{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T03:39:07Z","timestamp":1771385947985,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,29]],"date-time":"2020-06-29T00:00:00Z","timestamp":1593388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,29]]},"DOI":"10.1145\/3379597.3387477","type":"proceedings-article","created":{"date-parts":[[2020,9,19]],"date-time":"2020-09-19T02:12:49Z","timestamp":1600481569000},"page":"186-197","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":30,"title":["Characterizing and Identifying Composite Refactorings"],"prefix":"10.1145","author":[{"given":"Leonardo","family":"Sousa","sequence":"first","affiliation":[{"name":"Electrical &amp; Computer Engineering, Carnegie Mellon University, USA"}]},{"given":"Diego","family":"Cedrim","sequence":"additional","affiliation":[{"name":"Amazon, Brazil"}]},{"given":"Alessandro","family":"Garcia","sequence":"additional","affiliation":[{"name":"PUC-Rio, Brazil"}]},{"given":"Willian","family":"Oizumi","sequence":"additional","affiliation":[{"name":"PUC-Rio, Brazil"}]},{"given":"Ana C.","family":"Bibiano","sequence":"additional","affiliation":[{"name":"PUC-Rio, Brazil"}]},{"given":"Daniel","family":"Oliveira","sequence":"additional","affiliation":[{"name":"PUC-Rio, Brazil"}]},{"given":"Miryung","family":"Kim","sequence":"additional","affiliation":[{"name":"UCLA, USA"}]},{"given":"Anderson","family":"Oliveira","sequence":"additional","affiliation":[{"name":"PUC-Rio, Brazil"}]}],"member":"320","published-online":{"date-parts":[[2020,9,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2011.24"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238217"},{"key":"e_1_3_2_1_3_1","volume-title":"An Empirical Study on Self-Affirmed Refactoring Activities. In 13th ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM","author":"AlOmar Eman Abdullah","year":"2019","unstructured":"Eman Abdullah AlOmar , Mohamed Wiem Mkaouer , Ali Ouni , and Marouane Kessentini . 2019 . Do Design Metrics Capture Developers Perception of Quality? An Empirical Study on Self-Affirmed Refactoring Activities. In 13th ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM 2019). Eman Abdullah AlOmar, Mohamed Wiem Mkaouer, Ali Ouni, and Marouane Kessentini. 2019. Do Design Metrics Capture Developers Perception of Quality? An Empirical Study on Self-Affirmed Refactoring Activities. In 13th ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM 2019)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/RSSE.2012.6233419"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.05.024"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2019.8870183"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.05.005"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER48275.2020.9054864"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2973839.2973848"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106259"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131151.3131171"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2019.8870141"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.71"},{"key":"e_1_3_2_1_14_1","volume-title":"Refactoring: Improving The Design Of Existing Code","author":"Fowler Martin","year":"1999","unstructured":"Martin Fowler , Kent Beck , John Brant , William Opdyke , and Don Roberts . 1999 . Refactoring: Improving The Design Of Existing Code ( 1 st ed.). Addison-Wesley Longman Publishing Co., Inc. , Boston, MA, USA . 464 pages. Martin Fowler, Kent Beck, John Brant, William Opdyke, and Don Roberts. 1999. Refactoring: Improving The Design Of Existing Code (1st ed.). Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA. 464 pages.","edition":"1"},{"key":"e_1_3_2_1_15_1","volume-title":"Assessing Refactoring Instances and the Maintainability Benefits of Them from Version Archives","author":"Fujiwara Kenji","unstructured":"Kenji Fujiwara , Kyohei Fushida , Norihiro Yoshida , and Hajimu Iida . 2013. Assessing Refactoring Instances and the Maintainability Benefits of Them from Version Archives . Springer Berlin Heidelberg , Berlin, Heidelberg , 313--323. https:\/\/doi.org\/10.1007\/978-3-642-39259-7_25 10.1007\/978-3-642-39259-7_25 Kenji Fujiwara, Kyohei Fushida, Norihiro Yoshida, and Hajimu Iida. 2013. Assessing Refactoring Instances and the Maintainability Benefits of Them from Version Archives. Springer Berlin Heidelberg, Berlin, Heidelberg, 313--323. https:\/\/doi.org\/10.1007\/978-3-642-39259-7_25"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/METRICS.2005.40"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2724525.2724567"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1276958.1277176"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393655"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2318734"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2016.028"},{"key":"e_1_3_2_1_22_1","volume-title":"2nd International Workshop on Model-driven Product Line Engineering (MDPLE). 37--48","author":"Kuhlemann Martin","year":"2010","unstructured":"Martin Kuhlemann , Liang Liang , and Gunter Saake . 