{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:08:13Z","timestamp":1725793693065},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,21]]},"DOI":"10.1145\/3422392.3422415","type":"proceedings-article","created":{"date-parts":[[2020,12,22]],"date-time":"2020-12-22T01:45:37Z","timestamp":1608601537000},"page":"62-71","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Oracles of Bad Smells"],"prefix":"10.1145","author":[{"given":"Rafael Prates Ferreira","family":"Trindade","sequence":"first","affiliation":[{"name":"Computer Science Department, Federal University of Minas Gerais, Belo Horizonte, M.G., Brazil"}]},{"given":"Mariza Andrade","family":"da Silva Bigonha","sequence":"additional","affiliation":[{"name":"Computer Science Department, Federal University of Minas Gerais, Belo Horizonte, M.G., Brazil"}]},{"given":"Kecia Aline Marques","family":"Ferreira","sequence":"additional","affiliation":[{"name":"Department of Computing, Federal Center for Technological Education of Minas Gerais, Belo Horizonte, M.G., Brazil"}]}],"member":"320","published-online":{"date-parts":[[2020,12,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2015.76"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2015.7381819"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2016.12"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9378-4"},{"key":"e_1_3_2_1_5_1","volume-title":"An Analysis of Resources in Extra-Academic Report Writing (ASIST '16)","author":"B\u00f6rjesson Lisa","year":"2016","unstructured":"Lisa B\u00f6rjesson. 2016. Research Outside Academia? An Analysis of Resources in Extra-Academic Report Writing (ASIST '16). American Society for Information Science, USA, Article 36, 10 pages."},{"key":"e_1_3_2_1_6_1","volume-title":"Mowbray","author":"Brown William J.","year":"1998","unstructured":"William J. Brown, Raphael C. Malveau, Hays W. \"Skip\" McCormick, and Thomas J. Mowbray. 1998. AntiPatterns: Refactoring Software, Architectures, and Projects in Crisis: Refactoring Software, Architecture and Projects in Crisis (1. auflage ed.). John Wiley & Sons."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.15"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SATE.2016.10"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/QUATIC.2016.044"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCET.2012.6342082"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2008.4493326"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9073-9"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2013.6648192"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2015.7335413"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2915970.2915984"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MTD.2012.6225993"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MTD.2015.7332620"},{"key":"e_1_3_2_1_18_1","volume-title":"Refactoring: Improving the Design of Existing Code","author":"Fowler Marting","year":"1999","unstructured":"Marting Fowler, Kent Beck, John Brant, William Opdyke, and Don Roberts. 1999. Refactoring: Improving the Design of Existing Code. Addison-Wesley."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897073.2897100"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2016.7503706"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2016.7732136"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MOBILESoft.2017.29"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859015"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2009.28"},{"key":"e_1_3_2_1_25_1","unstructured":"Foutse Khomh St\u00e9phane Vaucher Yann ga\u00ebl Gu\u00e9h\u00e9neuc and Houari Sahraoui. [n.d.]. A Bayesian Approach for the Detection of Code and Design Smells."},{"key":"e_1_3_2_1_26_1","unstructured":"B. Kitchenham and S Charters. 2007. Guidelines for performing Systematic Literature Reviews in Software Engineering."},{"volume-title":"Object-Oriented Metrics in Practice","author":"Lanza Michele","key":"e_1_3_2_1_27_1","unstructured":"Michele Lanza, Radu Marinescu, and St\u00e9phane Ducasse. 2005. Object-Oriented Metrics in Practice. Springer-Verlag, Berlin, Heidelberg."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985404.1985411"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2012.35"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351723"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897073.2897094"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2004.1357825"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/882501.884717"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.50"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884868"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SBES.2014.18"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2009.5314231"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2932631"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.03.040"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.244"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9535-z"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693086"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2372760"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2015.69"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/MALTESQUE.2017.7882010"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/icpc.2016.7503704"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2752171"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2012.79"},{"key":"e_1_3_2_1_49_1","unstructured":"Dilan Sahin. 2016. A Multi-Level Framework for the Detection Prioritization and Testing of Software Design Defects."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.12.034"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/JCSSE.2016.7748884"},{"key":"e_1_3_2_1_52_1","unstructured":"Elder V. P. Sobrinho A. Lucia and M. Maia. 2018. A systematic literature review on bad smells --- 5 W's: which when what who where. IEEE Transactions on Software Engineering (2018) 1--1."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-09156-3_37"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2791060.2791078"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/SBES.2015.9"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICODSE.2015.7436966"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2601248.2601268"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-013-9250-3"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2013.08.002"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332458"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.521"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASEW.2015.15"}],"event":{"name":"SBES '20: 34th Brazilian Symposium on Software Engineering","sponsor":["SBC Brazilian Computer Society"],"location":"Natal Brazil","acronym":"SBES '20"},"container-title":["Proceedings of the XXXIV Brazilian Symposium on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3422392.3422415","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,30]],"date-time":"2024-05-30T22:29:30Z","timestamp":1717108170000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422392.3422415"}},"subtitle":["a Systematic Literature Review"],"short-title":[],"issued":{"date-parts":[[2020,10,21]]},"references-count":62,"alternative-id":["10.1145\/3422392.3422415","10.1145\/3422392"],"URL":"https:\/\/doi.org\/10.1145\/3422392.3422415","relation":{},"subject":[],"published":{"date-parts":[[2020,10,21]]},"assertion":[{"value":"2020-12-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}