A Systematic Literature Review on Bad Smells-5 W's: Which, When, What, Who, Where

Bad smells are sub-optimal code structures that may represent problems needing attention. We conduct an extensive literature review on bad smells relying on a large body of knowledge from 1990 to 2017. We show that some smells are much more studied in the literature than others, and also that some o...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on software engineering Vol. 47; no. 1; pp. 17 - 66
Main Authors Sobrinho, Elder Vicente de Paulo, De Lucia, Andrea, Maia, Marcelo de Almeida
Format Journal Article
LanguageEnglish
Published New York IEEE 01.01.2021
IEEE Computer Society
Subjects
Online AccessGet full text
ISSN0098-5589
1939-3520
DOI10.1109/TSE.2018.2880977

Cover

Abstract Bad smells are sub-optimal code structures that may represent problems needing attention. We conduct an extensive literature review on bad smells relying on a large body of knowledge from 1990 to 2017. We show that some smells are much more studied in the literature than others, and also that some of them are intrinsically inter-related (which). We give a perspective on how the research has been driven across time (when). In particular, while the interest in duplicated code emerged before the reference publications by Fowler and Beck and by Brown et al., other types of bad smells only started to be studied after these seminal publications, with an increasing trend in the last decade. We analyzed aims, findings, and respective experimental settings, and observed that the variability of these elements may be responsible for some apparently contradictory findings on bad smells (what). Moreover, we could observe that, in general, papers tend to study different types of smells at once. However, only a small percentage of those papers actually investigate possible relations between the respective smells (co-studies), i.e., each smell tends to be studied in isolation. Despite of a few relations between some types of bad smells have been investigated, there are other possible relations for further investigation. We also report that authors have different levels of interest in the subject, some of them publishing sporadically and others continuously (who). We observed that scientific connections are ruled by a large "small world" connected graph among researchers and several small disconnected graphs. We also found that the communities studying duplicated code and other types of bad smells are largely separated. Finally, we observed that some venues are more likely to disseminate knowledge on Duplicate Code (which often is listed as a conference topic on its own), while others have a more balanced distribution among other smells (where). Finally, we provide a discussion on future directions for bad smell research.
AbstractList Bad smells are sub-optimal code structures that may represent problems needing attention. We conduct an extensive literature review on bad smells relying on a large body of knowledge from 1990 to 2017. We show that some smells are much more studied in the literature than others, and also that some of them are intrinsically inter-related ( which ). We give a perspective on how the research has been driven across time ( when ). In particular, while the interest in duplicated code emerged before the reference publications by Fowler and Beck and by Brown et al., other types of bad smells only started to be studied after these seminal publications, with an increasing trend in the last decade. We analyzed aims, findings, and respective experimental settings, and observed that the variability of these elements may be responsible for some apparently contradictory findings on bad smells ( what ). Moreover, we could observe that, in general, papers tend to study different types of smells at once. However, only a small percentage of those papers actually investigate possible relations between the respective smells (co-studies), i.e., each smell tends to be studied in isolation. Despite of a few relations between some types of bad smells have been investigated, there are other possible relations for further investigation. We also report that authors have different levels of interest in the subject, some of them publishing sporadically and others continuously ( who ). We observed that scientific connections are ruled by a large “small world” connected graph among researchers and several small disconnected graphs. We also found that the communities studying duplicated code and other types of bad smells are largely separated. Finally, we observed that some venues are more likely to disseminate knowledge on Duplicate Code (which often is listed as a conference topic on its own), while others have a more balanced distribution among other smells ( where ). Finally, we provide a discussion on future directions for bad smell research.
Author Maia, Marcelo de Almeida
Sobrinho, Elder Vicente de Paulo
De Lucia, Andrea
Author_xml – sequence: 1
  givenname: Elder Vicente de Paulo
  orcidid: 0000-0001-7735-6732
  surname: Sobrinho
  fullname: Sobrinho, Elder Vicente de Paulo
  email: eldereng@hotmail.com
  organization: Department of Electrical Engineering, Federal University of Triângulo Mineiro, Uberaba, Brazil
– sequence: 2
  givenname: Andrea
  orcidid: 0000-0002-4238-1425
  surname: De Lucia
  fullname: De Lucia, Andrea
  email: adelucia@unisa.it
  organization: University of Salerno, Fisciano, (SA), Italy
– sequence: 3
  givenname: Marcelo de Almeida
  orcidid: 0000-0003-3578-1380
  surname: Maia
  fullname: Maia, Marcelo de Almeida
  email: marcelo.maia@ufu.br
  organization: Faculty of Computing, Federal University of Uberlândia, Uberlândia, Brazil
BookMark eNp9kEtLAzEUhYNUsK3uBTcDLtw4NY9mkrirpT6gINpCl0OauUNTpjM1SZX-ezO2uHDh5h64fOc-Tg916qYGhC4JHhCC1d18NhlQTOSASomVECeoSxRTKeMUd1AXYyVTzqU6Qz3v1xhjLgTvordRMtv7ABsdrEmmNoDTYecgeYdPC19JUycPukhmG6gqn_JkcePvk8XKmtVtFKjbqkNbm5-Gg3N0WurKw8VR-2j-OJmPn9Pp69PLeDRNDVUkpCUQKgtdZJoYwaMqIzOmMjmk5XIIkdHSULE0ptDxVM1xUWqRQZGBIVnG-uj6MHbrmo8d-JCvm52r48acDoWgnDLCIpUdKOMa7x2UubEhvtrUwWlb5QTnbXp5TC9v08uP6UUj_mPcOrvRbv-f5epgsQDwi0vOKMOKfQNxn3pM
CODEN IESEDJ
CitedBy_id crossref_primary_10_1142_S0218194023500274
crossref_primary_10_1016_j_infsof_2020_106278
crossref_primary_10_1002_spe_3257
crossref_primary_10_1145_3607181
crossref_primary_10_1007_s10586_023_04144_1
crossref_primary_10_1109_ACCESS_2023_3302260
crossref_primary_10_1016_j_jss_2021_111141
crossref_primary_10_1016_j_infsof_2022_106939
