2023
DOI: 10.1016/j.jss.2023.111829
|View full text |Cite
|
Sign up to set email alerts
|

Catalog and detection techniques of microservice anti-patterns and bad smells: A tertiary study

Tomas Cerny,
Amr S. Abdelfattah,
Abdullah Al Maruf
et al.
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3
2
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 59 publications
0
4
0
Order By: Relevance
“…This can be reflected in the provided metrics, indicating that the E2E test might not achieve 100% coverage. This prompts the question of whether the remaining endpoints signify the presence of the Nobody Home smell [36], indicating missing wiring from the user interface, or if they represent outdated or dead code.…”
Section: Discussionmentioning
confidence: 99%
“…This can be reflected in the provided metrics, indicating that the E2E test might not achieve 100% coverage. This prompts the question of whether the remaining endpoints signify the presence of the Nobody Home smell [36], indicating missing wiring from the user interface, or if they represent outdated or dead code.…”
Section: Discussionmentioning
confidence: 99%
“…Major instances of technical debt include code smells and ineffective design decisions made by developers, which can have a negative impact on the maintainability, scalability, and quality of a software system [4]. Over the past few decades, research has heavily focused on the following areas [5]:…”
Section: Introductionmentioning
confidence: 99%
“…The problems that affect the overall quality of software, commonly referred to as code smells, can take the form of poorly designed architecture, hidden bugs, misuse of design patterns, or badly written code [4]. These code smells hinder the evolution of the software itself.…”
mentioning
confidence: 99%
“…From the available patterns, it is found that the circuit breaker pattern and the retry pattern was the widely implemented pattern due to its simplicity and efficient way of handling of failures. (3,4) These patterns are implemented either through method-based implementation or proxy-based implementation. These patterns are widely implemented for transient failure cases.…”
Section: Introductionmentioning
confidence: 99%