{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T10:25:56Z","timestamp":1768904756208,"version":"3.49.0"},"reference-count":86,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2017,10,31]],"date-time":"2017-10-31T00:00:00Z","timestamp":1509408000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Softw. Eng. Methodol."],"published-print":{"date-parts":[[2017,10,31]]},"abstract":"<jats:p>We present a method and tool (ePAD) for the detection of design pattern instances in source code. The approach combines static analysis, based on visual language parsing and model checking, and dynamic analysis, based on source code instrumentation. Visual language parsing and static source code analysis identify candidate instances satisfying the structural properties of design patterns. Successively, model checking statically verifies the behavioral aspects of the candidates recovered in the previous phase. We encode the sequence of messages characterizing the correct behaviour of a pattern as Linear Temporal Logic (LTL) formulae and the sequence diagram representing the possible interaction traces among the objects involved in the candidates as Promela specifications. The model checker SPIN verifies that candidates satisfy the LTL formulae. Dynamic analysis is then performed on the obtained candidates by instrumenting the source code and monitoring those instances at runtime through the execution of test cases automatically generated using a search-based approach. The effectiveness of ePAD has been evaluated by detecting instances of 12 creational and behavioral patterns from six publicly available systems. The results reveal that ePAD outperforms other approaches by recovering more actual instances. Furthermore, on average ePAD achieves better results in terms of correctness and completeness.<\/jats:p>","DOI":"10.1145\/3176643","type":"journal-article","created":{"date-parts":[[2018,2,12]],"date-time":"2018-02-12T14:02:50Z","timestamp":1518444170000},"page":"1-41","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Detecting the Behavior of Design Patterns through Model Checking and Dynamic Analysis"],"prefix":"10.1145","volume":"26","author":[{"given":"Andrea De","family":"Lucia","sequence":"first","affiliation":[{"name":"University of Salerno, Fisciano(SA), Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6711-3590","authenticated-orcid":false,"given":"Vincenzo","family":"Deufemia","sequence":"additional","affiliation":[{"name":"University of Salerno, Fisciano(SA), Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4394-9035","authenticated-orcid":false,"given":"Carmine","family":"Gravino","sequence":"additional","affiliation":[{"name":"University of Salerno, Fisciano(SA), Italy"}]},{"given":"Michele","family":"Risi","sequence":"additional","affiliation":[{"name":"University of Salerno, Fisciano(SA), Italy"}]}],"member":"320","published-online":{"date-parts":[[2018,2,12]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-013-0292-z"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2010.17"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.01.007"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/942800.943608"},{"key":"e_1_2_1_5_1","volume-title":"Encyclopedia of Software Engineering","author":"Basili Victor R.","unstructured":"Victor R. Basili , Gianluigi Caldiera , and H. Dieter Rombach . 1994. Goal question metric paradigm . In Encyclopedia of Software Engineering Vol. 1 . John Wiley 8 Sons, 528--532. Victor R. Basili, Gianluigi Caldiera, and H. Dieter Rombach. 1994. Goal question metric paradigm. In Encyclopedia of Software Engineering Vol. 1. John Wiley 8 Sons, 528--532."},{"key":"e_1_2_1_6_1","volume-title":"Retrieved","author":"Beck Kent","year":"2011","unstructured":"Kent Beck , Erich Gamma , David Saff , and Mike Clark . 2011 . JUnit Cookbook . Retrieved March 23, 2017 from http:\/\/junit.org\/. Kent Beck, Erich Gamma, David Saff, and Mike Clark. 2011. JUnit Cookbook. Retrieved March 23, 2017 from http:\/\/junit.org\/."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/336512.336534"},{"key":"e_1_2_1_8_1","volume-title":"Retrieved","author":"Luca Mario","year":"2017","unstructured":"Mario Luca Bernardi and others. 2014. Design Pattern Finder home . Retrieved March 23, 2017 from https:\/\/github.com\/UnisannioSoftEng\/DPF\/wiki\/Design-Pattern-Finder-Home. Mario Luca Bernardi and others. 