{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T08:53:12Z","timestamp":1766566392177,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":69,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,17]]},"DOI":"10.1145\/3756681.3756949","type":"proceedings-article","created":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T08:30:04Z","timestamp":1766565004000},"page":"441-452","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Relating Complexity, Explicitness, Effectiveness of Refactorings and Non-Functional Requirements: A Replication Study"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-0891-8561","authenticated-orcid":false,"given":"Vin\u00edcius","family":"Soares","sequence":"first","affiliation":[{"name":"Pontifical Catholic University of Rio de Janeiro, Rio de Janeiro, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-5904-9313","authenticated-orcid":false,"given":"Lawrence","family":"Arkoh","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8023-7611","authenticated-orcid":false,"given":"Paulo Roberto","family":"Farah","sequence":"additional","affiliation":[{"name":"Santa Catarina State University, Florian\u00f3polis, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6847-5569","authenticated-orcid":false,"given":"Anderson","family":"Uch\u00f4a","sequence":"additional","affiliation":[{"name":"Federal University of Cear\u00e1, Itapaj\u00e9, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5788-5215","authenticated-orcid":false,"given":"Alessandro","family":"Garcia","sequence":"additional","affiliation":[{"name":"Pontifical Catholic University of Rio de Janeiro, Rio de Janeiro, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7557-9091","authenticated-orcid":false,"given":"Wesley K. G.","family":"Assun\u00e7\u00e3o","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,12,24]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"crossref","unstructured":"Chaima Abid Marouane Kessentini Vahid Alizadeh Mouna Dhaouadi and Rick Kazman. 2020. How Does Refactoring Impact Security When Improving Quality? A Security Aware Refactoring. (2020).","DOI":"10.1109\/TSE.2020.3005995"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","unstructured":"Chaima Abid Marouane Kessentini Vahid Alizadeh Mouna Dhaouadi and Rick Kazman. 2022. How Does Refactoring Impact Security When Improving Quality? A Security-Aware Refactoring Approach. IEEE Transactions on Software Engineering 48 3 (2022) 864\u2013878. 10.1109\/TSE.2020.3005995","DOI":"10.1109\/TSE.2020.3005995"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"crossref","unstructured":"Cruz Accarapi and Alex Raul. 2024. Evaluating Refactoring Techniques to Improve Software Maintainability. Available at SSRN 4905215 (2024).","DOI":"10.2139\/ssrn.4905215"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/Confluence52989.2022.9734141"},{"key":"e_1_3_3_2_6_2","unstructured":"Mansi Agnihotri and Anuradha Chug. 2024. Understanding the effect of batch refactoring on software quality. International Journal of System Assurance Engineering and Management (2024) 1\u20139."},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","unstructured":"Abdullah Almogahed Hairulnizam Mahdin Mazni Omar Nur\u00a0Haryani Zakaria Ghulam Muhammad and Zulfiqar Ali. 2023. Optimized Refactoring Mechanisms to Improve Quality Characteristics in Object-Oriented Systems. IEEE Access 11 (2023) 99143\u201399158. 10.1109\/ACCESS.2023.3313186","DOI":"10.1109\/ACCESS.2023.3313186"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITSS-IoE56359.2022.9990968"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/IWoR.2019.00017"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","unstructured":"Eman Alomar Mohamed\u00a0Wiem Mkaouer Ali Ouni and Marouane Kessentini. 2019. Do Design Metrics Capture Developers Perception of Quality? An Empirical Study on Self-Affirmed Refactoring Activities. 