2010 . Algebraic and cost-based optimization of refactoring sequences . In 2nd International Workshop on Model-driven Product Line Engineering (MDPLE). 37--48 . Martin Kuhlemann, Liang Liang, and Gunter Saake. 2010. Algebraic and cost-based optimization of refactoring sequences. In 2nd International Workshop on Model-driven Product Line Engineering (MDPLE). 37--48."},{"key":"e_1_3_2_1_23_1","volume-title":"Object-Oriented Metrics in Practice: Using Software Metrics to Characterize, Evaluate, and Improve the Design of Object-Oriented Systems","author":"Lanza Michele","unstructured":"Michele Lanza and Radu Marinescu . 2010. Object-Oriented Metrics in Practice: Using Software Metrics to Characterize, Evaluate, and Improve the Design of Object-Oriented Systems ( 1 st ed.). Springer Publishing Company, Inc orporated. Michele Lanza and Radu Marinescu. 2010. Object-Oriented Metrics in Practice: Using Software Metrics to Characterize, Evaluate, and Improve the Design of Object-Oriented Systems (1st ed.). Springer Publishing Company, Incorporated.","edition":"1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950317"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00019"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2012.35"},{"key":"e_1_3_2_1_28_1","volume-title":"An Empirical Study of Refactorings in Merge Conflicts. In 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE, 151--162","author":"Mahmoudi Mehran","year":"2019","unstructured":"Mehran Mahmoudi , Sarah Nadi , and Nikolaos Tsantalis . 2019 . Are Refactorings to Blame? An Empirical Study of Refactorings in Merge Conflicts. In 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE, 151--162 . Mehran Mahmoudi, Sarah Nadi, and Nikolaos Tsantalis. 2019. Are Refactorings to Blame? An Empirical Study of Refactorings in Merge Conflicts. In 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE, 151--162."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1960314.1960335"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351760"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642965"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2008.123"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.41"},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the Workshop on Formal Techniques for Java Programs, co-located with the 14th European Conference on Object-Oriented Programming (ECOOP). 1--6.","author":"Cinn\u00e9ide Mel","year":"2000","unstructured":"Mel \u00d3 Cinn\u00e9ide and Paddy Nixon . 2000 . Composite refactorings for Java programs . In Proceedings of the Workshop on Formal Techniques for Java Programs, co-located with the 14th European Conference on Object-Oriented Programming (ECOOP). 1--6. Mel \u00d3 Cinn\u00e9ide and Paddy Nixon. 2000. Composite refactorings for Java programs. In Proceedings of the Workshop on Formal Techniques for Java Programs, co-located with the 14th European Conference on Object-Oriented Programming (ECOOP). 1--6."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13173-018-0078-y"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884868"},{"key":"e_1_3_2_1_37_1","first-page":"5","article-title":"Search-based Refactoring: An Empirical Study","volume":"20","author":"O'Keeffe Mark","year":"2008","unstructured":"Mark O'Keeffe and Mel \u00d3 Cinn\u00e9ide . 2008 . Search-based Refactoring: An Empirical Study . J. Softw. Maint. Evol. 20 , 5 (Sept. 2008), 345--364. https:\/\/doi.org\/10.1002\/smr.v20:5 10.1002\/smr.v20:5 Mark O'Keeffe and Mel \u00d3 Cinn\u00e9ide. 2008. Search-based Refactoring: An Empirical Study. J. Softw. Maint. Evol. 20, 5 (Sept. 2008), 345--364. https:\/\/doi.org\/10.1002\/smr.v20:5","journal-title":"J. Softw. Maint. Evol."},{"key":"e_1_3_2_1_38_1","volume-title":"Collaborative Identification of Code Smells: A Multi-Case Study. In 39th IEEE\/ACM International Conference on Software Engineering: Software Engineering in Practice Track, ICSE-SEIP 2017","author":"Oliveira Roberto Felicio","year":"2017","unstructured":"Roberto Felicio Oliveira , Leonardo da Silva Sousa , Rafael Maiani de Mello , Natasha M. Costa Valentim , Adriana Lopes , Tayana Conte , Alessandro F. Garcia , Edson Cesar Cunha de Oliveira , and Carlos Jos\u00e9 Pereira de Lucena . 2017 . Collaborative Identification of Code Smells: A Multi-Case Study. In 39th IEEE\/ACM International Conference on Software Engineering: Software Engineering in Practice Track, ICSE-SEIP 2017 , Buenos Aires, Argentina , May 20-28, 2017. IEEE Computer Society, 33--42. Roberto Felicio Oliveira, Leonardo da Silva Sousa, Rafael Maiani de Mello, Natasha M. Costa Valentim, Adriana Lopes, Tayana Conte, Alessandro F. Garcia, Edson Cesar Cunha de Oliveira, and Carlos Jos\u00e9 Pereira de Lucena. 2017. Collaborative Identification of Code Smells: A Multi-Case Study. In 39th IEEE\/ACM International Conference on Software Engineering: Software Engineering in Practice Track, ICSE-SEIP 2017, Buenos Aires, Argentina, May 20-28, 2017. IEEE Computer Society, 33--42."