2014. Design Pattern Finder home. Retrieved March 23, 2017 from https:\/\/github.com\/UnisannioSoftEng\/DPF\/wiki\/Design-Pattern-Finder-Home."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1674"},{"key":"e_1_2_1_10_1","volume-title":"International Joint Conference on Software Technologies (ICSOFT\u201915)","author":"Bernardi M. L.","unstructured":"M. L. Bernardi , M. Cimitile , G. De Ruvo , G. A. Di Lucca , and A. Santone . 2015. Model checking to improve precision of design pattern instances identification in OO systems . In International Joint Conference on Software Technologies (ICSOFT\u201915) . SciTePress, 1--11. M. L. Bernardi, M. Cimitile, G. De Ruvo, G. A. Di Lucca, and A. Santone. 2015. Model checking to improve precision of design pattern instances identification in OO systems. In International Joint Conference on Software Technologies (ICSOFT\u201915). SciTePress, 1--11."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/851042.857035"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2012.82"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69149-5_36"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.43044"},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of the 5th International Conference on Genetic Algorithms. Morgan Kaufmann","author":"Helen","unstructured":"Helen G. Cobb and John J. Grefenstette. 1993. Genetic algorithms for tracking changing environments . In Proceedings of the 5th International Conference on Genetic Algorithms. Morgan Kaufmann , San Francisco, CA, 523--530. Helen G. Cobb and John J. Grefenstette. 1993. Genetic algorithms for tracking changing environments. In Proceedings of the 5th International Conference on Genetic Algorithms. Morgan Kaufmann, San Francisco, CA, 523--530."},{"key":"e_1_2_1_16_1","volume-title":"Practical Nonparametric Statistics","author":"Conover William","unstructured":"William Conover . 2006. Practical Nonparametric Statistics ( 3 rd ed.). Wiley India Pvt . Limited. William Conover. 2006. Practical Nonparametric Statistics (3rd ed.). Wiley India Pvt. Limited.","edition":"3"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.23"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1040291.1040293"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2006.06.002"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/985072.985105"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2009.29"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.02.012"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609707"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2010.16"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332462"},{"key":"e_1_2_1_26_1","volume-title":"Retrieved","author":"Lucia Andrea De","year":"2017","unstructured":"Andrea De Lucia , Vincenzo Deufemia , Carmine Gravino , and Michele Risi . 2017 . Web appendix . Retrieved March 23, 2017 from http:\/\/docenti.unisa.it\/004724\/risorse?categoria=335&risorsa=1126. Andrea De Lucia, Vincenzo Deufemia, Carmine Gravino, and Michele Risi. 2017. Web appendix. Retrieved March 23, 2017 from http:\/\/docenti.unisa.it\/004724\/risorse?categoria=335&risorsa=1126."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332480"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2336"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECBS.2007.33"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROMISE.2007.6"},{"key":"e_1_2_1_31_1","volume-title":"Retreived","author":"Foundation Eclipse","year":"2008","unstructured":"Eclipse Foundation . 2008 . TPTP (Test 8 Performance Tools Platform) . Retreived March 23, 2017 from https:\/\/projects.eclipse.org\/projects\/tptp.platform. Eclipse Foundation. 2008. TPTP (Test 8 Performance Tools Platform). Retreived March 23, 2017 from https:\/\/projects.eclipse.org\/projects\/tptp.platform."},{"key":"e_1_2_1_32_1","volume-title":"Retrieved","author":"Foundation Eclipse","year":"2009","unstructured":"Eclipse Foundation . 2009 . Eclipse JDT . Retrieved March 23, 2017 from http:\/\/www.eclipse.org\/jdt\/. Eclipse Foundation. 2009. Eclipse JDT. Retrieved March 23, 2017 from http:\/\/www.eclipse.org\/jdt\/."},{"key":"e_1_2_1_33_1","volume-title":"Hole","author":"Field Andy","year":"2003","unstructured":"Andy Field and Graham J . Hole . 