{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T01:59:35Z","timestamp":1760061575313,"version":"3.37.3"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,5,7]],"date-time":"2016-05-07T00:00:00Z","timestamp":1462579200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,5,7]],"date-time":"2016-05-07T00:00:00Z","timestamp":1462579200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100003621","name":"Ministry of Science, ICT and Future Planning","doi-asserted-by":"publisher","award":["R0126-15-1101"],"award-info":[{"award-number":["R0126-15-1101"]}],"id":[{"id":"10.13039\/501100003621","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000143","name":"A Funder not found in FundRef","doi-asserted-by":"publisher","award":["CCF-1149391"],"award-info":[{"award-number":["CCF-1149391"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"A Funder not found in FundRef","doi-asserted-by":"publisher","award":["CNS-1239498"],"award-info":[{"award-number":["CNS-1239498"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","award":["Google Faculty Award"],"award-info":[{"award-number":["Google Faculty Award"]}],"id":[{"id":"10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2017,2]]},"DOI":"10.1007\/s10664-016-9432-x","type":"journal-article","created":{"date-parts":[[2016,5,7]],"date-time":"2016-05-07T12:53:54Z","timestamp":1462625634000},"page":"436-473","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["An empirical study of supplementary patches in open source projects"],"prefix":"10.1007","volume":"22","author":[{"given":"Jihun","family":"Park","sequence":"first","affiliation":[]},{"given":"Miryung","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Doo-Hwan","family":"Bae","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,7]]},"reference":[{"key":"9432_CR1","unstructured":"An L, Khomh F, Adams B (2014) Supplementary bug fixes vs. re-opened bugs. In: 2014 IEEE 14th international working conference on source code analysis and manipulation (SCAM). IEEE, pp 205\u2013214"},{"key":"9432_CR2","doi-asserted-by":"publisher","unstructured":"Andersen J, Lawall J (2008) Generic patch inference. In: ASE \u201908: Proceedings of the 23rd IEEE\/ACM international conference on automated software engineering. IEEE Computer Society, Washington, DC, pp 337\u2013346. doi:\n                    10.1109\/ASE.2008.44","DOI":"10.1109\/ASE.2008.44"},{"key":"9432_CR3","doi-asserted-by":"crossref","unstructured":"Barnett M, Bird C, Brunet J, Lahiri S K (2015) Helping developers help themselves: automatic decomposition of code review changesets. In: 2015 IEEE\/ACM 37th IEEE international conference on software engineering (ICSE), vol 1. IEEE, pp 134\u2013144","DOI":"10.1109\/ICSE.2015.35"},{"issue":"6","key":"9432_CR4","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1016\/j.scico.2010.11.010","volume":"77","author":"N Bettenburg","year":"2012","unstructured":"Bettenburg N, Shang W, Ibrahim W M, Adams B, Zou Y, Hassan A E (2012) An empirical study on inconsistent changes to code clones at the release level. Sci Comput Program 77(6):760\u2013776","journal-title":"Sci Comput Program"},{"key":"9432_CR5","doi-asserted-by":"publisher","unstructured":"Bird C, Bachmann A, Aune E, Duffy J, Bernstein A, Filkov V, Devanbu P (2009) Fair and balanced?: bias in bug-fix datasets. In: ESEC\/FSE \u201909: Proceedings of the the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on the foundations of software engineering. ACM, New York, pp 121\u2013130. doi:\n                    10.1145\/1595696.1595716","DOI":"10.1145\/1595696.1595716"},{"key":"9432_CR6","unstructured":"Cliff N (1996) Ordinal methods for behavioral data analysis. Routledge, Evanston"},{"key":"9432_CR7","unstructured":"\u010cubrani\u0107 