{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T04:16:24Z","timestamp":1759032984967},"reference-count":34,"publisher":"Sociedade Brasileira de Computacao - SB","issue":"1","license":[{"start":{"date-parts":[[2015,7,10]],"date-time":"2015-07-10T00:00:00Z","timestamp":1436486400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Softw Eng Res Dev"],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1186\/s40411-015-0025-y","type":"journal-article","created":{"date-parts":[[2015,7,9]],"date-time":"2015-07-09T08:20:28Z","timestamp":1436430028000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":36,"title":["On the relationship of code-anomaly agglomerations and architectural problems"],"prefix":"10.5753","volume":"3","author":[{"given":"Willian N.","family":"Oizumi","sequence":"first","affiliation":[]},{"given":"Alessandro F.","family":"Garcia","sequence":"additional","affiliation":[]},{"given":"Thelma E.","family":"Colanzi","sequence":"additional","affiliation":[]},{"given":"Manuele","family":"Ferreira","sequence":"additional","affiliation":[]},{"given":"Arndt V.","family":"Staa","sequence":"additional","affiliation":[]}],"member":"3742","published-online":{"date-parts":[[2015,7,10]]},"reference":[{"key":"25_CR1","first-page":"181","volume-title":"Proceedings of the 15th European Software Engineering Conference","author":"M Abbes","year":"2011","unstructured":"Abbes, M, Khomh F, Gueheneuc Y, Antoniol G (2011) An empirical study of the impact of two antipatterns, blob and spaghetti code, on program comprehension In: Proceedings of the 15th European Software Engineering Conference, 181\u2013190.. IEEE Computer Society, Oldenburg, Germany."},{"key":"25_CR2","unstructured":"Apache OODT Source Code (2015). https:\/\/github.com\/apache\/oodt ."},{"key":"25_CR3","doi-asserted-by":"crossref","unstructured":"Baxter, G, Frean M, Noble J, Rickerby M, Smith H, Visser M, Melton H, Tempero E (2006) Understanding the shape of java software In: Proceedings of the 21st Annual ACM SIGPLAN Conference on Object-oriented Programming Systems, Languages, and Applications, 397\u2013412.. ACM.","DOI":"10.1145\/1167473.1167507"},{"key":"25_CR4","volume-title":"The Unified Modeling Language User Guide","author":"G Booch","year":"2005","unstructured":"Booch, G, Rumbaugh J, Jacobson I (2005) The Unified Modeling Language User Guide. Addison-Wesley, Boston."},{"key":"25_CR5","first-page":"23","volume-title":"Proceedings of the 10th International Conference on Quality Software","author":"M D\u2019Ambros","year":"2010","unstructured":"D\u2019Ambros, M, Bacchelli A, Lanza M (2010) On the impact of design flaws on software defects In: Proceedings of the 10th International Conference on Quality Software, 23\u201331.. IEEE Computer Society, Zhangjiajie, China."},{"key":"25_CR6","first-page":"391","volume-title":"Proceedings of the 30th International Conference on Software Engineering","author":"M Eichberg","year":"2008","unstructured":"Eichberg, M, Kloppenburg S, Klose K, Mezini M (2008) Defining and continuous checking of structural program dependencies In: Proceedings of the 30th International Conference on Software Engineering, 391\u2013400.. ACM, Leipzig, Germany."},{"key":"25_CR7","volume-title":"Refactoring: Improving the Design of Existing Code","author":"M Fowler","year":"1999","unstructured":"Fowler, M (1999) Refactoring: Improving the Design of Existing Code. Pearson Education, India."},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Garcia, J, Popescu D, Edwards G, Medvidovic N (2009) Identifying architectural bad smells In: Proceedings of the 13th European Conference on Software Maintenance and Reengineering; Kaiserslautern, Germany, 255\u2013258.. IEEE Computer Society.","DOI":"10.1109\/CSMR.2009.59"},{"key":"25_CR9","first-page":"486","volume-title":"Proceedings of the 28th IEEE\/ACM International Conference on Automated Software Engineering","author":"J Garcia","year":"2013","unstructured":"Garcia, J, Ivkovic I, Medvidovic N (2013) A comparative analysis of software architecture recovery techniques In: Proceedings of the 28th IEEE\/ACM International Conference on Automated Software Engineering, 486\u2013496.. IEEE Computer Society, Palo Alto, USA."},{"key":"25_CR10","unstructured":"Health Watcher Source Code (2015). http:\/\/ptolemy.cs.iastate.edu\/design-study\/#healthwatcher ."},{"key":"25_CR11","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1016\/j.infsof.2004.11.005","volume":"47","author":"L Hochstein","year":"2005","unstructured":"Hochstein, L, Lindvall M (2005) Combating architectural degeneration: a survey. Inf Softw Technol 47: 643\u2013656.","journal-title":"Inf Softw Technol"},{"key":"25_CR12","first-page":"75","volume-title":"Proceedings of the 16th Working Conference on Reverse Engineering","author":"K Khomh","year":"2009","unstructured":"Khomh, K, Penta MD, Gueheneuc Y (2009) An exploratory study of the impact of code smells on software change-proneness In: Proceedings of the 16th Working Conference on Reverse Engineering, 75\u201384.. IEEE Computer Society, Lille, France."