{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:23:44Z","timestamp":1773840224019,"version":"3.50.1"},"reference-count":97,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2013,6,7]],"date-time":"2013-06-07T00:00:00Z","timestamp":1370563200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1007\/s10664-013-9258-8","type":"journal-article","created":{"date-parts":[[2013,6,6]],"date-time":"2013-06-06T00:16:15Z","timestamp":1370477775000},"page":"1665-1705","source":"Crossref","is-referenced-by-count":201,"title":["Bug characteristics in open source software"],"prefix":"10.1007","volume":"19","author":[{"given":"Lin","family":"Tan","sequence":"first","affiliation":[]},{"given":"Chen","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhenmin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xuanhui","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yuanyuan","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Chengxiang","family":"Zhai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,6,7]]},"reference":[{"key":"9258_CR1","unstructured":"ASF bugzilla (2010) http:\/\/issues.apache.org\/bugzilla . Accessed September 2010"},{"key":"9258_CR2","unstructured":"Bayes Net (2013) http:\/\/www.cs.waikato.ac.nz\/~remco\/weka_bn\/"},{"key":"9258_CR3","unstructured":"Coverity (2013) Automated error prevention and source code analysis. http:\/\/www.coverity.com"},{"key":"9258_CR4","unstructured":"Debugging Memory Leaks (2013) https:\/\/wiki.mozilla.org\/Performance:Leak_Tools"},{"key":"9258_CR5","unstructured":"Kernel Bug Tracker (2010) http:\/\/bugzilla.kernel.org\/ . Accessed February 2010"},{"key":"9258_CR6","unstructured":"Mozilla.org Bugzilla (2010) https:\/\/bugzilla.mozilla.org . Accessed September 2010"},{"key":"9258_CR7","unstructured":"National Vulnerability Database (2011) http:\/\/nvd.nist.gov . Accessed 31 December 2011"},{"key":"9258_CR8","unstructured":"Nvd Common Vulnerability Scoring System (2013) http:\/\/nvd.nist.gov\/cvss.cfm?version=2"},{"key":"9258_CR9","unstructured":"Support vector machines using sequential minimal optimization (2013) http:\/\/weka.sourceforge.net\/doc.dev\/weka\/classifiers\/functions\/SMO.html"},{"key":"9258_CR10","unstructured":"Valgrind (2013) http:\/\/www.valgrind.org\/"},{"key":"9258_CR12","unstructured":"Ahmed L, Serge D, Quinten S, Tim V (2011) Comparing mining algorithms for predicting the severity of a reported bug. In: Proceedings of the 15th European conference on software maintenance and reengineering, pp 249\u2013258"},{"key":"9258_CR13","unstructured":"Amir M, Tao X (2005) Helping users avoid bugs in gui applications. In: Proceedings of the 27th international conference on software engineering, pp 107\u2013116"},{"key":"9258_CR14","doi-asserted-by":"crossref","unstructured":"Anvik J, Hiew L, Murphy GC (2006) Who should fix this bug? In: Proceedings of the 28th international conference on software engineering, pp 361\u2013370","DOI":"10.1145\/1134285.1134336"},{"key":"9258_CR15","doi-asserted-by":"crossref","unstructured":"Aranda J, Venolia G (2009) The secret life of bugs: Going past the errors and omissions in software repositories. In: Proceedings of the 31st international conference on software engineering. IEEE, pp 298\u2013308","DOI":"10.1109\/ICSE.2009.5070530"},{"issue":"1","key":"9258_CR16","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A Avizienis","year":"2004","unstructured":"Avizienis A, Laprie JC, Randell B, Landwehr CE (2004) Basic concepts and taxonomy of dependable and secure computing. IEEE Trans Dependable Secur Comput 1(1):11\u201333","journal-title":"IEEE Trans Dependable Secur Comput"},{"issue":"1","key":"9258_CR17","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1145\/69605.2085","volume":"27","author":"VR Basili","year":"1984","unstructured":"Basili VR, Perricone BT (1984) Software errors and complexity: an empirical investigation. Commun. ACM 27(1):42\u201352","journal-title":"Commun. ACM"},{"key":"9258_CR18","volume-title":"Software