{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T08:53:11Z","timestamp":1766566391510,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":58,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,17]]},"DOI":"10.1145\/3756681.3756948","type":"proceedings-article","created":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T08:30:04Z","timestamp":1766565004000},"page":"79-90","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Assessing the Bug-Proneness of Refactored Code: A Longitudinal Multi-Project Study"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9884-5890","authenticated-orcid":false,"given":"Isabella","family":"Ferreira","sequence":"first","affiliation":[{"name":"Pontifical Catholic University of Rio de Janeiro, Rio de Janeiro, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-5904-9313","authenticated-orcid":false,"given":"Lawrence","family":"Arkoh","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6847-5569","authenticated-orcid":false,"given":"Anderson","family":"Uch\u00f4a","sequence":"additional","affiliation":[{"name":"Federal University of Cear\u00e1, Itapaj\u00e9, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3730-9290","authenticated-orcid":false,"given":"Ana Carla","family":"Bibiano","sequence":"additional","affiliation":[{"name":"Pontifical Catholic University of Rio de Janeiro, Rio de Janeiro, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5788-5215","authenticated-orcid":false,"given":"Alessandro","family":"Garcia","sequence":"additional","affiliation":[{"name":"Pontifical Catholic University of Rio de Janeiro, Rio de Janeiro, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7557-9091","authenticated-orcid":false,"given":"Wesley K. G.","family":"Assun\u00e7\u00e3o","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,12,24]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP52600.2021.00044"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.14776416"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/1294948.1294950"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/RSSE.2012.6233419"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/3524842.3528034"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2012.20"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"crossref","unstructured":"Gabriele Bavota Andrea De\u00a0Lucia Massimiliano Di\u00a0Penta Rocco Oliveto and Fabio Palomba. 2015. An experimental investigation on the innate relationship between quality and refactoring. J. Syst. Softw (JSS) 107 (2015) 1\u201314.","DOI":"10.1016\/j.jss.2015.05.024"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"crossref","unstructured":"Hans\u00a0Christian Benestad Bente Anda and Erik Arisholm. 2009. Understanding software maintenance and evolution by analyzing individual changes: a literature review. Journal of Software Maintenance and Evolution: Research and Practice 21 6 (2009) 349\u2013378.","DOI":"10.1002\/smr.412"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME52107.2021.00033"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"crossref","unstructured":"Ana\u00a0Carla Bibiano Daniel Coutinho Anderson Uch\u00f4a Wesley\u00a0KG Assun\u00e7ao Alessandro Garcia Rafael de Mello Thelma\u00a0E Colanzi Daniel Ten\u00f3rio Audrey Vasconcelos Baldoino Fonseca et\u00a0al. 2024. Enhancing Recommendations of Composite Refactorings based on the Practice. (2024).","DOI":"10.1109\/SCAM63643.2024.00018"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2019.8870183"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3387904.3389264"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"crossref","unstructured":"Ana\u00a0Carla Bibiano Anderson Uch\u00f4a Wesley\u00a0KG Assun\u00e7\u00e3o Daniel Ten\u00f3rio Thelma\u00a0E Colanzi Silvia\u00a0Regina Vergilio and Alessandro Garcia. 2023. Composite refactoring: Representations characteristics and effects on software projects. Information and Software Technology 156 (2023) 107134.","DOI":"10.1016\/j.infsof.2022.107134"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106259"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106259"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3131151.3131171"},{"key":"e_1_3_3_2_18_2","volume-title":"Practical nonparametric statistics","author":"Conover William\u00a0Jay","year":"1999","unstructured":"William\u00a0Jay Conover. 1999. Practical nonparametric statistics. Vol.\u00a0350. john wiley & sons."},{"key":"e_1_3_3_2_19_2","unstructured":"Jerome Cornfield. 1951. A method of estimating comparative rates from clinical data. Applications to cancer of the lung breast and cervix. J. Nat. Cancer Inst. 11 6 (1951) 1269\u20131275."},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/SEAA56994.2022.00038"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/SANER53432.2022.00093"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"crossref","unstructured":"Daniel\u00a0Alencar da Costa Shane McIntosh Weiyi Shang Uira Kulesza Roberta Coelho and Ahmed\u00a0E Hassan. 2017. A Framework for Evaluating the Results of the SZZ Approach for Identifying Bug-Introducing Changes. IEEE Transactions on Software Engineering (TSE) 43 7 (2017) 641\u2013657.","DOI":"10.1109\/TSE.2016.2616306"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321702"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409695"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/SANER50967.2021.00030"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"crossref","unstructured":"Ronald Fisher. 1922. On the interpretation of \u03c7 2 from contingency tables and the calculation of P. J. Royal Stat. Soc. 85 1 (1922) 87\u201394.","DOI":"10.2307\/2340521"},{"key":"e_1_3_3_2_27_2","volume-title":"Refactoring: improving the design of existing code","author":"Fowler Martin","year":"2018","unstructured":"Martin Fowler. 