{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T03:50:21Z","timestamp":1760586621273},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2012,7,14]],"date-time":"2012-07-14T00:00:00Z","timestamp":1342224000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2014,2]]},"DOI":"10.1007\/s10664-012-9214-z","type":"journal-article","created":{"date-parts":[[2012,7,13]],"date-time":"2012-07-13T13:39:14Z","timestamp":1342186754000},"page":"1-38","source":"Crossref","is-referenced-by-count":53,"title":["How changes affect software entropy: an empirical study"],"prefix":"10.1007","volume":"19","author":[{"given":"Gerardo","family":"Canfora","sequence":"first","affiliation":[]},{"given":"Luigi","family":"Cerulo","sequence":"additional","affiliation":[]},{"given":"Marta","family":"Cimitile","sequence":"additional","affiliation":[]},{"given":"Massimiliano","family":"Di Penta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,7,14]]},"reference":[{"key":"9214_CR1","doi-asserted-by":"crossref","unstructured":"Aversano L, Canfora G, Cerulo L, Del Grosso C, Di Penta M (2007) An empirical study on the evolution of design patterns. In: ESEC-FSE \u201907: proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on the foundations of software engineering. ACM Press, New York, pp\u00a0385\u2013394","DOI":"10.1145\/1287624.1287680"},{"issue":"5","key":"9214_CR2","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1049\/iet-sen.2008.0105","volume":"3","author":"L Aversano","year":"2009","unstructured":"Aversano L, Cerulo L, Di Penta M (2009) The relationship between design patterns defects and crosscutting concern scattering degree: an empirical study. IET Softw 3(5):395\u2013409","journal-title":"IET Softw"},{"key":"9214_CR3","unstructured":"Bianchi A, Caivano D, Lanubile F, Visaggio G (2001) Evaluating software degradation through entropy. In: METRICS \u201901: Proceedings of the 7th international symposium on software metrics. IEEE Computer Society, Washington, DC, p\u00a0210"},{"key":"9214_CR4","first-page":"993","volume":"3","author":"DM Blei","year":"2003","unstructured":"Blei DM, Ng AY, Jordan MI (2003) Latent Dirichlet allocation. J Mach Learn Res 3:993\u20131022","journal-title":"J Mach Learn Res"},{"key":"9214_CR5","doi-asserted-by":"crossref","unstructured":"Canfora G, Cerulo L, Di Penta M, Pacilio F (2010) An exploratory study of factors influencing change entropy. In: The 18th IEEE international conference on program comprehension, ICPC 2010, Braga, Minho, Portugal, 30 June\u20132 July 2010. IEEE Computer Society, Washington, DC, pp\u00a0134\u2013143","DOI":"10.1109\/ICPC.2010.32"},{"key":"9214_CR6","doi-asserted-by":"crossref","unstructured":"Capiluppi A, Fern\u00e1ndez-Ramil J, Higman J, Sharp HC, Smith N (2007) An empirical study of the evolution of an agile-developed software system. In: 29th international conference on software engineering (ICSE 2007), Minneapolis, MN, USA, 20\u201326 May 2007. IEEE Computer Society, Washington, DC, pp\u00a0511\u2013518","DOI":"10.1109\/ICSE.2007.14"},{"key":"9214_CR7","unstructured":"Chapin N (1995) An entropy metric for software maintainability. In: Proceedings of the 28th Hawaii international conference on system sciences, pp\u00a0522\u2013523"},{"issue":"1","key":"9214_CR8","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1109\/52.43044","volume":"7","author":"EJ Chikofsky","year":"1990","unstructured":"Chikofsky EJ, Cross JH II (1990) Reverse engineering and design recovery: a taxonomy. IEEE Softw 7(1):13\u201317","journal-title":"IEEE Softw"},{"key":"9214_CR9","unstructured":"Di\u00a0Penta M, Germ\u00e1n DM (2009) Who are source code contributors and how do they change? In: 16th working conference on reverse engineering, WCRE 2009, 13\u201316 October 2009, Lille, France. IEEE Computer Society, Washington, DC, pp 11\u201320"},{"key":"9214_CR10","doi-asserted-by":"crossref","unstructured":"Di\u00a0Penta