Journal of Software-Evolution and Process最新文献

筛选
英文 中文
i-SYNERGY: An Integrated Predictive Model for Assessing Software Developers' Performance Under Time Pressure i-SYNERGY:在时间压力下评估软件开发人员绩效的集成预测模型
IF 1.8 4区 计算机科学
Journal of Software-Evolution and Process Pub Date : 2025-12-17 DOI: 10.1002/smr.70071
Ruqaya Gilal, Mazni Omar, Mawarny Md Rejab, Abdul Rehman Gilal
{"title":"i-SYNERGY: An Integrated Predictive Model for Assessing Software Developers' Performance Under Time Pressure","authors":"Ruqaya Gilal,&nbsp;Mazni Omar,&nbsp;Mawarny Md Rejab,&nbsp;Abdul Rehman Gilal","doi":"10.1002/smr.70071","DOIUrl":"https://doi.org/10.1002/smr.70071","url":null,"abstract":"<div>\u0000 \u0000 <p>Human factors significantly influence software engineering (SE), where assigning unsuitable personnel to tasks is a leading cause of project failures. This challenge worsens under time pressure (TP), resulting in decreased performance and delays. Past studies have primarily focused on technical aspects, often neglecting the humanistic side, such as personality types and gender differences, in coping with TP. This study investigates the impact of personality types, gender, knowledge, and task complexity on developers' performance under TP and proposes the i-SYNERGY model. The research provides actionable insights for project planning under time-constrained conditions. Empirical data were collected through controlled experiments with SE students and generalized using industrial case studies. Myers–Briggs type indicator (MBTI) measured personality types, while the NASA task load index (TLX) assessed TP levels. Logistic regression outperformed four other models (artificial neural network [ANN], support vector machine [SVM], decision tree, and K-nearest neighbor [KNN]) with the highest prediction accuracy and was used to develop the model. Gender-specific results revealed ESTJ and ENTJ as effective under TP for males and ISFJ and ISFP for females. The i-SYNERGY model demonstrates that TP significantly reduces developer performance, but personality type, gender, knowledge and task complexity shape resilience. These results highlight the importance of aligning task assignments with individual traits to optimize performance. The proposed i-SYNERGY model offers a validated, structured framework to enhance decision-making and improve project outcomes in time-constrained environments.</p>\u0000 </div>","PeriodicalId":48898,"journal":{"name":"Journal of Software-Evolution and Process","volume":"37 12","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145824741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reality Check on Formal Methods in Industry: A Study of Verum Dezyne 工业中形式方法的现实检验:Verum Dezyne的研究
IF 1.8 4区 计算机科学
Journal of Software-Evolution and Process Pub Date : 2025-12-10 DOI: 10.1002/smr.70069
Michele Chiari, Matteo Camilli, Marcello M. Bersani, Rutger van Beusekom, Damian A. Tamburri
{"title":"Reality Check on Formal Methods in Industry: A Study of Verum Dezyne","authors":"Michele Chiari,&nbsp;Matteo Camilli,&nbsp;Marcello M. Bersani,&nbsp;Rutger van Beusekom,&nbsp;Damian A. Tamburri","doi":"10.1002/smr.70069","DOIUrl":"https://doi.org/10.1002/smr.70069","url":null,"abstract":"<p>Many of the classical questions reflecting the actionable use of formal methods in the software industry—“do they scale?” or “are they easily integrated?”—remain without a definitive answer, with many potentially adoptable formal notations being exploited in industry, but in a rather stove-piped and siloed fashion, and with rather few, sometimes anecdotal, success stories to tell. In this article, we strive to provide some more answers to the aforementioned questions on formal methods adoption in industry. We focus our study on a widely adopted formal methods framework in Europe, that is, Verum Dezyne, employed by embedded-computing and hardware-programming companies including Thermo-Fisher, Philips, and more. Results convey a rather interesting story—requiring further study into these matters—but also highlight practical insights for formal practitioners in the field, for example, that formal methods do not disrupt existing processes and scalability issues can be easily addressed by applying mainstream engineering practices, such as decomposition.</p>","PeriodicalId":48898,"journal":{"name":"Journal of Software-Evolution and Process","volume":"37 12","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/smr.70069","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145750886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Cybersecurity Maturity Model for Digitally Transformed Organizations 数字化转型组织的网络安全成熟度模型