10.48550\/arXiv.1907.04797","DOI":"10.48550\/arXiv.1907.04797"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSR59073.2023.00090"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","unstructured":"Eman\u00a0Abdullah AlOmar Mohamed\u00a0Wiem Mkaouer and Ali Ouni. 2021. Toward the automatic classification of Self-Affirmed Refactoring. Journal of Systems and Software 171 (2021) 110821. 10.1016\/j.jss.2020.110821","DOI":"10.1016\/j.jss.2020.110821"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2019.8870177"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","unstructured":"Eman\u00a0Abdullah Alomar Tianjia Wang Vaibhavi Raut Mohamed\u00a0Wiem Mkaouer Christian Newman and Ali Ouni. 2022. Refactoring for reuse: an empirical study. Innovations in Systems and Software Engineering 18 1 (2022) 105\u2013135. 10.1007\/s11334-021-00422-6","DOI":"10.1007\/s11334-021-00422-6"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","unstructured":"Mohammad Alshayeb. 2009. Empirical investigation of refactoring effect on software quality. Information and Software Technology 51 9 (2009) 1319\u20131326. 10.1016\/j.infsof.2009.04.002","DOI":"10.1016\/j.infsof.2009.04.002"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3341184"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.14780165"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-71294-4_9"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/FIT.2017.00040"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME52107.2021.00033"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM63643.2024.00018"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2019.8870183"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/3387904.3389264"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"crossref","unstructured":"Ana\u00a0Carla Bibiano Anderson Uch\u00f4a Wesley\u00a0K.G. Assun\u00e7\u00e3o Daniel Ten\u00f3rio Thelma\u00a0E. Colanzi Silvia\u00a0Regina Vergilio and Alessandro Garcia. 2023. Composite refactoring: Representations characteristics and effects on software projects. Information and Software Technology 156 (2023) 107134.","DOI":"10.1016\/j.infsof.2022.107134"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2007.25"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.25"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568308"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","unstructured":"Agustin Casamayor Daniela Godoy and Marcelo Campo. 2010. Identification of non-functional requirements in textual specifications: A semi-supervised learning approach. Information and Software Technology 52 4 (2010) 436\u2013445. 10.1016\/j.infsof.2009.10.010","DOI":"10.1016\/j.infsof.2009.10.010"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3131151.3131171"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/1370905.1370913"},{"key":"e_1_3_3_2_31_2","volume-title":"Non-functional requirements in software engineering","author":"Chung Lawrence","year":"2012","unstructured":"Lawrence Chung, Brian\u00a0A Nixon, Eric Yu, and John Mylopoulos. 2012. Non-functional requirements in software engineering. Vol.\u00a05. Springer Science & Business Media."},{"key":"e_1_3_3_2_32_2","unstructured":"Serge Demeyer. 2003. Maintainability versus Performance: What\u2019s the Effect of Introducing Polymorphism ?https:\/\/api.semanticscholar.org\/CorpusID:16615442"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884788"},{"key":"e_1_3_3_2_34_2","doi-asserted-by":"publisher","unstructured":"Estomii Edward Ally\u00a0S. Nyamawe and Noe Elisa. 2024. On the Impact of Refactorings on Software Attack Surface. IEEE Access 12 (2024) 128570\u2013128584. 10.1109\/ACCESS.2024.3404058","DOI":"10.1109\/ACCESS.2024.3404058"},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"publisher","unstructured":"Eduardo Fernandes Alexander Ch\u00e1vez Alessandro Garcia Isabella Ferreira Diego Cedrim Leonardo Sousa and Willian Oizumi. 