M, Germ\u00e1n DM, Gu\u00e9h\u00e9neuc Y-G, Antoniol G (2010) An exploratory study of the evolution of software licensing. In: Proceedings of the 32nd ACM\/IEEE international conference on software engineering, ICSE 2010, Cape Town, South Africa, 1\u20138 May 2010. ACM, New York, pp 145\u2013154","DOI":"10.1145\/1806799.1806824"},{"issue":"1","key":"9214_CR11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/32.895984","volume":"27","author":"SG Eick","year":"2001","unstructured":"Eick SG, Graves TL, Karr AF, Marron JS, Mockus A (2001) Does code decay? Assessing the evidence from change management data. IEEE Trans Softw Eng 27(1):1\u201312","journal-title":"IEEE Trans Softw Eng"},{"key":"9214_CR12","volume-title":"Refactoring: improving the design of existing code","author":"M Fowler","year":"1999","unstructured":"Fowler M, Beck K, Brant J, Opdyke W, Roberts D (1999) Refactoring: improving the design of existing code. Addison-Wesley, Reading"},{"key":"9214_CR13","doi-asserted-by":"crossref","unstructured":"Gall H, Jazayeri M, Krajewski J (2003) CVS release history data for detecting logical couplings. In: IWPSE \u201903: Proceedings of the 6th international workshop on principles of software evolution. IEEE Computer Society, Washington, DC, pp 13\u201323","DOI":"10.1109\/IWPSE.2003.1231205"},{"key":"9214_CR14","volume-title":"Design patterns: elements of reusable object oriented software","author":"E Gamma","year":"1995","unstructured":"Gamma E, Helm R, Johnson R, Vlissides J (1995) Design patterns: elements of reusable object oriented software. Addison-Wesley, Reading"},{"key":"9214_CR15","volume-title":"Effect sizes for research: a broad practical approach","author":"RJ Grissom","year":"2005","unstructured":"Grissom RJ, Kim JJ (2005) Effect sizes for research: a broad practical approach, 2nd edn. Lawrence Earlbaum Associates, Hillsdale","edition":"2"},{"issue":"11","key":"9214_CR16","doi-asserted-by":"crossref","first-page":"1025","DOI":"10.1109\/32.177371","volume":"18","author":"W Harrison","year":"1992","unstructured":"Harrison W (1992) An entropy-based measure of software complexity. IEEE Trans Softw Eng 18(11):1025\u20131029","journal-title":"IEEE Trans Softw Eng"},{"key":"9214_CR17","doi-asserted-by":"crossref","unstructured":"Hassan AE (2009) Predicting faults using the complexity of code changes. In: 31st international conference on software engineering, ICSE 2009, 16\u201324 May 2009, Vancouver, Canada, pp\u00a078\u201388","DOI":"10.1109\/ICSE.2009.5070510"},{"key":"9214_CR18","unstructured":"Hassan AE, Holt RC (2003) The chaos of software development. In: IWPSE \u201903: Proceedings of the 6th international workshop on principles of software evolution. IEEE Computer Society, Washington, DC, p\u00a084"},{"key":"9214_CR19","first-page":"65","volume":"6","author":"S Holm","year":"1979","unstructured":"Holm S (1979) A simple sequentially rejective Bonferroni test procedure. Scand J Statist 6:65\u201370","journal-title":"Scand J Statist"},{"key":"9214_CR20","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1016\/j.infsof.2006.10.017","volume":"49","author":"A Kuhn","year":"2007","unstructured":"Kuhn A, Ducasse S, G\u00edrba T (2007) Semantic clustering: identifying topics in source code. Inf Softw Technol 49:230\u2013243","journal-title":"Inf Softw Technol"},{"issue":"9","key":"9214_CR21","doi-asserted-by":"crossref","first-page":"1060","DOI":"10.1109\/PROC.1980.11805","volume":"68","author":"MM Lehman","year":"1980","unstructured":"Lehman MM (1980) Programs life cycles and laws of software evolution. Proc IEEE 68(9):1060\u20131076","journal-title":"Proc IEEE"},{"key":"9214_CR22","volume-title":"Software evolution\u2014processes of software change","author":"MM Lehman","year":"1985","unstructured":"Lehman MM, Belady LA (1985) Software evolution\u2014processes of software change. Academic, London"},{"key":"9214_CR23","doi-asserted-by":"crossref","unstructured":"Linstead