IF 1.8 4区 计算机科学
Journal of Software-Evolution and Process Pub Date : 2025-12-07 DOI: 10.1002/smr.70074
Malek Al Zeibak, Mohammad Alshayeb, Malak Baslyman, Mahmood Niazi
{"title":"A Cybersecurity Maturity Model for Digitally Transformed Organizations","authors":"Malek Al Zeibak,&nbsp;Mohammad Alshayeb,&nbsp;Malak Baslyman,&nbsp;Mahmood Niazi","doi":"10.1002/smr.70074","DOIUrl":"https://doi.org/10.1002/smr.70074","url":null,"abstract":"<div>\u0000 \u0000 <p>Cybersecurity is a critical component of digital transformation, as the two must be integrated to enable business modernization and the adoption of innovative technologies while ensuring system security. Modern technologies introduce increasingly complex threats as more data is stored, transmitted, and processed across systems. Threats include the violation or misuse of data, such as data corruption, data theft, or a privacy violation. Determining if an organization applies the best practices requires measurements using maturity models. Several maturity models with different goals and qualities have been developed. However, no cybersecurity maturity model is related to digitally enabled or transforming organizations. The objective of this study is to develop a model that measures cybersecurity maturity for digitally transformed organizations. The model aims to provide a customizable assessment method for organizations of different sizes and domains. Two multivocal literature reviews (MLRs) were conducted to identify the available maturity models and best practices from formal and grey literature. After analyzing 165 studies, seven cybersecurity categories, as the capability areas, and 22 practice areas, were identified. Moreover, an assessment tool that supports self-assessment was developed. Finally, the model was evaluated through five case studies and expert judgments. As a result, a cybersecurity maturity model for digitally transformed organizations is developed, along with its assessment methodology and automation tool. The model evaluation showed promising results in terms of the ability to identify the maturity level.</p>\u0000 </div>","PeriodicalId":48898,"journal":{"name":"Journal of Software-Evolution and Process","volume":"37 12","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145739537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Mapping Study on JavaScript Quality Attributes and Metrics JavaScript质量属性和度量的映射研究
IF 1.8 4区 计算机科学
Journal of Software-Evolution and Process Pub Date : 2025-12-05 DOI: 10.1002/smr.70073
Ioannis Zozas, Stamatia Bibi, Apostolos Ampatzoglou, Elvira-Maria Arvanitou, Pantelis Angelidis, Markos Tsipouras
{"title":"A Mapping Study on JavaScript Quality Attributes and Metrics","authors":"Ioannis Zozas,&nbsp;Stamatia Bibi,&nbsp;Apostolos Ampatzoglou,&nbsp;Elvira-Maria Arvanitou,&nbsp;Pantelis Angelidis,&nbsp;Markos Tsipouras","doi":"10.1002/smr.70073","DOIUrl":"https://doi.org/10.1002/smr.70073","url":null,"abstract":"<div>\u0000 \u0000 <p>Although JavaScript dominates modern software development, research on its quality attributes remains scarce, despite the fundamental differences that distinguish it from other languages. This motivates dedicated research related to JavaScript quality attributes and metrics. This paper aims to identify (a) the quality attributes of the JavaScript language that are mainly studied and (b) the quality metrics that are used to quantify them. Additionally, the paper provides information on the tools that can be used to measure quality metrics. To achieve these goals, we have conducted a mapping study on seven journals and eight conferences of high quality. A total of 142 primary studies, published between 2002 and February 2025, have been selected and analyzed, to identify and classify software metrics to high-level quality attributes, as described in ISO/IEC 25010:2011. Maintainability, Security, Reliability, and Usability quality attributes are the most studied ones. Furthermore, 78 generic and 48 JavaScript-specific metrics were identified. A wide dispersion of metrics has been identified for assessing each quality attribute, based on different development tasks. Moreover, a variety of tools and benchmarks were identified. A clear research trend in JavaScript quality assessment related to issues that involve software reuse, code testing, and dynamic code analysis has been identified. Yet differences among primary studies in quality assessment and quantification, along with tool adoption indicate the need for further exploration of these recurring topics.</p>\u0000 </div>","PeriodicalId":48898,"journal":{"name":"Journal of Software-Evolution and Process","volume":"37 12","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145695187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Multilevel Approach to TARA: Proposals for Attack Feasibility in Interference-Free Scenarios TARA的多层方法:无干扰情况下攻击可行性的建议
