{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,12]],"date-time":"2024-07-12T20:31:25Z","timestamp":1720816285403},"reference-count":21,"publisher":"Elsevier BV","issue":"7","license":[{"start":{"date-parts":[[2010,9,1]],"date-time":"2010-09-01T00:00:00Z","timestamp":1283299200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,7,29]],"date-time":"2013-07-29T00:00:00Z","timestamp":1375056000000},"content-version":"vor","delay-in-days":1062,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electronic Notes in Theoretical Computer Science"],"published-print":{"date-parts":[[2010,9]]},"DOI":"10.1016\/j.entcs.2010.08.042","type":"journal-article","created":{"date-parts":[[2010,9,8]],"date-time":"2010-09-08T09:07:10Z","timestamp":1283936830000},"page":"191-204","source":"Crossref","is-referenced-by-count":27,"title":["Fundamental Nano-Patterns to Characterize and Classify Java Methods"],"prefix":"10.1016","volume":"253","author":[{"given":"Jeremy","family":"Singer","sequence":"first","affiliation":[]},{"given":"Gavin","family":"Brown","sequence":"additional","affiliation":[]},{"given":"Mikel","family":"Luj\u00e1n","sequence":"additional","affiliation":[]},{"given":"Adam","family":"Pocock","sequence":"additional","affiliation":[]},{"given":"Paraskevas","family":"Yiapanis","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.entcs.2010.08.042_br0010","doi-asserted-by":"crossref","unstructured":"Agrawal, R., T. Imielinski and A. Swami, Mining association rules between sets of items in large databases, in: Proceedings of the International Conference on Management of Data, 1993, pp. 207\u2013216.","DOI":"10.1145\/170035.170072"},{"key":"10.1016\/j.entcs.2010.08.042_br0020","unstructured":"Agrawal, R. and R. Srikant, Fast algorithms for mining association rules, in: Proceedings of the 20th International Conference on Very Large Databases, 1994, pp. 487\u2013499."},{"key":"10.1016\/j.entcs.2010.08.042_br0030","doi-asserted-by":"crossref","unstructured":"Bajracharya, S., T. Ngo, E. Linstead, Y. Dou, P. Rigor, P. Baldi and C. Lopes, Sourcerer: a search engine for open source code supporting structure-based search, in: Companion to the 21st ACM SIGPLAN Symposium on Object-Oriented Programming, Systems, Languages, and Applications, 2006, pp. 681\u2013682.","DOI":"10.1145\/1176617.1176671"},{"key":"10.1016\/j.entcs.2010.08.042_br0040","doi-asserted-by":"crossref","unstructured":"Blackburn, S. M. et al., The DaCapo benchmarks: Java benchmarking development and analysis, in: Proceedings of the 21st Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, 2006, pp. 169\u2013190.","DOI":"10.1145\/1167515.1167488"},{"key":"10.1016\/j.entcs.2010.08.042_br0050","doi-asserted-by":"crossref","unstructured":"Brin, S., R. Motwani, J. Ullman and S. Tsur, Dynamic itemset counting and implication rules for market basket data, in: Proceedings of the 1997 ACM SIGMOD International Conference on Management of Data, 1997, pp. 255\u2013264.","DOI":"10.1145\/253260.253325"},{"key":"10.1016\/j.entcs.2010.08.042_br0060","unstructured":"Bruneton, E., R. Lenglet and T. Coupaye, ASM: a code manipulation tool to implement adaptable systems, in: Adaptable and Extensible Component Systems, 2002."},{"key":"10.1016\/j.entcs.2010.08.042_br0070","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1109\/32.295895","article-title":"A metrics suite for object oriented design","volume":"20","author":"Chidamber","year":"1994","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/j.entcs.2010.08.042_br0080","doi-asserted-by":"crossref","unstructured":"Cohen, T., J. Y. Gil and I. Maman, Jtl: the Java tools language, in: Proceedings of the 21st Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, 2006, pp. 89\u2013108.","DOI":"10.1145\/1167515.1167481"},{"key":"10.1016\/j.entcs.2010.08.042_br0090","doi-asserted-by":"crossref","unstructured":"Dong, J. and Y. Zhao, Experiments on design pattern discovery, in: Proceedings of the Third International Workshop on Predictor Models in Software Engineering, 2007, p. 12.","DOI":"10.1109\/PROMISE.2007.6"},{"key":"10.1016\/j.entcs.2010.08.042_br0100","first-page":"213","article-title":"Knowledge discovery in databases: An