{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:20:28Z","timestamp":1759335628943,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,28]],"date-time":"2020-06-28T00:00:00Z","timestamp":1593302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"FAPEMIG","award":["PPM-00651-17"],"award-info":[{"award-number":["PPM-00651-17"]}]},{"name":"CNPq","award":["424340\/2016-0"],"award-info":[{"award-number":["424340\/2016-0"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,28]]},"DOI":"10.1145\/3387906.3388618","type":"proceedings-article","created":{"date-parts":[[2020,9,25]],"date-time":"2020-09-25T18:17:46Z","timestamp":1601057866000},"page":"31-40","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Detecting bad smells with machine learning algorithms"],"prefix":"10.1145","author":[{"given":"Daniel","family":"Cruz","sequence":"first","affiliation":[{"name":"Federal University of Minas Gerais, Belo Horizonte, Brazil"}]},{"given":"Amanda","family":"Santana","sequence":"additional","affiliation":[{"name":"Federal University of Minas Gerais, Belo Horizonte, Brazil"}]},{"given":"Eduardo","family":"Figueiredo","sequence":"additional","affiliation":[{"name":"Federal University of Minas Gerais, Belo Horizonte, Brazil"}]}],"member":"320","published-online":{"date-parts":[[2020,9,25]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2020. Detecting Bad Smells with Machine Learning Algorithms - Complementary Web Page: dvscross.github.io\/BadSmellsDetectionStudy.  2020. Detecting Bad Smells with Machine Learning Algorithms - Complementary Web Page: dvscross.github.io\/BadSmellsDetectionStudy."},{"volume-title":"European Conference on Software Maintenance and Reengineering (CSMR). 181--190","author":"Abbes M.","key":"e_1_3_2_1_2_1"},{"volume-title":"Symposium on Software Reliability Engineering (ISSRE) pages=261--269 year=2015 Ribeiro, M. [n. d.]. Experience report: Evaluating the effectiveness of decision trees for detecting code smells.","author":"Amorim L.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","unstructured":"M. Aniche. 2015. Java code metrics calculator (CK). Available in github.com\/mauricioaniche\/ck\/.  M. Aniche. 2015. Java code metrics calculator (CK). Available in github.com\/mauricioaniche\/ck\/."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756006.1859912"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"H. Barkmann R. Lincke and W. L\u00f6we. 2009. Quantitative evaluation of software quality metrics in open-source projects. In Int'l Conf. on Advanced Information Networking and Applications Workshops (AINA). 1067--1072.  H. Barkmann R. Lincke and W. L\u00f6we. 2009. Quantitative evaluation of software quality metrics in open-source projects. In Int'l Conf. on Advanced Information Networking and Applications Workshops (AINA). 1067--1072.","DOI":"10.1109\/WAINA.2009.190"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/2503308.2188395"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/223427.211856"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"L. Breiman. 2001. Random forests. Machine learning 45 1 (2001) 5--32.  L. Breiman. 2001. Random forests. Machine learning 45 1 (2001) 5--32.","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"L. Breiman. 2017. Classification and regression trees. Routledge.  L. Breiman. 2017. Classification and regression trees. Routledge.","DOI":"10.1201\/9781315139470"},{"key":"e_1_3_2_1_11_1","first-page":"2079","article-title":"On over-fitting in model selection and subsequent selection bias in performance evaluation","author":"Cawley G. C.","year":"2010","journal-title":"Journal of Machine Learning Research (JMLR) 11"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.295895"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1053964"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"D. Di Nucci F. Palomba D. A. Tamburri A. Serebrenik and A. De Lucia. 2018. Detecting code smells using machine learning techniques: are we there yet?. In Int'l Conf. on Software Analysis Evolution and Reengineering (SANER). 612--621.  D. Di Nucci F. Palomba D. A. Tamburri A. Serebrenik and A. De Lucia. 2018. Detecting code smells using machine learning techniques: are we there yet?. In Int'l Conf. on Software Analysis Evolution and Reengineering (SANER). 612--621.","DOI":"10.1109\/SANER.2018.8330266"},{"volume-title":"Proceedings of the Int'l Conf. on Evaluation and Assessment in Software Engineering (EASE).","author":"Fernandes E.