IF 1.8 4区 计算机科学
Journal of Software-Evolution and Process Pub Date : 2025-12-03 DOI: 10.1002/smr.70060
Thomas Liedtke, Richard Messnarz, Damjan Ekert, Alexander Much
{"title":"A Multilevel Approach to TARA: Proposals for Attack Feasibility in Interference-Free Scenarios","authors":"Thomas Liedtke,&nbsp;Richard Messnarz,&nbsp;Damjan Ekert,&nbsp;Alexander Much","doi":"10.1002/smr.70060","DOIUrl":"https://doi.org/10.1002/smr.70060","url":null,"abstract":"<div>\u0000 \u0000 <p>Automotive SPICE for Cybersecurity incorporates the Cybersecurity Risk Management process (MAN.7), aligning with the Risk Assessment methods defined in ISO/SAE 21434:2021 (Clause 15). Both standards provide guidance on conducting Threat Analysis and Risk Assessments (TARA). However, they do not specify how to integrate the determination of attack feasibility when multiple TARAs emerge across different development phases. This paper explores how the concept of freedom from interference can facilitate a unified approach to determining attack feasibility in such scenarios.</p>\u0000 </div>","PeriodicalId":48898,"journal":{"name":"Journal of Software-Evolution and Process","volume":"37 12","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145695131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software Asset Management Roles and Responsibilities for Projects Using AHP and WASPAS 使用AHP和WASPAS的项目的软件资产管理角色和职责
IF 1.8 4区 计算机科学
Journal of Software-Evolution and Process Pub Date : 2025-11-30 DOI: 10.1002/smr.70070
Runhan Zhang, Shah Nazir
{"title":"Software Asset Management Roles and Responsibilities for Projects Using AHP and WASPAS","authors":"Runhan Zhang,&nbsp;Shah Nazir","doi":"10.1002/smr.70070","DOIUrl":"https://doi.org/10.1002/smr.70070","url":null,"abstract":"<div>\u0000 \u0000 <p>Effective management of software assets in their whole lifespan is the main goal of software asset management (SAM) and is a contemporary organizational practice. It includes a range of tasks such as purchasing, implementing, and maintaining software inside a company. SAM seeks to minimize the risks and expenses related to software ownership while ensuring that software resources are used as efficiently as possible to support business activities. Recently, a great increase in the use of this technique has occurred, especially in large-scale enterprises where the complexity and diversity of software assets have faced major hurdles. The proposed study presents an overview of the analysis of the recent approaches and hurdles in the area of SAM. Because big software companies have access to a multitude of resources and experience, maximizing the reuse of software assets inside these organizations is a common topic of academic and industrial study. Through the integration of several important attributes from previous research endeavors, the current study seeks to determine the most common attributes for the research. The study aims to contribute to the area by integrating the Analytical Hierarchy Process (AHP) along with the Weighted Aggregated Sum Product Assessment (WASPAS) approaches to give a rigorous and systematic way to analyze and rate the prominent qualities for selection of the most appropriate choice among the available alternatives.</p>\u0000 </div>","PeriodicalId":48898,"journal":{"name":"Journal of Software-Evolution and Process","volume":"37 12","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145626747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing OCR-based Engineering Diagram Analysis by Integrating Diverse External Legends with VLMs 集成多种外部图例与vlm,增强基于ocr的工程图分析
IF 1.8 4区 计算机科学
Journal of Software-Evolution and Process Pub Date : 2025-11-30 DOI: 10.1002/smr.70072
Vasil Shteriyanov, Rimma Dzhusupova, Jan Bosch, Helena Holmström Olsson
