Computer Science ›› 2025, Vol. 52 ›› Issue (12): 32-39.doi: 10.11896/jsjkx.241200007
• Computer Software & Architecture • Previous Articles Next Articles
LI Jianhao, BAI Yaoyao, MI Jie, ZHANG Yingzhou, CAO Wenlong, WANG Dong, WANG Gang
CLC Number:
| [1]FOWLER M,BECK K,BRANT J,et al.Refactoring:improving the design of existing code [M].Massachusetts:Addison-Wesley,1999. [2]TAN T,MA X X,XU C,et al.Overview of Java Pointer Analysis[J].Journal of Computer Research and Development,2023,60(2):274-293. [3]HU Z,HUGHES J,WANG M.How functional programming mattered[J].National Science Review,2015,2(3):349-370. [4]ZHANG Y Z,ZHANG W F.Haskell:A Modern Purely Functional Programming Language[J].Journal of Nanjing University of Posts and Telecommunications(Natural Science),2007(4):13-18,23. [5]FOKAEFS M,TSANTAILS N,CHATZIGEORGIOU A.JDe-odorant:Identication and Removal of Feature Envy Bad Smells[C]//Proceedings of the 23rd IEEE International Conference on Software Maintenance.IEEE,2007:519-520. [6]SALES V,TERRA R,MIRANDA L F,et al.Recommending Move MethodRefactorings Using Dependency Sets[C]//Proceedings of the 20th Working Conference on Reverse Engineering.IEEE,2013:232-241. [7]LIU D D,ZHAO F Y.Research on feature envy detection and refactoring[J].Electronic Science and Technology,2016,29(11):70-73. [8]CHEN W K,LIU C H,LI B H.A feature envy detection method based on dataflow analysis[C]//IEEE 42nd Annual Computer Software and Applications Conference.IEEE,2018:14-19. [9]SKIPINA M,SLIVKA J,LUBURIC N,et al.Automaticdetection of Feature Envy and Data Class code smells using machine learning[J].Expert Systems With Applications,2024,243:122855. [10]PRIYAMBADHA B,KATAYAMA T,KITA Y,et al.Detection of Blob and Feature Envy Smells in a Class Diagram using Class’s Features[J].Journal of Robotics,Networking and Artificial Life,2022,9(1):43-48. [11]LIU B,LIU H,LI G J,et al.Deep Learning Based Feature Envy Detection Boosted by Real-World Examples[C]//Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering.ACM,2023:908-920. [12]AL-FRAIHAT D,SHARRAB Y,AL-GHUWAIRI A R,et al.Detecting and resolving feature envy throughautomatedmachine learning and move method refactoring[J].International Journal of Electrical & Computer Engineering,2024,4(2):2330-2343. [13]YU D J,XU Y H,WENG L H,et al.Efficient feature envy detection and refactoring based ongraphneural network[J].Automated Software Engineering,2025,32(1). [14]GRUJIC K G,PROKIC S,KOVACEVIC A,et al.MachineLearning Approaches for Code Smell Detection:A Systematic Literature Review[J/OL].Social Science Research Network,2022.https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4299859. [15]LEWOWSKI T,MADEYSKI L.Code smells detection using artificial intelligence techniques:A business-driven systematic review[M]//Studies in Systems,Decision and Control.2021:285-319. [16]BLOCH J.Effective Java[M].Beijing:Posts & Telecom Press,2024. |
| [1] | SONG Enzhou, HU Tao, YI Peng, WANG Wenbo. PDF Malicious Indicators Extraction Technique Based on Improved Symbolic Execution [J]. Computer Science, 2024, 51(7): 389-396. |
| [2] | LU Ling, ZHOU Zhide, REN Zhilei, JIANG He. Category-directed Fuzzing Test Method for Error Reporting Mechanism in JavaScript Engines [J]. Computer Science, 2023, 50(12): 49-57. |
| [3] | SUN Zhi-gang, WANG Guo-tao, JIANG Ai-ping, GAO Meng-meng, LIU Jin-gang. Monitoring System of Traffic Safety Based on Information Fusion Technology [J]. Computer Science, 2020, 47(11A): 642-650. |
| [4] | QIN Meng-na, CHEN Jun-jie, GUO Hao. Multi-feature Fusion Classification Method Based on High-order Minimum Spanning Tree Brain Network [J]. Computer Science, 2018, 45(7): 293-298. |
| [5] | WANG Pan-zao. Research on Intelligent Maps Navigation System Based on Location Service [J]. Computer Science, 2017, 44(Z6): 575-576. |
| [6] | SUN Ya-jing, ZHAO Xu, YAN Xue-xiong and WANG Qing-xian. Data Leakage Oriented Testing Method for Web Sandbox [J]. Computer Science, 2017, 44(Z11): 322-328. |
| [7] | WEI Miao, WU Yi-jian, SHEN Li-wei, PENG Xin and ZHAO Wen-yun. Finding Type Mismatch Defects of JavaScript Based on Static Analysis [J]. Computer Science, 2017, 44(4): 223-228. |
| [8] | GONG Wei-gang, YOU Wei, LI Zan, SHI Wen-chang and LIANG Bin. JavaScript Counterfactual Execution Method Based on Dynamic Instrumentation [J]. Computer Science, 2017, 44(11): 22-26. |
| [9] | WU Wei-min, LIN Shui-ming and LIN Zhi-yi. Chaotic-based Opaque Predicate Control Flow Flatten Algorithm [J]. Computer Science, 2015, 42(5): 178-182. |
| [10] | ZENG Yi, LI Han-yu, LIU Hui-jun, YU Shuang-shuang and ZHOU Bo. Consistency Detection Method between UML Model and Java Source Code [J]. Computer Science, 2015, 42(4): 151-155. |
| [11] | ZHANG Yang, ZHANG Dong-wen and QIU Jing. Automated Refactoring Framework for Java Locks [J]. Computer Science, 2015, 42(11): 84-89. |
| [12] | FU Teng and GAO Jian-hua. Metadata Checking and Testing of Web Application Based on Invariance [J]. Computer Science, 2014, 41(8): 224-228. |
| [13] | CHEN Xiao-yu,HUANG Zhen,LIU Xuan-zhe,HUANG Gang and ZHANG Ying. Scratch:Tooling Support for Capture-and-replay of User Actions in Chrome Browser [J]. Computer Science, 2014, 41(11): 112-117. |
| [14] | CUI Li-qun and ZHANG Ming-jie. Design and Research of Embedded Thin Web Server [J]. Computer Science, 2013, 40(Z6): 236-238. |
| [15] | SI Biao. Exam System Modelling Research Based on MVC [J]. Computer Science, 2013, 40(Z6): 403-406. |
|
||