{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T04:29:28Z","timestamp":1774931368853,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2013,2,15]],"date-time":"2013-02-15T00:00:00Z","timestamp":1360886400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1007\/s10664-013-9245-0","type":"journal-article","created":{"date-parts":[[2013,2,14]],"date-time":"2013-02-14T09:26:58Z","timestamp":1360834018000},"page":"1009-1039","source":"Crossref","is-referenced-by-count":33,"title":["Correlations between bugginess and time-based commit characteristics"],"prefix":"10.1007","volume":"19","author":[{"given":"Jon","family":"Eyolfson","sequence":"first","affiliation":[]},{"given":"Lin","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"Lam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,2,15]]},"reference":[{"issue":"4","key":"9245_CR1","doi-asserted-by":"crossref","first-page":"1165","DOI":"10.1214\/aos\/1013699998","volume":"29","author":"Y Benjamini","year":"2001","unstructured":"Benjamini Y, Yekutieli D (2001) The control of the false discovery rate in multiple testing under dependency. Ann Stat 29(4):1165\u20131188","journal-title":"Ann Stat"},{"key":"9245_CR2","doi-asserted-by":"crossref","unstructured":"Bird C, Bachmann A, Aune E, Duffy J, Bernstein A, Filkov V, Devanbu P (2009) Fair and balanced?: bias in bug-fix datasets. In: ESEC\/FSE \u201909: Proceedings of the the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering, pp\u00a0121\u2013130","DOI":"10.1145\/1595696.1595716"},{"key":"9245_CR3","doi-asserted-by":"crossref","unstructured":"Bird C, Nagappan N (2012) Who? where? what? examining distributed development in two large open source projects. In: Proceedings of the international working conference on mining software repositories","DOI":"10.1109\/MSR.2012.6224286"},{"key":"9245_CR4","doi-asserted-by":"crossref","unstructured":"Bird C, Nagappan N, Devanbu PT, Gall H, Murphy B (2009) Does distributed development affect software quality? In: ICSE, pp\u00a0518\u2013528","DOI":"10.1109\/ICSE.2009.5070550"},{"key":"9245_CR5","doi-asserted-by":"crossref","unstructured":"Bird C, Nagappan N, Murphy B, Gall H, Devanbu P (2011) Don\u2019t touch my code!: examining the effects of ownership on software quality. In: Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on foundations of software engineering, ESEC\/FSE \u201911, pp\u00a04\u201314","DOI":"10.1145\/2025113.2025119"},{"key":"9245_CR6","doi-asserted-by":"crossref","unstructured":"Chou A, Yang J, Chelf B, Hallem S, Engler DR (2001) An empirical study of operating system errors. In: Symposium on operating systems principles, pp\u00a073\u201388","DOI":"10.1145\/502059.502042"},{"key":"9245_CR7","doi-asserted-by":"crossref","unstructured":"Engler D, Chen DY, Hallem S, Chou A, Chelf B (2001) Bugs as deviant behavior: a general approach to inferring errors in systems code. In: SOSP\u201901: Proceedings of the eighteenth ACM symposium on operating systems principles, pp 57\u201372","DOI":"10.1145\/502034.502041"},{"key":"9245_CR8","doi-asserted-by":"crossref","unstructured":"Eyolfson J, Tan L, Lam P (2011) Do time of day and developer experience affect commit bugginess? In: MSR","DOI":"10.1145\/1985441.1985464"},{"issue":"7","key":"9245_CR9","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1109\/32.859533","volume":"26","author":"TL Graves","year":"2000","unstructured":"Graves TL, Karr AF, Marron JS, Siy HP (2000) Predicting fault incidence using software change history. TSE 26(7):653\u2013661","journal-title":"TSE"},{"key":"9245_CR10","unstructured":"Guo L, Ma Y, Cukic B, Singh H (2004) Robust prediction of fault-proneness by random forests. In: ISSRE"},{"key":"9245_CR11","unstructured":"Haas R (2012) So, why isn\u2019t PostgreSQL using Git yet? http:\/\/rhaas.blogspot.com\/2010_09_01_archive.html : 2010. Accessed 5 Feb 2013"},{"key":"9245_CR12","doi-asserted-by":"crossref","unstructured":"Hassan AE (2009) Predicting faults using the complexity of code changes. In: ICSE, pp\u00a078\u201388","DOI":"10.1109\/ICSE.2009.5070510"},{"key":"9245_CR13","doi-asserted-by":"crossref","unstructured":"Herraiz I, Gonz\u00e1lez-Barahona JM, Robles G, Germ\u00e1n DM (2007) On the prediction of the evolution of libre software projects. In: ICSM, pp\u00a0405\u2013414","DOI":"10.1109\/ICSM.2007.4362653"},{"issue":"2","key":"9245_CR14","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1109\/TSE.2007.70773","volume":"34","author":"S Kim","year":"2008","unstructured":"Kim S, Whitehead Jr EJ, Zhang Y (2008) Classifying software changes: clean or buggy? IEEE Trans Softw Eng 34(2):181\u2013196","journal-title":"IEEE Trans Softw Eng"},{"key":"9245_CR15","doi-asserted-by":"crossref","unstructured":"Kim S, Whitehead Jr E (2006) How long did it take to fix bugs? In: MSR, pp\u00a0173\u2013174","DOI":"10.1145\/1137983.1138027"},{"key":"9245_CR16","doi-asserted-by":"crossref","unstructured":"Kim S, Zimmermann T, Pan K, Whitehead E (2006) Automatic identification of bug-introducing changes. In: