rd International Workshop on Software Clones"},{"key":"ref49","first-page":"1991","author":"fenton","year":"0","journal-title":"Software Metrics A Rigorous Approach"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/smr.521"},{"year":"2007","author":"koschke","key":"ref46"},{"year":"0","key":"ref45"},{"article-title":"Evaluation and improvement of software architecture: Identification of design problems in object-oriented systems and resolution through refactorings","year":"2010","author":"tsantalis","key":"ref48"},{"year":"0","key":"ref47"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1314493.1314495"},{"article-title":"Genetic algorithm toolbox user's guide","year":"0","author":"chipperfield","key":"ref41"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/METRIC.1993.263799"},{"key":"ref43","first-page":"439","author":"weiser","year":"0","journal-title":"5th Int Conf on Software Engineering"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/7488923\/07337457.pdf?arnumber=7337457","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:45:23Z","timestamp":1641987923000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7337457\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,1]]},"references-count":56,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tse.2015.2503740","relation":{},"ISSN":["0098-5589","1939-3520"],"issn-type":[{"type":"print","value":"0098-5589"},{"type":"electronic","value":"1939-3520"}],"subject":[],"published":{"date-parts":[[2016,6,1]]}}}