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"M. Fokaefs N. Tsantalis E. Stroulia and A. Chatzigeorgiou. 2011. JDeodorant: identification and application of extract class refactorings. In Int'l Conf. on Software Engineering (ICSE). 1037--1039.  M. Fokaefs N. Tsantalis E. Stroulia and A. Chatzigeorgiou. 2011. JDeodorant: identification and application of extract class refactorings. In Int'l Conf. on Software Engineering (ICSE). 1037--1039.","DOI":"10.1145\/1985793.1985989"},{"volume-title":"Proceedings of the International Workshop on Managing Technical Debt. 15--22","author":"Fontana F. A.","key":"e_1_3_2_1_18_1"},{"volume-title":"Proceedings of the International Workshop on Emerging Trends in Software Metrics (WETSoM). 44--53","author":"Fontana F. A.","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/2938006.2938019"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"F. A. Fontana M. Zanoni A. Marino and M. V. M\u00e4ntyl\u00e4. 2013. Code Smell Detection: Towards a Machine Learning-Based Approach (ICSM). In Int'l Conf. on Software Maintenance. 396--399.  F. A. Fontana M. Zanoni A. Marino and M. V. M\u00e4ntyl\u00e4. 2013. Code Smell Detection: Towards a Machine Learning-Based Approach (ICSM). In Int'l Conf. on Software Maintenance. 396--399.","DOI":"10.1109\/ICSM.2013.56"},{"key":"e_1_3_2_1_22_1","unstructured":"M. Fowler. 2018. Refactoring: improving the design of existing code. Addison-Wesley Professional.  M. Fowler. 2018. Refactoring: improving the design of existing code. Addison-Wesley Professional."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9162-z"},{"key":"e_1_3_2_1_24_1","unstructured":"M. Hitz and B. Montazeri. 1995. Measuring coupling and cohesion in object-oriented systems.  M. Hitz and B. Montazeri. 1995. Measuring coupling and cohesion in object-oriented systems."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"K. Hornik M. Stinchcombe and H. White. 1989. Multilayer feedforward networks are universal approximators. Neural networks 2 5 (1989) 359--366.  K. Hornik M. Stinchcombe and H. White. 1989. Multilayer feedforward networks are universal approximators. Neural networks 2 5 (1989) 359--366.","DOI":"10.1016\/0893-6080(89)90020-8"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9171-y"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"F. Khomh S. Vaucher YG. Gu\u00e9h\u00e9neuc and H. Sahraoui. 2009. A bayesian approach for the detection of code and design smells. In Int'l Conf. on Quality Software. 305--314.  F. Khomh S. Vaucher YG. Gu\u00e9h\u00e9neuc and H. Sahraoui. 2009. A bayesian approach for the detection of code and design smells. In Int'l Conf. on Quality Software. 305--314.","DOI":"10.1109\/QSIC.2009.47"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.11.921"},{"key":"e_1_3_2_1_29_1","unstructured":"D. G. Kleinbaum K. Dietz M. Gail M. Klein and M. Klein. 2002. Logistic regression. Springer.  D. G. Kleinbaum K. Dietz M. Gail M. Klein and M. Klein. 2002. Logistic regression. Springer."},{"key":"e_1_3_2_1_30_1","volume-title":"International Joint Conferences on Artificial Intelligence(IJCAI)","volume":"14","author":"Kohavi R.","year":"1995"},{"key":"e_1_3_2_1_31_1","unstructured":"M. Lanza and R. Marinescu. 2007. Object-oriented metrics in practice: using software metrics to characterize evaluate and improve the design of object-oriented systems. Springer Science & Business Media.  M. Lanza and R. Marinescu. 2007. Object-oriented metrics in practice: using software metrics to characterize evaluate and improve the design of object-oriented systems. Springer Science & Business Media."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0026666"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(93)90077-B"},{"key":"e_1_3_2_1_34_1","unstructured":"S. M. Lundberg and SI. Lee. 2017. A unified approach to interpreting model predictions. In Advances in Neural Information Processing Systems (NIPS). 4765--4774.  S. M. Lundberg and SI. Lee. 2017. A unified approach to interpreting model predictions. In Advances in Neural Information Processing Systems (NIPS). 4765--4774."},{"volume-title":"SMURF: A SVM-based Incremental Anti-pattern Detection Approach. In Working Conference on Reverse Engineering (WCRE). 466--475","author":"Maiga A.","key":"e_1_3_2_1_35_1"},{"volume-title":"Proceedings of Int'l Conf. on Automated Software Engineering (ASE). 278--281","author":"Maiga A.","key":"e_1_3_2_1_36_1"},{"key":"e_1_3_2_1_37_1","unstructured":"C. Marinescu R. Marinescu P. F. Mihancea and R. Wettel. 