{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,9]],"date-time":"2024-07-09T07:21:20Z","timestamp":1720509680109},"reference-count":50,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T00:00:00Z","timestamp":1496275200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Knowledge-Based Systems"],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1016\/j.knosys.2017.04.003","type":"journal-article","created":{"date-parts":[[2017,4,12]],"date-time":"2017-04-12T16:01:36Z","timestamp":1492012896000},"page":"20-32","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":3,"special_numbering":"C","title":["Specifying and identifying widely used crosscutting concerns"],"prefix":"10.1016","volume":"126","author":[{"given":"Misael","family":"Mongiov\u00ec","sequence":"first","affiliation":[]},{"given":"Giuseppe","family":"Pappalardo","sequence":"additional","affiliation":[]},{"given":"Emiliano","family":"Tramontana","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.knosys.2017.04.003_bib0001","series-title":"Refactoring: improving the design of existing code","author":"Fowler","year":"1999"},{"key":"10.1016\/j.knosys.2017.04.003_bib0002","series-title":"Refactoring to patterns","author":"Kerievsky","year":"2005"},{"key":"10.1016\/j.knosys.2017.04.003_bib0003","series-title":"Proceedings of Symposium on Applied Computing (SAC)","first-page":"1243","article-title":"AODP: refactoring code to provide advanced aspect-oriented modularization of design patterns","author":"Giunta","year":"2012"},{"issue":"3","key":"10.1016\/j.knosys.2017.04.003_bib0004","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1109\/TSE.2009.1","article-title":"Identification of move method refactoring opportunities","volume":"35","author":"Tsantalis","year":"2009","journal-title":"IEEE Trans. Software Eng."},{"key":"10.1016\/j.knosys.2017.04.003_bib0005","series-title":"Proceedings of Complex, Intelligent and Software Intensive Systems (CISIS)","first-page":"529","article-title":"Using modularity metrics to assist move method refactoring of large systems","author":"Napoli","year":"2013"},{"key":"10.1016\/j.knosys.2017.04.003_bib0006","series-title":"Proceedings of Asia Pacific Software Engineering Conference (APSEC)","first-page":"105","article-title":"Suggesting extract class refactoring opportunities by measuring strength of method interactions","author":"Pappalardo","year":"2013"},{"key":"10.1016\/j.knosys.2017.04.003_bib0007","series-title":"Proceedings of Computer Software and Applications Conference (COMPSAC) workshop QUORS","first-page":"499","article-title":"Automatically characterising components with concerns and reducing tangling","author":"Tramontana","year":"2013"},{"issue":"10","key":"10.1016\/j.knosys.2017.04.003_bib0008","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1145\/383845.383854","article-title":"Discussing aspects of aop.","volume":"44","author":"Elrad","year":"2001","journal-title":"Commun. ACM"},{"key":"10.1016\/j.knosys.2017.04.003_bib0009","series-title":"Proceedings of European Conference on Object-Oriented Programming (ECOOP)","first-page":"220","article-title":"Aspect-oriented programming","volume":"1241","author":"Kiczales","year":"1997"},{"key":"10.1016\/j.knosys.2017.04.003_bib0010","series-title":"AspectJ in Action: Enterprise AOP with Spring Applications","author":"Laddad","year":"2009"},{"key":"10.1016\/j.knosys.2017.04.003_bib0011","series-title":"Proceedings of International Conference on Software Engineering (ICSE)","first-page":"406","article-title":"Concern graphs: finding and describing concerns using structural program dependencies","author":"Robillard","year":"2002"},{"key":"10.1016\/j.knosys.2017.04.003_bib0012","series-title":"Proceedings of Working Conference on Reverse Engineering (WCRE)","first-page":"132","article-title":"Identifying aspects using fan-in analysis","author":"Marin","year":"2004"},{"issue":"10","key":"10.1016\/j.knosys.2017.04.003_bib0013","doi-asserted-by":"crossref","first-page":"804","DOI":"10.1109\/TSE.2005.114","article-title":"On the use of clone detection for identifying crosscutting concern code","volume":"31","author":"Bruntink","year":"2005","journal-title":"IEEE Trans. Software Eng."},{"key":"10.1016\/j.knosys.2017.04.003_bib0014","series-title":"Proceedings of international conference on Aspect-oriented software development (AOSD)","first-page":"226","article-title":"Efficiently mining crosscutting concerns through random walks","author":"Zhang","year":"2007"},{"key":"10.1016\/j.knosys.2017.04.003_bib0015","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1007\/11687061_7","article-title":"Towards a catalogue of refactorings and code smells for aspectj","volume":"3880","author":"Monteiro","year":"2006","journal-title":"Trans. Aspect-Oriented Softw. Dev. I"},{"key":"10.1016\/j.knosys.2017.04.003_bib0016","series-title":"Proceedings of OOPSLA","first-page":"161","article-title":"Design pattern implementation in Java and AspectJ","volume":"37","author":"Hannemann","year":"2002"},{"key":"10.1016\/j.knosys.2017.04.003_bib0017","series-title":"Proceedings of EuroPLoP","first-page":"769","article-title":"Patterns