{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T06:43:09Z","timestamp":1764225789529,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T00:00:00Z","timestamp":1663545600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ICT Division, Ministry of Posts, Telecommunications and Information Technology, Bangladesh","award":["56.00.0000.052.33.005.21-2"],"award-info":[{"award-number":["56.00.0000.052.33.005.21-2"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,9,19]]},"DOI":"10.1145\/3544902.3546634","type":"proceedings-article","created":{"date-parts":[[2022,9,7]],"date-time":"2022-09-07T04:07:45Z","timestamp":1662523665000},"page":"289-294","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["An Empirical Study on the Occurrences of Code Smells in Open Source and Industrial Projects"],"prefix":"10.1145","author":[{"given":"Md. Masudur","family":"Rahman","sequence":"first","affiliation":[{"name":"Institute of Information Technology (IIT), University of Dhaka, Bangladesh"}]},{"given":"Abdus","family":"Satter","sequence":"additional","affiliation":[{"name":"Institute of Information Technology (IIT), University of Dhaka, Bangladesh"}]},{"given":"Md. Mahbubul Alam","family":"Joarder","sequence":"additional","affiliation":[{"name":"Institute of Information Technology (IIT), University of Dhaka, Bangladesh"}]},{"given":"Kazi","family":"Sakib","sequence":"additional","affiliation":[{"name":"Institute of Information Technology (IIT), University of Dhaka, Bangladesh"}]}],"member":"320","published-online":{"date-parts":[[2022,9,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11334-013-0205-z"},{"volume-title":"Refactoring: improving the design of existing code","author":"Fowler Martin","key":"e_1_3_2_1_2_1","unstructured":"Martin Fowler . 2018. Refactoring: improving the design of existing code . Addison-Wesley Professional . Martin Fowler. 2018. Refactoring: improving the design of existing code. Addison-Wesley Professional."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9171-y"},{"key":"e_1_3_2_1_4_1","first-page":"100","article-title":"Introduction to information retrieval","volume":"16","author":"Manning Christopher","year":"2010","unstructured":"Christopher Manning , Prabhakar Raghavan , and Hinrich Sch\u00fctze . 2010 . Introduction to information retrieval . Natural Language Engineering 16 , 1 (2010), 100 \u2013 103 . Christopher Manning, Prabhakar Raghavan, and Hinrich Sch\u00fctze. 2010. Introduction to information retrieval. Natural Language Engineering 16, 1 (2010), 100\u2013103.","journal-title":"Natural Language Engineering"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.50"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.41"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.02.004"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2372760"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9535-z"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2019.00023"},{"volume-title":"Case study research in software engineering: Guidelines and examples","author":"Runeson Per","key":"e_1_3_2_1_11_1","unstructured":"Per Runeson , Martin Host , Austen Rainer , and Bjorn Regnell . 2012. Case study research in software engineering: Guidelines and examples . John Wiley & Sons . Per Runeson, Martin Host, Austen Rainer, and Bjorn Regnell. 2012. Case study research in software engineering: Guidelines and examples. John Wiley & Sons."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.89"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330192"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606614"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332458"}],"event":{"name":"ESEM '22: ACM \/ IEEE International Symposium on Empirical Software Engineering and Measurement","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Helsinki Finland","acronym":"ESEM '22"},"container-title":["Proceedings of the 16th ACM \/ IEEE International Symposium on Empirical Software Engineering and Measurement"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544902.3546634","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544902.3546634","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:01Z","timestamp":1750186801000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544902.3546634"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,19]]},"references-count":15,"alternative-id":["10.1145\/3544902.3546634","10.1145\/3544902"],"URL":"https:\/\/doi.org\/10.1145\/3544902.3546634","relation":{},"subject":[],"published":{"date-parts":[[2022,9,19]]},"assertion":[{"value":"2022-09-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}