{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T06:58:11Z","timestamp":1775199491556,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,8,25]],"date-time":"2016-08-25T00:00:00Z","timestamp":1472083200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,8,25]]},"DOI":"10.1145\/2970276.2970340","type":"proceedings-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T12:40:09Z","timestamp":1472215209000},"page":"4-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":115,"title":["An empirical investigation into the nature of test smells"],"prefix":"10.1145","author":[{"given":"Michele","family":"Tufano","sequence":"first","affiliation":[{"name":"College of William and Mary, USA"}]},{"given":"Fabio","family":"Palomba","sequence":"additional","affiliation":[{"name":"University of Salerno, Italy"}]},{"given":"Gabriele","family":"Bavota","sequence":"additional","affiliation":[{"name":"University of Lugano, Switzerland"}]},{"given":"Massimiliano","family":"Di Penta","sequence":"additional","affiliation":[{"name":"University of Sannio, Italy"}]},{"given":"Rocco","family":"Oliveto","sequence":"additional","affiliation":[{"name":"University of Molise, Italy"}]},{"given":"Andrea","family":"De Lucia","sequence":"additional","affiliation":[{"name":"University of Salerno, Italy"}]},{"given":"Denys","family":"Poshyvanyk","sequence":"additional","affiliation":[{"name":"College of William and Mary, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"https:\/\/sites.google.com\/site\/testsmells\/","author":"Online","year":"2016","unstructured":"Online appendix. https:\/\/sites.google.com\/site\/testsmells\/ , 2016 . Online appendix. https:\/\/sites.google.com\/site\/testsmells\/, 2016."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2011.24"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/170036.170072"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1984732.1984740"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR-WCRE.2014.6747214"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-013-9256-x"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405253"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-014-9313-0"},{"key":"e_1_3_2_1_9_1","volume-title":"Test Driven Development: By Example","year":"2002","unstructured":"Beck. Test Driven Development: By Example . Addison-Wesley Longman Publishing Co., Inc. , Boston, MA, USA , 2002 . Beck. Test Driven Development: By Example. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 2002."},{"key":"e_1_3_2_1_10_1","volume-title":"Anti Patterns: Refactoring Software, Architectures, and Projects in Crisis","author":"Brown W. J.","year":"1998","unstructured":"W. J. Brown , R. C. Malveau , W. H. Brown , H. W. McCormick III, and T. J. Mowbray . Anti Patterns: Refactoring Software, Architectures, and Projects in Crisis . John Wiley and Sons , 1 st edition, 1998 . W. J. Brown, R. C. Malveau, W. H. Brown, H. W. McCormick III, and T. J. Mowbray. Anti Patterns: Refactoring Software, Architectures, and Projects in Crisis. John Wiley and Sons, 1st edition, 1998.","edition":"1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/QUATIC.2010.16"},{"key":"e_1_3_2_1_12_1","volume-title":"Continuous Integration: Improving Software Quality and Reducing Risk","author":"Duvall P. M.","year":"2007","unstructured":"P. M. Duvall , S. Matyas , and A. Glover . Continuous Integration: Improving Software Quality and Reducing Risk . Addison-Wesley , 2007 . P. M. Duvall, S. Matyas, and A. Glover. Continuous Integration: Improving Software Quality and Reducing Risk. Addison-Wesley, 2007."},{"key":"e_1_3_2_1_13_1","volume-title":"improving the design of existing code","author":"Fowler M.","year":"1999","unstructured":"M. Fowler . Refactoring : improving the design of existing code . Addison-Wesley , 1999 . M. Fowler. Refactoring: improving the design of existing code. Addison-Wesley, 1999."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2013.45"},{"key":"e_1_3_2_1_15_1","first-page":"396","volume-title":"Proceedings of the 10th Working Conference on Mining Software Repositories (MSR)","author":"Greiler M.","unstructured":"M. Greiler , A. Zaidman , A. van Deursen , and M.-A. Storey . Strategies for avoiding text fixture smells during software evolution . In Proceedings of the 10th Working Conference on Mining Software Repositories (MSR) , pages 387\u2013 396 . IEEE, 2013. M. Greiler, A. Zaidman, A. van Deursen, and M.-A. Storey. Strategies for avoiding text fixture smells during software evolution. In Proceedings of the 10th Working Conference on Mining Software Repositories (MSR), pages 387\u2013396. IEEE, 2013."},{"key":"e_1_3_2_1_16_1","volume-title":"Survey Methodology","author":"Groves R. M.","year":"2009","unstructured":"R. M. Groves . Survey Methodology , 2 nd edition. Wiley , 2009 . R. M. Groves. Survey Methodology, 2nd edition. Wiley, 2009.","edition":"2"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1958.10501452"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9171-y"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2009.47"},{"key":"e_1_3_2_1_20_1","volume-title":"Object-Oriented Metrics in Practice: Using Software Metrics to Characterize, Evaluate, and Improve the Design of Object-Oriented Systems","author":"Lanza M.","year":"2006","unstructured":"M. Lanza and R. Marinescu . Object-Oriented Metrics in Practice: Using Software Metrics to Characterize, Evaluate, and Improve the Design of Object-Oriented Systems . Springer , 2006 . M. Lanza and R. Marinescu. Object-Oriented Metrics in Practice: Using Software Metrics to Characterize, Evaluate, and Improve the Design of Object-Oriented Systems. Springer, 2006."