{"id":"https://openalex.org/W2145258344","doi":"https://doi.org/10.1109/icsm.2007.4362670","title":"Poor Performing Patterns of Code: Analysis and Detection","display_name":"Poor Performing Patterns of Code: Analysis and Detection","publication_year":2007,"publication_date":"2007-10-01","ids":{"openalex":"https://openalex.org/W2145258344","doi":"https://doi.org/10.1109/icsm.2007.4362670","mag":"2145258344"},"language":"en","primary_location":{"id":"doi:10.1109/icsm.2007.4362670","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsm.2007.4362670","pdf_url":null,"source":{"id":"https://openalex.org/S4210174939","display_name":"Proceedings/Proceedings - Conference on Software Maintenance","issn_l":"1063-6773","issn":["1063-6773","2576-3148"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2007 IEEE International Conference on Software Maintenance","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043552303","display_name":"Rim Chaabane","orcid":null},"institutions":[{"id":"https://openalex.org/I204730241","display_name":"Universit\u00e9 Paris Cit\u00e9","ror":"https://ror.org/05f82e368","country_code":"FR","type":"education","lineage":["https://openalex.org/I204730241"]},{"id":"https://openalex.org/I48825208","display_name":"Universit\u00e9 Paris 8","ror":"https://ror.org/04wez5e68","country_code":"FR","type":"education","lineage":["https://openalex.org/I48825208"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Rim Chaabane","raw_affiliation_strings":["Sungard GP3, University of Paris 8, France","University of Paris 8, Paris"],"affiliations":[{"raw_affiliation_string":"Sungard GP3, University of Paris 8, France","institution_ids":["https://openalex.org/I48825208","https://openalex.org/I204730241"]},{"raw_affiliation_string":"University of Paris 8, Paris","institution_ids":["https://openalex.org/I48825208","https://openalex.org/I204730241"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5043552303"],"corresponding_institution_ids":["https://openalex.org/I204730241","https://openalex.org/I48825208"],"apc_list":null,"apc_paid":null,"fwci":1.5824,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.89267256,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"501","last_page":"502"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8376666307449341},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.7388263940811157},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.6268041133880615},{"id":"https://openalex.org/keywords/software-maintenance","display_name":"Software maintenance","score":0.6136797666549683},{"id":"https://openalex.org/keywords/kpi-driven-code-analysis","display_name":"KPI-driven code analysis","score":0.6073721051216125},{"id":"https://openalex.org/keywords/static-program-analysis","display_name":"Static program analysis","score":0.5896676778793335},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5539612770080566},{"id":"https://openalex.org/keywords/code-refactoring","display_name":"Code refactoring","score":0.5420279502868652},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5387436151504517},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.48447561264038086},{"id":"https://openalex.org/keywords/software-quality","display_name":"Software quality","score":0.4747213125228882},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.46768003702163696},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.46052178740501404},{"id":"https://openalex.org/keywords/code-smell","display_name":"Code smell","score":0.44661208987236023},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.355979323387146},{"id":"https://openalex.org/keywords/software-system","display_name":"Software system","score":0.3222768306732178},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.2634761333465576}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8376666307449341},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.7388263940811157},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.6268041133880615},{"id":"https://openalex.org/C101317890","wikidata":"https://www.wikidata.org/wiki/Q940053","display_name":"Software maintenance","level":4,"score":0.6136797666549683},{"id":"https://openalex.org/C121957198","wikidata":"https://www.wikidata.org/wiki/Q14365593","display_name":"KPI-driven code analysis","level":5,"score":0.6073721051216125},{"id":"https://openalex.org/C137287247","wikidata":"https://www.wikidata.org/wiki/Q1329550","display_name":"Static program analysis","level":4,"score":0.5896676778793335},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5539612770080566},{"id":"https://openalex.org/C152752567","wikidata":"https://www.wikidata.org/wiki/Q116877","display_name":"Code refactoring","level":3,"score":0.5420279502868652},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5387436151504517},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.48447561264038086},{"id":"https://openalex.org/C117447612","wikidata":"https://www.wikidata.org/wiki/Q1412670","display_name":"Software quality","level":4,"score":0.4747213125228882},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.46768003702163696},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.46052178740501404},{"id":"https://openalex.org/C133237599","wikidata":"https://www.wikidata.org/wiki/Q2295111","display_name":"Code smell","level":5,"score":0.44661208987236023},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.355979323387146},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.3222768306732178},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.2634761333465576},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icsm.2007.4362670","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsm.2007.4362670","pdf_url":null,"source":{"id":"https://openalex.org/S4210174939","display_name":"Proceedings/Proceedings - Conference on Software Maintenance","issn_l":"1063-6773","issn":["1063-6773","2576-3148"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2007 IEEE International Conference on Software Maintenance","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"No poverty","id":"https://metadata.un.org/sdg/1","score":0.6200000047683716}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W109947125","https://openalex.org/W2153887189"],"related_works":["https://openalex.org/W2946499381","https://openalex.org/W125071098","https://openalex.org/W3166181464","https://openalex.org/W2955607951","https://openalex.org/W2091064206","https://openalex.org/W2954134394","https://openalex.org/W3203858588","https://openalex.org/W2096821349","https://openalex.org/W2904412847","https://openalex.org/W2015418718"],"abstract_inverted_index":{"Software":[0],"maintenance":[1,16],"is":[2,26],"a":[3,74],"way":[4],"to":[5,27,37,43,50,72,101,109,113,118],"optimize":[6],"software":[7],"performances,":[8,40],"but":[9],"for":[10,79,88],"huge":[11],"code":[12,35,84],"source's":[13],"softwares,":[14],"this":[15],"may":[17],"be":[18,51,110,114],"very":[19],"complex.":[20],"The":[21],"aim":[22],"of":[23,57],"our":[24,58,61],"work":[25,59],"detect":[28],"suspected":[29],"poor":[30],"performing":[31],"patterns":[32],"in":[33,41,45,82,91,126],"source":[34,83,128],"and":[36,60,85,122],"measure":[38],"their":[39],"order":[42],"state":[44],"which":[46,103],"contexts":[47],"they":[48],"need":[49,108],"refactored.":[52],"We":[53,65],"present":[54],"the":[55,67,92,119,127],"context":[56],"pattern":[62,80,105],"analysis":[63,78,87],"approach.":[64],"explain":[66],"reason":[68],"why":[69],"we":[70],"have":[71],"establish":[73],"link":[75,97],"between":[76],"static":[77],"detection":[81],"dynamic":[86],"performance":[89],"measurement":[90],"corresponding":[93],"executed":[94],"instructions.":[95],"This":[96],"will":[98],"allow":[99],"us":[100],"identify":[102],"set":[104,121],"instances":[106,124],"really":[107],"refactored,":[111],"expected":[112],"restricted":[115],"with":[116],"respect":[117],"large":[120],"are":[123],"encountered":[125],"code.":[129]},"counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
