{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:02:09Z","timestamp":1750309329708,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,27]],"date-time":"2024-10-27T00:00:00Z","timestamp":1729987200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62232003"],"award-info":[{"award-number":["62232003"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,27]]},"DOI":"10.1145\/3691620.3694992","type":"proceedings-article","created":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T15:39:19Z","timestamp":1729265959000},"page":"129-140","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A Position-Aware Approach to Decomposing God Classes"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-7238-1615","authenticated-orcid":false,"given":"Tianyi","family":"Chen","sequence":"first","affiliation":[{"name":"Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6404-9143","authenticated-orcid":false,"given":"Yanjie","family":"Jiang","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-0256-4028","authenticated-orcid":false,"given":"Fu","family":"Fan","sequence":"additional","affiliation":[{"name":"Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5055-2837","authenticated-orcid":false,"given":"Bo","family":"Liu","sequence":"additional","affiliation":[{"name":"Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3267-6801","authenticated-orcid":false,"given":"Hui","family":"Liu","sequence":"additional","affiliation":[{"name":"Beijing Institute of Technology, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2024,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5220\/0007743804270433"},{"key":"e_1_3_2_1_2_1","first-page":"123","article-title":"Extract Class Refactoring Based on Cohesion and Coupling","volume":"11","author":"Alzahrani Musaad","year":"2022","unstructured":"Musaad Alzahrani. 2022. Extract Class Refactoring Based on Cohesion and Coupling: A Greedy Approach. Computers 11, 8 (2022), 123.","journal-title":"A Greedy Approach. Computers"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2019.00027"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1999.806964"},{"key":"e_1_3_2_1_5_1","unstructured":"ant media. 2017. Ant-Media-server. https:\/\/github.com\/ant-media\/Ant-Media-Server"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9378-4"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-013-9256-x"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.11.918"},{"key":"e_1_3_2_1_9_1","volume-title":"Bad Smells in Code. Refactoring: Improving the design of existing code 1","author":"Beck Kent","year":"1999","unstructured":"Kent Beck, Martin Fowler, and Grandma Beck. 1999. Bad Smells in Code. Refactoring: Improving the design of existing code 1, 1999 (1999), 75--88."},{"key":"e_1_3_2_1_10_1","first-page":"6","volume-title":"Proceedings of international journal of advanced research in computer science and software engineering 3","author":"Bhargava Neeraj","year":"2013","unstructured":"Neeraj Bhargava, Girja Sharma, Ritu Bhargava, and Manish Mathuria. 2013. Decision Tree Analysis on j48 Algorithm for Data Mining. Proceedings of international journal of advanced research in computer science and software engineering 3, 6 (2013)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOSE.2007.27"},{"key":"e_1_3_2_1_12_1","first-page":"993","article-title":"Latent Dirichlet Allocation","author":"Blei David M","year":"2003","unstructured":"David M Blei, Andrew Y Ng, and Michael I Jordan. 2003. Latent Dirichlet Allocation. Journal of machine Learning research 3, Jan (2003), 993--1022.","journal-title":"Journal of machine Learning research 3"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3340458"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","unstructured":"Xiangping CHEN Xing HU Yuan HUANG He JIANG Weixing JI Yanjie JIANG Yanyan JIANG Bo LIU Hui LIU Xiaochen LI Xiaoli LIAN Guozhu MENG Xin PENG0 Hailong SUN Lin SHI Bo WANG Chong WANG0 Jiayi WANG Tiantian WANG Jifeng XUAN Xin XIA Yibiao YANG Yixin YANG Li ZHANG Yuming ZHOU and ZHANG Lu. [n. d.]. Deep Learning-based Software Engineering: Progress Challenges and Opportunities. SCIENCE CHINA Information Sciences ([n. d.]) -. 10.1007\/s11432-023-4127-5","DOI":"10.1007\/s11432-023-4127-5"},{"key":"e_1_3_2_1_15_1","unstructured":"ClassSplitter. 2023. ClassSplitter. https:\/\/github.com\/ClassSplitter\/ClassSplitter"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-377-6.50023-2"},{"volume-title":"Introduction to Algorithms","author":"Cormen Thomas H","key":"e_1_3_2_1_17_1","unstructured":"Thomas H Cormen, Charles E Leiserson, Ronald L Rivest, and Clifford Stein. 2022. Introduction to Algorithms. MIT press."