crossref_primary_10_1016_j_neucom_2023_127014
crossref_primary_10_1016_j_jss_2024_112101
crossref_primary_10_1016_j_jss_2023_111677
crossref_primary_10_1002_smr_2431
crossref_primary_10_1016_j_jss_2024_112303
crossref_primary_10_1007_s11219_024_09680_6
crossref_primary_10_1016_j_csi_2025_103998
crossref_primary_10_1002_spe_3401
crossref_primary_10_1016_j_jss_2023_111618
crossref_primary_10_1016_j_infsof_2022_107112
crossref_primary_10_1145_3596908
crossref_primary_10_1109_ACCESS_2023_3327553
crossref_primary_10_5753_jserd_2024_3324
crossref_primary_10_2174_2666255816666230222112313
crossref_primary_10_1016_j_infsof_2025_107678
crossref_primary_10_3390_app14146149
crossref_primary_10_1007_s10664_022_10227_1
crossref_primary_10_1007_s10515_025_00486_9
crossref_primary_10_1016_j_jss_2022_111221
crossref_primary_10_1007_s13198_020_01001_x
crossref_primary_10_1109_ACCESS_2025_3530927
crossref_primary_10_1007_s10664_024_10577_y
crossref_primary_10_1007_s42979_024_02956_5
crossref_primary_10_1016_j_jss_2024_111968
crossref_primary_10_1007_s10664_024_10598_7
crossref_primary_10_1016_j_eswa_2023_121640
crossref_primary_10_1007_s10664_023_10343_6
Cites_doi 10.1145/1095430.1081737
10.1109/MTD.2015.7332620
10.1007/s10664-012-9236-6
10.1109/ICSME.2014.27
10.1109/ICSME.2016.73
10.1109/SANER.2016.104
10.1109/METRICS.2005.38
10.1007/978-3-540-78137-0_21
10.1089/brain.2011.0038
10.1109/WCRE.2012.33
10.1109/CSMR.2013.13
10.1007/978-3-642-11503-5_10
10.1109/ICSM.2012.6405287
10.1109/SANER.2017.7884614
10.1002/smr.521
10.1109/SANER.2016.84
10.1145/2597073.2597104
10.1145/1852786.1852797
10.1007/978-3-540-76440-3_2
10.1109/CSMR.2011.11
10.1109/CSMR.2013.27
10.1007/s10664-014-9313-0
10.1145/2889160.2889168
10.1109/WETSoM.2015.14
10.1145/582435.582436
10.1109/WCRE.2011.11
10.1109/ICSM.2012.6405348
10.1007/11693017_31
10.1109/WCRE.2008.54
10.1109/TSE.2009.50
10.1109/SBCARS.2011.18
10.1109/SCAM.2013.6648192
10.1016/j.infsof.2006.10.005
10.1145/2568225.2568286
10.1109/SCAM.2011.12
10.1002/smr.333
10.1007/978-3-642-19811-3_25
10.1007/978-3-540-73066-8_16
10.1109/WCRE.1995.514697
10.1109/ICSM.2004.1357804
10.1109/SCAM.2012.21
10.1002/0471722324
10.1186/s40411-015-0025-y
10.1109/ICECCS.2011.36
10.1109/ICSM.2015.7332459
10.1145/1985793.1985836
10.1109/ICSME.2016.94
10.1109/ICSM.2013.14
10.1016/j.jss.2006.10.018
10.1109/ASE.2015.46
10.1109/SCAM.2014.17
10.1007/978-3-642-21378-6_2
10.1109/CSMR.2003.1192416
10.1109/WCRE.2000.891457
10.1007/s10664-014-9316-x
10.1109/TSE.2015.2503740
10.1109/TSE.2005.114
10.1109/CSMR.2009.20
10.1109/TSE.2017.2653105
10.1145/2162049.2162069
10.1109/ESEM.2015.7321186
10.1145/2597008.2597805
10.1109/MSR.2010.5463343
10.1109/ICSE.2012.6227183
10.1109/APSEC.2002.1183002
10.1002/(SICI)1096-908X(199907/08)11:4<223::AID-SMR194>3.3.CO;2-4
10.1109/TSE.2009.16
10.1109/SCAM.2014.12
10.1109/ICSE.2007.90
10.1177/001316446002000104
10.1109/SBES.2010.21
10.1109/CSMR.2007.51
10.1109/ICST.2013.45
10.1109/FOSM.2008.4659255
10.1109/WCRE.2002.1173068
10.1109/TSE.2013.4
10.1145/2970276.2970340
10.1109/CSMR.2011.7
10.1109/WCRE.2009.28
10.1109/ICSM.1998.738528
10.1109/ISESE.2005.1541846
10.1109/ICSE.2015.24
10.1109/ICSM.2015.7332458
10.1002/smr.394
10.1109/ICSM.2011.6080795
10.1016/B978-0-12-800160-8.00004-8
10.1109/ICSM.2012.6405285
10.1002/spe.750
10.1145/2635868.2635879
10.1109/ICPC.2013.6613837
10.1007/s10664-011-9195-3
10.1109/ICSM.2013.37
10.1109/SCAM.2015.7335413
10.1109/ICPC.2013.6613838
10.1109/SANER.2016.94
10.1109/SBCARS.2014.21
10.1109/MSR.2013.6624021
10.1145/2387358.2387360
10.1109/ICPC.2008.41
10.1002/widm.1048
10.1007/s10664-011-9171-y
10.1109/ICSM.1996.565012
10.2307/2529310
10.1109/SANER.2017.7884633
10.1007/s10664-015-9368-6
10.1109/TSE.2014.2331057
10.1145/1062455.1062537
10.1145/1368088.1368172
10.1109/TSE.2007.70745
10.1109/ICPC.2010.22
10.1109/ICSME.2016.27
10.1109/CSMR.2008.4493311
10.1007/s10664-008-9076-6
10.1109/ICSM.2004.1357820
10.1109/SCAM.2011.21
10.1109/CSMR.2009.59
10.1007/s10664-015-9402-8
10.1109/SCAM.2014.11
10.1002/spe.1031
10.1007/978-3-540-24659-6_16
10.1016/S0950-5849(02)00123-4
10.1007/BF00126960
10.1109/WCRE.2001.957835
10.1002/smr.520
10.1145/2970276.2970326
10.1145/2351676.2351701
10.1109/ICSM.2013.38
10.1109/ICPC.2011.22
10.1007/3-540-47764-0_3
10.1007/978-3-642-00593-0_31
10.1109/METRIC.2002.1011326
10.1016/j.jss.2011.05.016
10.1109/TSE.2013.19
10.1145/1767751.1767754
10.1145/2635868.2635886
10.1109/MSR.2015.17
10.1145/1095430.1081733
10.1109/ESEM.2009.5314231
10.1109/ASEW.2008.4686327
10.1007/s10515-011-0098-8
10.1007/s10664-008-9073-9
10.1109/SCAM.2014.10
10.1002/spe.2173
10.1145/2915970.2915984
10.1109/SANER.2015.7081827
10.1109/ICSTW.2009.18
10.1007/s11334-013-0205-z
10.1007/s10664-013-9250-3
10.1109/ESEM.2015.7321194
10.1109/ICSM.2007.4362615
10.1007/s10664-015-9378-4
10.1109/SCAM.2011.17
10.1109/MSR.2009.5069483
10.1109/IWPSE.2004.1334772
10.1007/s10664-015-9361-0
10.1016/j.jss.2009.03.077
10.1109/TSE.2011.90
10.1109/SANER.2016.103
10.1007/s10664-014-9350-8
10.1109/WCRE.2007.7
10.1007/11774129_8
10.1109/SCAM.2009.17
10.1109/ESEM.2011.10
10.1145/2597073.2597109
10.1109/TSE.2012.89
10.1109/CSMR.2010.33
10.1109/CSMR.2013.28
10.1109/TSE.2006.28
10.1109/ICSM.2012.6405324
10.1109/SCAM.2015.7335411
10.1007/s10664-013-9256-x
10.1109/SCAM.2008.14
10.1007/978-3-642-19811-3_30
10.1007/978-3-642-24485-8_19
10.1109/TSE.2015.2448531
10.1109/ICPC.2012.6240490
10.1145/1287624.1287634
10.1109/ICSE.2013.6606614
10.1109/WCRE.1999.806971
10.1145/1960275.1960300
10.1109/METRIC.1999.809750
10.1109/SCAM.2012.18
10.1109/SCAM.2011.18
10.1109/ICSME.2016.12
10.1145/1985793.1985989
10.1109/CSMR-WCRE.2014.6747168
10.1109/CSMR.2007.26
10.1109/ICSE.2007.97
10.1109/QSIC.2009.47
10.1109/CSMR.2005.53
10.1109/SANER.2016.78
10.1049/iet-sen.2012.0058
10.1145/3167132.3167295
10.1145/2568225.2568298
10.1145/1985793.1985835
10.1016/j.eswa.2014.09.022
10.1016/j.jss.2010.11.921
10.1109/ICSME.2014.55
10.1109/SANER.2015.7081830
10.1002/smr.416
10.1109/ASE.2013.6693107
10.1109/MSR.2013.6624053
10.1145/1842752.1842805
10.1007/978-3-642-39038-8_21
10.1109/ICPC.2006.25
10.1016/j.scico.2009.02.007
10.1109/ICSME.2014.31
10.1016/j.infsof.2013.01.008
10.1109/WCRE.2013.6671299
10.1109/ICSM.2005.52
10.1007/s10664-009-9108-x
10.1016/j.infsof.2013.08.002
10.1016/j.infsof.2017.01.006
10.1109/WCRE.2012.56
10.1109/ICSM.2010.5609665
10.1145/2884781.2884877
10.1109/ICSME.2014.32
10.1007/978-3-642-39742-4_6
10.1109/TSE.2014.2372760
10.1109/ICSM.2011.6080794
10.1007/s10515-014-0175-x
10.1109/SCAM.2007.19
10.1109/WCRE.2009.51
