{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T11:51:09Z","timestamp":1776081069867,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,11,1]],"date-time":"2016-11-01T00:00:00Z","timestamp":1477958400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1145\/2950290.2950305","type":"proceedings-article","created":{"date-parts":[[2016,11,1]],"date-time":"2016-11-01T13:46:03Z","timestamp":1478007963000},"page":"858-870","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":229,"title":["Why we refactor? confessions of GitHub contributors"],"prefix":"10.1145","author":[{"given":"Danilo","family":"Silva","sequence":"first","affiliation":[{"name":"Federal University of Minas Gerais, Brazil"}]},{"given":"Nikolaos","family":"Tsantalis","sequence":"additional","affiliation":[{"name":"Concordia University, Canada"}]},{"given":"Marco Tulio","family":"Valente","sequence":"additional","affiliation":[{"name":"Federal University of Minas Gerais, Brazil"}]}],"member":"320","published-online":{"date-parts":[[2016,11]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"419","volume-title":"Recommendation Systems in Software Engineering","author":"Bavota G.","unstructured":"G. Bavota , A. De Lucia , A. Marcus , and R. Oliveto . Recommending refactoring operations in large software systems . In M. P. Robillard, W. Maalej, R. J. Walker, and T. Zimmermann, editors, Recommendation Systems in Software Engineering , pages 387\u2013 419 . Springer Berlin Heidelberg, 2014. G. Bavota, A. De Lucia, A. Marcus, and R. Oliveto. Recommending refactoring operations in large software systems. In M. P. Robillard, W. Maalej, R. J. Walker, and T. Zimmermann, editors, Recommendation Systems in Software Engineering, pages 387\u2013419. Springer Berlin Heidelberg, 2014."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.11.918"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.60"},{"key":"e_1_3_2_1_4_1","volume-title":"Extreme Programming Explained: Embrace Change","author":"Beck K.","year":"2000","unstructured":"K. Beck . Extreme Programming Explained: Embrace Change . Addison-Wesley , 2000 . K. Beck. Extreme Programming Explained: Embrace Change. Addison-Wesley, 2000."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.73"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2011.36"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2015.7081844"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.567"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2005.25"},{"key":"e_1_3_2_1_10_1","volume-title":"Refactoring: Improving the Design of Existing Code","author":"Fowler M.","year":"1999","unstructured":"M. Fowler . Refactoring: Improving the Design of Existing Code . Addison-Wesley , Boston, MA, USA , 1999 . M. Fowler. Refactoring: Improving the Design of Existing Code. Addison-Wesley, Boston, MA, USA, 1999."},{"issue":"2","key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1080\/00031305.1998.10480559","article-title":"Violin plots: A box plot-density trace synergism","volume":"52","author":"Hintze J. L.","year":"1998","unstructured":"J. L. Hintze and R. D. Nelson . Violin plots: A box plot-density trace synergism . The American Statistician , 52 ( 2 ): 181 \u2013 184 , 1998 . J. L. Hintze and R. D. Nelson. Violin plots: A box plot-density trace synergism. The American Statistician, 52(2):181\u2013184, 1998.","journal-title":"The American Statistician"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2012.16"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985842"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985815"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882353"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393655"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2318734"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818804"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.1265817"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2006.105"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368146"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2014.2357438"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.41"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39038-8_23"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568317"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609577"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405293"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2013.6671298"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597008.2597141"},{"key":"e_1_3_2_1_31_1","volume-title":"Springer London","author":"Singer J.","year":"2008","unstructured":"J. Singer , S. E. Sim , and T. C. Lethbridge . Guide to Advanced Empirical Software Engineering, chapter Software Engineering Data Collection for Field Studies, pages 9\u201334 . Springer London , London , 2008 . J. Singer, S. E. Sim, and T. C. Lethbridge. Guide to Advanced Empirical Software Engineering, chapter Software Engineering Data Collection for Field Studies, pages 9\u201334. Springer London, London, 2008."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.10.040"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2012.06.011"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.1"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.05.016"},{"key":"e_1_3_2_1_36_1","first-page":"146","volume-title":"Proceedings of the Conference of the Centre for Advanced Studies on Collaborative Research (CASCON)","author":"Tsantalis N.","year":"2013","unstructured":"N. Tsantalis , V. Guana , E. Stroulia , and A. Hindle . A multidimensional empirical study on refactoring activity . In Proceedings of the Conference of the Centre for Advanced Studies on Collaborative Research (CASCON) , pages 132\u2013 146 , 2013 . N. Tsantalis, V. Guana, E. Stroulia, and A. Hindle. A multidimensional empirical study on refactoring activity. In Proceedings of the Conference of the Centre for Advanced Studies on Collaborative Research (CASCON), pages 132\u2013146, 2013."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2448531"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337251"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2009.5306290"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1137983.1138011"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101919"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1370175.1370203"}],"event":{"name":"FSE'16: 24nd ACM SIGSOFT International Symposium on the Foundations of Software Engineering","location":"Seattle WA USA","acronym":"FSE'16","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2950290.2950305","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2950290.2950305","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:49:56Z","timestamp":1750218596000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2950290.2950305"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":41,"alternative-id":["10.1145\/2950290.2950305","10.1145\/2950290"],"URL":"https:\/\/doi.org\/10.1145\/2950290.2950305","relation":{},"subject":[],"published":{"date-parts":[[2016,11]]},"assertion":[{"value":"2016-11-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}