testing techniques","author":"B Beizer","year":"1990","unstructured":"Beizer B (1990) Software testing techniques, 2nd edn. Van Nostrand Reinhold Co., New York, NY, USA","edition":"2"},{"key":"9258_CR19","doi-asserted-by":"crossref","unstructured":"Bird C, Bachmann A, Aune E, Duffy J, Bernstein A, Filkov V, Devanbu P (2009) Fair and balanced?: bias in bug-fix datasets. In: Proceedings of the the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on the foundations of software engineering. ESEC\/FSE \u201909, pp 121\u2013130","DOI":"10.1145\/1595696.1595716"},{"key":"9258_CR20","doi-asserted-by":"crossref","unstructured":"Bougie G, Treude C, German DM, Storey MA (2010) A comparative exploration of FreeBSD bug lifetimes. In: 2010 7th IEEE working conference on mining software repositories (MSR 2010). IEEE, pp 106\u2013109","DOI":"10.1109\/MSR.2010.5463291"},{"key":"9258_CR21","doi-asserted-by":"crossref","unstructured":"Canfora G, Cerulo L, Cimitile M, Di\u00a0Penta M (2011) Social interactions around cross-system bug fixings: the case of freebsd and openbsd. In: Proceedings of the 8th working conference on mining software repositories, pp\u00a0143\u2013152","DOI":"10.1145\/1985441.1985463"},{"key":"9258_CR22","unstructured":"Chang CC, Lin CJ (2001) Libsvm\u2014a library for support vector machines. The Weka classifier works with version 2.82 of LIBSVM. http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm\/"},{"key":"9258_CR23","doi-asserted-by":"crossref","unstructured":"Chillarege R, Kao WL, Condit RG (1991) Defect type and its impact on the growth curve. In: Proceedings of the 13th international conference on software engineering, pp 246\u2013255","DOI":"10.1109\/ICSE.1991.130649"},{"key":"9258_CR24","doi-asserted-by":"crossref","unstructured":"Chou A, Yang J, Chelf B, Hallem S, Engler DR (2001) An empirical study of operating system errors. In: Proceedings of the 18th ACM symposium on operating systems principles, pp 73\u201388","DOI":"10.1145\/502059.502042"},{"issue":"3","key":"9258_CR25","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/0164-1212(90)90040-S","volume":"12","author":"BT Compton","year":"1990","unstructured":"Compton BT, Withrow C (1990) Prediction and control of ADA software defects. J Syst Softw 12(3):199\u2013207","journal-title":"J Syst Softw"},{"issue":"1","key":"9258_CR26","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MSECP.2003.1176994","volume":"1","author":"C Cowan","year":"2003","unstructured":"Cowan C (2003) Software security for open-source systems. IEEE Secur Priv 1(1):38\u201345","journal-title":"IEEE Secur Priv"},{"key":"9258_CR27","unstructured":"Cowan C, Wagle P, Pu C, Beattie S, Walpole J (2000) Buffer overflows: attacks and defenses for the vulnerability of the decade. In: Proceedings of the DARPA information survivability conference and exposition"},{"key":"9258_CR28","unstructured":"Cubranic D, Murphy GC (2004) Automatic bug triage using text categorization. In: Proceedings of the 16th international conference on software engineering and knowledge engineering, pp 92\u201397"},{"key":"9258_CR29","doi-asserted-by":"crossref","unstructured":"Dallmeier V, Zimmermann T (2007) Extraction of bug localization benchmarks from history. In: Proceedings of the 22nd IEEE\/ACM international conference on automated software engineering, pp 433\u2013436","DOI":"10.1145\/1321631.1321702"},{"issue":"4\u20135","key":"9258_CR30","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1007\/s10664-011-9173-9","volume":"17","author":"M D\u2019Ambros","year":"2012","unstructured":"D\u2019Ambros M, Lanza M, Robbes R (2012) Evaluating defect prediction approaches: a benchmark and an extensive comparison. Empir Softw Eng 17(4\u20135):531\u2013577","journal-title":"Empir Softw Eng"},{"issue":"3","key":"9258_CR31","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1007\/s10515-010-0068-6","volume":"17","author":"A Edwards","year":"2010","unstructured":"Edwards A, Tucker