10.1145/1052898.1052908
10.1145/1862372.1862390
10.1109/TSE.2009.1
10.1109/TSE.2002.1019480
10.1109/SCAM.2016.13
10.1109/ICPC.2016.7503705
10.1007/s10664-015-9394-4
10.1145/1367497.1367516
10.1109/WCRE.2011.12
10.1109/SCAM.2010.32
10.1109/ASE.2013.6693086
10.1007/s11219-013-9200-8
10.1109/ESEM.2007.9
10.1109/ICSM.2011.6080796
10.1109/ICPC.2011.25
10.1145/2420950.2421004
10.1016/j.jss.2013.05.007
10.1109/WCRE.2009.26
10.1109/CSMR.2012.37
10.1109/ICPC.2011.45
10.1109/WCRE.2006.18
10.1007/3-540-36209-6_17
10.1109/METRICS.2005.36
10.1109/ICPC.2012.6240491
10.1145/2897073.2897100
10.1145/2884781.2884868
10.1109/TSE.2014.2323972
10.1109/TSE.2007.70725
10.1016/j.scico.2013.11.027
10.1109/ICPC.2016.7503706
10.1007/s10664-008-9089-1
10.1109/WCRE.2003.1287259
10.1016/j.jss.2013.03.061
10.1109/WCRE.2013.6671310
10.14279/tuj.eceasst.59.930.916
10.1109/QUATIC.2010.16
10.1109/ICSM.2013.16
10.1109/WCRE.2012.45
10.1109/CSMR.2011.24
10.1109/TSE.2014.2318734
10.1109/TSE.2013.60
10.1145/2745802.2745821
10.1147/JRD.2012.2204512
10.1016/j.scico.2013.10.006
10.1109/ICPC.2016.7503704
10.1145/2629648
10.1109/SANER.2017.7884630
10.1145/1368088.1368132
10.1016/j.jss.2015.05.024
10.1145/1882291.1882317
10.1109/ICSM.2013.15
10.1109/SANER.2016.23
10.1016/j.infsof.2010.12.011
10.1109/ICSM.2012.6405253
10.1109/WCRE.2013.6671286
10.1109/CSMR.2011.12
10.1109/ASE.2009.90
10.1109/SCAM.2009.16
10.1109/ICSM.2010.5609564
10.1109/WCRE.2009.23
10.1145/1932682.1869475
10.1109/ICSME.2014.56
10.1109/ICSM.2012.6405283
10.1145/2675067
10.1145/1094855.1094963
10.1109/ICSM.2004.1357825
10.1145/2597008.2597144
10.1109/CSMR.2012.38
10.1109/ICPC.2008.42
10.1109/WCRE.2012.53
10.1016/S0164-1212(01)00152-2
10.1109/ICSM.2008.4658051
10.1145/2786805.2786871
10.1002/smr.317
10.1145/1409720.1409733
10.1145/2970276.2970338
10.1109/ICSE.2009.5070547
10.1109/ICSME.2014.54
10.1109/TSE.2007.70720
10.1109/CSMR-WCRE.2014.6747161
10.1109/SCAM.2014.13
10.1007/978-3-642-28872-2_31
10.1007/978-3-540-78743-3_20
10.1109/WCRE.2008.12
10.1109/WCRE.2013.6671298
10.1109/ICSM.1999.792593
10.1007/s10664-006-9002-8
10.1109/WCRE.2012.50
10.1145/1706356.1706378
10.1109/WCRE.2010.11
10.1109/ICSM.2008.4658071
10.1016/j.anbehav.2012.08.008
10.1145/2491411.2491420
10.1109/CSMR-WCRE.2014.6747229
10.1109/WCRE.2010.33
10.1109/ICIS.2007.68
10.1002/smr.402
10.1109/MSR.2013.6624022
10.1109/SBES.2014.18
10.1109/ICSM.2003.1235447
10.1109/WCRE.2013.6671285
10.1109/ICSE.2009.5070528
10.1016/j.entcs.2005.02.059
10.1007/s10115-013-0677-z
10.1109/ICSM.2013.55
10.1109/ICSM.2012.6405284
10.1145/2660193.2660203
10.1109/CSMR.2012.35
10.1109/QSIC.2010.58
10.1109/ICSE.2007.95
10.1007/s00165-009-0115-x
10.1109/WPC.2004.1311055
10.1109/ICPC.2012.6240496
10.1109/TSE.1976.233837
10.1145/1572272.1572287
10.1109/MSR.2015.69
10.1016/j.jss.2012.04.013
10.1109/WCRE.2007.15
10.1109/ESEM.2011.36
10.1109/ICSM.2015.7332455
10.1016/j.infsof.2012.06.011
10.1109/ICSE.2012.6227181
10.1109/CSMR-WCRE.2014.6747160
10.1109/ICPC.2006.6
10.1109/TSE.2011.9
10.1145/1985793.1985913
10.1109/SCAM.2011.9
10.1109/SCAM.2010.19
10.1145/1879211.1879216
10.1109/WCRE.2004.25
10.1016/j.jss.2010.11.918
10.1109/WCRE.2006.1
10.1109/SCAM.2015.7335412
10.1109/WCRE.2013.6671309
10.1109/ICSE.2007.30
10.1007/s11219-010-9115-6
10.1002/smr.327
ContentType Journal Article
Copyright Copyright IEEE Computer Society 2021
Copyright_xml – notice: Copyright IEEE Computer Society 2021
DBID 97E
RIA
RIE
AAYXX
CITATION
JQ2
K9.
DOI 10.1109/TSE.2018.2880977
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
ProQuest Computer Science Collection
ProQuest Health & Medical Complete (Alumni)
DatabaseTitle CrossRef
ProQuest Health & Medical Complete (Alumni)
ProQuest Computer Science Collection
DatabaseTitleList ProQuest Health & Medical Complete (Alumni)

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1939-3520
EndPage 66
ExternalDocumentID 10_1109_TSE_2018_2880977
8532309
Genre orig-research
GrantInformation_xml – fundername: Conselho Nacional de Desenvolvimento Científico e Tecnológico; CNPq
  funderid: 10.13039/501100003593
– fundername: Fundação de Amparo à Pesquisa do Estado de Minas Gerais; FAPEMIG
  funderid: 10.13039/501100004901
– fundername: Coordenação de Aperfeiçoamento de Pessoal de Nível Superior; CAPES
  funderid: 10.13039/501100002322
GroupedDBID --Z
-DZ
-~X
.DC
0R~
29I
4.4
5GY
6IK
85S
8R4
8R5
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABPPZ
ABQJQ
ABVLG
ACGFO
ACGOD
ACIWK
ACNCT
AENEX
AGQYO
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BKOMP
BPEOZ
CS3
DU5
EBS
EDO
EJD
HZ~
I-F
IEDLZ
IFIPE
IPLJI
JAVBF
LAI
M43
MS~
O9-
OCL
P2P
Q2X
RIA
RIE
RNS
RXW
S10
TAE
TN5
TWZ
UHB
UPT
WH7
YZZ
AAYXX
CITATION
JQ2
K9.
ID FETCH-LOGICAL-c291t-fe128dad6a1c75ad69c86396842fb4e291a8c27bccda577a50dfa76ed6ec1663
IEDL.DBID RIE
ISSN 0098-5589
IngestDate Fri Oct 03 03:41:35 EDT 2025
Wed Oct 01 02:36:04 EDT 2025
Thu Apr 24 23:04:31 EDT 2025
Wed Aug 27 02:28:47 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 1
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c291t-fe128dad6a1c75ad69c86396842fb4e291a8c27bccda577a50dfa76ed6ec1663
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-7735-6732
0000-0002-4238-1425
0000-0003-3578-1380
PQID 2477252313
PQPubID 21418
PageCount 50
ParticipantIDs proquest_journals_2477252313
crossref_citationtrail_10_1109_TSE_2018_2880977
ieee_primary_8532309
crossref_primary_10_1109_TSE_2018_2880977
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2021-Jan.-1
2021-1-1
20210101
PublicationDateYYYYMMDD 2021-01-01
PublicationDate_xml – month: 01
  year: 2021
  text: 2021-Jan.-1
  day: 01
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on software engineering
PublicationTitleAbbrev TSE
PublicationYear 2021
Publisher IEEE
IEEE Computer Society
Publisher_xml – name: IEEE
– name: IEEE Computer Society
References ref207
ref57
ref208
ref56
ref329
ref205
ref326
ref327
ref203
ref53
ref324
ref204
ref52
ref325
ref201
ref55
ref322
ref54
ref323
fowler (ref9) 1999
ref209
su (ref275) 2016
kirk (ref403) 2006
ref210
ref331
ref332
ref51
distefano (ref63) 2010
ref50
ref330
demeyer (ref35) 2002
ref218
ref339
ref219
ref45
ref216
ref48
ref337
ref47
ref338
ref42
ref335
ref41
ref336
ref44
ref333
ref43
ref334
ref49
rasool (ref417) 2015; 27
juergens (ref262) 2010
ref100
ref221
ref342
ref101
ref222
ref343
ref340
ref220
ref341
ref306
ref307
ref304
ref36
ref305
ref302
ref30
ref303
ref33
ref300
ref32
ref301
ref39
ref308
ref309
ref310
ref317
ref318
ref26
ref315
ref25
ref316
ref20
ref313
ref314
ref22
ref311
ref21
ref312
ref28
ref27
ref319
