{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T00:08:03Z","timestamp":1725926883146},"reference-count":34,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"10","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2021,10,1]]},"DOI":"10.1587\/transinf.2020edp7255","type":"journal-article","created":{"date-parts":[[2021,9,30]],"date-time":"2021-09-30T22:40:45Z","timestamp":1633041645000},"page":"1601-1615","source":"Crossref","is-referenced-by-count":0,"title":["Supporting Proactive Refactoring: An Exploratory Study on Decaying Modules and Their Prediction"],"prefix":"10.1587","volume":"E104.D","author":[{"given":"Natthawute","family":"SAE-LIM","sequence":"first","affiliation":[{"name":"School of Computing, Tokyo Institute of Technology"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shinpei","family":"HAYASHI","sequence":"additional","affiliation":[{"name":"School of Computing, Tokyo Institute of Technology"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Motoshi","family":"SAEKI","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, Faculty of Science and Technology, Nanzan University"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"532","reference":[{"doi-asserted-by":"crossref","unstructured":"[1] N. Sae-Lim, S. Hayashi, and M. Saeki, \u201cToward proactive refactoring: An exploratory study on decaying modules,\u201d Proc. third International Workshop on Refactoring (IWOR&apos;19), pp.1-10, 2019. 10.1109\/iwor.2019.00015","key":"1","DOI":"10.1109\/IWoR.2019.00015"},{"doi-asserted-by":"crossref","unstructured":"[2] N. Sae-Lim, S. Hayashi, and M. Saeki, \u201cCan automated impact analysis techniques help predict decaying modules?,\u201d Proc. 35th IEEE International Conference on Software Maintenance and Evolution (ICSME&apos;19), pp.541-545, 2019. 10.1109\/icsme.2019.00088","key":"2","DOI":"10.1109\/ICSME.2019.00088"},{"unstructured":"[3] M. Fowler, Refactoring: Improving the Design of Existing Code, Addison-Wesley, 1999.","key":"3"},{"unstructured":"[4] M. Lanza and R. Marinescu, Object-Oriented Metrics in Practice, Springer, 2006.","key":"4"},{"doi-asserted-by":"crossref","unstructured":"[5] A. Yamashita and L. Moonen, \u201cDo code smells reflect important maintainability aspects?,\u201d Proc. 28th IEEE International Conference on Software Maintenance (ICSM&apos;12), pp.306-315, 2012. 10.1109\/icsm.2012.6405287","key":"5","DOI":"10.1109\/ICSM.2012.6405287"},{"doi-asserted-by":"crossref","unstructured":"[6] A. Yamashita and L. Moonen, \u201cExploring the impact of inter-smell relations on software maintainability: An empirical study,\u201d Proc. 35th International Conference on Software Engineering (ICSE&apos;13), pp.682-691, 2013. 10.1109\/icse.2013.6606614","key":"6","DOI":"10.1109\/ICSE.2013.6606614"},{"doi-asserted-by":"crossref","unstructured":"[7] Z. Soh, A. Yamashita, F. Khomh, and Y.-G. Gu\u00e9h\u00e9neuc, \u201cDo code smells impact the effort of different maintenance programming activities?,\u201d Proc. 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER&apos;16), pp.393-402, 2016. 10.1109\/saner.2016.103","key":"7","DOI":"10.1109\/SANER.2016.103"},{"doi-asserted-by":"publisher","unstructured":"[8] R. Marinescu, \u201cAssessing technical debt by identifying design flaws in software systems,\u201d IBM J. Res. Dev., vol.56, no.5, pp.9:1-9:13, 2012. 10.1147\/jrd.2012.2204512","key":"8","DOI":"10.1147\/JRD.2012.2204512"},{"doi-asserted-by":"crossref","unstructured":"[9] F.A. Fontana, V. Ferme, and M. Zanoni, \u201cPoster: Filtering code smells detection results,\u201d Proc. 37th International Conference on Software Engineering (ICSE&apos;15), pp.803-804, 2015. 10.1109\/icse.2015.256","key":"9","DOI":"10.1109\/ICSE.2015.256"},{"doi-asserted-by":"publisher","unstructured":"[10] E. Murphy-Hill and A.P. Black, \u201cRefactoring tools: Fitness for purpose,\u201d IEEE Softw., vol.25, no.5, pp.38-44, 2008. 