of aspect-oriented design","author":"Noble","year":"2007"},{"key":"10.1016\/j.knosys.2017.04.003_bib0018","series-title":"Proceedings of Symposium on Applied Computing (SAC)","first-page":"1866","article-title":"Superimposing roles for design patterns into application classes by means of aspects","author":"Giunta","year":"2012"},{"key":"10.1016\/j.knosys.2017.04.003_bib0019","series-title":"Design Patterns: Elements Of Reusable Object-Oriented Software","author":"Gamma","year":"1994"},{"issue":"11","key":"10.1016\/j.knosys.2017.04.003_bib0020","doi-asserted-by":"crossref","first-page":"896","DOI":"10.1109\/TSE.2006.112","article-title":"Design pattern detection using similarity scoring","volume":"32","author":"Tsantalis","year":"2006","journal-title":"Softw. Eng., IEEE Trans."},{"issue":"01","key":"10.1016\/j.knosys.2017.04.003_bib0021","doi-asserted-by":"crossref","first-page":"1450001","DOI":"10.1142\/S0218001414500013","article-title":"Graph matching and learning in pattern recognition in the last 10 years","volume":"28","author":"Foggia","year":"2014","journal-title":"Int. J. Pattern Recognit. Artif. Intell."},{"issue":"1-2","key":"10.1016\/j.knosys.2017.04.003_bib0022","doi-asserted-by":"crossref","first-page":"264","DOI":"10.14778\/1920841.1920878","article-title":"Graph pattern matching: from intractable to polynomial time","volume":"3","author":"Fan","year":"2010","journal-title":"Proc. VLDB Endowment"},{"issue":"1","key":"10.1016\/j.knosys.2017.04.003_bib0023","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1471-2105-11-96","article-title":"Sing: subgraph search in non-homogeneous graphs","volume":"11","author":"Di Natale","year":"2010","journal-title":"BMC Bioinform."},{"issue":"9","key":"10.1016\/j.knosys.2017.04.003_bib0024","doi-asserted-by":"crossref","first-page":"698","DOI":"10.1109\/TSE.2006.95","article-title":"Tool-supported refactoring of existing object-oriented code into aspects","volume":"32","author":"Binkley","year":"2006","journal-title":"IEEE Trans. Software Eng."},{"key":"10.1016\/j.knosys.2017.04.003_bib0025","series-title":"Proceedings of OOPSLA","first-page":"543","article-title":"A theory of aspects as latent topics","volume":"43","author":"Baldi","year":"2008"},{"key":"10.1016\/j.knosys.2017.04.003_bib0026","series-title":"Proceedings of International Conference on Frontier of Computer Science and Technology (FCST)","first-page":"312","article-title":"Aspect mining using link analysis","author":"Huang","year":"2010"},{"key":"10.1016\/j.knosys.2017.04.003_bib0027","series-title":"Proceedings of International Conference on Tools Pacific: Objects for internet, mobile and embedded applications","first-page":"191","article-title":"Dynamic hierarchical undo facility in a fine-grained component environment","author":"Washizaki","year":"2002"},{"issue":"10","key":"10.1016\/j.knosys.2017.04.003_bib0028","doi-asserted-by":"crossref","first-page":"1367","DOI":"10.1109\/TPAMI.2004.75","article-title":"A (sub) graph isomorphism algorithm for matching large graphs","volume":"26","author":"Cordella","year":"2004","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.knosys.2017.04.003_bib0029","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1016\/j.scico.2012.04.008","article-title":"Sourcerer: an infrastructure for large-scale collection and analysis of open-source code","volume":"79","author":"Bajracharya","year":"2014","journal-title":"Sci. Comput. Program"},{"issue":"2","key":"10.1016\/j.knosys.2017.04.003_bib0030","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1007\/s10618-008-0118-x","article-title":"Sourcerer: mining and searching internet-scale software repositories","volume":"18","author":"Linstead","year":"2009","journal-title":"Data Min. Knowl. Discov."},{"key":"10.1016\/j.knosys.2017.04.003_bib0031","series-title":"Proceedings of Symposium on Applied Computing (SAC)","first-page":"765","article-title":"Design pattern detection by template matching","author":"Dong","year":"2008"},{"key":"10.1016\/j.knosys.2017.04.003_bib0032","series-title":"21st IEEE International Conference on Software Maintenance (ICSM\u201905)","first-page":"27","article-title":"Automated refactoring of object oriented code into aspects","author":"Binkley","year":"2005"},{"issue":"3","key":"10.1016\/j.knosys.2017.04.003_bib0033","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/s11280-014-0322-0","article-title":"Answering subgraph queries over massive disk resident graphs","volume":"19","author":"Peng","year":"2016","journal-title":"World Wide Web"},{"key":"10.1016\/j.knosys.2017.04.003_sbref0034","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-77042-8_6","article-title":"A survey of automated code-level aspect mining techniques","author":"Kellens","year":"2007","journal-title":"Trans. Aspect-Oriented Softw. Dev."},{"key":"10.1016\/j.knosys.2017.04.003_bib0035","series-title":"Proceedings of Automated Software Engineering (ASE)","first-page":"310","article-title":"Aspect mining using event traces","author":"Breu","year":"2004"},{"issue":"5","key":"10.1016\/j.knosys.2017.04.003_bib0036","first-page":"1235","article-title":"Towards the identification of cross-cutting concerns: a comprehensive dynamic approach based on execution relations","volume":"97","author":"Dongjin","year":"2014","journal-title":"IEICE Trans. Inf. Syst."