{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:48:03Z","timestamp":1767340083469,"version":"3.37.3"},"reference-count":68,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2022,5,1]]},"DOI":"10.1109\/tse.2020.3024814","type":"journal-article","created":{"date-parts":[[2020,9,18]],"date-time":"2020-09-18T20:26:56Z","timestamp":1600460816000},"page":"1560-1578","source":"Crossref","is-referenced-by-count":11,"title":["Enabling Decision and Objective Space Exploration for Interactive Multi-Objective Refactoring"],"prefix":"10.1109","volume":"48","author":[{"given":"Soumaya","family":"Rebai","sequence":"first","affiliation":[{"name":"Department of Computer and Information Science, University of Michigan-Dearborn, Dearborn, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5030-9036","authenticated-orcid":false,"given":"Vahid","family":"Alizadeh","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Science, University of Michigan-Dearborn, Dearborn, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0053-3443","authenticated-orcid":false,"given":"Marouane","family":"Kessentini","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Science, University of Michigan-Dearborn, Dearborn, MI, USA"}]},{"given":"Houcem","family":"Fehri","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Science, University of Michigan-Dearborn, Dearborn, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0392-2783","authenticated-orcid":false,"given":"Rick","family":"Kazman","sequence":"additional","affiliation":[{"name":"University of Hawaii, Honolulu, HI, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45672-4_31"},{"volume-title":"Refactoring to Patterns","year":"2005","author":"Kerievsky","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.146"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1810295.1810317"},{"key":"ref5","article-title":"The developer coefficient"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2004.33"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227191"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2048147.2048157"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882353"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2004.1357820"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.41"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/11785477_24"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.23"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884802"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2331057"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-011-0098-8"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642965"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2932631"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/11785477_24"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3071178.3071334"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2377656.2377658"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2872711"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238217"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950317"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2729974"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9414-4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2012.15"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.41"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1843"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642965"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227233"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/32.979986"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-016-9426-8"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1002\/smr.378"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2372251.2372260"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/4235.996017"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070539"},{"key":"ref38","article-title":"The proposed refactoring tool"},{"key":"ref39","first-page":"175","article-title":"Detecting model refactoring opportunities using heuristic search","volume-title":"Proc. Conf. Center Adv. Stud. Collaborative Res.","author":"Ghannem"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27777-4_42"},{"key":"ref41","article-title":"The seventh International Workshop on Managing Technical Debt"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008715808855"},{"key":"ref43","first-page":"60","article-title":"Why don\u2019t people use refactoring tools?","volume-title":"Proc. 5th Workshop Refactoring Tools","author":"Murphy-Hill"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884822"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368114"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/302405.302654"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/32.979986"},{"issue":"4","key":"ref48","first-page":"127","article-title":"An empirical assessment of refactoring impact on software quality using a hierarchical quality model","volume":"5","author":"Shatnawi","year":"2011","journal-title":"Int. J. Softw. Eng. Appl."},{"volume-title":"Refactoring Object-Oriented Frameworks","year":"1992","author":"Opdyke","key":"ref49"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1080\/03610927408827101"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2001.958974"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1137\/1026034"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2932631"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985989"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.2307\/1165329"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.11.009"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-015-9271-9"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-09940-8_3"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(01)00189-6"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/1143997.1144315"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/1276958.1277176"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2018.07.076"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.05.042"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2731853"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2016.06.027"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.06.034"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2803055"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2011.1"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/9775544\/09200705.pdf?arnumber=9200705","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T23:28:35Z","timestamp":1704842915000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9200705\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,1]]},"references-count":68,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tse.2020.3024814","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"type":"print","value":"0098-5589"},{"type":"electronic","value":"1939-3520"},{"type":"electronic","value":"2326-3881"}],"subject":[],"published":{"date-parts":[[2022,5,1]]}}}