S, Demsky B (2010) Afid: an automated approach to collecting software faults. Autom Softw Eng 17(3):347\u2013372","journal-title":"Autom Softw Eng"},{"key":"9258_CR32","unstructured":"Emad S, Akinori I, Yasutaka K, Walid MI, Masao O, Bram A, Ahmed EH, Ken-ichi M (2010) Predicting re-opened bugs: a case study on the eclipse project. In: Proceedings of the 2010 17th working conference on reverse engineering, pp 249\u2013258"},{"key":"9258_CR33","doi-asserted-by":"crossref","unstructured":"Endres A (1975) An analysis of errors and their causes in system programs. In: Proceedings of the international conference on reliable software, pp 327\u2013336","DOI":"10.1145\/800027.808455"},{"key":"9258_CR34","doi-asserted-by":"crossref","unstructured":"Engler D, Chen DY, Chou A (2001) Bugs as deviant behavior: a general approach to inferring errors in systems code. In: Proceedings of the 18th ACM symposium on operating systems principles, pp 57\u201372","DOI":"10.1145\/502059.502041"},{"issue":"2","key":"9258_CR35","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1109\/32.908957","volume":"27","author":"MD Ernst","year":"2001","unstructured":"Ernst MD, Cockrell J, Griswold WG, Notkin D (2001) Dynamically discovering likely program invariants to support program evolution. IEEE Trans Softw Eng 27(2):99\u2013123","journal-title":"IEEE Trans Softw Eng"},{"issue":"8","key":"9258_CR36","doi-asserted-by":"crossref","first-page":"797","DOI":"10.1109\/32.879815","volume":"26","author":"NE Fenton","year":"2000","unstructured":"Fenton NE, Ohlsson N (2000) Quantitative analysis of faults and failures in a complex software system. IEEE Trans Softw Eng 26(8):797\u2013814","journal-title":"IEEE Trans Softw Eng"},{"key":"9258_CR37","doi-asserted-by":"crossref","unstructured":"Gegick M, Rotella P, Xie T (2010) Identifying security bug reports via text mining: an industrial case study. In: Proceedings of the 7th working conference on mining software repositories, pp 11\u201320","DOI":"10.1109\/MSR.2010.5463340"},{"issue":"3","key":"9258_CR38","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1007\/s10664-006-9004-6","volume":"11","author":"DM Germ\u00e1n","year":"2006","unstructured":"Germ\u00e1n DM (2006) An empirical study of fine-grained software modifications. Empir Softw Eng 11(3):369\u2013393","journal-title":"Empir Softw Eng"},{"issue":"2","key":"9258_CR39","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1109\/TSE.1981.230831","volume":"7","author":"R Glass","year":"1981","unstructured":"Glass R (1981) Persistent software errors. IEEE Trans Softw Eng 7(2):162\u2013168","journal-title":"IEEE Trans Softw Eng"},{"issue":"7","key":"9258_CR40","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1109\/32.859533","volume":"26","author":"T Graves","year":"2000","unstructured":"Graves T, Karr A, Marron J, Siy H (2000) Predicting fault incidence using software change history. IEEE Trans Softw Eng 26(7):653\u2013661","journal-title":"IEEE Trans Softw Eng"},{"key":"9258_CR41","unstructured":"Gu W, Kalbarczyk Z, Iyer RK, Yang ZY (2003) Characterization of linux kernel behavior under errors. In: Proceedings of the 2003 international conference on dependable systems and networks, pp 459\u2013468"},{"key":"9258_CR42","unstructured":"Guo L, Ma Y, Cukic B, Singh H (2004) Robust prediction of fault-proneness by random forests. In: 15th international symposium on software reliability engineering, pp 417\u2013428"},{"key":"9258_CR43","doi-asserted-by":"crossref","unstructured":"Guo PJ, Zimmermann T, Nagappan N, Murphy B (2010) Characterizing and predicting which bugs get fixed. In: Proceedings of the 32nd ACM\/IEEE international conference on software engineering, ICSE \u201910, vol\u00a01, pp 495\u2013504","DOI":"10.1145\/1806799.1806871"},{"key":"9258_CR44","unstructured":"Hafiz M (2010) Security on demand. Ph.D. thesis"},{"key":"9258_CR11","doi-asserted-by":"crossref","unstructured":"Hall M, Frank E, Holmes G, Pfahringer B, Reutemann P, Witten