{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T12:23:43Z","timestamp":1756383823482,"version":"3.37.3"},"reference-count":68,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2022,10,1]]},"DOI":"10.1109\/tse.2021.3105037","type":"journal-article","created":{"date-parts":[[2021,8,16]],"date-time":"2021-08-16T20:28:42Z","timestamp":1629145722000},"page":"3753-3770","source":"Crossref","is-referenced-by-count":10,"title":["X-SBR: On the Use of the History of Refactorings for Explainable Search-Based Refactoring and Intelligent Change Operators"],"prefix":"10.1109","volume":"48","author":[{"given":"Chaima","family":"Abid","sequence":"first","affiliation":[{"name":"Department of Computer and Information Science, University of Michigan, Dearborn, MI, USA"}]},{"given":"Dhia Elhaq","family":"Rzig","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Science, University of Michigan, Dearborn, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7010-8306","authenticated-orcid":false,"given":"Thiago do Nascimento","family":"Ferreira","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Science, University of Michigan, Dearborn, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0053-3443","authenticated-orcid":false,"given":"Marouane","family":"Kessentini","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Science, University of Michigan, Dearborn, MI, USA"}]},{"given":"Tushar","family":"Sharma","sequence":"additional","affiliation":[{"name":"Siemens Corporate Technology, Charlotte, NC, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/638750.638780"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1234772.1234790"},{"key":"ref3","volume-title":"Evolutionary Algorithms for Solving Multi-Objective Problems","volume":"5","author":"Coello","year":"2007"},{"volume-title":"Refactoring: Improving the Design of Existing Programs","year":"1999","author":"Fowler","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2012.40"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693086"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.11.009"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1186\/s40411-018-0046-4"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.06.003"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/32.979986"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1276958.1277176"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.03.040"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-016-9426-8"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405309"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2872711"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.12.005"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.71"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.11.007"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.compstruc.2007.11.006"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/212794"},{"key":"ref21","first-page":"487","article-title":"Fast algorithms for mining association rules","volume-title":"Proc. 20th Int. Conf. Very Large Data Bases","volume":"1215","author":"Agrawal"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9414-4"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2932631"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2008.4493342"},{"article-title":"Study appendix","year":"2020","author":"Authors","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/4235.996017"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180206"},{"volume-title":"Refactoring for Software Design Smells: Managing Technical Debt","year":"2014","author":"Suryanarayana","key":"ref28"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1143997.1144315"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2372251.2372260"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.1015"},{"key":"ref32","first-page":"1401","article-title":"Software quality management tool for engineering managers","volume-title":"Proc. Ind. Eng. Res. Conf.","author":"Virani"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606640"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICEEI.2011.6021753"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ITSIM.2010.5561639"},{"issue":"3","key":"ref36","doi-asserted-by":"crossref","first-page":"1705","DOI":"10.17762\/turcomat.v12i3.995","article-title":"Empirical studies on software refactoring techniques in the industrial setting","volume":"12","author":"Almogahed","year":"2021","journal-title":"Turkish J. Comput. Math. Educ."},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2597008.2597806"},{"key":"ref38","first-page":"100","article-title":"A survey of refactoring detection tools","volume-title":"Proc. Softw. Eng. (Workshops)","author":"Tan"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238217"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2576768.2598366"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2729974"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2654255"},{"article-title":"Refactoring object-oriented frameworks","year":"1992","author":"Opdyke","key":"ref43"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2000.870781"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2004.1330885"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1002\/nme.947"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/S1474-0346(02)00011-3"},{"key":"ref48","article-title":"The soot framework for Java program analysis: A retrospective","volume-title":"Proc. Cetus Users Compiler Infastructure Workshop","volume":"15","author":"Lam"},{"key":"ref49","first-page":"60","article-title":"Why dont people use refactoring tools?","volume-title":"Proc. 5th Workshop Refactoring Tools","author":"Murphy-Hill"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2011.22"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2008.03.013"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606592"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2000.870312"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/4235.797969"},{"article-title":"Multiobjective evolutionary algorithm research: A history and analysis","year":"1998","author":"Van Veldhuizen","key":"ref55"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1002\/9780470496916"},{"key":"ref57","first-page":"171","article-title":"Critical values and probability levels for the wilcoxon rank sum test and the wilcoxon signed rank test","volume":"1","author":"Wilcoxon","year":"1970","journal-title":"Sel. Tables Math. Statist."},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985795"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.edurev.2010.12.001"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2014.2378512"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2379776.2379787"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2012.2196800"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405292"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/3071178.3071334"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2017.2787152"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.92"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23716-4_6"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61473-1_9"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/9923560\/09514445.pdf?arnumber=9514445","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T23:01:43Z","timestamp":1705014103000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9514445\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,1]]},"references-count":68,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/tse.2021.3105037","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"type":"print","value":"0098-5589"},{"type":"electronic","value":"1939-3520"},{"type":"electronic","value":"2326-3881"}],"subject":[],"published":{"date-parts":[[2022,10,1]]}}}