{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:33:08Z","timestamp":1750221188217,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,27]],"date-time":"2018-05-27T00:00:00Z","timestamp":1527379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,27]]},"DOI":"10.1145\/3194164.3194173","type":"proceedings-article","created":{"date-parts":[[2018,7,23]],"date-time":"2018-07-23T13:02:25Z","timestamp":1532350945000},"page":"41-50","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Evaluating domain-specific metric thresholds"],"prefix":"10.1145","author":[{"given":"Allan","family":"Mori","sequence":"first","affiliation":[{"name":"Federal University of Minas Gerais (UFMG), Belo Horizonte, Brazil"}]},{"given":"Gustavo","family":"Vale","sequence":"additional","affiliation":[{"name":"University of Passau, Passau, Germany"}]},{"given":"Markos","family":"Viggiato","sequence":"additional","affiliation":[{"name":"Federal University of Minas Gerais (UFMG), Belo Horizonte, Brazil"}]},{"given":"Johnatan","family":"Oliveira","sequence":"additional","affiliation":[{"name":"Pontifical Catholic University of Minas Gerais (PUC-Minas), Belo Horizonte, Brazil"}]},{"given":"Eduardo","family":"Figueiredo","sequence":"additional","affiliation":[{"name":"Federal University of Minas Gerais (UFMG), Belo Horizonte, Brazil and Carnegie Mellon University (CMU)"}]},{"given":"Elder","family":"Cirilo","sequence":"additional","affiliation":[{"name":"Federal University of Sao Joao dei-Rei (UFSJ), Sao Joao del-Rei, Brazil"}]},{"given":"Pooyan","family":"Jamshidi","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University (CMU)"}]},{"given":"Christian","family":"Kastner","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University (CMU)"}]}],"member":"320","published-online":{"date-parts":[[2018,5,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609747"},{"key":"e_1_3_2_1_2_1","volume-title":"A System of Patterns","author":"Buschmann F.","year":"1996","unstructured":"F. Buschmann , R. Meunier , Ha. Rohnert , P. Sommerlad , M. Stai . \"Pattern-Oriented Software Architecture : A System of Patterns \". Volume 1 , Wiley , 1996 . F. Buschmann, R. Meunier, Ha. Rohnert, P. Sommerlad, M. Stai. \"Pattern-Oriented Software Architecture: A System of Patterns\". Volume 1, Wiley, 1996."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.295895"},{"key":"e_1_3_2_1_4_1","unstructured":"CK Tool available at https:\/\/github.com\/mauricioaniche\/ck  CK Tool available at https:\/\/github.com\/mauricioaniche\/ck"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(94)00125-7"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.1019"},{"key":"e_1_3_2_1_7_1","volume-title":"Management, Measurement, and Estimates","author":"DeMarco T.","year":"1986","unstructured":"T. DeMarco . \"Controlling Software Projects : Management, Measurement, and Estimates \". Prentice Hall , 1986 . T. DeMarco. \"Controlling Software Projects: Management, Measurement, and Estimates\". Prentice Hall, 1986."},{"key":"e_1_3_2_1_8_1","first-page":"48","volume-title":"proceedings of the 16th International Conference on Software Reuse (ICSR)","author":"Fernandes E.","year":"2017","unstructured":"E. Fernandes , G. Vale , L. Sousa , E. Figueiredo , A. Garcia , and J. Lee . \" No Code Anomaly is an Island Anomaly Agglomeration as Sign of Product Line Instabilities \". In proceedings of the 16th International Conference on Software Reuse (ICSR) , pp. 48 -- 64 , 2017 . E. Fernandes, G. Vale, L. Sousa, E. Figueiredo, A. Garcia, and J. Lee. \"No Code Anomaly is an Island Anomaly Agglomeration as Sign of Product Line Instabilities\". In proceedings of the 16th International Conference on Software Reuse (ICSR), pp. 48--64, 2017."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2915970.2915984"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.05.044"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.56"},{"key":"e_1_3_2_1_12_1","volume-title":"Improving the Design of Existing Code","author":"Fowler M.","year":"1999","unstructured":"M. Fowler . \"Refactoring : Improving the Design of Existing Code \". In Addison-Wesley Professional , 1999 . M. Fowler. \"Refactoring: Improving the Design of Existing Code\". In Addison-Wesley Professional, 1999."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9162-z"},{"key":"e_1_3_2_1_14_1","volume-title":"Finding the Value of \"Intangibles\" in Business","author":"Hubbard D.","year":"2014","unstructured":"D. Hubbard . \"How to Measure Anything : Finding the Value of \"Intangibles\" in Business \". John Wiley & Sons , 2014 . D. Hubbard. \"How to Measure Anything: Finding the Value of \"Intangibles\" in Business\". John Wiley & Sons, 2014."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.06.041"},{"key":"e_1_3_2_1_16_1","unstructured":"M. Lanza R. Marinescu. \"Object-Oriented Metrics in Practice\". Springer 2006.   M. Lanza R. Marinescu. \"Object-Oriented Metrics in Practice\". Springer 2006."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597008.2597144"},{"key":"e_1_3_2_1_18_1","volume-title":"Object-Oriented Software Metrics: APractical Guide","author":"Lorenz M.","year":"1994","unstructured":"M. Lorenz and J. Kidd . \" Object-Oriented Software Metrics: APractical Guide \". Prentice Hall , 1994 . M. Lorenz and J. Kidd. \"Object-Oriented Software Metrics: APractical Guide\". Prentice Hall, 1994."},{"key":"e_1_3_2_1_19_1","first-page":"350","volume-title":"Proceedings of the 20th International Conference on Software Maintenance (ICSM)","author":"Marinescu R.","year":"2004","unstructured":"R. Marinescu . \"Detection strategies : metrics-based rules for detecting design flaws \". In Proceedings of the 20th International Conference on Software Maintenance (ICSM) , pp. 350 -- 359 , 2004 . R. Marinescu. \"Detection strategies: metrics-based rules for detecting design flaws\". In Proceedings of the 20th International Conference on Software Maintenance (ICSM), pp. 350--359, 2004."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889168"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233837"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568226"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.112"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884868"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07881-6_44"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2695664.2695749"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635922"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368140"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1852786.1852797"},{"key":"e_1_3_2_1_30_1","unstructured":"Support Website Available at https:\/\/labsoft-ufmg.github.io\/techdebt-2018\/.  Support Website Available at https:\/\/labsoft-ufmg.github.io\/techdebt-2018\/."},{"key":"e_1_3_2_1_31_1","unstructured":"TechDebt 2018 - International Conference on Technical Debt Website Available at https:\/\/2018.techdebtconf.org\/track\/TechDebt-2018-papers.  TechDebt 2018 - International Conference on Technical Debt Website Available at https:\/\/2018.techdebtconf.org\/track\/TechDebt-2018-papers."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2010.46"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2791060.2791078"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2915970.2916014"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCCC.2015.7416572"}],"event":{"name":"ICSE '18: 40th International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"],"location":"Gothenburg Sweden","acronym":"ICSE '18"},"container-title":["Proceedings of the 2018 International Conference on Technical Debt"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3194164.3194173","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3194164.3194173","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:09Z","timestamp":1750210749000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3194164.3194173"}},"subtitle":["an empirical study"],"short-title":[],"issued":{"date-parts":[[2018,5,27]]},"references-count":35,"alternative-id":["10.1145\/3194164.3194173","10.1145\/3194164"],"URL":"https:\/\/doi.org\/10.1145\/3194164.3194173","relation":{},"subject":[],"published":{"date-parts":[[2018,5,27]]},"assertion":[{"value":"2018-05-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}