IH (2009) TheWEKA data mining software: an update. SIGKDD Explorations, vol 11, issue 1","DOI":"10.1145\/1656274.1656278"},{"key":"9258_CR45","unstructured":"Han J, Kamber M (2001) Data mining: concepts and techniques. Morgan Kaufmann Publishers"},{"key":"9258_CR46","unstructured":"Hastings R, Joyce B (1992) Purify: fast detection of memory leaks and access errors. In: Proceedings of the winter USENIX conference, pp 125\u2013136"},{"key":"9258_CR47","doi-asserted-by":"crossref","unstructured":"Herraiz I, German DM, Gonzalez-Barahona JM, Robles G (2008) Towards a simplification of the bug report form in eclipse. In: Proceedings of the 2008 international workshop on mining software repositories, MSR \u201908. ACM Press, pp 145\u2013148","DOI":"10.1145\/1370750.1370786"},{"key":"9258_CR48","doi-asserted-by":"crossref","unstructured":"Hooimeijer P, Weimer W (2007) Modeling bug report quality. In: Proceedings of the 22nd IEEE\/ACM international conference on automated software engineering, pp 34\u201343","DOI":"10.1145\/1321631.1321639"},{"key":"9258_CR49","doi-asserted-by":"crossref","unstructured":"Joachims T (2002) Learning to classify text using support vector machines. Kluwer Academic Publishers","DOI":"10.1007\/978-1-4615-0907-3"},{"key":"9258_CR50","doi-asserted-by":"crossref","unstructured":"Ka\u00e2niche M, Kanoun K, Cukier M, de\u00a0Bastos\u00a0Martini MR (1994) Software reliability analysis of three successive generations of a switching system. In: Proceedings of the 1st European dependable computing conference on dependable compproceedings of the first European dependable computing conference on dependable computing, pp 473\u2013490","DOI":"10.1007\/3-540-58426-9_153"},{"key":"9258_CR51","doi-asserted-by":"crossref","unstructured":"Kim S, Zimmermann T, Pan K, Whitehead E Jr (2006) Automatic identification of bug-introducing changes. In: 21st IEEE\/ACM international conference on automated software engineering (ASE\u201906), pp 81\u201390","DOI":"10.1109\/ASE.2006.23"},{"issue":"1","key":"9258_CR52","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/s10664-010-9151-7","volume":"16","author":"S Kpodjedo","year":"2011","unstructured":"Kpodjedo S, Ricca F, Galinier P, Gu\u00e9h\u00e9neuc YG, Antoniol G (2011) Design evolution metrics for defect prediction in object oriented systems. Empir Softw Eng 16(1):141\u2013175","journal-title":"Empir Softw Eng"},{"key":"9258_CR53","unstructured":"Li Z, Lu S, Myagmar S, Zhou Y (2004) CP-Miner: a tool for finding copy-paste and related bugs in operating system code. In: 6th symposium on operating systems design and implementation, pp\u00a0289\u2013302"},{"key":"9258_CR54","unstructured":"Li Z, Tan L, Wang X, Lu S, Zhou Y, Zhai C (2006) Have things changed now? An empirical study of bug characteristics in modern open source software. In: Proceedings of the 1st workshop on architectural and system support for improving software dependability, ASID \u201906"},{"key":"9258_CR55","unstructured":"Lu S (2008) Understanding, detecting and exposing concurrency bugs. Ph.D. thesis"},{"key":"9258_CR56","unstructured":"Lu S, Li Z, Qin F, Tan L, Zhou P, Zhou Y (2005) BugBench: a benchmark for evaluating bug detection tools. In: Workshop on the evaluation of software defect detection tools"},{"key":"9258_CR57","doi-asserted-by":"crossref","unstructured":"Lu S, Park S, Seo E, Zhou Y (2008) Learning from mistakes: a comprehensive study on real world concurrency bug characteristics. In: Proceedings of the 13th international conference on architectural support for programming languages and operating systems, pp 329\u2013339","DOI":"10.1145\/1346281.1346323"},{"key":"9258_CR58","doi-asserted-by":"crossref","unstructured":"Massacci F, Neuhaus S, Nguyen VH (2011) After-life vulnerabilities: a study on firefox evolution, its vulnerabilities, and fixes. In: Proceedings of the 3rd international conference on engineering secure software and systems, pp 