2003 . How to Design and Report Experiments (1 ed.). Sage, Thousand Oaks, CA. Andy Field and Graham J. Hole. 2003. How to Design and Report Experiments (1 ed.). Sage, Thousand Oaks, CA."},{"key":"e_1_2_1_34_1","volume-title":"Refactoring: Improving the Design of Existing Code","author":"Fowler Martin","year":"1999","unstructured":"Martin Fowler . 1999 . Refactoring: Improving the Design of Existing Code . Addison-Wesley Longman , Boston, MA . Martin Fowler. 1999. Refactoring: Improving the Design of Existing Code. Addison-Wesley Longman, Boston, MA."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025179"},{"key":"e_1_2_1_36_1","volume-title":"Retrieved","author":"Gamma Erich","year":"1998","unstructured":"Erich Gamma and Thomas Eggenschwiler . 1998 . JHotDraw . Retrieved March 23, 2017 from http:\/\/www.jhotdraw.org. Erich Gamma and Thomas Eggenschwiler. 1998. JHotDraw. Retrieved March 23, 2017 from http:\/\/www.jhotdraw.org."},{"key":"e_1_2_1_37_1","volume-title":"Design Patterns: Elements of Reusable Object-Oriented Software","author":"Gamma Erich","year":"1995","unstructured":"Erich Gamma , Richard Helm , Ralph Johnson , and John Vlissides . 1995 . Design Patterns: Elements of Reusable Object-Oriented Software . Addison-Wesley Longman Publishing Co., Inc. , Boston, MA . Erich Gamma, Richard Helm, Ralph Johnson, and John Vlissides. 1995. Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley Longman Publishing Co., Inc., Boston, MA."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080780"},{"key":"e_1_2_1_39_1","volume-title":"Genetic Algorithms in Search, Optimization and Machine Learning","author":"Goldberg David E.","unstructured":"David E. Goldberg . 1989. Genetic Algorithms in Search, Optimization and Machine Learning ( 1 st ed.). Addison-Wesley Longman Publishing Co., Inc. , Boston, MA . David E. Goldberg. 1989. Genetic Algorithms in Search, Optimization and Machine Learning (1st ed.). Addison-Wesley Longman Publishing Co., Inc., Boston, MA.","edition":"1"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2011.18"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33666-9_13"},{"key":"e_1_2_1_42_1","volume-title":"Retrieved Mardh 23","author":"Gu\u00e9h\u00e9neuc Yann-Ga\u00ebl","year":"2000","unstructured":"Yann-Ga\u00ebl Gu\u00e9h\u00e9neuc . 2000 . P-MARt . Retrieved Mardh 23 , 2017 from http:\/\/www.iro.umontreal.ca\/labgelo\/p-mart\/index.php. Yann-Ga\u00ebl Gu\u00e9h\u00e9neuc. 2000. P-MARt. Retrieved Mardh 23, 2017 from http:\/\/www.iro.umontreal.ca\/labgelo\/p-mart\/index.php."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.48"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/786769.787039"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(01)00189-6"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.5555\/851042.857057"},{"key":"e_1_2_1_47_1","volume-title":"The Spin Model Checker: Primer and Reference Manual (1 ed.)","author":"Holzmann Gerard","unstructured":"Gerard Holzmann . 2003. The Spin Model Checker: Primer and Reference Manual (1 ed.) . Addison-Wesley Professional . Gerard Holzmann. 2003. The Spin Model Checker: Primer and Reference Manual (1 ed.). Addison-Wesley Professional."},{"key":"e_1_2_1_48_1"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2009.5316015"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/141936.141943"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.5555\/1116163.1116402"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2007.02.015"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/302405.302622"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.391832"},{"key":"e_1_2_1_55_1","volume-title":"ISSSE 2006-2008","volume":"5413","author":"Koschke Rainer","year":"2008","unstructured":"Rainer Koschke . 2008 . Architecture reconstruction. In International Summer Schools on Software Engineering , ISSSE 2006-2008 , Revised Tutorial Lectures, Andrea De Lucia and Filomena Ferrucci (Eds.), Lecture Notes in Computer Science , Vol. 5413 . Springer, 140--173. Rainer Koschke. 2008. Architecture reconstruction. In International Summer Schools on Software Engineering, ISSSE 2006-2008, Revised Tutorial Lectures, Andrea De Lucia and Filomena Ferrucci (Eds.), Lecture Notes in Computer Science, Vol. 5413. Springer, 140--173."