{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T14:34:26Z","timestamp":1725806066149},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,2]]},"DOI":"10.1145\/2597008.2597805","type":"proceedings-article","created":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T09:48:00Z","timestamp":1400579280000},"page":"168-176","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Prioritizing maintainability defects based on refactoring recommendations"],"prefix":"10.1145","author":[{"given":"Daniela","family":"Steidl","sequence":"first","affiliation":[{"name":"CQSE, Germany"}]},{"given":"Sebastian","family":"Eder","sequence":"additional","affiliation":[{"name":"TU M\u00fcnchen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2014,6,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405318"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2006.22"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings Philips Software Conference","author":"Boogerd C.","year":"2006","unstructured":"C. Boogerd and L. Moonen . Ranking software inspection results using execution likelihood . In Proceedings Philips Software Conference , 2006 . C. Boogerd and L. Moonen. Ranking software inspection results using execution likelihood. In Proceedings Philips Software Conference, 2006."},{"key":"e_1_3_2_1_4_1","first-page":"52","volume-title":"Using software history to guide deployment of coding standards","author":"Boogerd C.","unstructured":"C. Boogerd and L. Moonen . Using software history to guide deployment of coding standards , chapter 4, pages 39\u2013 52 . Embedded Systems Institute, Eindhoven, the Netherlands, 2009. C. Boogerd and L. Moonen. Using software history to guide deployment of coding standards, chapter 4, pages 39\u201352. Embedded Systems Institute, Eindhoven, the Netherlands, 2009."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143997.1144312"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2008.129"},{"key":"e_1_3_2_1_7_1","volume-title":"ECOOP\u201999","author":"Ducasse S.","year":"1999","unstructured":"S. Ducasse , M. Rieger , G. Golomingi , and B. B. Tool support for refactoring duplicated oo code . In ECOOP\u201999 , 1999 . S. Ducasse, M. Rieger, G. Golomingi, and B. B. Tool support for refactoring duplicated oo code. In ECOOP\u201999, 1999."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.895984"},{"key":"e_1_3_2_1_9_1","volume-title":"Improving the Design of Existing Code","author":"Fowler M.","year":"1999","unstructured":"M. Fowler . Refactoring : Improving the Design of Existing Code . Addison-Wesley , Boston, MA, USA , 1999 . M. Fowler. Refactoring: Improving the Design of Existing Code. Addison-Wesley, Boston, MA, USA, 1999."},{"key":"e_1_3_2_1_10_1","first-page":"233","volume-title":"Kansai Science City","author":"Higo Y.","unstructured":"Y. Higo , T. Kamiya , S. Kusumoto , and K. Inoue . Refactoring support based on code clone analysis . In Kansai Science City , pages 220\u2013 233 . Springer, 2004. Y. Higo, T. Kamiya, S. Kusumoto, and K. Inoue. Refactoring support based on code clone analysis. In Kansai Science City, pages 220\u2013233. Springer, 2004."},{"key":"e_1_3_2_1_11_1","volume-title":"SEA 2004","author":"Higo Y.","year":"2004","unstructured":"Y. Higo , T. Kamiya , S. Kusumoto , K. Inoue , and K. Words . Aries: Refactoring support environment based on code clone analysis . In SEA 2004 , 2004 . Y. Higo, T. Kamiya, S. Kusumoto, K. Inoue, and K. Words. Aries: Refactoring support environment based on code clone analysis. In SEA 2004, 2004."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/646972.713674"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609665"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070547"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2007.26"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2006.18"},{"key":"e_1_3_2_1_17_1","volume-title":"EWSPT \u201996","author":"Lehman M. M.","year":"1996","unstructured":"M. M. Lehman . Laws of software evolution revisited . In EWSPT \u201996 , 1996 . M. M. Lehman. Laws of software evolution revisited. In EWSPT \u201996, 1996."},{"key":"e_1_3_2_1_18_1","volume-title":"Clean Code: A Handbook of Agile Software Craftsmanship","author":"Martin R. C.","year":"2008","unstructured":"R. C. Martin . Clean Code: A Handbook of Agile Software Craftsmanship . Prentice Hall PTR , 2008 . R. C. Martin. Clean Code: A Handbook of Agile Software Craftsmanship. Prentice Hall PTR, 2008."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/236337.236361"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368146"},{"key":"e_1_3_2_1_21_1","volume-title":"IWSC \u201913","author":"Steidl D.","year":"2013","unstructured":"D. Steidl and N. Goede . Feature-based detection of bugs in clones . In IWSC \u201913 , 2013 . D. Steidl and N. Goede. Feature-based detection of bugs in clones. In IWSC \u201913, 2013."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2013.6613836"},{"key":"e_1_3_2_1_23_1","volume-title":"XP\u201912","author":"van Deursen A.","year":"2002","unstructured":"A. van Deursen and L. Moonen . The video store revisited \u2013 thoughts on refactoring and testing . In XP\u201912 , 2002 . A. van Deursen and L. Moonen. The video store revisited \u2013 thoughts on refactoring and testing. In XP\u201912, 2002."},{"key":"e_1_3_2_1_24_1","volume-title":"IWSC \u201913","author":"Venkatasubramanyam R.","year":"2013","unstructured":"R. Venkatasubramanyam , S. Gupta , and H. Singh . Prioritizing code clone detection results for clone management . In IWSC \u201913 , 2013 . R. Venkatasubramanyam, S. Gupta, and H. Singh. Prioritizing code clone detection results for clone management. In IWSC \u201913, 2013."}],"event":{"name":"ICSE '14: 36th International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","TCSE IEEE Computer Society's Tech. Council on Software Engin."],"location":"Hyderabad India","acronym":"ICSE '14"},"container-title":["Proceedings of the 22nd International Conference on Program Comprehension"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2597008.2597805","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T11:30:35Z","timestamp":1673004635000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2597008.2597805"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,2]]},"references-count":24,"alternative-id":["10.1145\/2597008.2597805","10.1145\/2597008"],"URL":"https:\/\/doi.org\/10.1145\/2597008.2597805","relation":{},"subject":[],"published":{"date-parts":[[2014,6,2]]},"assertion":[{"value":"2014-06-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}