},{"key":"25_CR13","first-page":"187","volume-title":"Proceedings of the 10th European Software Engineering Conference","author":"M Kim","year":"2005","unstructured":"Kim, M, Sazawal V, Notkin D, Murphy G (2005) An empirical study of code clone genealogies In: Proceedings of the 10th European Software Engineering Conference, 187\u2013196.. ACM, Lisbon, Portugal."},{"key":"25_CR14","volume-title":"Object-Oriented Metrics in Practice","author":"M Lanza","year":"2006","unstructured":"Lanza, M, Marinescu R (2006) Object-Oriented Metrics in Practice. Springer, Heidelberg."},{"key":"25_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1391984.1391986","volume":"18","author":"P Louridas","year":"2008","unstructured":"Louridas, P, Spinellis D, Vlachos V (2008) Power laws in software. ACM Trans Softw Eng Methodol 18: 1\u201326.","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"25_CR16","first-page":"227","volume-title":"Proceedings of the 24th IEEE International Conference on Software Maintenance","author":"A Lozano","year":"2008","unstructured":"Lozano, A, Wermelinger M (2008) Assessing the effect of clones of changeability In: Proceedings of the 24th IEEE International Conference on Software Maintenance, 227\u2013236.. IEEE Computer Society, Beijing, China."},{"key":"25_CR17","first-page":"321","volume-title":"Proceedings of the 24th ACM SIGPLAN Conference Companion on Object Oriented Programming Systems Languages and Applications","author":"A Marwan","year":"2009","unstructured":"Marwan, A, Aldrich J (2009) Static extraction and conformance analysis of hierarchical runtime architectural structure using annotations In: Proceedings of the 24th ACM SIGPLAN Conference Companion on Object Oriented Programming Systems Languages and Applications, 321\u2013340.. ACM, Orlando, USA."},{"key":"25_CR18","first-page":"277","volume-title":"Proceedings of the 16th European Conference on Software Maintenance and Reengineering","author":"I Macia","year":"2012","unstructured":"Macia, I, Arcoverde R, Garcia A, Chavez C, Staa A (2012) On the relevance of code anomalies for identifying architecture degradation symptoms In: Proceedings of the 16th European Conference on Software Maintenance and Reengineering, 277\u2013286.. Computer Society, Szeged, Hungary."},{"key":"25_CR19","unstructured":"Macia, I (2013) On the detection of architecturally-relevant code anomalies in software systems. PhD thesis, Pontifical Catholic University of Rio de Janeiro, Informatics Department."},{"key":"25_CR20","doi-asserted-by":"crossref","unstructured":"Macia, I, Arcoverde R, Cirilo E, Garcia A, Staa A (2012a) Supporting the identification of architecturally-relevant code anomalies In: Proceedings of the 28th IEEE International Conference on Software Maintenance, 662\u2013665.. Computer Society, Trento, Italy.","DOI":"10.1109\/ICSM.2012.6405348"},{"key":"25_CR21","doi-asserted-by":"crossref","unstructured":"Macia, I, Garcia J, Popescu D, Garcia A, Medvidovic N, Staa A (2012b) Are automatically-detected code anomalies relevant to architectural modularity? An exploratory analysis of evolving systems In: Proceedings of the 11st International Conference on Aspect-Oriented Software Development, 167\u2013178.. ACM, Postdam, Germany.","DOI":"10.1145\/2162049.2162069"},{"key":"25_CR22","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1145\/1134285.1134400","volume-title":"Proceedings of the 28th International Conference on Software Engineering: Software Engineering Achievements Track","author":"C Mattmann","year":"2006","unstructured":"Mattmann, C, Crichton D, Medvidovic N, Hughes S (2006) A software architecture-based framework for highly distributed and data intensive scientific applications In: Proceedings of the 28th International Conference on Software Engineering: Software Engineering Achievements Track, 721\u2013730.. ACM, Shanghai, China."},{"key":"25_CR23","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/1218563.1218571","volume-title":"Proceedings of the 6th International Conference on Aspect-oriented Software Development","author":"C Morgan","year":"2007","unstructured":"Morgan, C (2007) A static aspect language of checking design rules In: Proceedings of the 6th International Conference on Aspect-oriented Software Development, 63\u201372.. ACM, Vancouver, Canada."