{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T14:37:34Z","timestamp":1723473454839},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,9,8]],"date-time":"2015-09-08T00:00:00Z","timestamp":1441670400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,9,8]]},"DOI":"10.1145\/2807426.2807437","type":"proceedings-article","created":{"date-parts":[[2015,9,15]],"date-time":"2015-09-15T15:02:27Z","timestamp":1442329347000},"update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Identifying Test Refactoring Candidates with Assertion Fingerprints"],"prefix":"10.1145","author":[{"given":"Zheng Felix","family":"Fang","sequence":"first","affiliation":[{"name":"Microsoft Corporation"}]},{"given":"Patrick","family":"Lam","sequence":"additional","affiliation":[{"name":"University of Waterloo"}]}],"member":"320","published-online":{"date-parts":[[2015,9,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2013.21"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/832306.837061"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405253"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/850947.853341"},{"key":"e_1_3_2_1_5_1","first-page":"92","volume-title":"Proceedings of the 2nd International Conference on Extreme Programming and Flexible Processes in Software Engineering (XP2001)","author":"Deursen A. V.","year":"2001","unstructured":"A. V. Deursen , L. Moonen , A. Bergh , and G. Kok . Refactoring test code . In Proceedings of the 2nd International Conference on Extreme Programming and Flexible Processes in Software Engineering (XP2001) , pages 92 -- 95 , 2001 . A. V. Deursen, L. Moonen, A. Bergh, and G. Kok. Refactoring test code. In Proceedings of the 2nd International Conference on Extreme Programming and Flexible Processes in Software Engineering (XP2001), pages 92--95, 2001."},{"key":"e_1_3_2_1_6_1","first-page":"1632","volume-title":"ICSE","author":"Estefo P.","year":"2012","unstructured":"P. Estefo . Restructuring unit tests with testsurgeon. In M. Glinz, G. C. Murphy, and M. Pezz\u00e8, editors , ICSE , pages 1632 -- 1634 . IEEE, 2012 . P. Estefo. Restructuring unit tests with testsurgeon. In M. Glinz, G. C. Murphy, and M. Pezz\u00e8, editors, ICSE, pages 1632--1634. IEEE, 2012."},{"key":"e_1_3_2_1_7_1","volume-title":"Test clone detection via assertion fingerprints. Master's thesis","author":"Fang Z.","year":"2014","unstructured":"Z. Fang . Test clone detection via assertion fingerprints. Master's thesis , University of Waterloo , Sept. 2014 . Z. Fang. Test clone detection via assertion fingerprints. Master's thesis, University of Waterloo, Sept. 2014."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2009.17"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2013.45"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30561-0_8"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSEA.2007.57"},{"key":"e_1_3_2_1_12_1","volume-title":"Cetus Users and Compiler Infrastructure Workshop","author":"Lam P.","year":"2011","unstructured":"P. Lam , E. Bodden , O. Lhot\u00e1k , and L. Hendren . The Soot framework for Java program analysis: a retrospective . In Cetus Users and Compiler Infrastructure Workshop , Galveston Island, TX , October 2011 . P. Lam, E. Bodden, O. Lhot\u00e1k, and L. Hendren. The Soot framework for Java program analysis: a retrospective. In Cetus Users and Compiler Infrastructure Workshop, Galveston Island, TX, October 2011."},{"key":"e_1_3_2_1_13_1","volume-title":"GTAC","author":"Lam P.","year":"2014","unstructured":"P. Lam and Z. F. Fang . Beyond coverage: What lurks in test suites ? In GTAC , 2014 . http:\/\/goo.gl\/tVGzy3. P. Lam and Z. F. Fang. Beyond coverage: What lurks in test suites? In GTAC, 2014. http:\/\/goo.gl\/tVGzy3."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/645544.655888"},{"key":"e_1_3_2_1_15_1","volume-title":"xUnit test patterns: Refactoring Test Code","author":"Meszaros G.","year":"2007","unstructured":"G. Meszaros . xUnit test patterns: Refactoring Test Code . Addison-Wesley , 2007 . G. Meszaros. xUnit test patterns: Refactoring Test Code. Addison-Wesley, 2007."},{"key":"e_1_3_2_1_16_1","volume-title":"http:\/\/www.bauhaus-stuttgart.de\/. Last accessed","author":"Bauhaus Project","year":"2015","unstructured":"Project Bauhaus . http:\/\/www.bauhaus-stuttgart.de\/. Last accessed July 2015 . Project Bauhaus. http:\/\/www.bauhaus-stuttgart.de\/. Last accessed July 2015."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70745"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2009.02.007"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297846.1297919"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1987434.1987463"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081749"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/2664398.2664406"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001463"}],"event":{"name":"PPPJ '15: Principles and Practices of Programming on the Java Platform","location":"Melbourne FL USA","acronym":"PPPJ '15","sponsor":["ACM Association for Computing Machinery"]},"container-title":["Proceedings of the Principles and Practices of Programming on The Java Platform"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2807426.2807437","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T18:00:14Z","timestamp":1673632814000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2807426.2807437"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,8]]},"references-count":23,"alternative-id":["10.1145\/2807426.2807437","10.1145\/2807426"],"URL":"https:\/\/doi.org\/10.1145\/2807426.2807437","relation":{},"subject":[],"published":{"date-parts":[[2015,9,8]]},"assertion":[{"value":"2015-09-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}