{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T08:53:32Z","timestamp":1770454412978,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,2,27]],"date-time":"2020-02-27T00:00:00Z","timestamp":1582761600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,2,27]]},"DOI":"10.1145\/3385032.3385042","type":"proceedings-article","created":{"date-parts":[[2020,3,25]],"date-time":"2020-03-25T10:04:52Z","timestamp":1585130692000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Prediction of Web Service Anti-patterns Using Aggregate Software Metrics and Machine Learning Techniques"],"prefix":"10.1145","author":[{"given":"Sahithi","family":"Tummalapalli","sequence":"first","affiliation":[{"name":"BITS Pilani Hyderabad, India"}]},{"given":"Lov","family":"Kumar","sequence":"additional","affiliation":[{"name":"BITS Pilani Hyderabad, India"}]},{"given":"N. L. Bhanu","family":"Murthy","sequence":"additional","affiliation":[{"name":"BITS Pilani Hyderabad, India"}]}],"member":"320","published-online":{"date-parts":[[2020,3,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/556393"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TOOLS.1999.787532"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.303623"},{"key":"e_1_3_2_1_4_1","volume-title":"J2EE antipatterns","author":"Dudney B.","year":"2003","unstructured":"B. Dudney, S. Asbury, J. K. Krozak, and K. Wittkopf. J2EE antipatterns. John Wiley & Sons, 2003."},{"key":"e_1_3_2_1_5_1","first-page":"332","article-title":"A review of class imbalance problem","volume":"1","author":"Elrahman S. M. A.","year":"2013","unstructured":"S. M. A. Elrahman and A. Abraham. A review of class imbalance problem. Journal of Network and Innovative Computing, 1(2013):332--340, 2013.","journal-title":"Journal of Network and Innovative Computing"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2011.2161285"},{"key":"e_1_3_2_1_7_1","first-page":"60","volume-title":"Empirical software engineering and verification","author":"Juristo N.","year":"2010","unstructured":"N. Juristo and O. S. G\u00f3mez. Replication of software engineering experiments. In Empirical software engineering and verification, pages 60--88. Springer, 2010."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9061-0"},{"key":"e_1_3_2_1_9_1","first-page":"160","volume-title":"Crucial service-oriented antipatterns","author":"Kr\u00e1l J.","year":"2008","unstructured":"J. Kr\u00e1l and M. Zemlicka. Crucial service-oriented antipatterns. vol. 2. International Academy, Research and Industry Association (IARIA), pages 160--171, 2008."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2018.00010"},{"key":"e_1_3_2_1_11_1","volume-title":"Schedule of bad smell detection and resolution: A new way to save effort","author":"Liu H.","year":"2011","unstructured":"H. Liu, Z. Ma, W. Shao, and Z. Niu. Schedule of bad smell detection and resolution: A new way to save effort. IEEE transactions on Software Engineering, 38(1):220--235, 2011."},{"key":"e_1_3_2_1_12_1","first-page":"466","volume-title":"Reverse engineering (WCRE)","author":"Maiga A.","year":"2012","unstructured":"A. Maiga, N. Ali, N. Bhattacharya, A. Sabane, Y.-G. Gueheneuc, and E. Aimeur. Smurf: A svm-based incremental anti-pattern detection approach. In Reverse engineering (WCRE), 2012 19th working conference on, pages 466--475. IEEE, 2012."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJWGS.2011.044710"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJWGS.2013.054108"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2739480.2754724"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2015.2502595"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2015.2502595"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2015.2502595"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-09970-5_6"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218843013410049"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218843013410049"},{"key":"e_1_3_2_1_22_1","first-page":"19","volume-title":"Detecting bad smells in object oriented design using design change propagation probability matrix 1","author":"Rao A. A.","year":"2007","unstructured":"A. A. Rao and K. N. Reddy. Detecting bad smells in object oriented design using design change propagation probability matrix 1. volume 01, pages 19--21. Citeseer, 2007."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16283-1_18"},{"key":"e_1_3_2_1_24_1","volume-title":"Manning","author":"Rotem-Gal-Oz A.","year":"2012","unstructured":"A. Rotem-Gal-Oz, E. Bruno, and U. Dahan. SOA patterns. Manning, 2012."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2017.080555"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2001.914965"},{"key":"e_1_3_2_1_27_1","first-page":"47","volume-title":"ACM Sigplan Notices","author":"Travassos G.","year":"1999","unstructured":"G. Travassos, F. Shull, M. Fredericks, and V. R. Basili. Detecting defects in object-oriented designs: using reading techniques to increase software quality. In ACM Sigplan Notices, volume 34, pages 47--56. ACM, 1999."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2016.81"}],"event":{"name":"ISEC 2020: 13th Innovations in Software Engineering Conference","location":"Jabalpur India","acronym":"ISEC 2020","sponsor":["iSOFT iSOFT","SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 13th Innovations in Software Engineering Conference (formerly known as India Software Engineering Conference)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3385032.3385042","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3385032.3385042","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:13Z","timestamp":1750200073000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3385032.3385042"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,27]]},"references-count":28,"alternative-id":["10.1145\/3385032.3385042","10.1145\/3385032"],"URL":"https:\/\/doi.org\/10.1145\/3385032.3385042","relation":{},"subject":[],"published":{"date-parts":[[2020,2,27]]},"assertion":[{"value":"2020-03-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}