},{"key":"e_1_2_1_56_1","volume-title":"Genetic Programming: On the Programming of Computers by Means of Natural Selection","author":"Koza John R.","year":"1992","unstructured":"John R. Koza . 1992 . Genetic Programming: On the Programming of Computers by Means of Natural Selection . MIT Press, Cambridge , MA. John R. Koza. 1992. Genetic Programming: On the Programming of Computers by Means of Natural Selection. MIT Press, Cambridge, MA."},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.5555\/525595.836964"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/RESER.2011.10"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2012.03.009"},{"key":"e_1_2_1_60_1","volume-title":"Proceedings of the 2nd International Workshop on SPIN Verification System (SPIN\u201997)","volume":"32","author":"Leue Stefan","unstructured":"Stefan Leue and Peter B. Ladkin . 1997. Implementing and verifying MSC specifications using PROMELA\/XSPIN . In Proceedings of the 2nd International Workshop on SPIN Verification System (SPIN\u201997) , Discrete Mathematics and Theoretical Computer Science , Vol. 32 . American Mathematical Society, 65--89. Stefan Leue and Peter B. Ladkin. 1997. Implementing and verifying MSC specifications using PROMELA\/XSPIN. In Proceedings of the 2nd International Workshop on SPIN Verification System (SPIN\u201997), Discrete Mathematics and Theoretical Computer Science, Vol. 32. American Mathematical Society, 65--89."},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.v14:2"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297846.1297930"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.421"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297846.1297902"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.5555\/1038267.1039064"},{"key":"e_1_2_1_66_1","volume-title":"Computational Intelligence and Quantitative Software Engineering","author":"Patrick Matthew","unstructured":"Matthew Patrick . 2016. Metaheuristic optimisation and mutation-driven test data generation . In Computational Intelligence and Quantitative Software Engineering . Springer International , 89--115. Matthew Patrick. 2016. Metaheuristic optimisation and mutation-driven test data generation. In Computational Intelligence and Quantitative Software Engineering. Springer International, 89--115."},{"key":"e_1_2_1_67_1","volume-title":"Proceedings of the International Conference on Software Engineering and Knowledge Engineering (SEKE\u201908)","author":"Peng Tu","year":"2008","unstructured":"Tu Peng , Jing Dong , and Yajing Zhao . 2008 . Verifying behavioral correctness of design pattern implementation . In Proceedings of the International Conference on Software Engineering and Knowledge Engineering (SEKE\u201908) . Knowledge Systems Institute, 454--459. Tu Peng, Jing Dong, and Yajing Zhao. 2008. Verifying behavioral correctness of design pattern implementation. In Proceedings of the International Conference on Software Engineering and Knowledge Engineering (SEKE\u201908). Knowledge Systems Institute, 454--459."},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/1082983.1083253"},{"key":"e_1_2_1_69_1","volume-title":"Retrieved","author":"Phelan Marty","year":"2000","unstructured":"Marty Phelan . 2000 . MapperXML . Retrieved March 23, 2017 from http:\/\/mapper.sourceforge.net\/mapperxml\/. Marty Phelan. 2000. MapperXML. Retrieved March 23, 2017 from http:\/\/mapper.sourceforge.net\/mapperxml\/."},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-004-0059-9"},{"key":"e_1_2_1_71_1","volume-title":"Practical Software Maintenance: Best Practices for Managing Your Software Investment","author":"Pigoski Thomas M.","unstructured":"Thomas M. Pigoski . 1996. Practical Software Maintenance: Best Practices for Managing Your Software Investment . John Wiley 8 Sons, Inc., New York, NY. Thomas M. Pigoski. 1996. Practical Software Maintenance: Best Practices for Managing Your Software Investment. John Wiley 8 Sons, Inc., New York, NY."},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1010061"},{"key":"e_1_2_1_73_1","volume-title":"Software engineering research center. Retrieved march 23","author":"Rasool Ghulam","year":"2017","unstructured":"Ghulam Rasool and others. 