},{"key":"10.1016\/j.knosys.2017.04.003_bib0037","series-title":"Proceedings of Working Conference on Reverse Engineering (WCRE)","first-page":"112","article-title":"Aspect mining through the formal concept analysis of execution traces","author":"Tonella","year":"2004"},{"key":"10.1016\/j.knosys.2017.04.003_bib0038","series-title":"Proceedings of International Workshop on Source Code Analysis and Manipulation","first-page":"97","article-title":"Mining aspectual views using formal concept analysis","author":"Tourwe","year":"2004"},{"key":"10.1016\/j.knosys.2017.04.003_bib0039","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1016\/j.jss.2014.08.030","article-title":"Toward a new aspect-mining approach for multi-agent systems","volume":"98","author":"Zerrougui","year":"2014","journal-title":"J. Syst. Softw."},{"key":"10.1016\/j.knosys.2017.04.003_bib0040","series-title":"Proceedings of Working Conference on Reverse Engineering","first-page":"334","article-title":"Mining control flow graphs for crosscutting concerns","author":"Krinke","year":"2006"},{"key":"10.1016\/j.knosys.2017.04.003_bib0041","series-title":"Software Engineering Research and Practice","first-page":"601","article-title":"Design and evaluation of an automated aspect mining tool","author":"Shepherd","year":"2004"},{"issue":"3","key":"10.1016\/j.knosys.2017.04.003_bib0042","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1007\/s10664-012-9224-x","article-title":"Configuring latent dirichlet allocation based feature location","volume":"19","author":"Biggers","year":"2014","journal-title":"Empir. Softw. Eng."},{"key":"10.1016\/j.knosys.2017.04.003_bib0043","series-title":"Proceedings of Automated Software Engineering (ASE)","first-page":"221","article-title":"Mining aspects from version history","author":"Breu","year":"2006"},{"issue":"1","key":"10.1016\/j.knosys.2017.04.003_bib0044","first-page":"1","article-title":"A combined approach for concern identification in kdm models","volume":"21","author":"Santib\u00e1\u00f1ez","year":"2015","journal-title":"J. Braz. Comput. Soc."},{"key":"10.1016\/j.knosys.2017.04.003_bib0045","series-title":"6th Latin American Workshop on Aspect Oriented Software Development Advanced Modularization Techniques","article-title":"A clustering based approach for aspect mining and pointcut identification","author":"Fillus","year":"2012"},{"key":"10.1016\/j.knosys.2017.04.003_bib0046","series-title":"Intelligent Computer Communication and Processing, 2008. ICCP 2008. 4th International Conference on","first-page":"129","article-title":"On clustering based aspect mining","author":"Cojocar","year":"2008"},{"key":"10.1016\/j.knosys.2017.04.003_bib0047","series-title":"Proceedings of IEEE\/ACM International Conference on Automated Software Engineering (ASE)","first-page":"278","article-title":"Automated aspect recommendation through clustering-based fan-in analysis","author":"Zhang","year":"2008"},{"key":"10.1016\/j.knosys.2017.04.003_bib0048","series-title":"Proceedings of the joint ACM SIGSOFT conference\u2013QoSA and ACM SIGSOFT symposium\u2013ISARCS on Quality of software architectures\u2013QoSA and architecting critical systems\u2013ISARCS","first-page":"23","article-title":"Combining clustering and pattern detection for the reengineering of component-based software systems","author":"von Detten","year":"2011"},{"key":"10.1016\/j.knosys.2017.04.003_bib0049","series-title":"Proceedings of IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI)","first-page":"249","article-title":"On top-down aspect mining for monitoring techniques implementation","author":"Cojocar","year":"2016"},{"issue":"2","key":"10.1016\/j.knosys.2017.04.003_bib0050","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1007\/s00766-013-0193-4","article-title":"Early identification of crosscutting concerns with the language extended lexicon","volume":"20","author":"Antonelli","year":"2015","journal-title":"Requirements Eng."}],"container-title":["Knowledge-Based Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950705117301703?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950705117301703?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T20:46:12Z","timestamp":1569012372000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0950705117301703"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":50,"alternative-id":["S0950705117301703"],"URL":"https:\/\/doi.org\/10.1016\/j.knosys.2017.04.003","relation":{},"ISSN":["0950-7051"],"issn-type":[{"value":"0950-7051","type":"print"}],"subject":[],"published":{"date-parts":[[2017,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Specifying and identifying widely used crosscutting concerns","name":"articletitle","label":"Article Title"},{"value":"Knowledge-Based Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.knosys.2017.04.003","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2017 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}