ASE, pp\u00a081\u201390","DOI":"10.1109\/ASE.2006.23"},{"key":"9245_CR17","doi-asserted-by":"crossref","unstructured":"Meneely A, Williams L, Snipes W, Osborne J (2008) Predicting failures with developer networks and social network analysis. In: SIGSOFT\/FSE, pp\u00a013\u201323","DOI":"10.1145\/1453101.1453106"},{"key":"9245_CR18","doi-asserted-by":"crossref","unstructured":"Menzies T, Milton Z, Turhan B, Cukic B, Jiang Y, Bener AB (2010) Defect prediction from static code features: current results, limitations, new approaches. In: ASE","DOI":"10.1007\/s10515-010-0069-5"},{"issue":"2","key":"9245_CR19","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1002\/bltj.2229","volume":"5","author":"A Mockus","year":"2000","unstructured":"Mockus A, Weiss DM (2000) Predicting risk of software changes. Bell Labs Tech J 5(2):169\u2013180","journal-title":"Bell Labs Tech J"},{"key":"9245_CR20","doi-asserted-by":"crossref","unstructured":"Mockus A, Weiss DM, Zhang P (2003) Understanding and predicting effort in software projects. In: ICSE","DOI":"10.1109\/ICSE.2003.1201207"},{"key":"9245_CR21","doi-asserted-by":"crossref","unstructured":"Nagappan N, Murphy B, Basili VR (2008) The influence of organizational structure on software quality: an empirical case study. In: ICSE, pp\u00a0521\u2013530","DOI":"10.1145\/1368088.1368160"},{"issue":"6","key":"9245_CR22","first-page":"511","volume":"31","author":"TJ Ostrand","year":"2005","unstructured":"Ostrand TJ, Weyuker EJ, Bell RM (2005) Predicting the location and number of faults in large software systems. TSE 31(4):340\u2013355","journal-title":"TSE"},{"issue":"6","key":"9245_CR23","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1109\/TSE.2005.74","volume":"31","author":"R Purushothaman","year":"2005","unstructured":"Purushothaman R, Perry DE (2005) Toward understanding the rhetoric of small source code changes. TSE 31(6):511\u2013526","journal-title":"TSE"},{"key":"9245_CR24","doi-asserted-by":"crossref","unstructured":"Rahman F, Devanbu P (2011) Ownership, experience and defects: a fine-grained study of authorship. In: Proceedings of the 33rd International Conference on Software Engineering, ICSE \u201911, pp\u00a0491\u2013500","DOI":"10.1145\/1985793.1985860"},{"key":"9245_CR25","doi-asserted-by":"crossref","unstructured":"\u015aliwerski J, Zimmermann T, Zeller A (2005) When do changes induce fixes? In: MSR, pp\u00a024\u201328","DOI":"10.1145\/1083142.1083147"},{"key":"9245_CR26","doi-asserted-by":"crossref","unstructured":"Spinellis D (2006) Global software development in the FreeBSD project. In: GSD, pp\u00a073\u201379","DOI":"10.1145\/1138506.1138524"},{"key":"9245_CR27","doi-asserted-by":"crossref","unstructured":"Swift MM, Bershad BN, Levy HM (2003) Improving the reliability of commodity operating systems. In: SOSP, pp\u00a0207\u2013222","DOI":"10.1145\/945445.945466"},{"key":"9245_CR28","doi-asserted-by":"crossref","unstructured":"Tian Y, Lawall J, Lo D (2012) Identifying Linux bug fixing patches. In: ICSE\u201912, pp 386\u2013396","DOI":"10.1109\/ICSE.2012.6227176"},{"issue":"5","key":"9245_CR29","doi-asserted-by":"crossref","first-page":"539","DOI":"10.1007\/s10664-008-9082-8","volume":"13","author":"EJ Weyuker","year":"2008","unstructured":"Weyuker EJ, Ostrand TJ, Bell RM (2008) Do too many cooks spoil the broth? using the number of developers to enhance defect prediction models. Empir Software Eng 13(5):539\u2013559","journal-title":"Empir Software Eng"},{"key":"9245_CR30","doi-asserted-by":"crossref","unstructured":"Wu R, Zhang H, Kim S, Cheung S-C (2011) Relink: recovering links between bugs and changes. In: Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on foundations of software engineering, ESEC\/FSE \u201911, pp\u00a015\u201325","DOI":"10.1145\/2025113.2025120"},{"key":"9245_CR31","doi-asserted-by":"crossref","unstructured":"Zimmermann T, Nagappan N (2008) Predicting defects using network analysis on dependency graphs. In: ICSE","DOI":"10.1145\/1368088.1368161"},{"key":"9245_CR32","doi-asserted-by":"crossref","unstructured":"Zimmermann T, Premraj R, Zeller A (2007) Predicting defects for eclipse. In: PROMISE","DOI":"10.1109\/PROMISE.2007.10"},{"key":"9245_CR33","doi-asserted-by":"crossref","unstructured":"Zimmermann T, Wei\u00dfgerber P (2004) Preprocessing CVS data for fine-grained analysis. In: MSR, pp\u00a02\u20136","DOI":"10.1049\/ic:20040466"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-013-9245-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-013-9245-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-013-9245-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T18:49:58Z","timestamp":1562698198000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-013-9245-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,2,15]]},"references-count":33,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,8]]}},"alternative-id":["9245"],"URL":"https:\/\/doi.org\/10.1007\/s10664-013-9245-0","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,2,15]]}}}