ref29
basit (ref90) 2008
ref320
ref200
ref321
ref128
ref249
ref129
barbour (ref240) 2013; 25
ref126
ref368
ref97
ref127
ref248
ref369
ref96
ref124
dexun jiang (ref1) 2014; 10
ref366
ref99
ref246
ref367
ref98
ref133
ref375
ref93
ref134
ref255
ref376
ref92
ref131
ref373
ref95
ref132
ref253
ref374
ref94
ref250
ref371
ref130
ref251
ref372
ref91
ref370
ref89
ref139
ref137
ref258
ref379
ref86
ref259
ref85
ref135
ref256
ref377
ref88
ref136
ref378
ref87
cheng (ref276) 2016
ref144
ref265
ref386
ref145
ref266
ref387
ref81
ref142
ref263
ref384
ref84
ref143
ref264
ref83
ref140
ref261
ref382
ref141
ref380
ref80
ref260
ref381
ref108
ref79
ref109
ref78
ref227
ref106
ref348
ref107
ref349
ref225
ref104
ref346
ref75
ref226
ref105
opdyke (ref23) 1990
ref347
ref74
ref223
ref344
ref77
ref224
ref103
ref345
ref76
ref232
ref353
ref71
ref233
ref112
ref354
ref70
ref230
ref351
ref73
ref231
ref110
ref352
ref72
ref119
ref68
ref67
ref238
ref117
ref359
ref239
ref118
ref69
ref236
ref115
ref357
ref64
ref116
ref358
ref234
ref113
ref355
ref66
ref235
ref114
ref356
opdyke (ref24) 1992
ref122
ref364
ref60
ref244
ref123
ref365
ref241
ref120
ref362
ref62
ref242
ref121
ref363
ref61
higo (ref243) 2011
ref361
ref168
ref289
ref169
ref290
ref170
ref291
ref177
uchida (ref257) 2005; 45
kitchenham (ref16) 2007
ref178
ref299
fowler (ref46) 2010
ref175
ref296
ref176
ref297
ref173
ref294
ref174
ref295
ref171
ref292
ref172
ref293
sajnani (ref281) 2015; 27
ref179
du bois (ref404) 2006
ref180
ref181
ref188
ref189
ref186
ref187
ref184
ref185
ref182
ref183
ref269
ref148
ref149
ref267
ref146
ref388
ref268
ref147
ref389
deursen (ref34) 2001
ref390
ref155
ref397
ref277
ref156
ref398
ref274
ref153
ref395
ref154
ref396
ref272
ref151
ref393
ref273
ref152
ref394
ref270
ref391
ref271
ref150
ref392
ref159
ref278
ref157
ref399
ref279
ref158
ref280
ref287
ref166
ref288
ref167
suryanarayana (ref4) 2014
ref285
ref164
ref286
ref165
ref283
ref162
ref284
ref163
ref160
ref282
ref161
svajlenko (ref237) 2015; 27
li (ref254) 2004
aiko (ref328) 2013; 55
faloutsos (ref17) 1995
brown (ref10) 0
harder (ref111) 2013; 25
ref191
ref192
ref190
ref199
ref197
ref198
ref195
ref196
ref193
ref194
baker (ref211) 1993; 24
lo (ref82) 2012
giesecke (ref213) 2007
ref8
ref7
ref3
ref5
seaman (ref2) 2011; 82
lan (ref138) 2014; 40
bavota (ref298) 2016
lanza (ref31) 2006
roy (ref125) 2010; 22
cordy (ref206) 2004
rapu (ref385) 2004
wake (ref65) 2003
tufano (ref360) 2015
pate (ref6) 2013; 25
kapser (ref217) 2003
calefato (ref245) 2004; 3
dean (ref215) 2014; 63
fontana (ref350) 2012; 11
koschke (ref214) 2007
ferme (ref383) 2013
wit (ref102) 2009
piveta (ref40) 2006; 12
arwin (ref202) 2006
ref405
ref13
ref406
ref12
ref15
ref14
ref401
ref402
ref11
ref400
ref409
ref407
kim (ref229) 2004
ref19
ref408
ref18
merlo (ref212) 2007
ref416
ref414
basit (ref252) 2005
ref412
ref413
marinescu (ref37) 2002
ref410
ref411
field (ref59) 2007
davey (ref247) 1995; 1
bastian (ref58) 2009
sharma (ref415) 2016
martin (ref38) 2003
roy (ref228) 2013; 7
References_xml – ident: ref219
  doi: 10.1145/1095430.1081737
– ident: ref353
  doi: 10.1109/MTD.2015.7332620
– ident: ref194
  doi: 10.1007/s10664-012-9236-6
– ident: ref118
  doi: 10.1109/ICSME.2014.27
– ident: ref410
  doi: 10.1109/ICSME.2016.73
– ident: ref370
  doi: 10.1109/SANER.2016.104
– ident: ref384
  doi: 10.1109/METRICS.2005.38
– ident: ref53
  doi: 10.1007/978-3-540-78137-0_21
– ident: ref60
  doi: 10.1089/brain.2011.0038
– ident: ref395
  doi: 10.1109/WCRE.2012.33
– ident: ref162
  doi: 10.1109/CSMR.2013.13
– ident: ref250
  doi: 10.1007/978-3-642-11503-5_10
– ident: ref313
  doi: 10.1109/ICSM.2012.6405287
– ident: ref411
  doi: 10.1109/SANER.2017.7884614
– ident: ref7
  doi: 10.1002/smr.521
– ident: ref45
  doi: 10.1109/SANER.2016.84
– ident: ref287
  doi: 10.1145/2597073.2597104
– start-page: 361
  year: 2009
  ident: ref58
  article-title: Gephi: An open source software for exploring and manipulating networks
  publication-title: Proc of the 3rd Int'l AAAI Conf on Weblogs and Social Media
– ident: ref400
  doi: 10.1145/1852786.1852797
– ident: ref244
  doi: 10.1007/978-3-540-76440-3_2
– ident: ref166
  doi: 10.1109/CSMR.2011.11
– ident: ref345
  doi: 10.1109/CSMR.2013.27
– ident: ref402
  doi: 10.1007/s10664-014-9313-0
– volume: 24
  start-page: 49
  year: 1993
  ident: ref211
  article-title: A program for identifying duplicated code
  publication-title: Comput Sci Statist
– start-page: 1
  year: 2013
  ident: ref383
  article-title: Is it a real code smell to be removed or not?
  publication-title: Proc Co-located Event XP Conf Int Workshop Refactoring Testing
– ident: ref55
  doi: 10.1145/2889160.2889168
– ident: ref362
  doi: 10.1109/WETSoM.2015.14
– start-page: 1
  year: 2007
  ident: ref212
  article-title: Detection of plagiarism in university projects using metrics-based spectral similarity
  publication-title: Duplication Redundancy and Similarity in Software
– ident: ref36
  doi: 10.1145/582435.582436
– start-page: 1998
  year: 0
  ident: ref10
  publication-title: Antipatterns Refactoring Software Architectures and Projects in Crisis
– ident: ref115
  doi: 10.1109/WCRE.2011.11
– ident: ref54
  doi: 10.1109/ICSM.2012.6405348
– ident: ref128
  doi: 10.1007/11693017_31
– ident: ref122
  doi: 10.1109/WCRE.2008.54
– ident: ref366
  doi: 10.1109/TSE.2009.50
– volume: 10
  start-page: 1519
  year: 2014
  ident: ref1
  article-title: Distance metric based divergent change bad smell detection and refactoring scheme analysis
  publication-title: Int J Innovative Comput Inf Control
– ident: ref316
  doi: 10.1109/SBCARS.2011.18
– ident: ref355
  doi: 10.1109/SCAM.2013.6648192
– ident: ref234
  doi: 10.1016/j.infsof.2006.10.005
– ident: ref199
  doi: 10.1145/2568225.2568286
– ident: ref179
  doi: 10.1109/SCAM.2011.12
– ident: ref241
  doi: 10.1002/smr.333
– ident: ref144
  doi: 10.1007/978-3-642-19811-3_25
– ident: ref406
  doi: 10.1007/978-3-540-73066-8_16
– ident: ref265
  doi: 10.1109/WCRE.1995.514697
– start-page: 145
  year: 1990
  ident: ref23
  article-title: Refactoring: An aid in designing application frameworks and evolving object-oriented systems
  publication-title: Proc Symp Object-Oriented Program Emphasizing Practical Appl
– ident: ref149
  doi: 10.1109/ICSM.2004.1357804
– ident: ref176
  doi: 10.1109/SCAM.2012.21
– ident: ref48
  doi: 10.1002/0471722324
– ident: ref349
  doi: 10.1186/s40411-015-0025-y
– ident: ref221
  doi: 10.1109/ICECCS.2011.36
– year: 2007
  ident: ref214
  article-title: Survey of research on software clones
