{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T02:42:05Z","timestamp":1725763325260},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1109\/iceccs.2017.23","type":"proceedings-article","created":{"date-parts":[[2018,2,15]],"date-time":"2018-02-15T16:32:24Z","timestamp":1518712344000},"page":"110-119","source":"Crossref","is-referenced-by-count":2,"title":["Class Modularization Using Indirect Relationships"],"prefix":"10.1109","author":[{"given":"Junha","family":"Lee","sequence":"first","affiliation":[]},{"given":"Dae-Kyoo","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Jiwoo","family":"Park","sequence":"additional","affiliation":[]},{"given":"Sooyong","family":"Park","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1137983.1138001"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/IWPSE.2003.1231213"},{"journal-title":"Pattern Recognition","year":"2008","author":"theodoridis","key":"ref31"},{"journal-title":"Introduction to Data Mining","year":"2005","author":"tan","key":"ref30"},{"key":"ref10","first-page":"692","article-title":"An empirical study on the developers perception of software coupling","author":"oliveto","year":"2013","journal-title":"International Conference on Software Engineering"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738508"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IWPSE.2003.1231205"},{"key":"ref13","first-page":"1351","article-title":"A new representation and crossover operator for search-based optimization of software modularization","author":"harman","year":"2002","journal-title":"Proceedings of the Genetic and Evolutionary Computation Conference"},{"key":"ref14","article-title":"Enriching reverse engineering with semantic clustering","author":"kuhn","year":"2006","journal-title":"Proceedings of Working Conference on Reverse Engineering"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2006.10.017"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1080\/01638539809545028"},{"key":"ref17","article-title":"Measuring the coupling and cohesion of an object-oriented program based on information flow","author":"lee","year":"1995","journal-title":"Proceedings - International Conference on Quality Software"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.1998.693283"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2005.89"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1068009.1068186"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9226-8"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1002\/spe.988"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2559935"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2011.8"},{"journal-title":"Evolutionary Optimization Algorithms","year":"2013","author":"simon","key":"ref29"},{"journal-title":"Introductory Graph Theory","year":"1984","author":"chartrand","key":"ref5"},{"journal-title":"Cvs","year":"1990","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2010.36"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2089116.2089118"},{"key":"ref9","first-page":"189","article-title":"Reversing engineering with logical coupling","author":"dambros","year":"2006","journal-title":"Proceedings of Working Conference on Reverse Engineering"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2009.13"},{"journal-title":"Agile Software Development Principles Patterns and Practices","year":"2003","author":"martin","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233837"},{"journal-title":"Clean code a handbook of agile software craftsmanship","year":"2008","author":"martin","key":"ref21"},{"journal-title":"An Introduction to Statistical Methods And Data Analvsis","year":"2010","author":"ott","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.31"},{"key":"ref26","first-page":"820","article-title":"Identifying method friendships to remove the feature envy bad smell","author":"bavota","year":"2011","journal-title":"International Conference on Software Engineering"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2006.67"}],"event":{"name":"2017 22nd International Conference on Engineering of Complex Computer Systems (ICECCS)","start":{"date-parts":[[2017,11,5]]},"location":"Fukuoka","end":{"date-parts":[[2017,11,8]]}},"container-title":["2017 22nd International Conference on Engineering of Complex Computer Systems (ICECCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8270726\/8292146\/08292808.pdf?arnumber=8292808","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,19]],"date-time":"2018-03-19T17:57:58Z","timestamp":1521482278000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8292808\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/iceccs.2017.23","relation":{},"subject":[],"published":{"date-parts":[[2017,11]]}}}