2020. Refactoring effect on internal quality attributes: What haven\u2019t they told you yet? Information and Software Technology 126 (2020) 106347. 10.1016\/j.infsof.2020.106347","DOI":"10.1016\/j.infsof.2020.106347"},{"key":"e_1_3_3_2_36_2","volume-title":"Design patterns: elements of reusable object-oriented software","author":"Gamma Erich","year":"1995","unstructured":"Erich Gamma, Richard Helm, Ralph Johnson, and John Vlissides. 1995. Design patterns: elements of reusable object-oriented software. Addison-Wesley Longman Publishing Co., Inc., USA."},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2007.45"},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/1656437.1656441"},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"publisher","unstructured":"Shinpei Hayashi Motoshi Saeki and Masahito Kurihara. 2006. Supporting Refactoring Activities Using Histories of Program Modification. IEICE - Trans. Inf. Syst. E89-D 4 (April 2006) 1403\u20131412. 10.1093\/ietisy\/e89-d.4.1403","DOI":"10.1093\/ietisy\/e89-d.4.1403"},{"key":"e_1_3_3_2_40_2","doi-asserted-by":"crossref","unstructured":"Umar Iftikhar Nauman\u00a0Bin Ali J\u00fcrgen B\u00f6rstler and Muhammad Usman. 2024. A tertiary study on links between source code metrics and external quality attributes. Information and Software Technology 165 (2024) 107348.","DOI":"10.1016\/j.infsof.2023.107348"},{"key":"e_1_3_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD62652.2024.00034"},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3558954"},{"key":"e_1_3_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2015.7381812"},{"key":"e_1_3_3_2_44_2","doi-asserted-by":"publisher","unstructured":"Miryung Kim Thomas Zimmermann and Nachiappan Nagappan. 2014. An Empirical Study of RefactoringChallenges and Benefits at Microsoft. IEEE Transactions on Software Engineering 40 7 (2014) 633\u2013649. 10.1109\/TSE.2014.2318734","DOI":"10.1109\/TSE.2014.2318734"},{"key":"e_1_3_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1145\/3084226.3084241"},{"key":"e_1_3_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2016.7732033"},{"key":"e_1_3_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/2851613.2851777"},{"key":"e_1_3_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070529"},{"key":"e_1_3_3_2_49_2","doi-asserted-by":"publisher","unstructured":"Emerson Murphy-Hill Chris Parnin and Andrew\u00a0P. Black. 2012. How We Refactor and How We Know It. IEEE Transactions on Software Engineering 38 1 (2012) 5\u201318. 10.1109\/TSE.2011.41","DOI":"10.1109\/TSE.2011.41"},{"key":"e_1_3_3_2_50_2","doi-asserted-by":"crossref","unstructured":"Shayan Noei Heng Li Stefanos Georgiou and Ying Zou. 2023. An Empirical Study of Refactoring Rhythms and Tactics in the Software Development Process. IEEE Transactions on Software Engineering 49 12 (2023) 5103\u20135119.","DOI":"10.1109\/TSE.2023.3326775"},{"key":"e_1_3_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSR59073.2023.00064"},{"key":"e_1_3_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/IWoR.2019.00010"},{"key":"e_1_3_3_2_53_2","doi-asserted-by":"publisher","unstructured":"Ali Ouni Eman\u00a0Abdullah AlOmar Oumayma Hamdi Mel\u00a0\u00d3 Cinn\u00e9ide Mohamed\u00a0Wiem Mkaouer and Mohamed\u00a0Aymen Saied. 2023. On the impact of single and co-occurrent refactorings on quality attributes in android applications. Journal of Systems and Software 205 (2023) 111817. 10.1016\/j.jss.2023.111817","DOI":"10.1016\/j.jss.2023.111817"},{"key":"e_1_3_3_2_54_2","doi-asserted-by":"crossref","unstructured":"Jevgenija Pantiuchina Fiorella Zampetti Simone Scalabrino Valentina Piantadosi Rocco Oliveto Gabriele Bavota and Massimiliano\u00a0Di Penta. 