{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:18:50Z","timestamp":1755998330926,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T00:00:00Z","timestamp":1603065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,19]]},"DOI":"10.1145\/3425269.3425274","type":"proceedings-article","created":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T16:04:58Z","timestamp":1604073898000},"page":"101-110","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["RefDiff4Go"],"prefix":"10.1145","author":[{"given":"Rodrigo","family":"Brito","sequence":"first","affiliation":[{"name":"ASERG Group - Department of Computer Science, Federal University of Minas Gerais (UFMG), Belo Horizonte, Brazil"}]},{"given":"Marco Tulio","family":"Valente","sequence":"additional","affiliation":[{"name":"ASERG Group - Department of Computer Science, Federal University of Minas Gerais (UFMG), Belo Horizonte, Brazil"}]}],"member":"320","published-online":{"date-parts":[[2020,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"How Does Refactoring Impact Security When Improving Quality? A Security-Aware Refactoring Approach","author":"Abid Chaima","year":"2020","unstructured":"Chaima Abid , Marouane Kessentini , Vahid Alizadeh , Mouna Dhouadi , and Rick Kazman . 2020. How Does Refactoring Impact Security When Improving Quality? A Security-Aware Refactoring Approach . IEEE Transactions on Software Engineering ( 2020 ), 1--1. Chaima Abid, Marouane Kessentini, Vahid Alizadeh, Mouna Dhouadi, and Rick Kazman. 2020. How Does Refactoring Impact Security When Improving Quality? A Security-Aware Refactoring Approach. IEEE Transactions on Software Engineering (2020), 1--1."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00081"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2661674"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2008.57"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2019.8870183"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2016.31"},{"key":"e_1_3_2_1_7_1","volume-title":"27th International Conference on Software Analysis, Evolution and Reengineering (SANER). 367--377","author":"Brito Aline","year":"2020","unstructured":"Aline Brito , Andre Hora , and Marco Tulio Valente . 2020 . Refactoring Graphs: Assessing Refactoring over Time . In 27th International Conference on Software Analysis, Evolution and Reengineering (SANER). 367--377 . Aline Brito, Andre Hora, and Marco Tulio Valente. 2020. Refactoring Graphs: Assessing Refactoring over Time. In 27th International Conference on Software Analysis, Evolution and Reengineering (SANER). 367--377."},{"key":"e_1_3_2_1_8_1","volume-title":"GoCity: Code City for Go. In 26th International Conference on Software Analysis, Evolution and Reengineering (SANER), Tool Track. 649--653","author":"Brito Rodrigo","year":"2019","unstructured":"Rodrigo Brito , Aline Brito , Gleison Brito , and Marco Tulio Valente . 2019 . GoCity: Code City for Go. In 26th International Conference on Software Analysis, Evolution and Reengineering (SANER), Tool Track. 649--653 . Rodrigo Brito, Aline Brito, Gleison Brito, and Marco Tulio Valente. 2019. GoCity: Code City for Go. In 26th International Conference on Software Analysis, Evolution and Reengineering (SANER), Tool Track. 649--653."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.73"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/11785477_24"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/2851099"},{"volume-title":"Refactoring: improving the design of existing code","author":"Fowler Martin","key":"e_1_3_2_1_12_1","unstructured":"Martin Fowler . 2018. Refactoring: improving the design of existing code . Addison-Wesley Professional . Martin Fowler. 2018. Refactoring: improving the design of existing code. Addison-Wesley Professional."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2048147.2048157"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882353"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393655"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2318734"},{"key":"e_1_3_2_1_17_1","volume-title":"27th International Conference on Software Analysis, Evolution and Reengineering (SANER). 512--516","author":"Krasniqi Rrezarta","year":"2020","unstructured":"Rrezarta Krasniqi and Jane Cleland-Huang . 2020 . Enhancing Source Code Refactoring Detection with Explanations from Commit Messages . In 27th International Conference on Software Analysis, Evolution and Reengineering (SANER). 512--516 . Rrezarta Krasniqi and Jane Cleland-Huang. 2020. Enhancing Source Code Refactoring Detection with Explanations from Commit Messages. In 27th International Conference on Software Analysis, Evolution and Reengineering (SANER). 512--516."},{"key":"e_1_3_2_1_18_1","volume-title":"Code smells and refactoring: a tertiary systematic review of challenges and observations. Journal of Systems and Software","author":"Lacerda Guilherme","year":"2020","unstructured":"Guilherme Lacerda , Fabio Petrillo , Marcelo Pimenta , and Yann Ga\u00ebl Gu\u00e9h\u00e9neuc . 2020. Code smells and refactoring: a tertiary systematic review of challenges and observations. Journal of Systems and Software ( 2020 ), 110610. Guilherme Lacerda, Fabio Petrillo, Marcelo Pimenta, and Yann Ga\u00ebl Gu\u00e9h\u00e9neuc. 2020. Code smells and refactoring: a tertiary systematic review of challenges and observations. Journal of Systems and Software (2020), 110610."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31424-7_54"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133909"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.11.010"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070529"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.41"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39038-8_23"},{"key":"e_1_3_2_1_25_1","unstructured":"Rob Pike. 2012 (accessed August 9 2020). Go at Google: Language design in the service of software engineering. http:\/\/talks.golang.org\/2012\/splash.article.  Rob Pike. 2012 (accessed August 9 2020). Go at Google: Language design in the service of software engineering. http:\/\/talks.golang.org\/2012\/splash.article."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609577"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1370750.1370759"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/576628"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3360596"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.2968072"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950305"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.14"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2018.09.016"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.11.073"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/2555523.2555539"},{"key":"e_1_3_2_1_36_1","volume-title":"IEEE Transactions on Software Engineering","author":"Tsantalis Nikolaos","year":"2020","unstructured":"Nikolaos Tsantalis , Ameya Ketkar , and Danny Dig . 2020. RefactoringMiner 2.0. IEEE Transactions on Software Engineering ( 2020 ). Nikolaos Tsantalis, Ameya Ketkar, and Danny Dig. 2020. RefactoringMiner 2.0. IEEE Transactions on Software Engineering (2020)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180206"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101919"}],"event":{"name":"SBCARS '20: 14th Brazilian Symposium on Software Components, Architectures, and Reuse","sponsor":["SBC Brazilian Computer Society"],"location":"Natal Brazil","acronym":"SBCARS '20"},"container-title":["Proceedings of the 14th Brazilian Symposium on Software Components, Architectures, and Reuse"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3425269.3425274","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3425269.3425274","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:54Z","timestamp":1750195914000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3425269.3425274"}},"subtitle":["Detecting Refactorings in Go"],"short-title":[],"issued":{"date-parts":[[2020,10,19]]},"references-count":38,"alternative-id":["10.1145\/3425269.3425274","10.1145\/3425269"],"URL":"https:\/\/doi.org\/10.1145\/3425269.3425274","relation":{},"subject":[],"published":{"date-parts":[[2020,10,19]]},"assertion":[{"value":"2020-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}