2018. Refactoring: improving the design of existing code. Addison-Wesley Professional."},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/1083142.1083148"},{"key":"e_1_3_3_2_29_2","volume-title":"Sample criteria for testing outlying observations","author":"Grubbs Frank\u00a0Ephraim","year":"1949","unstructured":"Frank\u00a0Ephraim Grubbs. 1949. Sample criteria for testing outlying observations. University of Michigan."},{"key":"e_1_3_3_2_30_2","first-page":"392","volume-title":"35th International Conference on Software Engineering (ICSE)","author":"Herzig Kim","year":"2013","unstructured":"Kim Herzig, Sascha Just, and Andreas Zeller. 2013. It\u2019s not a bug, it\u2019s a feature: how misclassification impacts bug prediction. In 35th International Conference on Software Engineering (ICSE). 392\u2013401."},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3558954"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"crossref","unstructured":"Chris\u00a0F Kemerer. 1995. Software complexity and software maintenance: A survey of empirical research. Annals of Software Engineering 1 (1995) 1\u201322.","DOI":"10.1007\/BF02249043"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393655"},{"key":"e_1_3_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393655"},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"crossref","unstructured":"Miryung Kim Thomas Zimmermann and Nachiappan Nagappan. 2014. An empirical study of refactoring challenges and benefits at Microsoft. IEEE Trans. Softw. Eng. (TSE) 40 7 (2014) 633\u2013649.","DOI":"10.1109\/TSE.2014.2318734"},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287633"},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2006.23"},{"key":"e_1_3_3_2_38_2","volume-title":"Object-oriented metrics in practice","author":"Lanza Michele","year":"2007","unstructured":"Michele Lanza and Radu Marinescu. 2007. Object-oriented metrics in practice. Springer Science & Business Media."},{"key":"e_1_3_3_2_39_2","volume-title":"Object-oriented metrics in practice","author":"Lanza Michele","year":"2007","unstructured":"Michele Lanza and Radu Marinescu. 2007. Object-oriented metrics in practice. Springer Science & Business Media."},{"key":"e_1_3_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2012.35"},{"key":"e_1_3_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2012.35"},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639227"},{"key":"e_1_3_3_2_43_2","doi-asserted-by":"crossref","unstructured":"Emerson Murphy-Hill and Andrew\u00a0P Black. 2008. Refactoring tools: Fitness for purpose. IEEE software 25 5 (2008).","DOI":"10.1109\/MS.2008.123"},{"key":"e_1_3_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070529"},{"key":"e_1_3_3_2_45_2","doi-asserted-by":"publisher","unstructured":"Emerson Murphy-Hill Chris Parnin and Andrew\u00a0P. Black. 2012. How We Refactor and How We Know It. IEEE Transactions on Software Engineering 38 1 (2012) 5\u201318. 10.1109\/TSE.2011.41","DOI":"10.1109\/TSE.2011.41"},{"key":"e_1_3_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00021"},{"key":"e_1_3_3_2_47_2","doi-asserted-by":"crossref","unstructured":"Daniel Oliveira Wesley\u00a0KG Assun\u00e7\u00e3o Alessandro Garcia Baldoino Fonseca and M\u00e1rcio Ribeiro. 2022. Developers\u2019 perception matters: machine learning to detect developer-sensitive smells. Empirical Software Engineering 27 7 (2022) 195.","DOI":"10.1007\/s10664-022-10234-2"},{"key":"e_1_3_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR-WCRE.2014.6747177"},{"key":"e_1_3_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1145\/3379597.3387475"},{"key":"e_1_3_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606589"},{"key":"e_1_3_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2017.26"},{"key":"e_1_3_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950305"},{"key":"e_1_3_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/1083142.1083147"},{"key":"e_1_3_3_2_54_2","doi-asserted-by":"crossref","unstructured":"G\u00e1bor Sz\u0151ke G\u00e1bor Antal Csaba Nagy Rudolf Ferenc and Tibor Gyim\u00f3thy. 2017. Empirical study on refactoring large-scale industrial systems and its effects on maintainability. Journal of Systems and Software 129 (2017) 107\u2013126.","DOI":"10.1016\/j.jss.2016.08.071"},{"key":"e_1_3_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.5555\/2555523.2555539"},{"key":"e_1_3_3_2_56_2","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180206"},{"key":"e_1_3_3_2_57_2","doi-asserted-by":"crossref","unstructured":"Gustavo Vale Eduardo Fernandes and Eduardo Figueiredo. 2018. On the proposal and evaluation of a benchmark-based threshold derivation method. Software Quality Journal (2018) 1\u201332.","DOI":"10.1007\/s11219-018-9405-y"},{"key":"e_1_3_3_2_58_2","doi-asserted-by":"publisher","DOI":"10.1145\/1137983.1138011"},{"key":"e_1_3_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635874"}],"event":{"name":"EASE '25: Evaluation and Assessment in Software Engineering","location":"Istanbul Turkiye","acronym":"EASE '25"},"container-title":["Proceedings of the 29th International Conference on Evaluation and Assessment in Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3756681.3756948","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T08:38:40Z","timestamp":1766565520000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3756681.3756948"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,17]]},"references-count":58,"alternative-id":["10.1145\/3756681.3756948","10.1145\/3756681"],"URL":"https:\/\/doi.org\/10.1145\/3756681.3756948","relation":{},"subject":[],"published":{"date-parts":[[2025,6,17]]},"assertion":[{"value":"2025-12-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}