{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:46:49Z","timestamp":1772164009189,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,10,19]],"date-time":"2008-10-19T00:00:00Z","timestamp":1224374400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,10,19]]},"DOI":"10.1145\/1449764.1449788","type":"proceedings-article","created":{"date-parts":[[2008,10,22]],"date-time":"2008-10-22T08:25:44Z","timestamp":1224663944000},"page":"295-312","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Annotation refactoring"],"prefix":"10.1145","author":[{"given":"Wesley","family":"Tansey","sequence":"first","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Eli","family":"Tilevich","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2008,10,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1025115.1025202"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/998675.999466"},{"issue":"7","key":"e_1_3_2_1_3_1","first-page":"37","article-title":"Test Infected: Programmers love writing tests","volume":"3","author":"Beck K.","year":"1998","unstructured":"K. Beck and E. Gamma . Test Infected: Programmers love writing tests . Java Report , 3 ( 7 ): 37 -- 50 , 1998 . K. Beck and E. Gamma. Test Infected: Programmers love writing tests. Java Report, 3(7):37--50, 1998.","journal-title":"Java Report"},{"key":"e_1_3_2_1_4_1","volume-title":"Next Generation Java Testing: TestNG and Advanced Concepts","author":"Beust C.","year":"2007","unstructured":"C. Beust and H. Suleiman . Next Generation Java Testing: TestNG and Advanced Concepts . Addison-Wesley Professional , 2007 . C. Beust and H. Suleiman. Next Generation Java Testing: TestNG and Advanced Concepts. Addison-Wesley Professional, 2007."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240715"},{"key":"e_1_3_2_1_6_1","volume-title":"AntiPatterns: refactoring software, architectures, and projects in crisis","author":"Brown W.","year":"1998","unstructured":"W. Brown , R. Malveau , H. McCormick III, and T. Mowbray . AntiPatterns: refactoring software, architectures, and projects in crisis . John Wiley & amp; Sons, Inc. New York, NY, USA, 1998 . W. Brown, R. Malveau, H. McCormick III, and T. Mowbray. AntiPatterns: refactoring software, architectures, and projects in crisis. John Wiley &amp; Sons, Inc. New York, NY, USA, 1998."},{"key":"e_1_3_2_1_7_1","first-page":"236","volume-title":"V Brazilian Symposium on Programming Languages","author":"Castor F.","year":"2001","unstructured":"F. Castor and P. Borba . A language for specifying Java transformations . In V Brazilian Symposium on Programming Languages , pages 236 -- 251 , 2001 . F. Castor and P. Borba. A language for specifying Java transformations. In V Brazilian Symposium on Programming Languages, pages 236--251, 2001."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/233269.233366"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/645544.655865"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2006.04.002"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/966221.966234"},{"key":"e_1_3_2_1_12_1","volume-title":"A Rule-based Approach to Framework Evolution. Journal of Object Technology (JOT), 5(1), jan-feb","author":"Cort\u00e9s M.","year":"2006","unstructured":"M. Cort\u00e9s , M. Fontoura , and C. Lucena . A Rule-based Approach to Framework Evolution. Journal of Object Technology (JOT), 5(1), jan-feb 2006 . M. Cort\u00e9s, M. Fontoura, and C. Lucena. A Rule-based Approach to Framework Evolution. Journal of Object Technology (JOT), 5(1), jan-feb 2006."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287649"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1289971.1290000"},{"key":"e_1_3_2_1_15_1","volume-title":"JSR 220: Enterprise JavaBeans 3.0","author":"DeMichiel L.","year":"2008","unstructured":"L. DeMichiel and M. Keith . JSR 220: Enterprise JavaBeans 3.0 , 2008 . http:\/\/jcp.org\/aboutJava\/communityprocess\/final\/jsr220\/index.html. L. DeMichiel and M. Keith. JSR 220: Enterprise JavaBeans 3.0, 2008. http:\/\/jcp.org\/aboutJava\/communityprocess\/final\/jsr220\/index.html."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/11785477_24"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.71"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368148"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/583854.582453"},{"key":"e_1_3_2_1_20_1","volume-title":"March","author":"Foundation Eclipse","year":"2008","unstructured":"Eclipse Foundation . Eclipse Java development tools , March 2008 . http:\/\/www.eclipse.org\/jdt. Eclipse Foundation. Eclipse Java development tools, March 2008. http:\/\/www.eclipse.org\/jdt."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70731"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1007\/978-3-540-45213-3_31","volume-title":"Modular Programming Languages","author":"Genssler T.","year":"2003","unstructured":"T. Genssler and V. Kuttruff . Source-to-source transformation in the large . In Modular Programming Languages , pages 254 -- 265 . Springer-Verlag , 2003 . T. Genssler and V. Kuttruff. Source-to-source transformation in the large. In Modular Programming Languages, pages 254--265. Springer-Verlag, 2003."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062512"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.20"},{"key":"e_1_3_2_1_25_1","volume-title":"Morgan Kaufmann","author":"Lieberman H.","year":"2001","unstructured":"H. Lieberman . Your Wish is My Command: Programming By Example . Morgan Kaufmann , 2001 . H. Lieberman. Your Wish is My Command: Programming By Example. Morgan Kaufmann, 2001."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000685"},{"key":"e_1_3_2_1_27_1","volume-title":"Oracle","author":"Panda D.","year":"2005","unstructured":"D. Panda , D. Clarke , and M. Schincariol . EJB 3.0 migration. Technical report , Oracle , October 2005 . D. Panda, D. Clarke, and M. Schincariol. EJB 3.0 migration. Technical report, Oracle, October 2005."