D, Murphy GC (2003) Hipikat: recommending pertinent software development artifacts. In: Proceedings of the 25th international conference on software engineering. IEEE Computer Society, Washington, DC, ICSE \u201903, pp 408\u2013418. \n                    http:\/\/portal.acm.org\/citation.cfm?id=776816.776866"},{"key":"9432_CR8","doi-asserted-by":"publisher","unstructured":"Duala-Ekoko E, Robillard MP (2007) Tracking code clones in evolving software. In: ICSE \u201907: Proceedings of the 29th international conference on software engineering. IEEE Computer Society, Washington, DC, pp 158\u2013167. doi:\n                    10.1109\/ICSE.2007.90","DOI":"10.1109\/ICSE.2007.90"},{"key":"9432_CR9","unstructured":"Eyolfson J, Tan L, Lam P (2011) Do time of day and developer experience affect commit bugginess? In: Proceedings of the 8th working conference on mining software repositories. ACM, pp 153\u2013162"},{"key":"9432_CR10","doi-asserted-by":"crossref","unstructured":"Fischer M, Pinzger M, Gall H (2003) Populating a release history database from version control and bug tracking systems. In: ICSM \u201903: Proceedings of the international conference on software maintenance. IEEE Computer Society, Washington, DC, p 23","DOI":"10.1109\/ICSM.2003.1235403"},{"key":"9432_CR11","doi-asserted-by":"publisher","unstructured":"Fry ZP, Weimer W (2010) A human study of fault localization accuracy. In: ICSM \u201910: Proceedings of the 2010 IEEE international conference on software maintenance. IEEE Computer Society, Washington, DC, pp 1\u201310. doi:\n                    10.1109\/ICSM.2010.5609691","DOI":"10.1109\/ICSM.2010.5609691"},{"key":"9432_CR12","unstructured":"Gamma E, Helm R, Johnson R, Vlissides JM (1994) Design patterns: elements of reusable object-oriented software. Addison-Wesley Professional"},{"key":"9432_CR13","doi-asserted-by":"publisher","unstructured":"G\u00f6rg C, Wei\u00dfgerber P (2005) Error detection by refactoring reconstruction. In: MSR \u201905: Proceedings of the 2005 international workshop on mining software repositories. ACM Press, New York, pp 1\u20135. doi:\n                    10.1145\/1083142.1083148","DOI":"10.1145\/1083142.1083148"},{"key":"9432_CR14","unstructured":"Grissom RJ, Kim JJ (2005) Effect sizes for research: a broad practical approach. Lawrence Erlbaum Associates Publishers"},{"key":"9432_CR15","doi-asserted-by":"publisher","unstructured":"Gu Z, Barr E, Hamilton D, Su Z (2010) Has the bug really been fixed? In: 2010 ACM\/IEEE 32nd international conference on software engineering, vol 1, pp 55\u201364. doi:\n                    10.1145\/1806799.1806812","DOI":"10.1145\/1806799.1806812"},{"key":"9432_CR16","doi-asserted-by":"publisher","unstructured":"Hassan AE (2009) Predicting faults using the complexity of code changes. In: ICSE \u201909: Proceedings of the 31st international conference on software engineering, IEEE Computer Society, Washington, DC, pp 78\u201388. doi:\n                    10.1109\/ICSE.2009.5070510","DOI":"10.1109\/ICSE.2009.5070510"},{"key":"9432_CR17","doi-asserted-by":"publisher","unstructured":"Hassan AE, Holt RC (2004) Predicting change propagation in software systems. In: ICSM \u201904: Proceedings of the 20th IEEE international conference on software maintenance. IEEE Computer Society, Washington, DC, pp 284\u2013293. doi:\n                    10.1109\/ICSM.2004.1357812","DOI":"10.1109\/ICSM.2004.1357812"},{"key":"9432_CR18","doi-asserted-by":"crossref","unstructured":"Herzig K, Zeller A (2013) The impact of tangled code changes. In: 2013 10th IEEE working conference on mining software repositories (MSR). IEEE, pp 