10.1109\/ms.2008.123","key":"10","DOI":"10.1109\/MS.2008.123"},{"doi-asserted-by":"publisher","unstructured":"[11] M. Tufano, F. Palomba, G. Bavota, R. Oliveto, M.D. Penta, A.D. Lucia, and D. Poshyvanyk, \u201cWhen and why your code starts to smell bad (and whether the smells go away),\u201d IEEE Trans. Softw. Eng., vol.43, no.11, pp.1063-1088, 2017. 10.1109\/tse.2017.2653105","key":"11","DOI":"10.1109\/TSE.2017.2653105"},{"doi-asserted-by":"publisher","unstructured":"[12] M. Zhang, T. Hall, and N. Baddoo, \u201cCode bad smells: A review of current knowledge,\u201d J. Softw. Maint. Evol.: Res. Pract., vol.23, no.3, pp.179-202, 2011. 10.1002\/smr.521","key":"12","DOI":"10.1002\/smr.521"},{"doi-asserted-by":"crossref","unstructured":"[13] F. Khomh, M.D. Penta, Y.-G. Gu\u00e9h\u00e9neuc, and G. Antoniol, \u201cAn exploratory study of the impact of antipatterns on class change-and fault-proneness,\u201d Empir. Softw. Eng., vol.17, no.3, pp.243-275, 2012. 10.1007\/s10664-011-9171-y","key":"13","DOI":"10.1007\/s10664-011-9171-y"},{"doi-asserted-by":"publisher","unstructured":"[14] F. Palomba, G. Bavota, M.D. Penta, F. Fasano, R. Oliveto, and A.D. Lucia, \u201cOn the diffuseness and the impact on maintainability of code smells: A large scale empirical investigation,\u201d Empir. Softw. Eng., vol.23, no.3, pp.1188-1221, 2018. 10.1007\/s10664-017-9535-z","key":"14","DOI":"10.1007\/s10664-017-9535-z"},{"doi-asserted-by":"crossref","unstructured":"[15] D. Silva, N. Tsantalis, and M.T. Valente, \u201cWhy we refactor? Confessions of GitHub contributors,\u201d Proc. 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering (FSE&apos;16), pp.858-870, 2016. 10.1145\/2950290.2950305","key":"15","DOI":"10.1145\/2950290.2950305"},{"doi-asserted-by":"publisher","unstructured":"[16] V.R. Basili, L.C. Briand, and W.L. Melo, \u201cA validation of object-oriented design metrics as quality indicators,\u201d IEEE Trans. Softw. Eng., vol.22, no.10, pp.751-761, 1996. 10.1109\/32.544352","key":"16","DOI":"10.1109\/32.544352"},{"doi-asserted-by":"crossref","unstructured":"[17] J. Pantiuchina, G. Bavota, M. Tufano, and D. Poshyvanyk, \u201cTowards just-in-time refactoring recommenders,\u201d Proc. 26th IEEE\/ACM International Conference on Program Comprehension (ICPC&apos;18), pp.312-315, 2018. 10.1145\/3196321.3196365","key":"17","DOI":"10.1145\/3196321.3196365"},{"unstructured":"[18] V. Rajlich, Software Engineering: The Current Practice, Chapman and Hall-CRC, 2011.","key":"18"},{"doi-asserted-by":"publisher","unstructured":"[19] N. Sae-Lim, S. Hayashi, and M. Saeki, \u201cContext-based approach to prioritize code smells for prefactoring,\u201d J. Softw. Evol. Proc., vol.30, no.6:e1886, pp.1-24, 2018. 10.1002\/smr.1886","key":"19","DOI":"10.1002\/smr.1886"},{"doi-asserted-by":"crossref","unstructured":"[20] M. Kersten and G.C. Murphy, \u201cUsing task context to improve programmer productivity,\u201d Proc. 14th ACM SIGSOFT International Symposium on Foundations of Software Engineering (FSE&apos;06), pp.1-11, 2006. 10.1145\/1181775.1181777","key":"20","DOI":"10.1145\/1181775.1181777"},{"doi-asserted-by":"crossref","unstructured":"[21] M. Gethers, B. Dit, H. Kagdi, and D. Poshyvanyk, \u201cIntegrated impact analysis for managing software changes,\u201d Proc. 34th International Conference on Software Engineering (ICSE&apos;12), pp.430-440, 2012. 10.1109\/icse.2012.6227172","key":"21","DOI":"10.1109\/ICSE.2012.6227172"},{"unstructured":"[22] J. Romano, J.D. Kromrey, J. Coraggio, and J. Skowronek, \u201cAppropriate statistics for ordinal level data: Should we really be using t-test and cohen&apos;s d for evaluating group differences on the nsse and other surveys,\u201d Annual meeting of the Florida Association of Institutional Research, pp.1-33, 2006.","key":"22"},{"doi-asserted-by":"publisher","unstructured":"[23] B. Dit, M. Revelle, M. Gethers, and D. Poshyvanyk, \u201cFeature location in source code: A taxonomy and survey,\u201d J. Softw. Evol. Proc., vol.25, no.1, pp.53-95, 2013. 10.1002\/smr.567","key":"23","DOI":"10.1002\/smr.567"},{"doi-asserted-by":"crossref","unstructured":"[24] T. Ishio, S. Hayashi, H. Kazato, and T. Oshima, \u201cOn the effectiveness of accuracy of automated feature location technique,\u201d Proc. 20th Working Conference on Reverse Engineering, pp.381-390, 2013. 