},{"key":"25_CR24","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/TSE.2009.50","volume":"36","author":"N Moha","year":"2010","unstructured":"Moha, N, Gueheneuc Y, Duchien L, Meur AL (2010) Decor: A method for the specification and detection of code and design smells. IEEE Trans Softw Eng 36: 20\u201336.","journal-title":"IEEE Trans Softw Eng"},{"key":"25_CR25","unstructured":"Mobile Media Source Code (2015). http:\/\/ptolemy.cs.iastate.edu\/design-study\/#mobilemedia ."},{"key":"25_CR26","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1109\/SBES.2014.18","volume-title":"Proceedings of the 2014 Brazilian Symposium on Software Engineering (SBES)","author":"W Oizumi","year":"2014","unstructured":"Oizumi, W, Garcia A, Colanzi T, Ferreira M, Staa A (2014) When code-anomaly agglomerations represent architectural problems? An exploratory study In: Proceedings of the 2014 Brazilian Symposium on Software Engineering (SBES), 91\u2013100.. IEEE Computer Society, Maceio, Brazil."},{"key":"25_CR27","first-page":"1","volume-title":"Proceedings of the 26th IEEE International Conference on Software Maintenance","author":"SM Olbrich","year":"2010","unstructured":"Olbrich, SM, Cruzes DS, Sjoberg DIK (2010) Are all code smells harmful? A study of god classes and brain classes in the evolution of three open source systems In: Proceedings of the 26th IEEE International Conference on Software Maintenance, 1\u201310.. IEEE Computer Society, Timisoara, Romania."},{"key":"25_CR28","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/141874.141884","volume":"17","author":"DE Perry","year":"1992","unstructured":"Perry, DE, Wolf AL (1992) Foundations for the study of software architecture. ACM Softw Eng Notes 17: 40\u201352.","journal-title":"ACM Softw Eng Notes"},{"key":"25_CR29","doi-asserted-by":"publisher","first-page":"1144","DOI":"10.1109\/TSE.2012.89","volume":"39","author":"D Sjobert","year":"2013","unstructured":"Sjobert, D, Yamashita A, Anda B, Mockus A, Dyba T (2013) Quantifying the effect of code smells on maintenance effort. IEEE Trans Softw Eng 39: 1144\u20131156.","journal-title":"IEEE Trans Softw Eng"},{"key":"25_CR30","first-page":"174","volume-title":"Proceedings of the 17th ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications","author":"S Soares","year":"2002","unstructured":"Soares, S, Laureano E, Borba P (2002) Implementing distribution and persistence aspects with aspectj In: Proceedings of the 17th ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications, 174\u2013190.. ACM Press, Seattle, USA."},{"key":"25_CR31","first-page":"75","volume-title":"Proceedings of the 32nd International Conference on Software Engineering","author":"N Ubayashi","year":"2010","unstructured":"Ubayashi, N, Nomura J, Tamai T (2010) Archface: A contract place where architectural design and code meet together In: Proceedings of the 32nd International Conference on Software Engineering, 75\u201384.. ACM, Cape Town, South Africa."},{"key":"25_CR32","unstructured":"Understand: User Guide and Reference Manual (2015). https:\/\/scitools.com\/documents\/manuals\/pdf\/understand.pdf ."},{"key":"25_CR33","first-page":"682","volume-title":"Proceedings of the 35th International Conference on Software Engineering","author":"A Yamashita","year":"2013","unstructured":"Yamashita, A, Moonen L (2013) Exploring the impact of inter-smell relations on software maintainability: an empirical study In: Proceedings of the 35th International Conference on Software Engineering, 682\u2013691.. IEEE Press, San Francisco, USA."},{"key":"25_CR34","unstructured":"Young, TJ (2005) Using aspectj to build a software product line for mobile devices, University of British Columbia."}],"container-title":["Journal of Software Engineering Research and Development"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s40411-015-0025-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s40411-015-0025-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s40411-015-0025-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s40411-015-0025-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,17]],"date-time":"2022-05-17T21:51:16Z","timestamp":1652824276000},"score":1,"resource":{"primary":{"URL":"https:\/\/jserd.springeropen.com\/articles\/10.1186\/s40411-015-0025-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7,10]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["25"],"URL":"https:\/\/doi.org\/10.1186\/s40411-015-0025-y","relation":{},"ISSN":["2195-1721"],"issn-type":[{"value":"2195-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,7,10]]},"assertion":[{"value":"8 December 2014","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 June 2015","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 July 2015","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"11"}}