2005. iplasma: An integrated platform for quality assessment of object-oriented design. In In ICSM (Industrial and Tool Volume). 77--80.  C. Marinescu R. Marinescu P. F. Mihancea and R. Wettel. 2005. iplasma: An integrated platform for quality assessment of object-oriented design. In In ICSM (Industrial and Tool Volume). 77--80."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2004.1357820"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.50"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13173-018-0078-y"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"R. M. O'brien. 2007. A caution regarding rules of thumb for variance inflation factors. Quality & quantity 41 5 (2007) 673--690.  R. M. O'brien. 2007. A caution regarding rules of thumb for variance inflation factors. Quality & quantity 41 5 (2007) 673--690.","DOI":"10.1007\/s11135-006-9018-6"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9535-z"},{"volume-title":"Proceedings of the Int'l Conf. on Automated Software Engineering (ASE). 268--278","author":"Palomba F.","key":"e_1_3_2_1_43_1"},{"volume-title":"Working Conference on Mining Software Repositories (MSR). 482--485","author":"Palomba F.","key":"e_1_3_2_1_44_1"},{"key":"e_1_3_2_1_45_1","unstructured":"J. R. Quinlan. 2014. C4. 5: programs for machine learning. Elsevier.  J. R. Quinlan. 2014. C4. 5: programs for machine learning. Elsevier."},{"volume-title":"Proceedings of the Int'l Conf. on Knowledge Discovery and Data Mining (KDD). 1135--1144","author":"Ribeiro M. T.","key":"e_1_3_2_1_46_1"},{"volume-title":"Proceedings of the International Symposium on Empirical Software Engineering and Measurement (ESEM).","author":"Schumacher J.","key":"e_1_3_2_1_47_1"},{"volume-title":"Conf. on Software Engineering pages=130--140 year=2017 P\u00e9raire, C. [n. d.]. Software development waste.","author":"Sedano T.","key":"e_1_3_2_1_48_1"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1974.tb00994.x"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756006.1756007"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"E. \u0160trumbelj and I. Kononenko. 2014. Explaining prediction models and individual predictions with feature contributions. Knowledge and information systems 41 3 (2014) 647--665.  E. \u0160trumbelj and I. Kononenko. 2014. Explaining prediction models and individual predictions with feature contributions. Knowledge and information systems 41 3 (2014) 647--665.","DOI":"10.1007\/s10115-013-0679-x"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","unstructured":"G. Suryanarayana G. Samarthyam and T. Sharma. 2014. Refactoring for software design smells: managing technical debt. Morgan Kaufmann.  G. Suryanarayana G. Samarthyam and T. Sharma. 2014. Refactoring for software design smells: managing technical debt. Morgan Kaufmann.","DOI":"10.1016\/B978-0-12-801397-7.00001-1"},{"volume-title":"The Qualitas Corpus: A Curated Collection of Java Code for Empirical Studies. In Asia Pacific Software Engineering Conference (APSEC). 336--345","author":"Tempero E.","key":"e_1_3_2_1_53_1"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"crossref","unstructured":"S. Vidal H. Vazquez J. A. Diaz-Pace C. Marcos A. Garcia and W. Oizumi. 2015. JSpIRIT: a flexible tool for the analysis of code smells. In Int'l Conf. of the Chilean Computer Science Society (SCCC). 1--6.  S. Vidal H. Vazquez J. A. Diaz-Pace C. Marcos A. Garcia and W. Oizumi. 2015. JSpIRIT: a flexible tool for the analysis of code smells. In Int'l Conf. of the Chilean Computer Science Society (SCCC). 1--6.","DOI":"10.1109\/SCCC.2015.7416572"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.05.007"}],"event":{"name":"TechDebt '20: International Conference on Technical Debt","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Seoul Republic of Korea","acronym":"TechDebt '20"},"container-title":["Proceedings of the 3rd International Conference on Technical Debt"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387906.3388618","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3387906.3388618","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:42Z","timestamp":1750200102000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387906.3388618"}},"subtitle":["an empirical study"],"short-title":[],"issued":{"date-parts":[[2020,6,28]]},"references-count":55,"alternative-id":["10.1145\/3387906.3388618","10.1145\/3387906"],"URL":"https:\/\/doi.org\/10.1145\/3387906.3388618","relation":{},"subject":[],"published":{"date-parts":[[2020,6,28]]},"assertion":[{"value":"2020-09-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}