  publication-title: Redundancy and Similarity in Software
– ident: ref278
  doi: 10.1109/ICSM.2015.7332459
– ident: ref109
  doi: 10.1145/1985793.1985836
– ident: ref280
  doi: 10.1109/ICSME.2016.94
– ident: ref157
  doi: 10.1109/ICSM.2013.14
– ident: ref348
  doi: 10.1016/j.jss.2006.10.018
– ident: ref368
  doi: 10.1109/ASE.2015.46
– ident: ref175
  doi: 10.1109/SCAM.2014.17
– ident: ref356
  doi: 10.1007/978-3-642-21378-6_2
– year: 2007
  ident: ref59
  publication-title: Discovering statistics using SPSS
– ident: ref307
  doi: 10.1109/CSMR.2003.1192416
– ident: ref110
  doi: 10.1109/WCRE.2000.891457
– ident: ref271
  doi: 10.1007/s10664-014-9316-x
– ident: ref310
  doi: 10.1109/TSE.2015.2503740
– ident: ref96
  doi: 10.1109/TSE.2005.114
– ident: ref168
  doi: 10.1109/CSMR.2009.20
– year: 2004
  ident: ref254
  article-title: CP-Miner: A tool for finding copy-paste and related bugs in operating system code
  publication-title: Proc 6th Conf Symp Opearting Syst Des Implementation-Vol 6
– ident: ref61
  doi: 10.1109/TSE.2017.2653105
– ident: ref315
  doi: 10.1145/2162049.2162069
– ident: ref321
  doi: 10.1109/ESEM.2015.7321186
– ident: ref381
  doi: 10.1145/2597008.2597805
– ident: ref134
  doi: 10.1109/MSR.2010.5463343
– ident: ref159
  doi: 10.1109/ICSE.2012.6227183
– ident: ref203
  doi: 10.1109/APSEC.2002.1183002
– ident: ref153
  doi: 10.1002/(SICI)1096-908X(199907/08)11:4<223::AID-SMR194>3.3.CO;2-4
– year: 2014
  ident: ref4
  publication-title: Refactoring for Software Design Smells Managing Technical Debt
– ident: ref86
  doi: 10.1109/TSE.2009.16
– ident: ref171
  doi: 10.1109/SCAM.2014.12
– ident: ref103
  doi: 10.1109/ICSE.2007.90
– ident: ref25
  doi: 10.1177/001316446002000104
– ident: ref377
  doi: 10.1109/SBES.2010.21
– ident: ref42
  doi: 10.1109/CSMR.2007.51
– ident: ref405
  doi: 10.1109/ICST.2013.45
– start-page: 1
  year: 2007
  ident: ref213
  article-title: Generic modelling of code clones
  publication-title: Duplication Redundancy and Similarity in Software
– ident: ref218
  doi: 10.1109/FOSM.2008.4659255
– ident: ref379
  doi: 10.1109/WCRE.2002.1173068
– ident: ref343
  doi: 10.1109/TSE.2013.4
– ident: ref351
  doi: 10.1145/2970276.2970340
– ident: ref374
  doi: 10.1109/CSMR.2011.7
– ident: ref311
  doi: 10.1109/WCRE.2009.28
– ident: ref152
  doi: 10.1109/ICSM.1998.738528
– ident: ref230
  doi: 10.1109/ISESE.2005.1541846
– ident: ref14
  doi: 10.1109/ICSE.2015.24
– volume: 82
  start-page: 25
  year: 2011
  ident: ref2
  article-title: Chapter 2-measuring and monitoring technical debt
– ident: ref329
  doi: 10.1109/ICSM.2015.7332458
– ident: ref239
  doi: 10.1002/smr.394
– ident: ref76
  doi: 10.1109/ICSM.2011.6080795
– ident: ref333
  doi: 10.1016/B978-0-12-800160-8.00004-8
– ident: ref226
  doi: 10.1109/ICSM.2012.6405285
– start-page: 1
  year: 2010
  ident: ref262
  article-title: How much is a clone
  publication-title: SQM '10 Proc of the 4th International Workshop on Software Quality and Maintainability
– ident: ref73
  doi: 10.1002/spe.750
– ident: ref286
  doi: 10.1145/2635868.2635879
– ident: ref106
  doi: 10.1109/ICPC.2013.6613837
– ident: ref192
  doi: 10.1007/s10664-011-9195-3
– ident: ref299
  doi: 10.1109/ICSM.2013.37
– ident: ref413
  doi: 10.1109/SCAM.2015.7335413
– year: 1999
  ident: ref9
  publication-title: Refactoring Improving the Design of Existing Code
– volume: 3
  start-page: 3
  year: 2004
  ident: ref245
  article-title: Function clone detection in web applications: A semiautomated approach
  publication-title: J Web Eng
– volume: 1
  start-page: 219
  year: 1995
  ident: ref247
  article-title: The development of a software clone detector
  publication-title: Int l J Applied Software Technology
– ident: ref79
  doi: 10.1109/ICPC.2013.6613838
– ident: ref293
  doi: 10.1109/SANER.2016.94
– ident: ref13
  doi: 10.1109/SBCARS.2014.21
– ident: ref120
  doi: 10.1109/MSR.2013.6624021
– ident: ref200
  doi: 10.1145/2387358.2387360
– year: 1992
  ident: ref24
  article-title: Refactoring object-oriented frameworks
– ident: ref83
  doi: 10.1109/ICPC.2008.41
– ident: ref57
  doi: 10.1002/widm.1048
– ident: ref319
  doi: 10.1007/s10664-011-9171-y
– start-page: 346
  year: 2006
  ident: ref404
  article-title: Does god class decomposition affect comprehensibility?
  publication-title: IASTED Conf on Software Engineering
– ident: ref100
  doi: 10.1109/ICSM.1996.565012
– year: 1995
  ident: ref17
  article-title: A survey of information retrieval and filtering methods
– ident: ref26
  doi: 10.2307/2529310
– ident: ref282
  doi: 10.1109/SANER.2017.7884633
– ident: ref272
  doi: 10.1007/s10664-015-9368-6
– ident: ref340
  doi: 10.1109/TSE.2014.2331057
– year: 2003
  ident: ref38
  publication-title: Agile Software Development Principles Patterns and Practices
– ident: ref222
  doi: 10.1145/1062455.1062537
– volume: 27
  start-page: 867
  year: 2015
  ident: ref417
  article-title: A review of code smell mining techniques
  publication-title: Journal of Software: Evolution and Process
– ident: ref223
  doi: 10.1145/1368088.1368172
– ident: ref397
  doi: 10.1109/TSE.2007.70745
– ident: ref88
  doi: 10.1109/ICPC.2010.22
– ident: ref352
  doi: 10.1109/ICSME.2016.27
– ident: ref169
  doi: 10.1109/CSMR.2008.4493311
– ident: ref193
  doi: 10.1007/s10664-008-9076-6
– start-page: 277
  year: 2006
  ident: ref202
  article-title: Plagiarism detection across programming languages
  publication-title: Proc 29th Australasian Comput Sci Conf -Volume 48
– ident: ref339
  doi: 10.1109/ICSM.2004.1357820
– ident: ref180
  doi: 10.1109/SCAM.2011.21
– ident: ref44
  doi: 10.1109/CSMR.2009.59
– ident: ref18
  doi: 10.1007/s10664-015-9402-8
– ident: ref172
  doi: 10.1109/SCAM.2014.11
– ident: ref84
  doi: 10.1002/spe.1031
– ident: ref253
  doi: 10.1007/978-3-540-24659-6_16
– ident: ref232
  doi: 10.1016/S0950-5849(02)00123-4
– ident: ref205
  doi: 10.1007/BF00126960
– ident: ref147
  doi: 10.1109/WCRE.2001.957835
– ident: ref289
  doi: 10.1002/smr.520
– ident: ref270
  doi: 10.1145/2970276.2970326
– ident: ref99
  doi: 10.1145/2351676.2351701
– ident: ref317
  doi: 10.1109/ICSM.2013.38
– ident: ref300
  doi: 10.1109/ICPC.2011.22
– ident: ref248
  doi: 10.1007/3-540-47764-0_3
– volume: 45
  start-page: 1
  year: 2005
  ident: ref257
  article-title: Software analysis by code clones in open source software
  publication-title: J Comput Inf Syst
– ident: ref151
  doi: 10.1007/978-3-642-00593-0_31
– ident: ref263
  doi: 10.1109/METRIC.2002.1011326
– ident: ref21
  doi: 10.1016/j.jss.2011.05.016
