{"id":"https://openalex.org/W2111072738","doi":"https://doi.org/10.1109/scam.2015.7335411","title":"How do Java methods grow?","display_name":"How do Java methods grow?","publication_year":2015,"publication_date":"2015-09-01","ids":{"openalex":"https://openalex.org/W2111072738","doi":"https://doi.org/10.1109/scam.2015.7335411","mag":"2111072738"},"language":"en","primary_location":{"id":"doi:10.1109/scam.2015.7335411","is_oa":false,"landing_page_url":"https://doi.org/10.1109/scam.2015.7335411","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045559425","display_name":"Daniela Steidl","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Daniela Steidl","raw_affiliation_strings":["CQSE GmbH, Garching b. M\u00fcnchen, Germany"],"affiliations":[{"raw_affiliation_string":"CQSE GmbH, Garching b. M\u00fcnchen, Germany","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082208010","display_name":"Florian Deissenboeck","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Florian Deissenboeck","raw_affiliation_strings":["CQSE GmbH, Garching b. M\u00fcnchen, Germany"],"affiliations":[{"raw_affiliation_string":"CQSE GmbH, Garching b. M\u00fcnchen, Germany","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5045559425"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.6468,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.88256158,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"151","last_page":"160"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10430","display_name":"Software Engineering Techniques and Practices","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/code-refactoring","display_name":"Code refactoring","score":0.953986406326294},{"id":"https://openalex.org/keywords/maintainability","display_name":"Maintainability","score":0.8116741180419922},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.7913358211517334},{"id":"https://openalex.org/keywords/commit","display_name":"Commit","score":0.7455134391784668},{"id":"https://openalex.org/keywords/software-evolution","display_name":"Software evolution","score":0.7434078454971313},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7384495735168457},{"id":"https://openalex.org/keywords/software-maintenance","display_name":"Software maintenance","score":0.6600356101989746},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.5924193263053894},{"id":"https://openalex.org/keywords/reuse","display_name":"Reuse","score":0.560486912727356},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.45090335607528687},{"id":"https://openalex.org/keywords/software-system","display_name":"Software system","score":0.4258897006511688},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4212532639503479},{"id":"https://openalex.org/keywords/software-construction","display_name":"Software construction","score":0.2594163119792938},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.24024727940559387},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.16314390301704407},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12975412607192993}],"concepts":[{"id":"https://openalex.org/C152752567","wikidata":"https://www.wikidata.org/wiki/Q116877","display_name":"Code refactoring","level":3,"score":0.953986406326294},{"id":"https://openalex.org/C160713754","wikidata":"https://www.wikidata.org/wiki/Q1389965","display_name":"Maintainability","level":2,"score":0.8116741180419922},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.7913358211517334},{"id":"https://openalex.org/C153180980","wikidata":"https://www.wikidata.org/wiki/Q19776675","display_name":"Commit","level":2,"score":0.7455134391784668},{"id":"https://openalex.org/C202105479","wikidata":"https://www.wikidata.org/wiki/Q265013","display_name":"Software evolution","level":5,"score":0.7434078454971313},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7384495735168457},{"id":"https://openalex.org/C101317890","wikidata":"https://www.wikidata.org/wiki/Q940053","display_name":"Software maintenance","level":4,"score":0.6600356101989746},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.5924193263053894},{"id":"https://openalex.org/C206588197","wikidata":"https://www.wikidata.org/wiki/Q846574","display_name":"Reuse","level":2,"score":0.560486912727356},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.45090335607528687},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.4258897006511688},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4212532639503479},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.2594163119792938},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.24024727940559387},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.16314390301704407},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12975412607192993},{"id":"https://openalex.org/C548081761","wikidata":"https://www.wikidata.org/wiki/Q180388","display_name":"Waste management","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/scam.2015.7335411","is_oa":false,"landing_page_url":"https://doi.org/10.1109/scam.2015.7335411","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM)","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.703.4184","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.703.4184","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://www.cqse.eu/publications/2015-how-do-java-methods-grow.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6100000143051147,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W1517055698","https://openalex.org/W1565935466","https://openalex.org/W1971826777","https://openalex.org/W1976902149","https://openalex.org/W1979686314","https://openalex.org/W1982871693","https://openalex.org/W1985048544","https://openalex.org/W1996842335","https://openalex.org/W2001841009","https://openalex.org/W2014216297","https://openalex.org/W2049576151","https://openalex.org/W2058690162","https://openalex.org/W2063662948","https://openalex.org/W2070111972","https://openalex.org/W2072632642","https://openalex.org/W2073544895","https://openalex.org/W2077616397","https://openalex.org/W2097318715","https://openalex.org/W2102736727","https://openalex.org/W2105300539","https://openalex.org/W2105376034","https://openalex.org/W2110440639","https://openalex.org/W2116667392","https://openalex.org/W2127938826","https://openalex.org/W2128780139","https://openalex.org/W2151191515","https://openalex.org/W2153150125","https://openalex.org/W3145100113","https://openalex.org/W3148842585","https://openalex.org/W4239148840","https://openalex.org/W4241437391","https://openalex.org/W4254118911","https://openalex.org/W6675770679"],"related_works":["https://openalex.org/W2146134503","https://openalex.org/W4367397452","https://openalex.org/W2026866620","https://openalex.org/W2512989791","https://openalex.org/W1979226027","https://openalex.org/W2186150085","https://openalex.org/W1938356314","https://openalex.org/W1980601824","https://openalex.org/W2112911378","https://openalex.org/W2120293505"],"abstract_inverted_index":{"Overly":[0],"long":[1,33],"methods":[2,79,105,131],"hamper":[3],"the":[4,121],"maintainability":[5],"of":[6,73,116],"software":[7,75,125],"-":[8],"they":[9],"are":[10,28],"hard":[11],"to":[12,15,20,31,53],"understand":[13],"and":[14,23,41,56,77,97],"change,":[16],"but":[17],"also":[18],"difficult":[19],"test,":[21],"reuse,":[22],"profile.":[24],"While":[25],"technically":[26],"there":[27],"many":[29],"opportunities":[30],"refactor":[32,54],"methods,":[34],"little":[35],"is":[36,45,60],"known":[37],"about":[38,114],"their":[39,42,78,109],"origin":[40],"evolution.":[43],"It":[44],"unclear":[46],"how":[47,74],"much":[48],"effort":[49,59],"should":[50],"be":[51],"spent":[52,61],"them":[55,117],"when":[57],"this":[58],"best.":[62],"To":[63],"obtain":[64],"a":[65,70],"maintenance":[66],"strategy,":[67],"we":[68],"need":[69],"better":[71],"understanding":[72],"systems":[76,126],"evolve.":[80],"This":[81],"paper":[82],"presents":[83],"an":[84],"empirical":[85],"case":[86],"study":[87],"on":[88],"method":[89],"growth":[90],"in":[91,112],"Java":[92],"with":[93],"nine":[94],"open":[95],"source":[96],"one":[98],"industry":[99],"system.":[100],"We":[101],"show":[102],"that":[103],"most":[104],"do":[106],"not":[107],"increase":[108],"length":[110],"significantly;":[111],"fact,":[113],"half":[115],"remain":[118],"unchanged":[119],"after":[120],"initial":[122],"commit.":[123],"Instead,":[124],"grow":[127],"by":[128,134],"adding":[129],"new":[130],"rather":[132],"than":[133],"modifying":[135],"existing":[136],"methods.":[137]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