195\u2013208","DOI":"10.1007\/978-3-642-19125-1_15"},{"key":"9258_CR59","doi-asserted-by":"crossref","unstructured":"Matter D, Kuhn A, Nierstrasz O (2009) Assigning bug reports using a vocabulary-based expertise model of developers. In: Proceedings of the 2009 6th IEEE international working conference on mining Software repositories, pp 131\u2013140","DOI":"10.1109\/MSR.2009.5069491"},{"issue":"8","key":"9258_CR60","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1109\/MC.2002.1023795","volume":"35","author":"AM Memon","year":"2002","unstructured":"Memon AM (2002) GUI testing: pitfalls and process. Computer 35(8):87\u201388","journal-title":"Computer"},{"issue":"3","key":"9258_CR61","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1145\/567793.567795","volume":"11","author":"A Mockus","year":"2002","unstructured":"Mockus A, Fielding RT, Herbsleb JD (2002) Two case studies of open source software development: Apache and Mozilla. ACM Trans Softw Eng Methodol (TOSEM) 11(3):309\u2013346","journal-title":"ACM Trans Softw Eng Methodol (TOSEM)"},{"key":"9258_CR62","doi-asserted-by":"crossref","unstructured":"Moller KH, Paulish DJ (1993) An empirical investigation of software fault distribution. In: Proceedings of the 1st international software metrics symposium, pp 82\u201390","DOI":"10.1109\/METRIC.1993.263798"},{"key":"9258_CR63","doi-asserted-by":"crossref","unstructured":"Neuhaus S, Zimmermann T (2010) Security trend analysis with cve topic models. In: Proceedings of the 2010 IEEE 21st international symposium on software reliability engineering, pp 111\u2013120","DOI":"10.1109\/ISSRE.2010.53"},{"key":"9258_CR64","doi-asserted-by":"crossref","unstructured":"Ostrand T, Weyuker E (2002) The distribution of faults in a large industrial software system. In: Proceedings of the 2002 ACM SIGSOFT international symposium on software testing and analysis, pp 55\u201364","DOI":"10.1145\/566172.566181"},{"issue":"4","key":"9258_CR65","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1016\/0164-1212(84)90028-1","volume":"4","author":"TJ Ostrand","year":"1984","unstructured":"Ostrand TJ, Weyuker EJ (1984) Collecting and categorizing software error data in an industrial environment. J Syst Softw 4(4):289\u2013300","journal-title":"J Syst Softw"},{"issue":"4","key":"9258_CR66","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1109\/TSE.2005.49","volume":"31","author":"TJ Ostrand","year":"2005","unstructured":"Ostrand TJ, Weyuker EJ, Bell RM (2005) Predicting the location and number of faults in large software systems. IEEE Trans Softw Eng 31(4):340\u2013355","journal-title":"IEEE Trans Softw Eng"},{"key":"9258_CR67","unstructured":"Ozment A, Schechter SE (2006) Milk or wine: does software security improve with age? In: Proceedings of the 15th conference on USENIX security symposium, vol 15"},{"key":"9258_CR68","unstructured":"Pamela B, Iulian N (2010) Fine-grained incremental learning and multi-feature tossing graphs to improve bug triaging. In: Proceedings of the 2010 IEEE international conference on Software maintenance"},{"key":"9258_CR69","unstructured":"Pamela B, Iulian N (2011) Bug-fix time prediction models: can we do better? In: Proceedings of the 8th workin conference on mining software repositories"},{"key":"9258_CR70","doi-asserted-by":"crossref","unstructured":"Panjer LD (2007) Predicting Eclipse bug lifetimes. In: Proceedings of the Fourth International Workshop on mining software repositories, pp 29\u201332","DOI":"10.1109\/MSR.2007.25"},{"key":"9258_CR71","doi-asserted-by":"crossref","unstructured":"woo Park J, woong Lee M, Kim J, won Hwang S, Kim S (2011) CosTriage: a cost-aware triage algorithm for bug reporting systems. In: In Proceedings of 25th conference on artificial intelligence","DOI":"10.1609\/aaai.v25i1.7839"},{"key":"9258_CR72","doi-asserted-by":"crossref","unstructured":"Park S, Lu S, Zhou Y (2009a) CTrigger: exposing atomicity violation bugs from their hiding places. In: Proceedings of the 14th international conference on architectural