– ident: ref388
  doi: 10.1109/TSE.2013.19
– start-page: 1
  year: 2016
  ident: ref276
  article-title: Rule-directed code clone synchronization
  publication-title: Proc IEEE 24th Int Conf Program Comprehension
– ident: ref70
  doi: 10.1145/1767751.1767754
– ident: ref71
  doi: 10.1145/2635868.2635886
– ident: ref288
  doi: 10.1109/MSR.2015.17
– volume: 63
  start-page: 1
  year: 2014
  ident: ref215
  article-title: Clone detection in MATLAB Stateflow models
  publication-title: ECEASST
– ident: ref69
  doi: 10.1145/1095430.1081733
– ident: ref380
  doi: 10.1109/ESEM.2009.5314231
– ident: ref204
  doi: 10.1109/ASEW.2008.4686327
– start-page: 1
  year: 2004
  ident: ref206
  article-title: Practical language-independent detection of near-miss clones
  publication-title: Proc Conf Centre Adv Stud Collaborative Res
– ident: ref303
  doi: 10.1007/s10515-011-0098-8
– ident: ref196
  doi: 10.1007/s10664-008-9073-9
– ident: ref173
  doi: 10.1109/SCAM.2014.10
– ident: ref28
  doi: 10.1002/spe.2173
– ident: ref12
  doi: 10.1145/2915970.2915984
– ident: ref344
  doi: 10.1109/SANER.2015.7081827
– ident: ref227
  doi: 10.1109/ICSTW.2009.18
– ident: ref369
  doi: 10.1007/s11334-013-0205-z
– ident: ref324
  doi: 10.1007/s10664-013-9250-3
– ident: ref301
  doi: 10.1109/ESEM.2015.7321194
– ident: ref131
  doi: 10.1109/ICSM.2007.4362615
– ident: ref309
  doi: 10.1007/s10664-015-9378-4
– ident: ref178
  doi: 10.1109/SCAM.2011.17
– ident: ref143
  doi: 10.1109/MSR.2009.5069483
– ident: ref259
  doi: 10.1109/IWPSE.2004.1334772
– ident: ref334
  doi: 10.1007/s10664-015-9361-0
– ident: ref145
  doi: 10.1016/j.jss.2009.03.077
– ident: ref117
  doi: 10.1109/TSE.2011.90
– ident: ref330
  doi: 10.1109/SANER.2016.103
– volume: 25
  start-page: 1139
  year: 2013
  ident: ref240
  article-title: An empirical study of faults in late propagation clone genealogies
  publication-title: Journal of Software: Evolution and Process
– ident: ref401
  doi: 10.1007/s10664-014-9350-8
– ident: ref95
  doi: 10.1109/WCRE.2007.7
– ident: ref375
  doi: 10.1007/11774129_8
– ident: ref184
  doi: 10.1109/SCAM.2009.17
– ident: ref188
  doi: 10.1109/ESEM.2011.10
– ident: ref187
  doi: 10.1145/2597073.2597109
– ident: ref323
  doi: 10.1109/TSE.2012.89
– ident: ref167
  doi: 10.1109/CSMR.2010.33
– ident: ref398
  doi: 10.1109/CSMR.2013.28
– start-page: 1
  year: 2016
  ident: ref275
  article-title: Identifying functionally similar code in complex codebases
  publication-title: Proc IEEE 24th Int Conf Program Comprehension
– ident: ref78
  doi: 10.1109/TSE.2006.28
– ident: ref27
  doi: 10.1109/ICSM.2012.6405324
– ident: ref414
  doi: 10.1109/SCAM.2015.7335411
– ident: ref22
  doi: 10.1007/s10664-013-9256-x
– ident: ref185
  doi: 10.1109/SCAM.2008.14
– ident: ref113
  doi: 10.1007/978-3-642-19811-3_30
– ident: ref251
  doi: 10.1007/978-3-642-24485-8_19
– ident: ref285
  doi: 10.1109/TSE.2015.2448531
– ident: ref148
  doi: 10.1109/ICPC.2012.6240490
– ident: ref132
  doi: 10.1145/1287624.1287634
– ident: ref327
  doi: 10.1109/ICSE.2013.6606614
– ident: ref108
  doi: 10.1109/WCRE.1999.806971
– start-page: 92
  year: 2001
  ident: ref34
  article-title: Refactoring test code
  publication-title: Proc 2nd Int Conf Extreme Program Flexible Processes Softw Eng
– ident: ref294
  doi: 10.1145/1960275.1960300
– ident: ref256
  doi: 10.1109/METRIC.1999.809750
– start-page: 397
  year: 2012
  ident: ref82
  article-title: Active refinement of clone anomaly reports
  publication-title: Proc 34th Int'l Conf Software Eng
– ident: ref177
  doi: 10.1109/SCAM.2012.18
– ident: ref399
  doi: 10.1109/SCAM.2011.18
– ident: ref409
  doi: 10.1109/ICSME.2016.12
– ident: ref50
  doi: 10.1145/1985793.1985989
– year: 2003
  ident: ref65
  publication-title: Refactoring Workbook
– start-page: 57
  year: 2011
  ident: ref243
  article-title: Identifying refactoring opportunities for removing code clones with a metrics-based approach
  publication-title: Java in Academia and Research
– ident: ref210
  doi: 10.1109/CSMR-WCRE.2014.6747168
– ident: ref170
  doi: 10.1109/CSMR.2007.26
– ident: ref124
  doi: 10.1109/ICSE.2007.97
– ident: ref408
  doi: 10.1109/QSIC.2009.47
– ident: ref305
  doi: 10.1109/CSMR.2005.53
– ident: ref292
  doi: 10.1109/SANER.2016.78
– volume: 7
  start-page: 167
  year: 2013
  ident: ref228
  article-title: Conflict-aware optimal scheduling of prioritised code clone refactoring
  publication-title: IET Softw
  doi: 10.1049/iet-sen.2012.0058
– start-page: 278
  year: 2010
  ident: ref63
  publication-title: Memory Leaks Detection in Java by Bi-abductive Inference
– ident: ref11
  doi: 10.1145/3167132.3167295
– ident: ref225
  doi: 10.1145/2568225.2568298
– ident: ref81
  doi: 10.1145/1985793.1985835
– ident: ref51
  doi: 10.1016/j.eswa.2014.09.022
– ident: ref373
  doi: 10.1016/j.jss.2010.11.921
– ident: ref80
  doi: 10.1109/ICSME.2014.55
– ident: ref269
  doi: 10.1109/SANER.2015.7081830
– volume: 22
  start-page: 165
  year: 2010
  ident: ref125
  article-title: Near-miss function clones in open source software: An empirical study
  publication-title: J Softw Maintenance Evolution Res Practice
  doi: 10.1002/smr.416
– year: 2010
  ident: ref46
  publication-title: Domain Specific Languages
– ident: ref74
  doi: 10.1109/ASE.2013.6693107
– ident: ref407
  doi: 10.1109/MSR.2013.6624053
– ident: ref216
  doi: 10.1145/1842752.1842805
– ident: ref189
  doi: 10.1007/978-3-642-39038-8_21
– ident: ref72
  doi: 10.1109/ICPC.2006.25
– ident: ref242
  doi: 10.1016/j.scico.2009.02.007
– ident: ref49
  doi: 10.1109/ICSME.2014.31
– ident: ref235
  doi: 10.1016/j.infsof.2013.01.008
– year: 2006
  ident: ref31
  publication-title: Object-Oriented Metrics in Practice Using Software Metrics to Characterize Evaluate and Improve the Design of Object-Oriented Systems
– start-page: 1
  year: 2006
  ident: ref403
  article-title: Using attribute slicing to refactor large classes
  publication-title: Proc Beyond Program Slicing
– ident: ref372
  doi: 10.1109/WCRE.2013.6671299
– ident: ref67
  doi: 10.1109/ICSM.2005.52
– ident: ref197
  doi: 10.1007/s10664-009-9108-x
– volume: 25
  start-page: 1063
  year: 2013
  ident: ref111
  article-title: Cloned code: Stable code
  publication-title: Journal of Software: Evolution and Process
– volume: 55
  start-page: 2223
  year: 2013
  ident: ref328
  article-title: To what extent can maintenance problems be predicted by code smell detection?-An empirical study
  publication-title: Inf Softw Technol
