{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T17:39:16Z","timestamp":1770485956434,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,4,13]],"date-time":"2015-04-13T00:00:00Z","timestamp":1428883200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ERDF - European Regional Development Fund & FCT - Portuguese Foundation for Science and Technology","award":["FCOMP-01-0124-FEDER-020484 & FCOMP-01-0124-FEDER-020554"],"award-info":[{"award-number":["FCOMP-01-0124-FEDER-020484 & FCOMP-01-0124-FEDER-020554"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,4,13]]},"DOI":"10.1145\/2695664.2695670","type":"proceedings-article","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T19:10:09Z","timestamp":1437419409000},"page":"175-181","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Towards a catalog of usability smells"],"prefix":"10.1145","author":[{"given":"Diogo","family":"Almeida","sequence":"first","affiliation":[{"name":"University of Minho, Braga, Portugal"}]},{"given":"Jos\u00e9 Creissac","family":"Campos","sequence":"additional","affiliation":[{"name":"University of Minho, Braga, Portugal"}]},{"given":"Jo\u00e3o","family":"Saraiva","sequence":"additional","affiliation":[{"name":"University of Minho, Braga, Portugal"}]},{"given":"Jo\u00e3o Carlos","family":"Silva","sequence":"additional","affiliation":[{"name":"Instituto Polit\u00e9cnico do C\u00e1vado e do Ave, Barcelos, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2015,4,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.33"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/998675.999484"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2005.10129098"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SNPD.2012.10"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SNPD.2012.10"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31128-4_15"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2002931.2002937"},{"key":"e_1_3_2_1_8_1","volume-title":"Human-Computer Interaction","author":"Dix A.","year":"2003","unstructured":"A. Dix , J. E. Finlay , G. D. Abowd , and R. Beale . Human-Computer Interaction ( 3 rd Ed). Prentice-Hall , 2003 . A. Dix, J. E. Finlay, G. D. Abowd, and R. Beale. Human-Computer Interaction (3rd Ed). Prentice-Hall, 2003.","edition":"3"},{"key":"e_1_3_2_1_9_1","volume-title":"Refactoring: Improving the Design of Existing Code","author":"Fowler M.","year":"1999","unstructured":"M. Fowler . Refactoring: Improving the Design of Existing Code . Addison-Wesley Professional , 1999 . M. Fowler. Refactoring: Improving the Design of Existing Code. Addison-Wesley Professional, 1999."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337275"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-013-9296-2"},{"key":"e_1_3_2_1_12_1","volume-title":"Morgan Kaufmann","author":"Johnson J.","year":"2007","unstructured":"J. Johnson . GUI Bloopers 2.0 . Morgan Kaufmann , 2007 . J. Johnson. GUI Bloopers 2.0. Morgan Kaufmann, 2007."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2318734"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1017472.1017483"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2598153.2598173"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541348.2541357"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756428.1756445"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1529282.1529307"},{"key":"e_1_3_2_1_19_1","volume-title":"Johannes Gutenberg-Universit\u00e4t Mainz","author":"Silva J. C.","year":"2006","unstructured":"J. C. Silva , J. C. Campos , and J. Saraiva . Models for the reverse engineering of Java\/Swing applications. In 3rd Int. Wksp on Metamodels, Schemas, Grammars, and Ontologies for Reverse Eng., number 1\/2006 in Mainzer Informatik-Berichte . Johannes Gutenberg-Universit\u00e4t Mainz , 2006 . J. C. Silva, J. C. Campos, and J. Saraiva. Models for the reverse engineering of Java\/Swing applications. In 3rd Int. Wksp on Metamodels, Schemas, Grammars, and Ontologies for Reverse Eng., number 1\/2006 in Mainzer Informatik-Berichte. Johannes Gutenberg-Universit\u00e4t Mainz, 2006."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1822018.1822045"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/2509758"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(200003)30:3%3C259::AID-SPE298%3E3.0.CO;2-Y"},{"key":"e_1_3_2_1_23_1","first-page":"1","volume-title":"IEEE 8th International Conference on Research Challenges in Information Science, RCIS 2014","author":"Zen M.","year":"2014","unstructured":"M. Zen and J. Vanderdonckt . Towards an evaluation of graphical user interfaces aesthetics based on metrics. In M. Bajec, M. Collard, and R. Deneck\u00c3\u00cdre, editors , IEEE 8th International Conference on Research Challenges in Information Science, RCIS 2014 , Marrakech, Morocco , May 28-30, 2014 , pages 1 -- 12 . IEEE, 2014. M. Zen and J. Vanderdonckt. Towards an evaluation of graphical user interfaces aesthetics based on metrics. In M. Bajec, M. Collard, and R. Deneck\u00c3\u00cdre, editors, IEEE 8th International Conference on Research Challenges in Information Science, RCIS 2014, Marrakech, Morocco, May 28-30, 2014, pages 1--12. IEEE, 2014."}],"event":{"name":"SAC 2015: Symposium on Applied Computing","location":"Salamanca Spain","acronym":"SAC 2015","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"]},"container-title":["Proceedings of the 30th Annual ACM Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2695664.2695670","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2695664.2695670","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:21Z","timestamp":1750227141000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2695664.2695670"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,13]]},"references-count":23,"alternative-id":["10.1145\/2695664.2695670","10.1145\/2695664"],"URL":"https:\/\/doi.org\/10.1145\/2695664.2695670","relation":{},"subject":[],"published":{"date-parts":[[2015,4,13]]},"assertion":[{"value":"2015-04-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}