121\u2013130","DOI":"10.1109\/MSR.2013.6624018"},{"key":"9432_CR19","doi-asserted-by":"crossref","unstructured":"Herzig K, Just S, Zeller A (2013) It\u2019s not a bug, it\u2019s a feature: how misclassification impacts bug prediction. In: Proceedings of the 2013 international conference on software engineering. IEEE Press, pp 392\u2013401","DOI":"10.1109\/ICSE.2013.6606585"},{"key":"9432_CR20","doi-asserted-by":"crossref","unstructured":"Hooimeijer P, Weimer W (2007) Modeling bug report quality. In: Proceedings of the twenty-second IEEE\/ACM international conference on automated software engineering. ACM, pp 34\u201343","DOI":"10.1145\/1321631.1321639"},{"key":"9432_CR21","doi-asserted-by":"publisher","unstructured":"Jiang L, Misherghi G, Su Z, Glondu S (2007) Deckard: scalable and accurate tree-based detection of code clones. In: Proceedings of the 29th international conference on software engineering. IEEE Computer Society, Washington, DC, ICSE \u201907, pp 96\u2013105. doi:\n                    10.1109\/ICSE.2007.30","DOI":"10.1109\/ICSE.2007.30"},{"issue":"7","key":"9432_CR22","doi-asserted-by":"publisher","first-page":"654","DOI":"10.1109\/TSE.2002.1019480","volume":"28","author":"T Kamiya","year":"2002","unstructured":"Kamiya T, Kusumoto S, Inoue K (2002) CCFinder: a multilinguistic token-based code clone detection system for large scale source code. IEEE Trans Softw Eng 28 (7):654\u2013670. doi:\n                    10.1109\/TSE.2002.1019480","journal-title":"IEEE Trans Softw Eng"},{"key":"9432_CR23","doi-asserted-by":"publisher","unstructured":"Kim M, Notkin D (2009) Discovering and representing systematic code changes. In: ICSE \u201909: Proceedings of the 2009 IEEE 31st international conference on software engineering. IEEE Computer Society, Washington, DC, pp 309\u2013319. doi:\n                    10.1109\/ICSE.2009.5070531","DOI":"10.1109\/ICSE.2009.5070531"},{"issue":"2","key":"9432_CR24","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1109\/TSE.2007.70773","volume":"34","author":"S Kim","year":"2008","unstructured":"Kim S, Whitehead EJ Jr, Zhang Y (2008) Classifying software changes: clean or buggy? IEEE Trans Softw Eng 34(2):181\u2013196. doi:\n                    10.1109\/TSE.2007.70773","journal-title":"IEEE Trans Softw Eng"},{"key":"9432_CR25","doi-asserted-by":"publisher","unstructured":"Kim M, Sinha S, Go Andrg C, Shah H, Harrold M, Nanda M (2010) Automated bug neighborhood analysis for identifying incomplete bug fixes. In: ICST \u201910: Proceedings of the third international conference on software testing, verification and validation. IEEE Computer Society, Washington, DC, pp 383\u2013392. doi:\n                    10.1109\/ICST.2010.63","DOI":"10.1109\/ICST.2010.63"},{"key":"9432_CR26","doi-asserted-by":"publisher","unstructured":"Kim M, Cai D, Kim S (2011) An empirical investigation into the role of refactorings during software evolution. In: ICSE\u2019 11: Proceedings of the 2011 ACM and IEEE 33rd international conference on software engineering. ACM, New York, pp 151\u2013160. doi:\n                    10.1145\/1985793.1985815","DOI":"10.1145\/1985793.1985815"},{"key":"9432_CR27","doi-asserted-by":"publisher","unstructured":"Loh A, Kim M (2010) Lsdiff: a program differencing tool to identify systematic structural differences. In: Proceedings of the 32nd ACM\/IEEE international conference on software engineering\u2014volume 2. ACM, New York, ICSE \u201910, pp 263\u2013266. doi:\n                    10.1145\/1810295.1810348","DOI":"10.1145\/1810295.1810348"},{"key":"9432_CR28","doi-asserted-by":"crossref","unstructured":"Meng N, Kim M, McKinley KS (2011) Systematic editing: generating program transformations from an example. In: Proceedings of the 32nd ACM SIGPLAN