10.1109\/wcre.2013.6671313","key":"24","DOI":"10.1109\/WCRE.2013.6671313"},{"doi-asserted-by":"crossref","unstructured":"[25] K. Miura, S. McIntosh, Y. Kamei, A.E. Hassan, and N. Ubayashi, \u201cThe impact of task granularity on co-evolution analyses,\u201d Proc. 10th ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM&apos;16), pp.1-10, 2016. 10.1145\/2961111.2962607","key":"25","DOI":"10.1145\/2961111.2962607"},{"doi-asserted-by":"crossref","unstructured":"[26] A. Yamashita and L. Moonen, \u201cDo developers care about code smells? An exploratory survey,\u201d Proc. 20th Working Conference on Reverse Engineering (WCRE&apos;13), pp.242-251, 2013. 10.1109\/wcre.2013.6671299","key":"26","DOI":"10.1109\/WCRE.2013.6671299"},{"doi-asserted-by":"publisher","unstructured":"[27] G. Bavota, A.D. Lucia, M.D. Penta, R. Oliveto, and F. Palomba, \u201cAn experimental investigation on the innate relationship between quality and refactoring,\u201d J. Syst. Softw., vol.107, pp.1-14, 2015. 10.1016\/j.jss.2015.05.024","key":"27","DOI":"10.1016\/j.jss.2015.05.024"},{"doi-asserted-by":"crossref","unstructured":"[28] B. Johnson, Y. Song, E. Murphy-Hill, and R. Bowdidge, \u201cWhy don&apos;t software developers use static analysis tools to find bugs?,\u201d Proc. 35th International Conference on Software Engineering (ICSE&apos;13), pp.672-681, 2013. 10.1109\/icse.2013.6606613","key":"28","DOI":"10.1109\/ICSE.2013.6606613"},{"doi-asserted-by":"publisher","unstructured":"[29] N. Sae-Lim, S. Hayashi, and M. Saeki, \u201cAn investigative study on how developers filter and prioritize code smells,\u201d IEICE Trans. Inf. Syst., vol.E101-D, no.7, pp.1733-1742, 2018. 10.1587\/transinf.2017kbp0006","key":"29","DOI":"10.1587\/transinf.2017KBP0006"},{"doi-asserted-by":"crossref","unstructured":"[30] S.A. Vidal, C. Marcos, and J.A. D\u00edaz-Pace, \u201cAn approach to prioritize code smells for refactoring,\u201d Autom. Softw. Eng., vol.23, no.3, pp.501-532, 2016. 10.1007\/s10515-014-0175-x","key":"30","DOI":"10.1007\/s10515-014-0175-x"},{"doi-asserted-by":"publisher","unstructured":"[31] A. Ouni, M. Kessentini, S. Bechikh, and H. Sahraoui, \u201cPrioritizing code-smells correction tasks using chemical reaction optimization,\u201d Softw. Qual. J., vol.23, no.2, pp.323-361, 2015. 10.1007\/s11219-014-9233-7","key":"31","DOI":"10.1007\/s11219-014-9233-7"},{"doi-asserted-by":"publisher","unstructured":"[32] S.G. Eick, T.L. Graves, A.F. Karr, J.S. Marron, and A. Mockus, \u201cDoes code decay? Assessing the evidence from change management data,\u201d IEEE Trans. Softw. Eng., vol.27, no.1, pp.1-12, 2001. 10.1109\/32.895984","key":"32","DOI":"10.1109\/32.895984"},{"doi-asserted-by":"crossref","unstructured":"[33] A. Takahashi, N. Sae-Lim, S. Hayashi, and M. Saeki, \u201cA preliminary study on using code smells to improve bug localization,\u201d Proc. 26th IEEE\/ACM International Conference on Program Comprehension (ICPC&apos;18), pp.324-327, 2018. 10.1145\/3196321.3196361","key":"33","DOI":"10.1145\/3196321.3196361"},{"doi-asserted-by":"publisher","unstructured":"[34] A. Takahashi, N. Sae-Lim, S. Hayashi, and M. Saeki, \u201cAn extensive study on smell-aware bug localization,\u201d J. Syst. Softw., vol.178, no.110986, pp.1-17, 2021. 10.1016\/j.jss.2021.110986","key":"34","DOI":"10.1016\/j.jss.2021.110986"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E104.D\/10\/E104.D_2020EDP7255\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T03:26:55Z","timestamp":1725852415000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E104.D\/10\/E104.D_2020EDP7255\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,1]]},"references-count":34,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2021]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2020edp7255","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"type":"print","value":"0916-8532"},{"type":"electronic","value":"1745-1361"}],"subject":[],"published":{"date-parts":[[2021,10,1]]},"article-number":"2020EDP7255"}}