Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering 2017
DOI: 10.1145/3106237.3106259
|View full text |Cite
|
Sign up to set email alerts
|

Understanding the impact of refactoring on smells: a longitudinal study of 23 software projects

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
81
1

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 63 publications
(85 citation statements)
references
References 31 publications
3
81
1
Order By: Relevance
“…For this study, we have decided to detect code smells with metric-based strategies (92,30). Thus, we can compare our results with related studies that have used the same detection strategies (85,88). These strategies are based on a set of metrics and thresholds, in which the metric values are compared against predefined thresholds and combined using logical operators.…”
Section: Phase 3: Code Smell Detectionmentioning
confidence: 96%
See 3 more Smart Citations
“…For this study, we have decided to detect code smells with metric-based strategies (92,30). Thus, we can compare our results with related studies that have used the same detection strategies (85,88). These strategies are based on a set of metrics and thresholds, in which the metric values are compared against predefined thresholds and combined using logical operators.…”
Section: Phase 3: Code Smell Detectionmentioning
confidence: 96%
“…The selected projects are written in Java. We focused on Java projects because (i) Java is a very popular programming language 2 , and Java projects were also targeted by related studies (85,88). Furthermore, we also selected projects in Java due to the availability of tools to identify refactoring operations (89).…”
Section: Phase 1: Selection Of Software Projectsmentioning
confidence: 99%
See 2 more Smart Citations
“…Another example is Move Method, which consists of moving a method across classes (66). This transformation type is usually applied to allocate a method to the most appropriate class (8).…”
Section: Introductionmentioning
confidence: 99%