• No results found

An Empirical Investigation of Code Smell 'Deception' and Research Contextualisation through Paul's Criteria

N/A
N/A
Protected

Academic year: 2020

Share "An Empirical Investigation of Code Smell 'Deception' and Research Contextualisation through Paul's Criteria"

Copied!
8
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Table 1. Mantyla’s Smell Taxonomy (Mantyla 2003).
Table 2 lists each of the code smells and the number of refactorings that each requires to be eradicated (in parentheses)
Table 3 shows the refactorings (Refs.) that the Large Class smell requires in order to be  erad-icated (Fowler 1999)
Table 5 shows the standard percentage responses found in the same study by Mantyla. Only 64.3% of developers responded that they  under-stood the Data Clumps smell

References

Related documents

The first two columns present the accounts for males and females based on the traditional methodology, using the aggregate male and female tax and transfer profiles from GPS but

(1) The Penal Code of the Republic of Slovenia shall apply to any foreign citizen who has, in a foreign country, committed a criminal offence against the Republic of Slovenia

The Diocese of Joliet is recommending all parishes with schools begin an annual appeal to further its mission of Catholic education as well as assist in the maintenance of

Queensboro Bridge to Manhattan via Queens Midtown Tunnel Kew Gardens Utopia Kew Gardens Hills Fresh Meadows Queens Glen Oaks Oakland Gardens Qu een s B lvd QM35 Terminal QM5

The second research was based on research on market cultures (Arnould & Thompson, 2005), consumer subcultures (Schouten & McAlexander, 1995), consumer cultures

The City’s housing problem manifests in rents that are too high for New Yorkers to afford. Consequently, any policy response to the problem needs to bring down the cost of housing

Rajendraprasad, Akshatha G, Hydrothermal Synthesis of Multiwall Carbon Nanotubes using Polystyrene: Purification and Characterization, International Journal for Research in

A quick scan of the Code Red II warning gives you several options to prevent the attack, such as blocking all traffic to port 80, the well known WWW port, but it will take