},{"key":"e_1_3_2_1_39_1","volume-title":"Eduardo Fernandes, Alessandro Garcia, and Carlos Lucena.","author":"Oliveira Roberto Felicio","year":"2020","unstructured":"Roberto Felicio Oliveira , Rafael Maiani de Mello , Eduardo Fernandes, Alessandro Garcia, and Carlos Lucena. 2020 . Collaborative or individual identification of code smells? On the effectiveness of novice and professional developers. Inf. Softw. Technol . 120 (2020). Roberto Felicio Oliveira, Rafael Maiani de Mello, Eduardo Fernandes, Alessandro Garcia, and Carlos Lucena. 2020. Collaborative or individual identification of code smells? On the effectiveness of novice and professional developers. Inf. Softw. Technol. 120 (2020)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1843"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2013.31"},{"key":"e_1_3_2_1_43_1","unstructured":"2020 Replication Package. 2020. https:\/\/figshare.com\/s\/81f7973d07ceb7e4796c.  2020 Replication Package. 2020. https:\/\/figshare.com\/s\/81f7973d07ceb7e4796c."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2017.38"},{"key":"e_1_3_2_1_45_1","volume-title":"Searching for Opportunities of Refactoring Sequences: Reducing the Search Space. In 2008 32nd Annual IEEE International Computer Software and Applications Conference. 319--326","author":"Piveta E.","year":"2008","unstructured":"E. Piveta , J. Araujo , M. Pimenta , A. Moreira , P. Guerreiro , and R. T. Price . 2008 . Searching for Opportunities of Refactoring Sequences: Reducing the Search Space. In 2008 32nd Annual IEEE International Computer Software and Applications Conference. 319--326 . https:\/\/doi.org\/10.1109\/COMPSAC. 2008 .119 10.1109\/COMPSAC.2008.119 E. Piveta, J. Araujo, M. Pimenta, A. Moreira, P. Guerreiro, and R. T. Price. 2008. Searching for Opportunities of Refactoring Sequences: Reducing the Search Space. In 2008 32nd Annual IEEE International Computer Software and Applications Conference. 319--326. https:\/\/doi.org\/10.1109\/COMPSAC.2008.119"},{"key":"e_1_3_2_1_46_1","volume-title":"Proceedings of IEEE International Conference on Software Maintenance. 1--10","author":"Prete K.","year":"2010","unstructured":"K. Prete , N. Rachatasumrit , N. Sudan , and M. Kim . 2010. Template-Based Reconstruction of Complex Refactorings . In Proceedings of IEEE International Conference on Software Maintenance. 1--10 . https:\/\/doi.org\/10.1109\/ICSM. 2010 .5609577 10.1109\/ICSM.2010.5609577 K. Prete, N. Rachatasumrit, N. Sudan, and M. Kim. 2010. Template-Based Reconstruction of Complex Refactorings. In Proceedings of IEEE International Conference on Software Maintenance. 1--10. https:\/\/doi.org\/10.1109\/ICSM.2010.5609577"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1370750.1370759"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2544173.2509544"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950305"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.08.071"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330192"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180206"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818805"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2019.05.002"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2019.07.003"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486878"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2013.08.002"},{"key":"e_1_3_2_1_58_1","volume-title":"Proceedings of the 37th International Conference on Software Engineering -","volume":"1","author":"Yoon Young Seok","year":"1875","unstructured":"Young Seok Yoon and Brad A. Myers . 2015. Supporting Selective Undo in a Code Editor . In Proceedings of the 37th International Conference on Software Engineering - Volume 1 (ICSE '15). IEEE Press, Piscataway, NJ, USA, 223--233. http:\/\/dl.acm.org\/citation.cfm?id=28 1875 4.2818784 Young Seok Yoon and Brad A. Myers. 2015. Supporting Selective Undo in a Code Editor. In Proceedings of the 37th International Conference on Software Engineering - Volume 1 (ICSE '15). IEEE Press, Piscataway, NJ, USA, 223--233. http:\/\/dl.acm.org\/citation.cfm?id=2818754.2818784"}],"event":{"name":"MSR '20: 17th International Conference on Mining Software Repositories","location":"Seoul Republic of Korea","acronym":"MSR '20","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS","SIGAI ACM Special Interest Group on Artificial Intelligence","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 17th International Conference on Mining Software Repositories"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3379597.3387477","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3379597.3387477","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:20Z","timestamp":1750200080000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3379597.3387477"}},"subtitle":["Concepts, Heuristics and Patterns"],"short-title":[],"issued":{"date-parts":[[2020,6,29]]},"references-count":56,"alternative-id":["10.1145\/3379597.3387477","10.1145\/3379597"],"URL":"https:\/\/doi.org\/10.1145\/3379597.3387477","relation":{},"subject":[],"published":{"date-parts":[[2020,6,29]]},"assertion":[{"value":"2020-09-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}