2011. Software engineering research center. Retrieved march 23 , 2017 from http:\/\/research.ciitlahore.edu.pk\/Groups\/SERC\/DesignPatterns.aspx. Ghulam Rasool and others. 2011. Software engineering research center. Retrieved march 23, 2017 from http:\/\/research.ciitlahore.edu.pk\/Groups\/SERC\/DesignPatterns.aspx."},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100060"},{"key":"e_1_2_1_75_1","volume-title":"Retrieved","author":"Seguin Chris","year":"2002","unstructured":"Chris Seguin . 2002 . JRefactory . Retrieved March 23, 2017 from http:\/\/jrefactory.sourceforge.net. Chris Seguin. 2002. JRefactory. Retrieved March 23, 2017 from http:\/\/jrefactory.sourceforge.net."},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2006.57"},{"key":"e_1_2_1_77_1","volume-title":"Reverse Engineering of Object Oriented Code","author":"Tonella Paolo","unstructured":"Paolo Tonella and Alessandra Potrich . 2005. Reverse Engineering of Object Oriented Code . Springer-Verlag, New York , NY. Paolo Tonella and Alessandra Potrich. 2005. Reverse Engineering of Object Oriented Code. Springer-Verlag, New York, NY."},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.112"},{"key":"e_1_2_1_79_1","volume-title":"Design Pattern Detection Tool and Study. Retreived","author":"Tsantalis Nikolaos","year":"2016","unstructured":"Nikolaos Tsantalis , Alexander Chatzigeorgiou , George Stephanides , and Spyros T. Halkidis . 2006b . Design Pattern Detection Tool and Study. Retreived June 16, 2016 from http:\/\/users.encs.concordia.ca\/ nikolaos\/pattern_detection.html. Nikolaos Tsantalis, Alexander Chatzigeorgiou, George Stephanides, and Spyros T. Halkidis. 2006b. Design Pattern Detection Tool and Study. Retreived June 16, 2016 from http:\/\/users.encs.concordia.ca\/ nikolaos\/pattern_detection.html."},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:EMSE.0000027778.69251.1f"},{"key":"e_1_2_1_81_1","volume-title":"Proceedings of the ICSE Workshop on Dynamic Analysis (WODA\u201903)","author":"Wendehals Lothar","year":"2003","unstructured":"Lothar Wendehals . 2003 . Improving design pattern instance recognition by dynamic analysis . In Proceedings of the ICSE Workshop on Dynamic Analysis (WODA\u201903) . 29--32. Lothar Wendehals. 2003. Improving design pattern instance recognition by dynamic analysis. In Proceedings of the ICSE Workshop on Dynamic Analysis (WODA\u201903). 29--32."},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/1138912.1138920"},{"key":"e_1_2_1_83_1","first-page":"35","article-title":"Data models in the verification of the singleton pattern","volume":"9","author":"Wojszczyk R.","year":"2015","unstructured":"R. Wojszczyk and W. Khadzhynov . 2015 . Data models in the verification of the singleton pattern . J. Theoret. Appl. Comput. Sci. 9 , 3 (2015), 35 -- 46 . R. Wojszczyk and W. Khadzhynov. 2015. Data models in the verification of the singleton pattern. J. Theoret. Appl. Comput. Sci. 9, 3 (2015), 35--46.","journal-title":"J. Theoret. Appl. Comput. Sci."},{"key":"e_1_2_1_85_1","volume-title":"Case Study Research: Design and Methods","author":"Yin Robert K.","unstructured":"Robert K. Yin . 1984. Case Study Research: Design and Methods . Sage , Thousand Oaks, CA . Robert K. Yin. 1984. Case Study Research: Design and Methods. Sage, Thousand Oaks, CA."},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.01.019"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.01.037"}],"container-title":["ACM Transactions on Software Engineering and Methodology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176643","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3176643","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:32Z","timestamp":1750212692000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176643"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,31]]},"references-count":86,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,10,31]]}},"alternative-id":["10.1145\/3176643"],"URL":"https:\/\/doi.org\/10.1145\/3176643","relation":{},"ISSN":["1049-331X","1557-7392"],"issn-type":[{"value":"1049-331X","type":"print"},{"value":"1557-7392","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,10,31]]},"assertion":[{"value":"2017-04-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-12-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-02-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}