Proceedings of the 17th International Conference on Mining Software Repositories 2020
DOI: 10.1145/3379597.3387477
|View full text |Cite
|
Sign up to set email alerts
|

Characterizing and Identifying Composite Refactorings

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
138
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 31 publications
(140 citation statements)
references
References 44 publications
2
138
0
Order By: Relevance
“…Kim et al [36] study refactoring challenges and benefits at Microsoft, while Vassallo et al [69] perform a large-scale refactoring study on open-source software, and Murphy-Hill et al [70] study general refactoring at the IDE level. Sousa et al [71] characterize composite refactorings, Hora and Robbes [72] explore the characteristics of method extraction refactorings, Peruma et al [73] investigate refactorings of unit tests in Android, and Bavota et al [60] and Ferreira et al [74] study fault inducing refactoring activities.…”
Section: Re L a T E D W O R Kmentioning
confidence: 99%
“…Kim et al [36] study refactoring challenges and benefits at Microsoft, while Vassallo et al [69] perform a large-scale refactoring study on open-source software, and Murphy-Hill et al [70] study general refactoring at the IDE level. Sousa et al [71] characterize composite refactorings, Hora and Robbes [72] explore the characteristics of method extraction refactorings, Peruma et al [73] investigate refactorings of unit tests in Android, and Bavota et al [60] and Ferreira et al [74] study fault inducing refactoring activities.…”
Section: Re L a T E D W O R Kmentioning
confidence: 99%
“…Thus, one could hypothesize that by combining multiple transformation types, developers can better address major structural problems in the code [8,34,50]. These combinations of transformations could be considered "complex refactorings".…”
Section: Nfc -Non-functional Concernmentioning
confidence: 99%
“…These composite refactorings can also be split into two groups, depending on which heuristic was used to detect them. Commit-based, which means that the composite was a group of refactorings applied within a single commit, or change, regardless of which methods/classes they were applied on; and range-based, which means that the composite was a group of refactorings applied over a series of commits, or changes, consecutively performed over the same small set of methods/classes [50].…”
Section: Refactoring and Its Mechanicsmentioning
confidence: 99%
See 2 more Smart Citations