2020. Why developers refactor source code: A mining-based study. ACM Transactions on Software Engineering and Methodology (TOSEM) 29 4 (2020) 1\u201330.","DOI":"10.1145\/3408302"},{"key":"e_1_3_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/1148493.1148529"},{"key":"e_1_3_3_2_56_2","doi-asserted-by":"publisher","unstructured":"Justyna Petke Mark Harman William\u00a0B. Langdon and Westley Weimer. 2018. Specialising Software for Different Downstream Applications Using Genetic Improvement and Code Transplantation. IEEE Transactions on Software Engineering 44 6 (2018) 574\u2013594. 10.1109\/TSE.2017.2702606","DOI":"10.1109\/TSE.2017.2702606"},{"key":"e_1_3_3_2_57_2","unstructured":"Jacek Ratzinger. 2007. sPACE-software project assessment in the course of evolution. Ph.\u00a0D. Dissertation. Technische Universit\u00e4t Wien."},{"key":"e_1_3_3_2_58_2","unstructured":"Diego Cedrim\u00a0Gomes R\u00eago. 2018. Understanding and improving batch refactoring in software systems. Ph.\u00a0D. Dissertation. PhD Thesis."},{"key":"e_1_3_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICACSIS51025.2020.9263167"},{"key":"e_1_3_3_2_60_2","doi-asserted-by":"publisher","DOI":"10.1109\/CONCAPAN.2017.8278488"},{"key":"e_1_3_3_2_61_2","doi-asserted-by":"publisher","DOI":"10.1109\/SANER53432.2022.00090"},{"key":"e_1_3_3_2_62_2","unstructured":"Muhammad Shahid and Khawaja\u00a0Awais Tasneem. 2017. Impact of avoiding non-functional requirements in software development stage. American Journal of Information Science and Computer Engineering 3 4 (2017) 52\u201355."},{"key":"e_1_3_3_2_63_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI.2017.159"},{"key":"e_1_3_3_2_64_2","volume-title":"International Workshop on Variability Modelling of Software-Intensive Systems","author":"Siegmund Norbert","year":"2010","unstructured":"Norbert Siegmund, Martin Kuhlemann, Mario Pukall, and Sven Apel. 2010. Optimizing Non-functional Properties of Software Product Lines by means of Refactorings. In International Workshop on Variability Modelling of Software-Intensive Systems. https:\/\/api.semanticscholar.org\/CorpusID:15325796"},{"key":"e_1_3_3_2_65_2","doi-asserted-by":"publisher","DOI":"10.1145\/350391.350420"},{"key":"e_1_3_3_2_66_2","doi-asserted-by":"publisher","DOI":"10.1145\/3422392.3422439"},{"key":"e_1_3_3_2_67_2","doi-asserted-by":"publisher","DOI":"10.1145\/3379597.3387477"},{"key":"e_1_3_3_2_68_2","doi-asserted-by":"crossref","unstructured":"Luca Traini Daniele Di\u00a0Pompeo Michele Tucci Bin Lin Simone Scalabrino Gabriele Bavota Michele Lanza Rocco Oliveto and Vittorio Cortellessa. 2021. How software refactoring impacts execution time. ACM Transactions on Software Engineering and Methodology (TOSEM) 31 2 (2021) 1\u201323.","DOI":"10.1145\/3485136"},{"key":"e_1_3_3_2_69_2","doi-asserted-by":"publisher","unstructured":"Nikolaos Tsantalis Ameya Ketkar and Danny Dig. 2022. RefactoringMiner 2.0. IEEE Transactions on Software Engineering 48 3 (2022) 930\u2013950. 10.1109\/TSE.2020.3007722","DOI":"10.1109\/TSE.2020.3007722"},{"key":"e_1_3_3_2_70_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227190"}],"event":{"name":"EASE '25: Evaluation and Assessment in Software Engineering","location":"Istanbul Turkiye","acronym":"EASE '25"},"container-title":["Proceedings of the 29th International Conference on Evaluation and Assessment in Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3756681.3756949","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T08:38:42Z","timestamp":1766565522000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3756681.3756949"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,17]]},"references-count":69,"alternative-id":["10.1145\/3756681.3756949","10.1145\/3756681"],"URL":"https:\/\/doi.org\/10.1145\/3756681.3756949","relation":{},"subject":[],"published":{"date-parts":[[2025,6,17]]},"assertion":[{"value":"2025-12-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}