{"title":"Enhancing OCR-based Engineering Diagram Analysis by Integrating Diverse External Legends with VLMs","authors":"Vasil Shteriyanov,&nbsp;Rimma Dzhusupova,&nbsp;Jan Bosch,&nbsp;Helena Holmström Olsson","doi":"10.1002/smr.70072","DOIUrl":"https://doi.org/10.1002/smr.70072","url":null,"abstract":"<p>Manual analysis of diagrams and legend sheets in engineering projects is time consuming and needs automation. The lack of standardized legend formats complicates creating a general method for automated information extraction. Existing approaches require training and custom rules for each project. This study proposes a novel solution combining optical character recognition with vision language models and multimodal prompt engineering to automate information extraction from diverse legend sheets without training. It integrates legend information with information extracted from diagrams, unlike studies that only focus on diagrams. Our study shows that VLMs, guided by multimodal prompts, can accurately extract information from diverse legend sheets, enabling automatic information extraction in diagrams across engineering projects. We validate our method through a case study involving the extraction of instruments from piping and instrumentation diagrams (P&amp;IDs) and their legends across three projects with varied formats and standards. The proposed method achieved 100% accuracy in legend classification and information extraction, and 99.68% precision and 95.91% recall in generating instrument listings. The results demonstrate the effectiveness of our approach, significantly enhancing the accuracy and efficiency of information extraction from diagrams. This method can be adapted to different legend formats and diagrams, providing a versatile solution for various industries.</p>","PeriodicalId":48898,"journal":{"name":"Journal of Software-Evolution and Process","volume":"37 12","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/smr.70072","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145626745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Task Prioritization in Software Development Issues Tracking System 在软件开发问题跟踪系统中提高任务优先级
IF 1.8 4区 计算机科学
Journal of Software-Evolution and Process Pub Date : 2025-11-30 DOI: 10.1002/smr.70068
Karthik Shivashankar, Kristian Marison Haugerud, Antonio Martini
{"title":"Enhancing Task Prioritization in Software Development Issues Tracking System","authors":"Karthik Shivashankar,&nbsp;Kristian Marison Haugerud,&nbsp;Antonio Martini","doi":"10.1002/smr.70068","DOIUrl":"https://doi.org/10.1002/smr.70068","url":null,"abstract":"<div>\u0000 \u0000 <p>Modern software development faces a critical bottleneck in manually prioritizing the overwhelming volume of issues generated in platforms like Jira and GitHub. This labor-intensive process leads to delays, increased costs, inconsistent handling, and developer burnout, worsened by the lack of standardized priority labels. This paper investigates the potential of automated issue priority classification using state-of-the-art Transformer models to alleviate this burden. We evaluate the performance of models like BERT, DeBERTa, and ModernBERT, comparing them against general large language models (LLMs) such as GPT-3.5, Qwen2.5-3B and Llama-3.2-3B, using curated datasets derived from public Jira and GitHub repositories. Our research addresses the effectiveness of these models for their generalization capabilities on out-of-distribution projects, the impact of fine-tuning, and performs a detailed performance comparison across different priority levels and model types. Results demonstrate that Transformer models, particularly ModernBERT, achieve high classification performance (e.g., accuracy &gt; 81%), significantly outperforming the evaluated general LLMs (accuracy <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mo>≈</mo>\u0000 </mrow>\u0000 <annotation>$$ approx $$</annotation>\u0000 </semantics></math> 75%) for this specific task. We find that binary classification is more effective than multilabel approaches, models generalize well to unseen projects, and performance is further enhanced by fine-tuning. Key contributions include the provision of cleaned, labeled datasets and a comprehensive evaluation confirming the viability and benefits of using specialized Transformer models for automated issue priority suggestion, offering a path to improved efficiency and resource allocation in software development workflows.</p>\u0000 </div>","PeriodicalId":48898,"journal":{"name":"Journal of Software-Evolution and Process","volume":"37 12","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145626746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel, Tool-Supported Catalog of Community Smell Symptoms 一个新颖的,工具支持的社区气味症状目录