},{"key":"e_1_3_2_1_28_1","volume-title":"INRIA Research Report","author":"Pawlak R.","year":"2006","unstructured":"R. Pawlak , C. Noguera , and N. Petitprez . Spoon: Program analysis and transformation in Java. Technical report , INRIA Research Report , 2006 . R. Pawlak, C. Noguera, and N. Petitprez. Spoon: Program analysis and transformation in Java. Technical report, INRIA Research Report, 2006."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1108792.1108818"},{"key":"e_1_3_2_1_30_1","volume-title":"Drools Documentation. Technical report","author":"Proctor M.","year":"2006","unstructured":"M. Proctor , M. Neale , P. Lin , and M. Frandsen . Drools Documentation. Technical report , JBoss Inc ., 2006 . M. Proctor, M. Neale, P. Lin, and M. Frandsen. Drools Documentation. Technical report, JBoss Inc., 2006."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142031.1142045"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1049\/ip-sen:20040078"},{"key":"e_1_3_2_1_33_1","volume-title":"Proc. Int'l Conf. eXtreme Programming and Flexible Processes in Software Engineering (XP)","author":"Roock S.","year":"2002","unstructured":"S. Roock and A. Havenstein . Refactoring tags for automatic refactoring of framework dependent applications . In Proc. Int'l Conf. eXtreme Programming and Flexible Processes in Software Engineering (XP) , 2002 . S. Roock and A. Havenstein. Refactoring tags for automatic refactoring of framework dependent applications. In Proc. Int'l Conf. eXtreme Programming and Flexible Processes in Software Engineering (XP), 2002."},{"key":"e_1_3_2_1_34_1","volume-title":"June","author":"Russell C.","year":"2007","unstructured":"C. Russell . Java Data Objects 2.1 , June 2007 . http:\/\/db.apache.org\/jdo\/specifications.html. C. Russell. Java Data Objects 2.1, June 2007. http:\/\/db.apache.org\/jdo\/specifications.html."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287650"},{"key":"e_1_3_2_1_36_1","volume-title":"December","author":"Stuckert R.","year":"2006","unstructured":"R. Stuckert . JUnit reloaded , December 2006 . http:\/\/today.java.net\/pub\/a\/today\/2006\/12\/07\/junit-reloaded.html. R. Stuckert. JUnit reloaded, December 2006. http:\/\/today.java.net\/pub\/a\/today\/2006\/12\/07\/junit-reloaded.html."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321688"},{"key":"e_1_3_2_1_38_1","volume-title":"Virginia Tech","author":"Tansey W.","year":"2008","unstructured":"W. Tansey and E. Tilevich . Refactoring object-oriented applications for metadata-based frameworks. Technical report , Virginia Tech , January 2008 . W. Tansey and E. Tilevich. Refactoring object-oriented applications for metadata-based frameworks. Technical report, Virginia Tech, January 2008."},{"key":"e_1_3_2_1_39_1","first-page":"148","volume-title":"ICSM '03: Proceedings of the International Conference on Software Maintenance","author":"Tourw\u00e9 T.","year":"2003","unstructured":"T. Tourw\u00e9 and T. Mens . Automated support for framework-based software evolution . In ICSM '03: Proceedings of the International Conference on Software Maintenance , page 148 , Washington, DC, USA , 2003 . IEEE Computer Society. T. Tourw\u00e9 and T. Mens. Automated support for framework-based software evolution. In ICSM '03: Proceedings of the International Conference on Software Maintenance, page 148, Washington, DC, USA, 2003. IEEE Computer Society."},{"key":"e_1_3_2_1_40_1","volume-title":"August","author":"Vines D.","year":"2007","unstructured":"D. Vines and K. Sutter . Migrating legacy Hibernate applications to OpenJPA and EJB 3.0 , August 2007 . http:\/\/www.ibm.com\/developerworks\/websphere\/techjournal\/0708_vines\/0708_vines.html. D. Vines and K. Sutter. Migrating legacy Hibernate applications to OpenJPA and EJB 3.0, August 2007. http:\/\/www.ibm.com\/developerworks\/websphere\/techjournal\/0708_vines\/0708_vines.html."},{"key":"e_1_3_2_1_41_1","first-page":"57","article-title":"A survey of strategies in program transformation systems","author":"Visser E.","year":"2001","unstructured":"E. Visser . A survey of strategies in program transformation systems . Electronic Notes in Theoretical Computer Science , 57 , 2001 . E. Visser. A survey of strategies in program transformation systems. Electronic Notes in Theoretical Computer Science, 57, 2001.","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25935-0_13"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101919"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70747"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-007-0007-3"}],"event":{"name":"OOPSLA08: ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications","location":"Nashville TN USA","acronym":"OOPSLA08","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 23rd ACM SIGPLAN conference on Object-oriented programming systems languages and applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1449764.1449788","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1449764.1449788","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:56:15Z","timestamp":1750240575000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1449764.1449788"}},"subtitle":["inferring upgrade transformations for legacy applications"],"short-title":[],"issued":{"date-parts":[[2008,10,19]]},"references-count":45,"alternative-id":["10.1145\/1449764.1449788","10.1145\/1449764"],"URL":"https:\/\/doi.org\/10.1145\/1449764.1449788","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1449955.1449788","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2008,10,19]]},"assertion":[{"value":"2008-10-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}