{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T19:16:32Z","timestamp":1772738192359,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,11,11]],"date-time":"2012-11-11T00:00:00Z","timestamp":1352592000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000143","name":"Division of Computing and Communication Foundations","doi-asserted-by":"publisher","award":["CCF-1149391CCF-1117902CCF-1043810"],"award-info":[{"award-number":["CCF-1149391CCF-1117902CCF-1043810"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,11,11]]},"DOI":"10.1145\/2393596.2393655","type":"proceedings-article","created":{"date-parts":[[2012,11,13]],"date-time":"2012-11-13T15:04:07Z","timestamp":1352819047000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":170,"title":["A field study of refactoring challenges and benefits"],"prefix":"10.1145","author":[{"given":"Miryung","family":"Kim","sequence":"first","affiliation":[{"name":"The University of Texas at Austin, TX"}]},{"given":"Thomas","family":"Zimmermann","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA"}]},{"given":"Nachiappan","family":"Nagappan","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA"}]}],"member":"320","published-online":{"date-parts":[[2012,11,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1463788.1463819"},{"key":"e_1_3_2_1_2_1","volume-title":"Design rules: The power of modularity","author":"Baldwin C. Y.","year":"1999","unstructured":"C. Y. Baldwin and K. B. Clark . Design rules: The power of modularity volume 1 . Cambridge, MA , USA, 1999 . MIT Press . C. Y. Baldwin and K. B. Clark. Design rules: The power of modularity volume 1. Cambridge, MA, USA, 1999. MIT Press."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.799939"},{"key":"e_1_3_2_1_4_1","volume-title":"extreme Programming explained, embrace change","author":"Beck K.","year":"2000","unstructured":"K. Beck . extreme Programming explained, embrace change . Addison-Wesley Professional , 2000 . K. Beck. extreme Programming explained, embrace change. Addison-Wesley Professional, 2000."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.153.0225"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2009.17"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1810295.1810317"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/157709.157715"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287651"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2005.90"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/11785477_24"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1177\/1077800405284363"},{"key":"e_1_3_2_1_13_1","volume-title":"Refactoring: Improving the Design of Existing Code","author":"Fowler M.","year":"2000","unstructured":"M. Fowler . Refactoring: Improving the Design of Existing Code . Addison-Wesley Professional , 2000 . M. Fowler. Refactoring: Improving the Design of Existing Code. Addison-Wesley Professional, 2000."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1083142.1083148"},{"key":"e_1_3_2_1_16_1","volume-title":"Microsoft Faculty Summit 2011","author":"Johnson R.","year":"2011","unstructured":"R. Johnson . Beyond behavior preservation . Microsoft Faculty Summit 2011 , Invited Talk , July 2011 . R. Johnson. Beyond behavior preservation. Microsoft Faculty Summit 2011, Invited Talk, July 2011."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/876882.879822"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985815"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.v18:2"},{"key":"e_1_3_2_1_21_1","volume-title":"The Social Science Encyclopedia","author":"Kuper A.","year":"1985","unstructured":"A. Kuper and J. Kuper , editors . The Social Science Encyclopedia . Routledge , 1985 . A. Kuper and J. Kuper, editors. The Social Science Encyclopedia. Routledge, 1985."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1060.0552"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.1265817"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/11763864_21"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2006.105"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070529"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062514"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609577"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1370750.1370759"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1096-9942(1997)3:4%3C253::AID-TAPO3%3E3.3.CO;2-I"},{"key":"e_1_3_2_1_32_1","volume-title":"Software design as an investment activity: A real options perspective. Technical report","author":"Sullivan K.","year":"1998","unstructured":"K. Sullivan , P. Chalasani , and V. Sazawal . Software design as an investment activity: A real options perspective. Technical report , 1998 . K. Sullivan, P. Chalasani, and V. Sazawal. Software design as an investment activity: A real options perspective. Technical report, 1998."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337251"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1137983.1138011"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2006.41"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101919"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368161"}],"event":{"name":"SIGSOFT\/FSE'12: 20th ACM SIGSOFT Symposium on the Foundations of Software Engineering","location":"Cary North Carolina","acronym":"SIGSOFT\/FSE'12","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2393596.2393655","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2393596.2393655","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:34:56Z","timestamp":1750239296000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2393596.2393655"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,11,11]]},"references-count":34,"alternative-id":["10.1145\/2393596.2393655","10.1145\/2393596"],"URL":"https:\/\/doi.org\/10.1145\/2393596.2393655","relation":{},"subject":[],"published":{"date-parts":[[2012,11,11]]},"assertion":[{"value":"2012-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}