E, Baldi P (2009) Mining the coherence of gnome bug reports with statistical topic models. In: Proceedings of the 2009 6th IEEE international working conference on mining software repositories, MSR \u201909. IEEE Computer Society, Washington, DC, pp 99\u2013102","DOI":"10.1109\/MSR.2009.5069486"},{"key":"9214_CR24","doi-asserted-by":"crossref","unstructured":"Nagappan N, Ball T (2007) Using software dependencies and churn metrics to predict field failures: an empirical case study. In: Proceedings of the first international symposium on empirical software engineering and measurement, ESEM 2007, 20\u201321 September 2007, Madrid, Spain. IEEE Computer Society, Washington, DC, pp 364\u2013373","DOI":"10.1109\/ESEM.2007.13"},{"key":"9214_CR25","doi-asserted-by":"crossref","unstructured":"Parnas DL (1994) Software aging. In: Proceedings of the international conference on software engineering, pp\u00a0279\u2013287","DOI":"10.1109\/ICSE.1994.296790"},{"key":"9214_CR26","first-page":"35","volume-title":"Proceedings of the 2008 international working conference on mining software repositories, MSR 2008, Leipzig, Germany, 10\u201311 May 2008","author":"J Ratzinger","year":"2008","unstructured":"Ratzinger J, Sigmund T, Gall H (2008) On the relation of refactorings and software defect prediction. In: Proceedings of the 2008 international working conference on mining software repositories, MSR 2008, Leipzig, Germany, 10\u201311 May 2008. ACM, New York, pp\u00a035\u201338"},{"key":"9214_CR27","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27:379\u2013423, 625\u2013656","journal-title":"Bell Syst Tech J"},{"key":"9214_CR28","volume-title":"Handbook of parametric and nonparametric statistical procedures","author":"DJ Sheskin","year":"2007","unstructured":"Sheskin DJ (2007) Handbook of parametric and nonparametric statistical procedures, 4th edn. Chapman & Hall, London","edition":"4"},{"key":"9214_CR29","first-page":"55","volume-title":"IEEE international workshop on source code analysis and manipulation","author":"SW Thomas","year":"2010","unstructured":"Thomas SW, Adams B, Hassan AE, Blostein D (2010) Validating the use of topic models for software evolution. In: IEEE international workshop on source code analysis and manipulation. IEEE Computer Society, Los Alamitos, pp\u00a055\u201364"},{"issue":"11","key":"9214_CR30","doi-asserted-by":"crossref","first-page":"896","DOI":"10.1109\/TSE.2006.112","volume":"32","author":"N Tsantalis","year":"2006","unstructured":"Tsantalis N, Chatzigeorgiou A, Stephanides G, Halkidis ST (2006) Design pattern detection using similarity scoring. IEEE Trans Softw Eng 32(11):896\u2013909","journal-title":"IEEE Trans Softw Eng"},{"key":"9214_CR31","unstructured":"van\u00a0Rijsbergen CJ, Robertson SE, Porter MF (1980) New models in probabilistic information retrieval. In: British Library research and development report, no. 5587. British Library, London"},{"key":"9214_CR32","doi-asserted-by":"crossref","unstructured":"Zimmermann T, Weisgerber P, Diehl S, Zeller A (2004) Mining version histories to guide software changes. In: ICSE \u201904: Proceedings of the 26th international conference on software engineering. IEEE Computer Society, Washington, DC, pp\u00a0563\u2013572","DOI":"10.1109\/ICSE.2004.1317478"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-012-9214-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-012-9214-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-012-9214-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,30]],"date-time":"2019-06-30T18:11:13Z","timestamp":1561918273000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-012-9214-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7,14]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,2]]}},"alternative-id":["9214"],"URL":"https:\/\/doi.org\/10.1007\/s10664-012-9214-z","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,7,14]]}}}