IF 1.8 4区 计算机科学
Journal of Software-Evolution and Process Pub Date : 2025-11-21 DOI: 10.1002/smr.70067
Antonio Della Porta, Stefano Lambiase, Gemma Catolino, Filomena Ferrucci, Fabio Palomba
{"title":"A Novel, Tool-Supported Catalog of Community Smell Symptoms","authors":"Antonio Della Porta,&nbsp;Stefano Lambiase,&nbsp;Gemma Catolino,&nbsp;Filomena Ferrucci,&nbsp;Fabio Palomba","doi":"10.1002/smr.70067","DOIUrl":"https://doi.org/10.1002/smr.70067","url":null,"abstract":"<div>\u0000 \u0000 <p>Software development is a multifaceted endeavor, requiring a profound grasp of both social dynamics and technical intricacies. Poor collaboration often leads to the accumulation of <i>social debt</i>, manifesting as unforeseen project costs due to sub-optimal team interactions. <i>Community smells</i> have emerged as indicators of these socio-technical inefficiencies and potential social debt. While previous research has focused on automated detection of community smells through analyzing developer communication patterns, our study offers a complementary approach. We emphasize the critical role of project managers in assessing socio-technical dynamics and propose a novel, tool-supported catalog of symptoms. This catalog can be used for manual inspections to identify early signs of community smells at the individual level, allowing managers to address issues before they escalate. Using a mixed-method design that leveraged an existing literature review and a user survey, we cataloged symptoms related to four community smell types. Additionally, we developed TOAST, a tool that operationalizes this catalog, and assessed its usability and practical usefulness through an experiment involving project managers. The study showed that even participants unfamiliar with the term “community smells” were able to interpret the tool's output, reflect on team dynamics, and recognize problematic behavioral patterns when supported by structured symptom-based information. The paper concludes by shedding light on the potential impact of our work and its contribution to advancing the detection and analysis of community smells.</p>\u0000 </div>","PeriodicalId":48898,"journal":{"name":"Journal of Software-Evolution and Process","volume":"37 11","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145581428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How Far Is Machine Learning From the Detection of Complex Microservice Bad Smells? 机器学习离检测复杂微服务的不良气味还有多远?
IF 1.8 4区 计算机科学
Journal of Software-Evolution and Process Pub Date : 2025-11-20 DOI: 10.1002/smr.70064
Yongchao Xing, Weipan Yang, Yiming Lv, Dianhui Chu, Zhiying Tu
{"title":"How Far Is Machine Learning From the Detection of Complex Microservice Bad Smells?","authors":"Yongchao Xing,&nbsp;Weipan Yang,&nbsp;Yiming Lv,&nbsp;Dianhui Chu,&nbsp;Zhiying Tu","doi":"10.1002/smr.70064","DOIUrl":"https://doi.org/10.1002/smr.70064","url":null,"abstract":"<div>\u0000 \u0000 <p>Microservice bad smells, arising from poor design and development practices, can severely degrade system quality if unaddressed. While rule-based detection methods exist, their applicability is limited by subjective metric thresholds and the difficulty in defining certain bad smells, particularly complex microservice bad smells that are challenging to express through rules or involve high subjectivity. These smells often involve multiple services or manifest across multiple layers within a service, making them particularly challenging to detect using traditional methods. Without efficient and accurate detection mechanisms, the self-healing capabilities of microservices during operation and continuous evolution will also be compromised. Given the promise of machine learning in code smell detection, this study empirically evaluates its performance in detecting complex microservice bad smells. We employ two sampling techniques and eight classification models on 1180 samples from 55 systems, generating 45 detection models and identifying top classifiers for seven complex microservice bad smell types. We compare machine learning with rule-based methods for high-subjectivity smells, analyze performance gaps, and propose a MAPE-K-based conceptual framework for runtime detection and refactoring. Finally, we discuss the necessity for future research.</p>\u0000 </div>","PeriodicalId":48898,"journal":{"name":"Journal of Software-Evolution and Process","volume":"37 11","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145581132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书