{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T12:05:13Z","timestamp":1777637113744,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,7,6]],"date-time":"2018-07-06T00:00:00Z","timestamp":1530835200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,7,6]]},"DOI":"10.1145\/3205651.3208294","type":"proceedings-article","created":{"date-parts":[[2018,7,6]],"date-time":"2018-07-06T19:30:44Z","timestamp":1530905444000},"page":"1606-1613","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Assessing single-objective performance convergence and time complexity for refactoring detection"],"prefix":"10.1145","author":[{"given":"David","family":"Nader-Palacio","sequence":"first","affiliation":[{"name":"Universidad Nacional de Colombia, Bogota, Colombia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Daniel","family":"Rodr\u00edguez-C\u00e1rdenas","sequence":"additional","affiliation":[{"name":"Universidad del Rosario, Bogota, Colombia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jonatan","family":"Gomez","sequence":"additional","affiliation":[{"name":"Universidad Nacional de Colombia, Bogota, Colombia"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2018,7,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.05.024"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.73"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2011.2132725"},{"key":"e_1_3_2_1_4_1","volume-title":"Refactoring: improving the design of existing code","author":"Fowler Martin","unstructured":"Martin Fowler and Kent Beck . 1999. Refactoring: improving the design of existing code . Addison-Wesley Professional . Martin Fowler and Kent Beck. 1999. Refactoring: improving the design of existing code. Addison-Wesley Professional."},{"key":"e_1_3_2_1_5_1","unstructured":"Jonatan Gomez. 2017. Stochastic Global Optimization Algorithms: A Systematic Formal Approach. (2017).  Jonatan Gomez. 2017. Stochastic Global Optimization Algorithms: A Systematic Formal Approach. (2017)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1276958.1277176"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1830483.1830731"},{"key":"e_1_3_2_1_8_1","volume-title":"GECCO","author":"Gomez Jonatan","year":"2004","unstructured":"Jonatan Gomez . 2004 . Self adaptation in evolutionary algorithms . In GECCO 2004, LNCS. Universidad Nacional de Colombia, 12. Jonatan Gomez. 2004. Self adaptation in evolutionary algorithms. In GECCO 2004, LNCS. Universidad Nacional de Colombia, 12."},{"key":"e_1_3_2_1_9_1","article-title":"Search-Based Refactoring : an empirical study","author":"Keeffe Mark O","year":"2007","unstructured":"Mark O Keeffe and Mel \u00d3 Cinn\u00e9ide . 2007 . Search-Based Refactoring : an empirical study . Journal of Software Maintenance and Evolution: Research and Practice August 2007 (2007), 1--7. Mark O Keeffe and Mel \u00d3 Cinn\u00e9ide. 2007. Search-Based Refactoring : an empirical study. Journal of Software Maintenance and Evolution: Research and Practice August 2007 (2007), 1--7.","journal-title":"Journal of Software Maintenance and Evolution: Research and Practice"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2011.22"},{"key":"e_1_3_2_1_11_1","volume-title":"A Cooperative Parallel Search-Based Software Engineering Approach for Code-Smells Detection","author":"Kessentini Wael","year":"2014","unstructured":"Wael Kessentini , Marouane Kessentini , Houari Sahraoui , Slim Bechikh , and Ali Ouni . 2014. A Cooperative Parallel Search-Based Software Engineering Approach for Code-Smells Detection . IEEE Transactions on Software Engineering ( 2014 ). Wael Kessentini, Marouane Kessentini, Houari Sahraoui, Slim Bechikh, and Ali Ouni. 2014. A Cooperative Parallel Search-Based Software Engineering Approach for Code-Smells Detection. IEEE Transactions on Software Engineering (2014)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.11.009"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1571-0661(05)82624-6"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.1265817"},{"key":"e_1_3_2_1_15_1","series-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).","volume-title":"A robust multi-objective approach for software refactoring under uncertainty","author":"Mkaouer Mohamed Wiem","unstructured":"Mohamed Wiem Mkaouer , Marouane Kessentini , Slim Bechikh , and Mel \u00d3 Cinn\u00e9ide . 2014. A robust multi-objective approach for software refactoring under uncertainty . In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Mohamed Wiem Mkaouer, Marouane Kessentini, Slim Bechikh, and Mel \u00d3 Cinn\u00e9ide. 2014. A robust multi-objective approach for software refactoring under uncertainty. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642965"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Mohamed Wiem Mkaouer Marouane Kessentini Slim Bechikh Mel \u00d3 Cinn\u00e9ide and Kalyanmoy Deb. 2015. On the use of many quality attributes for software refactoring: a many-objective search-based software engineering approach. (2015) 43 pages  Mohamed Wiem Mkaouer Marouane Kessentini Slim Bechikh Mel \u00d3 Cinn\u00e9ide and Kalyanmoy Deb. 2015. On the use of many quality attributes for software refactoring: a many-objective search-based software engineering approach. (2015) 43 pages","DOI":"10.1007\/s10664-015-9414-4"},{"key":"e_1_3_2_1_18_1","volume-title":"A robust multi-objective approach to balance severity and importance of refactoring opportunities. Empirical Software Engineering","author":"Mkaouer Mohamed Wiem","year":"2016","unstructured":"Mohamed Wiem Mkaouer , Marouane Kessentini , Mel Cinn\u00e9ide , Shinpei Hayashi , and Kalyanmoy Deb . 2016. A robust multi-objective approach to balance severity and importance of refactoring opportunities. Empirical Software Engineering ( 2016 ), 1--34. Mohamed Wiem Mkaouer, Marouane Kessentini, Mel Cinn\u00e9ide, Shinpei Hayashi, and Kalyanmoy Deb. 2016. A robust multi-objective approach to balance severity and importance of refactoring opportunities. Empirical Software Engineering (2016), 1--34."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591013"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.06.003"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-014-9233-7"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2013.31"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-011-0098-8"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405292"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2463372.2463554"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.03.040"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2013.03.014"},{"key":"e_1_3_2_1_28_1","volume-title":"Hyper-heuristics: A Survey of the State of the Art. Journal of the Operational Research Society","author":"Michel Edmund","year":"2012","unstructured":"Edmund Burke; Michel Gendreau; Matthew Hyde; Graham Kendall; Gabriela Ochoa; Ender Ozcan; Rong Qu . 2012 . Hyper-heuristics: A Survey of the State of the Art. Journal of the Operational Research Society (2012), 1695--1724. Edmund Burke; Michel Gendreau; Matthew Hyde; Graham Kendall; Gabriela Ochoa; Ender Ozcan; Rong Qu. 2012. Hyper-heuristics: A Survey of the State of the Art. Journal of the Operational Research Society (2012), 1695--1724."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143997.1144315"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2803203"}],"event":{"name":"GECCO '18: Genetic and Evolutionary Computation Conference","location":"Kyoto Japan","acronym":"GECCO '18","sponsor":["SIGEVO ACM Special Interest Group on Genetic and Evolutionary Computation"]},"container-title":["Proceedings of the Genetic and Evolutionary Computation Conference Companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3205651.3208294","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3205651.3208294","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:15Z","timestamp":1750212435000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3205651.3208294"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,6]]},"references-count":30,"alternative-id":["10.1145\/3205651.3208294","10.1145\/3205651"],"URL":"https:\/\/doi.org\/10.1145\/3205651.3208294","relation":{},"subject":[],"published":{"date-parts":[[2018,7,6]]},"assertion":[{"value":"2018-07-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}