support for programming languages and operating systems, pp 25\u201336","DOI":"10.1145\/1508244.1508249"},{"key":"9258_CR73","doi-asserted-by":"crossref","unstructured":"Park S, Zhou Y, Xiong W, Yin Z, Kaushik R, Lee KH, Lu S (2009b) PRES: probabilistic replay with execution sketching on multiprocessors. In: Proceedings of the ACM SIGOPS 22nd symposium on operating systems principles, pp 177\u2013192","DOI":"10.1145\/1629575.1629593"},{"key":"9258_CR74","doi-asserted-by":"crossref","unstructured":"Payne C (2002) On the security of open source software. Inf Syst J 12(1):61\u201378","DOI":"10.1046\/j.1365-2575.2002.00118.x"},{"key":"9258_CR75","unstructured":"Philipp S, Juergen R, Philippe C (2008) Mining bug repositories\u2014a quality assessment. In: Proceedings of the 2008 international conference on computational intelligence for modelling control and automation"},{"key":"9258_CR76","doi-asserted-by":"crossref","unstructured":"Pighin M, Marzona A (2003) An empirical analysis of fault persistence through software releases. In: Proceedings of the international symposium on empirical software engineering, p 206","DOI":"10.1109\/ISESE.2003.1237979"},{"key":"9258_CR77","doi-asserted-by":"crossref","unstructured":"Podgurski A, Leon D, Francis P, Masri W, Minch M, Sun J, Wang B (2003) Automated support for classifying software failure reports. In: Proceedings of the 23th international conference on software engineering, pp 465\u2013475","DOI":"10.1109\/ICSE.2003.1201224"},{"key":"9258_CR78","unstructured":"Quinlan R (1993) C4.5: programs for machine learning. Morgan Kaufmann Publishers, San Mateo, CA"},{"key":"9258_CR79","doi-asserted-by":"crossref","unstructured":"Runeson P, Alexandersson M, Nyholm O (2007) Detection of duplicate defect reports using natural language processing. In: Proceedings of the 29th international conference on software engineering, pp 499\u2013510","DOI":"10.1109\/ICSE.2007.32"},{"key":"9258_CR80","doi-asserted-by":"crossref","unstructured":"Sahoo SK, Criswell J, Adve V (2010) An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: Proceedings of the 32nd ACM\/IEEE international conference on software engineering\u2014ICSE \u201910, vol\u00a01. ACM Press, p 485","DOI":"10.1145\/1806799.1806870"},{"issue":"4\u20135","key":"9258_CR81","doi-asserted-by":"crossref","first-page":"390","DOI":"10.1007\/s10664-011-9165-9","volume":"17","author":"Y Shin","year":"2012","unstructured":"Shin Y, Bell RM, Ostrand TJ, Weyuker EJ (2012) On the use of calling structure information to improve fault prediction. Empir Softw Eng 17(4\u20135):390\u2013423","journal-title":"Empir Softw Eng"},{"key":"9258_CR82","doi-asserted-by":"crossref","unstructured":"\u015aliwerski J, Zimmermann T, Zeller A (2005) When do changes induce fixes? In: MSR \u201905: Proceedings of the 2005 international workshop on mining software repositories, pp 1\u20135","DOI":"10.1145\/1083142.1083147"},{"key":"9258_CR83","doi-asserted-by":"crossref","unstructured":"Sullivan M, Chillarege R (1991) Software defects and their impact on system availability\u2014a study of field failures in operating systems. In: 21st int. symp. on fault-tolerant computing, pp 2\u20139","DOI":"10.1109\/FTCS.1991.146625"},{"key":"9258_CR84","doi-asserted-by":"crossref","unstructured":"Sullivan M, Chillarege R (1992) A comparison of software defects in database management systems and operating systems. In: 22nd annual international symposium on fault-tolerant computing, pp\u00a0475\u2013484","DOI":"10.1109\/FTCS.1992.243586"},{"key":"9258_CR85","doi-asserted-by":"crossref","unstructured":"Sun C, Lo D, Wang X, Jiang J, Khoo SC (2010) A discriminative model approach for accurate duplicate bug report retrieval. In: Proceedings of the 32nd ACM\/IEEE international conference on software engineering, pp 45\u201354","DOI":"10.1145\/1806799.1806811"},{"key":"9258_CR86","doi-asserted-by":"crossref","unstructured":"Swift MM, Bershad BN, Levy HM (2003) Improving the reliability