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597008.2597144"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294948.1294957"},{"key":"e_1_3_2_1_23_1","first-page":"359","volume-title":"Proceedings of the International Conference on Software Maintenance (ICSM)","author":"Marinescu R.","year":"2004","unstructured":"R. Marinescu . Detection strategies : Metrics-based rules for detecting design flaws . In Proceedings of the International Conference on Software Maintenance (ICSM) , pages 350\u2013 359 , 2004 . R. Marinescu. Detection strategies: Metrics-based rules for detecting design flaws. In Proceedings of the International Conference on Software Maintenance (ICSM), pages 350\u2013359, 2004."},{"key":"e_1_3_2_1_24_1","volume-title":"xUnit Test Patterns: Refactoring Test Code","author":"Meszaros G.","year":"2007","unstructured":"G. Meszaros . xUnit Test Patterns: Refactoring Test Code . Addison Wesley , 2007 . G. Meszaros. xUnit Test Patterns: Refactoring Test Code. Addison Wesley, 2007."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.50"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/METRICS.2005.38"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2007.4362611"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2010.47"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.32"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2372760"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693086"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/2820518.2820593"},{"key":"e_1_3_2_1_33_1","first-page":"2016","volume-title":"Proceedings of the International Conference on Program Comprehension (ICPC)","author":"Palomba F.","unstructured":"F. Palomba , A. Panichella , A. De Lucia , R. Oliveto , and A. Zaidman . A textual-based technique for smell detection . In Proceedings of the International Conference on Program Comprehension (ICPC) , page to appear. IEEE, 2016 . F. Palomba, A. Panichella, A. De Lucia, R. Oliveto, and A. Zaidman. A textual-based technique for smell detection. In Proceedings of the International Conference on Program Comprehension (ICPC), page to appear. IEEE, 2016."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2012.79"},{"key":"e_1_3_2_1_35_1","first-page":"232","volume-title":"European Conf. on Software Maintenance and Reengineering (CSMR)","author":"Ratiu D.","unstructured":"D. Ratiu , S. Ducasse , T. G\u02c6\u0131rba , and R. Marinescu . Using history information to improve design flaws detection . In European Conf. on Software Maintenance and Reengineering (CSMR) , pages 223\u2013 232 . IEEE, 2004. D. Ratiu, S. Ducasse, T. G\u02c6\u0131rba, and R. Marinescu. Using history information to improve design flaws detection. In European Conf. on Software Maintenance and Reengineering (CSMR), pages 223\u2013232. IEEE, 2004."},{"key":"e_1_3_2_1_36_1","volume-title":"Survival Analysis","author":"Miller J. Rupert G.","year":"2011","unstructured":"J. Rupert G. Miller . Survival Analysis , 2 nd Edition. John Wiley and Sons , 2011 . J. Rupert G. Miller. Survival Analysis, 2nd Edition. John Wiley and Sons, 2011.","edition":"2"},{"key":"e_1_3_2_1_37_1","volume-title":"Java World","author":"Schneider A.","year":"2000","unstructured":"A. Schneider . Junit best practices . Java World , 2000 . A. Schneider. Junit best practices. Java World, 2000."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.89"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2015.7335422"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.1"},{"key":"e_1_3_2_1_41_1","first-page":"414","volume-title":"Int\u2019l Conf. on Softw. Engineering (ICSE)","author":"Tufano M.","unstructured":"M. Tufano , F. Palomba , G. Bavota , R. Oliveto , M. Di Penta , A. De Lucia , and D. Poshyvanyk . When and why your code starts to smell bad . In Int\u2019l Conf. on Softw. Engineering (ICSE) , pages 403\u2013 414 . IEEE, 2015. M. Tufano, F. Palomba, G. Bavota, R. Oliveto, M. Di Penta, A. De Lucia, and D. Poshyvanyk. When and why your code starts to smell bad. In Int\u2019l Conf. on Softw. Engineering (ICSE), pages 403\u2013414. IEEE, 2015."},{"key":"e_1_3_2_1_42_1","first-page":"95","volume-title":"Proceedings of the 2nd International Conference on Extreme Programming and Flexible Processes in Software Engineering (XP)","author":"van Deursen A.","year":"2001","unstructured":"A. van Deursen , L. Moonen , A. Bergh , and G. Kok . Refactoring test code . In Proceedings of the 2nd International Conference on Extreme Programming and Flexible Processes in Software Engineering (XP) , pages 92\u2013 95 , 2001 . A. van Deursen, L. Moonen, A. Bergh, and G. Kok. Refactoring test code. In Proceedings of the 2nd International Conference on Extreme Programming and Flexible Processes in Software Engineering (XP), pages 92\u201395, 2001."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70745"},{"key":"e_1_3_2_1_44_1","first-page":"251","volume-title":"Proceedings of the Working Conference on Reverse Engineering (WCRE)","author":"Yamashita A. F.","unstructured":"A. F. Yamashita and L. Moonen . Do developers care about code smells? an exploratory survey . In Proceedings of the Working Conference on Reverse Engineering (WCRE) , pages 242\u2013 251 . IEEE, 2013. A. F. Yamashita and L. Moonen. Do developers care about code smells? an exploratory survey. In Proceedings of the Working Conference on Reverse Engineering (WCRE), pages 242\u2013251. IEEE, 2013."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486878"}],"event":{"name":"ASE'16: ACM\/IEEE International Conference on Automated Software Engineering","location":"Singapore Singapore","acronym":"ASE'16","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"]},"container-title":["Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970276.2970340","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2970276.2970340","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:01Z","timestamp":1750218601000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970276.2970340"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,25]]},"references-count":45,"alternative-id":["10.1145\/2970276.2970340","10.1145\/2970276"],"URL":"https:\/\/doi.org\/10.1145\/2970276.2970340","relation":{},"subject":[],"published":{"date-parts":[[2016,8,25]]},"assertion":[{"value":"2016-08-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}