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1177\/147078530805000106"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2008.4658051"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639195"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2009.5306332"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985989"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.04.014"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1137983.1137989"},{"key":"e_1_3_2_1_26_1","volume-title":"Codesearchnet Challenge: Evaluating the state of Semantic Code Search. arXiv preprint arXiv:1909.09436","author":"Husain Hamel","year":"2019","unstructured":"Hamel Husain, Ho-Hsiang Wu, Tiferet Gazit, Miltiadis Allamanis, and Marc Brockschmidt. 2019. Codesearchnet Challenge: Evaluating the state of Semantic Code Search. arXiv preprint arXiv:1909.09436 (2019)."},{"key":"e_1_3_2_1_27_1","unstructured":"Tahmim Jeba Tarek Mahmuda Pritom S Akashb and Nadia Naharb. 2020. God Class Refactoring Recommendation and Extraction using Context Based Grouping. (2020)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2009.47"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.11.921"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2936376"},{"key":"e_1_3_2_1_31_1","volume-title":"Smurf: A Svm-based Incremental Anti-pattern Detection Approach. In 2012 19th Working Conference on Reverse Engineering. IEEE, 466--475","author":"Maiga Abdou","year":"2012","unstructured":"Abdou Maiga, Nasir Ali, Neelesh Bhattacharya, Aminata Saban\u00e9, Yann-Ga\u00ebl Gu\u00e9h\u00e9neuc, and Esma Aimeur. 2012. Smurf: A Svm-based Incremental Anti-pattern Detection Approach. In 2012 19th Working Conference on Reverse Engineering. IEEE, 466--475."},{"key":"e_1_3_2_1_32_1","volume-title":"Detection Strategies: Metrics-based Rules for Detecting Design Flaws. In 20th IEEE International Conference on Software Maintenance, 2004. Proceedings. IEEE, 350--359","author":"Marinescu Radu","year":"2004","unstructured":"Radu Marinescu. 2004. Detection Strategies: Metrics-based Rules for Detecting Design Flaws. In 20th IEEE International Conference on Software Maintenance, 2004. Proceedings. IEEE, 350--359."},{"volume-title":"Agile Software Development: Principles, Patterns, and Practices","author":"Martin Robert Cecil","key":"e_1_3_2_1_33_1","unstructured":"Robert Cecil Martin. 2003. Agile Software Development: Principles, Patterns, and Practices. Prentice Hall PTR."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.1265817"},{"key":"e_1_3_2_1_35_1","volume-title":"Noah Constant, Ji Ma, Keith B. Hall, Daniel Cer, and Yinfei Yang (Eds.).","author":"Ni Jianmo","year":"2022","unstructured":"Jianmo Ni, Gustavo Hernandez Abrego, Noah Constant, Ji Ma, Keith B. Hall, Daniel Cer, and Yinfei Yang (Eds.). 2022. Sentence-T5: Scaling up Sentence Encoder from Pre-trained Text-to-Text Transfer Transformer. https:\/\/aclanthology.org\/2022.findings-acl.146\/"},{"volume-title":"Refactoring Object-Oriented Frameworks","author":"Opdyke William F","key":"e_1_3_2_1_36_1","unstructured":"William F Opdyke. 1992. Refactoring Object-Oriented Frameworks. University of Illinois at Urbana-Champaign."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2372760"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2016.7503704"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-021-09566-x"},{"key":"e_1_3_2_1_40_1","volume-title":"Sentence-bert: Sentence Embeddings using Siamese Bert-networks. arXiv preprint arXiv:1908.10084","author":"Reimers Nils","year":"2019","unstructured":"Nils Reimers and Iryna Gurevych. 2019. Sentence-bert: Sentence Embeddings using Siamese Bert-networks. arXiv preprint arXiv:1908.10084 (2019)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11030442"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.110936"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2001.914965"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.1"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3007722"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-016-0043-6"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2004.1311061"}],"event":{"name":"ASE '24: 39th IEEE\/ACM International Conference on Automated Software Engineering","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Sacramento CA USA","acronym":"ASE '24"},"container-title":["Proceedings of the 39th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3691620.3694992","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3691620.3694992","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:04:06Z","timestamp":1750291446000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3691620.3694992"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,27]]},"references-count":47,"alternative-id":["10.1145\/3691620.3694992","10.1145\/3691620"],"URL":"https:\/\/doi.org\/10.1145\/3691620.3694992","relation":{},"subject":[],"published":{"date-parts":[[2024,10,27]]},"assertion":[{"value":"2024-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}