of commodity operating systems. In: Proceedings of the ACM SIGOPS symposium on operating systems principles, pp 207\u2013222","DOI":"10.1145\/1165389.945466"},{"key":"9258_CR87","unstructured":"Syed A, Franz W (2010) Impact analysis of scrs using single and multi-label machine learning classification. In: Proceedings of the 2010 ACM-IEEE international symposium on empirical software engineering and measurement"},{"key":"9258_CR88","doi-asserted-by":"crossref","unstructured":"Tan L, Yuan D, Krishna G, Zhou Y (2007) \/* iComment: bugs or bad comments? *\/. In: Proceedings of the 21st ACM symposium on operating systems principles","DOI":"10.1145\/1294261.1294276"},{"key":"9258_CR89","doi-asserted-by":"crossref","unstructured":"Tan L, Zhou Y, Padioleau Y (2011) aComment: mining annotations from comments and code to detect interrupt-related concurrency bugs. In: Proceedings of the 33rd international conference on software engineering","DOI":"10.1145\/1985793.1985796"},{"key":"9258_CR90","unstructured":"Tang Y, Tang Y, Gao Q, Gao Q, Qin F, Qin F (2008) LeakSurvivor: towards safely tolerating memory leaks for garbage-collected languages. In: USENIX 2008 annual technical conference on annual technical conference, pp 307\u2013320"},{"key":"9258_CR91","unstructured":"Tian Y, Lawall J, Lo D (2008) Identifying linux bug fixing patches. In: Proceedings of the international conference on software engineering"},{"key":"9258_CR92","doi-asserted-by":"crossref","unstructured":"Wang X, Zhang L, Xie T, Anvik J, Sun J (2008) An approach to detecting duplicate bug reports using natural language and execution information. In: Proceedings of the 30th international conference on software engineering, pp 461\u2013470","DOI":"10.1145\/1368088.1368151"},{"issue":"3","key":"9258_CR93","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1007\/s10664-009-9111-2","volume":"15","author":"EJ Weyuker","year":"2010","unstructured":"Weyuker EJ, Ostrand TJ, Bell RM (2010) Comparing the effectiveness of several modeling methods for fault prediction. Empir Softw Eng 15(3):277\u2013295","journal-title":"Empir Softw Eng"},{"key":"9258_CR94","doi-asserted-by":"crossref","unstructured":"Wu R, Zhang H, Kim S, Cheung SC (2011) ReLink: recovering links between bugs and changes. In: Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on foundations of software engineering, pp 15\u201325","DOI":"10.1145\/2025113.2025120"},{"key":"9258_CR95","doi-asserted-by":"crossref","unstructured":"Yin Z, Yuan D, Zhou Y, Pasupathy S, Bairavasundaram L (2011) How do fixes become bugs? In: Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on foundations of software engineering, pp 26\u201336","DOI":"10.1145\/2025113.2025121"},{"issue":"9","key":"9258_CR96","doi-asserted-by":"crossref","first-page":"574","DOI":"10.1109\/TSE.2004.52","volume":"30","author":"ATT Ying","year":"2004","unstructured":"Ying ATT, Murphy GC, Ng RT, Chu-Carroll M (2004) Predicting source code changes by mining change history. IEEE Trans Softw Eng 30(9):574\u2013586","journal-title":"IEEE Trans Softw Eng"},{"key":"9258_CR97","doi-asserted-by":"crossref","unstructured":"Zaman S, Adams B, Hassan AE (2011) Security versus performance bugs: a case study on firefox. In: Proceedings of the 8th working conference on mining software repositories, pp 93\u2013102","DOI":"10.1145\/1985441.1985457"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-013-9258-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-013-9258-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-013-9258-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,2]],"date-time":"2023-07-02T07:01:34Z","timestamp":1688281294000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-013-9258-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,7]]},"references-count":97,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["9258"],"URL":"https:\/\/doi.org\/10.1007\/s10664-013-9258-8","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,6,7]]}}}