overview","author":"Frawley","year":"1992","journal-title":"AI Magazine"},{"key":"10.1016\/j.entcs.2010.08.042_br0110","series-title":"Design Patterns: Elements of Reusable Object-Oriented Software","author":"Gamma","year":"1994"},{"key":"10.1016\/j.entcs.2010.08.042_br0120","doi-asserted-by":"crossref","unstructured":"Gil, Y. and I. Maman, Micro patterns in Java code, in: Proceedings of the 20th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, 2005, pp. 97\u2013116.","DOI":"10.1145\/1094811.1094819"},{"key":"10.1016\/j.entcs.2010.08.042_br0130","doi-asserted-by":"crossref","unstructured":"Gueheneuc, Y., H. Sahraoui and F. Zaidi, Fingerprinting design patterns, in: Proceedings of the 11th Working Conference on Reverse Engineering, pp. 172\u2013181.","DOI":"10.1109\/WCRE.2004.21"},{"key":"10.1016\/j.entcs.2010.08.042_br0140","doi-asserted-by":"crossref","unstructured":"Heuzeroth, D., T. Holl, G. H\u00f6gstr\u00f6m and W. L\u00f6we, Automatic design pattern detection, in: Proceedings of the 11th IEEE International Workshop on Program Comprehension, 2003, pp. 94\u2013103.","DOI":"10.1109\/WPC.2003.1199193"},{"key":"10.1016\/j.entcs.2010.08.042_br0150","doi-asserted-by":"crossref","unstructured":"H\u00f8st, E. W. and B. M. \u00d8stvold, The programmer's lexicon, volume I: The verbs, in: Proceedings of the Seventh IEEE International Working Conference on Source Code Analysis and Manipulation, 2007, pp. 193\u2013202.","DOI":"10.1109\/SCAM.2007.18"},{"key":"10.1016\/j.entcs.2010.08.042_br0160","doi-asserted-by":"crossref","unstructured":"H\u00f8st, E. W. and B. M. \u00d8stvold, The Java programmer's phrase book, in: Proceedings of the First International Conference on Software Language Engineering, 2008, pp. 322\u2013341.","DOI":"10.1007\/978-3-642-00434-6_20"},{"key":"10.1016\/j.entcs.2010.08.042_br0170","doi-asserted-by":"crossref","unstructured":"Kim, S., K. Pan and E. Whitehead Jr, Micro pattern evolution, in: Proceedings of the International Workshop on Mining Software Repositories, 2006, pp. 40\u201346.","DOI":"10.1145\/1137983.1137995"},{"key":"10.1016\/j.entcs.2010.08.042_br0180","doi-asserted-by":"crossref","unstructured":"Marion, S., R. Jones and C. Ryder, Decrypting the Java gene pool: Predicting objects' lifetimes with micro-patterns, in: Proceedings of the International Symposium on Memory Management, 2007, pp. 67\u201378.","DOI":"10.1145\/1296907.1296918"},{"key":"10.1016\/j.entcs.2010.08.042_br0190","doi-asserted-by":"crossref","unstructured":"Rousidis, D. and C. Tjortjis, Clustering data retrieved from Java source code to support software maintenance: A case study, in: 9th European Conference on Software Maintenance and Reengineering, 2005, pp. 276\u2013279.","DOI":"10.1109\/CSMR.2005.16"},{"key":"10.1016\/j.entcs.2010.08.042_br0200","doi-asserted-by":"crossref","unstructured":"Singer, J. and C. Kirkham, Exploiting the correspondence between micro patterns and class names, in: Proceedings of the Eighth IEEE International Working Conference on Source Code Analysis and Manipulation, 2008, pp. 67\u201376.","DOI":"10.1109\/SCAM.2008.23"},{"key":"10.1016\/j.entcs.2010.08.042_br0210","doi-asserted-by":"crossref","unstructured":"Sridharan, M. and R. Bod\u00edk, Refinement-based context-sensitive points-to analysis for Java, in: Proceedings of the 2006 ACM SIGPLAN Conference on Programming Language Design and Implementation, 2006, pp. 387\u2013400.","DOI":"10.1145\/1133981.1134027"}],"container-title":["Electronic Notes in Theoretical Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066110001210?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066110001210?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,6,4]],"date-time":"2019-06-04T04:03:51Z","timestamp":1559621031000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1571066110001210"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9]]},"references-count":21,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2010,9]]}},"alternative-id":["S1571066110001210"],"URL":"https:\/\/doi.org\/10.1016\/j.entcs.2010.08.042","relation":{},"ISSN":["1571-0661"],"issn-type":[{"value":"1571-0661","type":"print"}],"subject":[],"published":{"date-parts":[[2010,9]]}}}