{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T18:46:07Z","timestamp":1776105967288,"version":"3.50.1"},"reference-count":95,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2023,7]]},"DOI":"10.1109\/tse.2023.3267848","type":"journal-article","created":{"date-parts":[[2023,4,25]],"date-time":"2023-04-25T18:33:04Z","timestamp":1682447584000},"page":"3692-3714","source":"Crossref","is-referenced-by-count":18,"title":["JavaScript Dead Code Identification, Elimination, and Empirical Assessment"],"prefix":"10.1109","volume":"49","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5773-8346","authenticated-orcid":false,"given":"Ivano","family":"Malavolta","sequence":"first","affiliation":[{"name":"Vrije Universiteit Amsterdam, Amsterdam, The Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-6132-8126","authenticated-orcid":false,"given":"Kishan","family":"Nirghin","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam, Amsterdam, The Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3588-2659","authenticated-orcid":false,"given":"Gian Luca","family":"Scoccia","sequence":"additional","affiliation":[{"name":"University of L&#x2019;Aquila, L&#x2019;Aquila, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4880-3622","authenticated-orcid":false,"given":"Simone","family":"Romano","sequence":"additional","affiliation":[{"name":"University of Salerno, Fisciano, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-0296-0803","authenticated-orcid":false,"given":"Salvatore","family":"Lombardi","sequence":"additional","affiliation":[{"name":"University of Basilicata, Potenza, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0024-7508","authenticated-orcid":false,"given":"Giuseppe","family":"Scanniello","sequence":"additional","affiliation":[{"name":"University of Salerno, Fisciano, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2234-0845","authenticated-orcid":false,"given":"Patricia","family":"Lago","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam, Amsterdam, The Netherlands"}]}],"member":"263","reference":[{"key":"ref13","year":"2022"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2021.3102254"},{"key":"ref12","article-title":"Tranco: A research-oriented top sites ranking hardened against manipulation","author":"pochat","year":"2018"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2020.2994306"},{"key":"ref15","author":"fowler","year":"2018","journal-title":"Refactoring Improving the Design of Existing Code"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3383219.3383239"},{"key":"ref14","year":"2022"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-91452-3_1"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.07.002"},{"key":"ref52","author":"shull","year":"2007","journal-title":"Guide to Advanced Empirical Software Engineering"},{"key":"ref11","year":"2022"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741114"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/32.6156"},{"key":"ref17","author":"wake","year":"2003","journal-title":"Refactoring Workbook"},{"key":"ref16","author":"brown","year":"1998","journal-title":"Antipatterns Refactoring Software Architectures and Projects in Crisis"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2842781"},{"key":"ref18","author":"martin","year":"2008","journal-title":"Clean code a handbook of agile software craftsmanship"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/ICCICCT.2015.7475289"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ADCOM.2006.4289962"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2005.08.009"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2017.69"},{"key":"ref50","author":"juristo","year":"2013","journal-title":"Basics of Software Engineering Experimentation"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/SERA.2007.69"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/CSIT.2018.8486334"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1145\/353171.353190"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-93956-4_8"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWAMTIP51612.2020.9317462"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/SEAA.2018.00035"},{"key":"ref48","article-title":"System to identify and elide superfluous JavaScript code for faster webpage loads","author":"goel","year":"2020"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3517745.3561427"},{"key":"ref42","year":"2022"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/32.713323"},{"key":"ref41","year":"2022"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/3530019.3530032"},{"key":"ref44","year":"2022"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332484"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809071"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1145\/2851613.2851968"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29044-2"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227109"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405314"},{"key":"ref9","year":"2021"},{"key":"ref4","first-page":"228","article-title":"Dead code elimination through dependent types","author":"xi","year":"1999","journal-title":"Proc Int Symp Practical Aspects Declarative Lang"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3382494.3422171"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330226"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883014"},{"key":"ref82","year":"2021"},{"key":"ref81","year":"0"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15769-1_20"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2016.7503723"},{"key":"ref83","author":"campbell","year":"1979","journal-title":"Quasi-Experimentation Design and analysis issues for field settings"},{"key":"ref80","year":"2022"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2048066.2048078"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.3102\/10769986027001077"},{"key":"ref34","year":"2021"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1961.10482090"},{"key":"ref37","year":"2022"},{"key":"ref36","year":"0"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/512950.512973"},{"key":"ref75","author":"zizzamia","year":"2022"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336758"},{"key":"ref74","year":"2022"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.10.009"},{"key":"ref77","first-page":"19","article-title":"The need to report effect size estimates revisited. an overview of some recommended measures of effect size","volume":"1","author":"tomczak","year":"2014","journal-title":"TRENDS Sport Sci"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606621"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483780"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MobileSoft.2015.15"},{"key":"ref1","year":"2022"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/BF00290339"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03237-0_17"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2017.05.002"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/SANER48275.2020.9054858"},{"key":"ref73","year":"2022"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/2840723"},{"key":"ref24","year":"2022"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2958684"},{"key":"ref23","year":"2022"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3417113.3422184"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3517745.3561427"},{"key":"ref25","year":"2022"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/MOBILESoft.2017.7"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2013.6648192"},{"key":"ref64","first-page":"55","author":"linge","year":"2016","journal-title":"Computer Integration"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2018.07.077"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1809028.1806598"},{"key":"ref66","article-title":"Paint timing 1","year":"2021"},{"key":"ref21","article-title":"The state of JavaScript 2017","author":"greif","year":"2017"},{"key":"ref65","year":"2022"},{"key":"ref28","first-page":"3:1","article-title":"Automatic root cause quantification for missing edges in JavaScript call graphs","author":"chakraborty","year":"2022","journal-title":"Proc Eur Conf Object-Oriented Program"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2018.00028"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1543135.1542483"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2689012"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597097"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606555"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/10185148\/10108937.pdf?arnumber=10108937","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,7]],"date-time":"2023-08-07T18:06:13Z","timestamp":1691431573000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10108937\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7]]},"references-count":95,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tse.2023.3267848","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7]]}}}