  doi: 10.1016/j.infsof.2013.08.002
– ident: ref66
  doi: 10.1016/j.infsof.2017.01.006
– ident: ref364
  doi: 10.1109/WCRE.2012.56
– ident: ref89
  doi: 10.1109/ICSM.2010.5609665
– ident: ref277
  doi: 10.1145/2884781.2884877
– ident: ref326
  doi: 10.1109/ICSME.2014.32
– ident: ref302
  doi: 10.1007/978-3-642-39742-4_6
– ident: ref361
  doi: 10.1109/TSE.2014.2372760
– ident: ref156
  doi: 10.1109/ICSM.2011.6080794
– ident: ref338
  doi: 10.1007/s10515-014-0175-x
– ident: ref186
  doi: 10.1109/SCAM.2007.19
– ident: ref249
  doi: 10.1109/WCRE.2009.51
– ident: ref39
  doi: 10.1145/1052898.1052908
– ident: ref260
  doi: 10.1145/1862372.1862390
– ident: ref393
  doi: 10.1109/TSE.2009.1
– year: 2007
  ident: ref16
  article-title: Guidelines for performing systematic literature reviews in software engineering
– ident: ref155
  doi: 10.1109/TSE.2002.1019480
– ident: ref284
  doi: 10.1109/SCAM.2016.13
– ident: ref297
  doi: 10.1109/ICPC.2016.7503705
– ident: ref268
  doi: 10.1007/s10664-015-9394-4
– ident: ref267
  doi: 10.1145/1367497.1367516
– ident: ref141
  doi: 10.1109/WCRE.2011.12
– ident: ref181
  doi: 10.1109/SCAM.2010.32
– ident: ref354
  doi: 10.1109/ASE.2013.6693086
– ident: ref337
  doi: 10.1007/s11219-013-9200-8
– ident: ref19
  doi: 10.1109/ESEM.2007.9
– ident: ref160
  doi: 10.1109/ICSM.2011.6080796
– ident: ref137
  doi: 10.1109/ICPC.2011.25
– ident: ref201
  doi: 10.1145/2420950.2421004
– ident: ref322
  doi: 10.1016/j.jss.2013.05.007
– volume: 27
  start-page: 430
  year: 2015
  ident: ref237
  article-title: Big data clone detection using classical detectors: An exploratory study
  publication-title: Journal of Software: Evolution and Process
– ident: ref43
  doi: 10.1109/WCRE.2009.26
– ident: ref163
  doi: 10.1109/CSMR.2012.37
– ident: ref121
  doi: 10.1109/ICPC.2011.45
– ident: ref129
  doi: 10.1109/WCRE.2006.18
– ident: ref255
  doi: 10.1007/3-540-36209-6_17
– ident: ref264
  doi: 10.1109/METRICS.2005.36
– ident: ref126
  doi: 10.1109/ICPC.2012.6240491
– ident: ref416
  doi: 10.1145/2897073.2897100
– ident: ref346
  doi: 10.1145/2884781.2884868
– volume: 40
  start-page: 773
  year: 2014
  ident: ref138
  article-title: Predicting consistency-maintenance requirement of code clonesat copy-and-paste time
  publication-title: IEEE Trans Softw Eng
  doi: 10.1109/TSE.2014.2323972
– ident: ref112
  doi: 10.1109/TSE.2007.70725
– ident: ref291
  doi: 10.1016/j.scico.2013.11.027
– start-page: 109
  year: 2005
  ident: ref252
  article-title: An empirical study on limits of clone unification using generics
  publication-title: Proc Int Conf on Software Eng Knowledge Eng
– start-page: 223
  year: 2004
  ident: ref385
  article-title: Using history information to improve design flaws detection
  publication-title: Proc European Conf Software Maintenance and Reengineering
– ident: ref304
  doi: 10.1109/ICPC.2016.7503706
– ident: ref195
  doi: 10.1007/s10664-008-9089-1
– ident: ref123
  doi: 10.1109/WCRE.2003.1287259
– ident: ref68
  doi: 10.1016/j.jss.2013.03.061
– ident: ref331
  doi: 10.1109/WCRE.2013.6671310
– ident: ref332
  doi: 10.14279/tuj.eceasst.59.930.916
– ident: ref376
  doi: 10.1109/QUATIC.2010.16
– ident: ref146
  doi: 10.1109/ICSM.2013.16
– ident: ref266
  doi: 10.1109/WCRE.2012.45
– ident: ref382
  doi: 10.1109/CSMR.2011.24
– ident: ref33
  doi: 10.1109/TSE.2014.2318734
– ident: ref391
  doi: 10.1109/TSE.2013.60
– ident: ref290
  doi: 10.1145/2745802.2745821
– ident: ref341
  doi: 10.1147/JRD.2012.2204512
– ident: ref246
  doi: 10.1016/j.scico.2013.10.006
– ident: ref359
  doi: 10.1109/ICPC.2016.7503704
– ident: ref357
  doi: 10.1145/2629648
– ident: ref412
  doi: 10.1109/SANER.2017.7884630
– ident: ref75
  doi: 10.1145/1368088.1368132
– ident: ref308
  doi: 10.1016/j.jss.2015.05.024
– ident: ref220
  doi: 10.1145/1882291.1882317
– ident: ref133
  doi: 10.1109/ICSM.2013.15
– ident: ref363
  doi: 10.1109/SANER.2016.23
– volume: 12
  start-page: 811
  year: 2006
  ident: ref40
  article-title: Detecting bad smells in aspectJ
  publication-title: J Universal Comput Sci
– ident: ref15
  doi: 10.1016/j.infsof.2010.12.011
– ident: ref394
  doi: 10.1109/ICSM.2012.6405253
– ident: ref98
  doi: 10.1109/WCRE.2013.6671286
– ident: ref165
  doi: 10.1109/CSMR.2011.12
– ident: ref119
  doi: 10.1109/ASE.2009.90
– ident: ref183
  doi: 10.1109/SCAM.2009.16
– ident: ref378
  doi: 10.1109/ICSM.2010.5609564
– ident: ref387
  doi: 10.1109/WCRE.2009.23
– year: 2002
  ident: ref37
  article-title: Measurement and quality in object-oriented design
– ident: ref190
  doi: 10.1145/1932682.1869475
– ident: ref104
  doi: 10.1109/ICSME.2014.56
– ident: ref87
  doi: 10.1109/ICSM.2012.6405283
– ident: ref347
  doi: 10.1145/2675067
– ident: ref191
  doi: 10.1145/1094855.1094963
– ident: ref371
  doi: 10.1109/ICSM.2004.1357825
– ident: ref314
  doi: 10.1145/2597008.2597144
– ident: ref164
  doi: 10.1109/CSMR.2012.38
– ident: ref77
  doi: 10.1109/ICPC.2008.42
– ident: ref325
  doi: 10.1109/WCRE.2012.53
– ident: ref3
  doi: 10.1016/S0164-1212(01)00152-2
– ident: ref389
  doi: 10.1109/ICSM.2008.4658051
– ident: ref274
  doi: 10.1145/2786805.2786871
– ident: ref154
  doi: 10.1002/smr.317
– ident: ref161
  doi: 10.1109/WCRE.2009.51
– ident: ref336
  doi: 10.1145/1409720.1409733
– ident: ref358
  doi: 10.1145/2970276.2970338
– ident: ref105
  doi: 10.1109/ICSE.2009.5070547
– ident: ref92
  doi: 10.1109/ICSME.2014.54
– ident: ref127
  doi: 10.1109/TSE.2007.70720
– ident: ref208
  doi: 10.1109/CSMR-WCRE.2014.6747161
– start-page: 376
  year: 2008
  ident: ref90
  article-title: Query-based filtering and graphical view generation for clone analysis
  publication-title: Proc IEEE Int Conf Softw Maintenance
– ident: ref174
  doi: 10.1109/SCAM.2014.13
– ident: ref30
  doi: 10.1007/978-3-642-28872-2_31
– ident: ref365
  doi: 10.1007/978-3-540-78743-3_20
– ident: ref136
  doi: 10.1109/WCRE.2008.12
– ident: ref392
  doi: 10.1109/WCRE.2013.6671298
– volume: 11
  start-page: 1
  year: 2012
  ident: ref350
  article-title: Automatic detection of bad smells in code: An experimental assessment
  publication-title: J Object Technol
– ident: ref140
  doi: 10.1109/ICSM.1999.792593
– ident: ref312
  doi: 10.1007/s10664-006-9002-8
– volume: 25
  start-page: 261
  year: 2013
  ident: ref6
  article-title: Clone evolution: A systematic review
  publication-title: Journal of Software: Evolution and Process
– ident: ref198
  doi: 10.1145/2568225.2568298
– ident: ref135
  doi: 10.1109/WCRE.2012.50
– ident: ref261
  doi: 10.1145/1706356.1706378
– ident: ref107
  doi: 10.1109/WCRE.2010.11
– ident: ref150
  doi: 10.1109/ICSM.2008.4658071
– ident: ref56
  doi: 10.1016/j.anbehav.2012.08.008
– ident: ref273
  doi: 10.1145/2491411.2491420
– ident: ref207
  doi: 10.1109/CSMR-WCRE.2014.6747229
– ident: ref101
  doi: 10.1109/WCRE.2010.33
– ident: ref41
  doi: 10.1109/ICIS.2007.68
– ident: ref94
  doi: 10.1002/smr.402
– ident: ref142
  doi: 10.1109/MSR.2013.6624022
– ident: ref320
  doi: 10.1109/SBES.2014.18
– ident: ref64
  doi: 10.1109/ICSM.2003.1235447
– ident: ref97
  doi: 10.1109/WCRE.2013.6671285
– ident: ref130
  doi: 10.1109/ICSE.2009.5070528
– ident: ref386
  doi: 10.1016/j.entcs.2005.02.059
– ident: ref238
  doi: 10.1007/s10115-013-0677-z
– start-page: 169
  year: 2009
  ident: ref102
  article-title: Managing code clones using dynamic change tracking and resolution
  publication-title: Proc IEEE Int Conf Softw Maintenance
– ident: ref52
  doi: 10.1109/ICSM.2013.55
– ident: ref139
  doi: 10.1109/ICSM.2012.6405284
– ident: ref20
  doi: 10.1145/2660193.2660203
– ident: ref318
  doi: 10.1109/CSMR.2012.35
– ident: ref295
  doi: 10.1109/QSIC.2010.58
– ident: ref224
  doi: 10.1109/ICSE.2007.95
– ident: ref335
  doi: 10.1007/s00165-009-0115-x
– ident: ref258
  doi: 10.1109/WPC.2004.1311055
– ident: ref29
  doi: 10.1109/ICPC.2012.6240496
– ident: ref32
  doi: 10.1109/TSE.1976.233837
– ident: ref231
  doi: 10.1145/1572272.1572287
– ident: ref62
  doi: 10.1109/MSR.2015.69
– volume: 27
  start-page: 402
  year: 2015
  ident: ref281
  article-title: A parallel and efficient approach to large scale clone detection
  publication-title: Journal of Software: Evolution and Process
– ident: ref390
  doi: 10.1016/j.jss.2012.04.013
– ident: ref116
  doi: 10.1109/WCRE.2007.15
– start-page: 315
  year: 2016
  ident: ref298
  article-title: A Large-Scale Empirical Study on Self-Admitted Technical Debt
  publication-title: 2016 IEEE/ACM 13th Conference on Mining Software Repositories (MSR)
– start-page: 67
  year: 2003
  ident: ref217
  article-title: Toward a taxonomy of clones in source code: A case study
  publication-title: Proc Conf Evolution Large Scale Ind Softw Archit
– ident: ref47
  doi: 10.1109/ESEM.2011.36
– ident: ref279
  doi: 10.1109/ICSM.2015.7332455
– ident: ref233
  doi: 10.1016/j.infsof.2012.06.011
– ident: ref158
  doi: 10.1109/ICSE.2012.6227181
– ident: ref209
  doi: 10.1109/CSMR-WCRE.2014.6747160
– ident: ref306
  doi: 10.1109/ICPC.2006.6
– start-page: 189
  year: 2016
  ident: ref415
  article-title: Does Your Configuration Code Smell?
  publication-title: 2016 IEEE/ACM 13th Conference on Mining Software Repositories (MSR)
– year: 2002
  ident: ref35
  publication-title: Object Oriented Reengineering Patterns
– ident: ref296
  doi: 10.1109/TSE.2011.9
– ident: ref8
  doi: 10.1145/1985793.1985913
– ident: ref367
  doi: 10.1109/SCAM.2011.9
– ident: ref182
  doi: 10.1109/SCAM.2010.19
– start-page: 403
  year: 2015
  ident: ref360
  article-title: When and why your code starts to smell bad
  publication-title: Proceedings of the International Conference on Software Engineering ICSE'94
– ident: ref342
  doi: 10.1145/1879211.1879216
– ident: ref91
  doi: 10.1109/WCRE.2004.25
– ident: ref396
  doi: 10.1016/j.jss.2010.11.918
– ident: ref85
  doi: 10.1109/WCRE.2006.1
– ident: ref283
  doi: 10.1109/SCAM.2015.7335412
– ident: ref5
  doi: 10.1109/WCRE.2013.6671309
– ident: ref93
  doi: 10.1109/ICSE.2007.30
– start-page: 83
  year: 2004
  ident: ref229
  article-title: An ethnographic study of copy and paste programming practices in OOPL
  publication-title: Proc Int l Symp Empirical Software Eng
– ident: ref236
  doi: 10.1007/s11219-010-9115-6
– ident: ref114
  doi: 10.1002/smr.327
SSID ssj0005775
ssib053395008
Score 2.5505216
Snippet Bad smells are sub-optimal code structures that may represent problems needing attention. We conduct an extensive literature review on bad smells relying on a...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 17
SubjectTerms bad smell
Bibliographies
Cloning
Documents
Investigations
Literature reviews
Measurement
Organizations
reengineering
Reproduction (copying)
Smell
Software
Software maintenance
Systematic review
Systematics
Title A Systematic Literature Review on Bad Smells-5 W's: Which, When, What, Who, Where
URI https://ieeexplore.ieee.org/document/8532309
https://www.proquest.com/docview/2477252313
Volume 47
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 1939-3520
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0005775
  issn: 0098-5589
  databaseCode: RIE
  dateStart: 19750101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEB7anrz4qmK1Sg6CCG7b3W724a2KpYgVpBV7W7LJLBXrrrTbi7_eyb7EB-IlWUICYSbZ-SbzAjglDOwLx0YjVMolBcWnK-WalhFJIS3tphBKHY08vndGj_btjM9qcFHFwiBi5nyGHf2Z2fJVItf6qaxLooUQs1-Huus5eazWpzuH6_IyPybnnl-aJHt-dzq50T5cXseiw0p454sIymqq_PgRZ9JluAXjcl-5U8lLZ52GHfn-LWXjfze-DZsFzGSD_FzsQA3jXdgqSziw4kY34WHAJlUuZ3ZX5Vhmuc2AJTG7EopNXnGxWBmcPZ2tLtnT_FnOL6jDWLci1W2SDSxxD6bDm-n1yCiqLBjS8s3UiJBElBLKEaZ0OfW-9Ai2aPtcFNpIc4QnLTeUUgkisuA9FQnXQeWgNAmv7EMjTmI8AOZ5IdeRqST5lE3ISVsYJfZDHjmIlpIt6JZ0D2SRgVwXwlgEmSbS8wPiVKA5FRScasF5teItz77xx9ymJnw1r6B5C9ola4Pieq4CyyalglRws3_4-6oj2LC080r21tKGRrpc4zGhjzQ8yY7dB3Cj1DU
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEB60HvRifWJ95iCI4Lbd7WYf3lQsVVtBWqm3JZvMUrFupd1e_PVO9iU-EC_JEhIIM8nON5kXwDFhYF84NhqhUi4pKD5dKde0jEgKaWk3hVDqaOTevdN5tG-f-NMCnJWxMIiYOp9hXX-mtnw1kXP9VNYg0UKI2V-EJW7bNs-itT4dOlyXFxkyOff8wijZ9BuD_rX24vLqFh1XQjxfhFBaVeXHrziVL-0q9IqdZW4lL_V5Etbl-7ekjf_d-hqs5kCTXWQnYx0WMN6AalHEgeV3ehMeLli_zObMumWWZZZZDdgkZpdCsf4rjsczg7PhyeycDUfPcnRGHca6FYluJ-nAFLdg0L4eXHWMvM6CIS3fTIwISUgpoRxhSpdT70uPgIu20EWhjTRHeNJyQymVICIL3lSRcB1UDkqTEMs2VOJJjDvAPC_kOjaVZJ-yCTtpG6PEVsgjB9FSsgaNgu6BzHOQ61IY4yDVRZp-QJwKNKeCnFM1OC1XvGX5N_6Yu6kJX87LaV6D_YK1QX5BZ4Flk1pBSrjZ2v191REsdwa9btC9ub_bgxVLu7KkLy_7UEmmczwgLJKEh-kR_AC7XNeC
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Systematic+Literature+Review+on+Bad+Smells%E2%80%935+W%27s%3A+Which%2C+When%2C+What%2C+Who%2C+Where&rft.jtitle=IEEE+transactions+on+software+engineering&rft.au=Elder+Vicente+de+Paulo+Sobrinho&rft.au=De+Lucia%2C+Andrea&rft.au=de+Almeida+Maia%2C+Marcelo&rft.date=2021-01-01&rft.pub=IEEE+Computer+Society&rft.issn=0098-5589&rft.eissn=1939-3520&rft.volume=47&rft.issue=1&rft.spage=17&rft_id=info:doi/10.1109%2FTSE.2018.2880977&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0098-5589&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0098-5589&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0098-5589&client=summon