conference on programming language design and implementation. ACM, New York, PLDI \u201911, pp 329\u2013342. \n                    http:\/\/doi.acm.org\/10.1145\/1993498.1993537","DOI":"10.1145\/1993498.1993537"},{"key":"9432_CR29","doi-asserted-by":"crossref","unstructured":"Meng N, Kim M, McKinley KS (2013) Lase: locating and applying systematic edits by learning from examples. In: Proceedings of the 2013 international conference on software engineering. IEEE Press, Piscataway, ICSE \u201913, pp 502\u2013511. \n                    http:\/\/dl.acm.org\/citation.cfm?id=2486788.2486855","DOI":"10.1109\/ICSE.2013.6606596"},{"key":"9432_CR30","doi-asserted-by":"publisher","unstructured":"Mockus A, Votta LG (2000) Identifying reasons for software changes using historic databases. In: ICSM \u201900: Proceedings of the international conference on software maintenance. IEEE Computer Society, Washington, DC, pp 120\u2013130. doi:\n                    10.1109\/ICSM.2000.883028","DOI":"10.1109\/ICSM.2000.883028"},{"issue":"2","key":"9432_CR31","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1002\/bltj.2229","volume":"5","author":"A Mockus","year":"2000","unstructured":"Mockus A, Weiss DM (2000) Predicting risk of software changes. Bell Labs Tech J 5(2):169\u2013180","journal-title":"Bell Labs Tech J"},{"key":"9432_CR32","doi-asserted-by":"publisher","unstructured":"Nagappan N, Zeller A, Zimmermann T, Herzig K, Murphy B (2010) Change bursts as defect predictors. In: Proceedings of the 2010 IEEE 21st international symposium on software reliability engineering. IEEE Computer Society, Washington, DC, ISSRE \u201910, pp 309\u2013318. doi:\n                    10.1109\/ISSRE.2010.25","DOI":"10.1109\/ISSRE.2010.25"},{"key":"9432_CR33","doi-asserted-by":"publisher","unstructured":"Nguyen TT, Nguyen HA, Pham NH, Al-Kofahi JM, Nguyen TN (2009) Clone-aware configuration management. In: ASE \u201909: Proceedings of the 2009 IEEE\/ACM international conference on automated software engineering. IEEE Computer Society, Washington, DC, pp 123\u2013134. doi:\n                    10.1109\/ASE.2009.90","DOI":"10.1109\/ASE.2009.90"},{"key":"9432_CR34","doi-asserted-by":"publisher","unstructured":"Nguyen TT, Nguyen HA, Pham NH, Al-Kofahi J, Nguyen TN (2010) Recurring bug fixes in object-oriented programs. In: ICSE \u201910: Proceedings of the 32nd ACM\/IEEE international conference on software engineering. ACM, New York, pp 315\u2013324. doi:\n                    10.1145\/1806799.1806847","DOI":"10.1145\/1806799.1806847"},{"key":"9432_CR35","doi-asserted-by":"publisher","unstructured":"Padioleau Y, Lawall J, Hansen RR, Muller G (2008) Documenting and automating collateral evolutions in linux device drivers. In: Eurosys \u201908: Proceedings of the 3rd ACM SIGOPS\/EuroSys European conference on computer systems 2008. ACM, New York, pp 247\u2013260. doi:\n                    10.1145\/1352592.1352618","DOI":"10.1145\/1352592.1352618"},{"key":"9432_CR36","doi-asserted-by":"publisher","unstructured":"Park J, Kim M, Ray B, Bae DH (2012) An empirical study of supplementary bug fixes. In: MSR \u201912: 9th IEEE working conference on mining software repositories. IEEE Computer Society, Washington, DC, pp 40\u201349. doi:\n                    10.1109\/MSR.2012.6224298","DOI":"10.1109\/MSR.2012.6224298"},{"key":"9432_CR37","doi-asserted-by":"crossref","unstructured":"Park J, Kim M, Bae DH (2014) An empirical study on reducing omission errors in practice. In: Proceedings of the 29th ACM\/IEEE international conference on automated software engineering. ACM, pp 121\u2013126","DOI":"10.1145\/2642937.2642956"},{"key":"9432_CR38","doi-asserted-by":"publisher","unstructured":"Pham NH, Nguyen HA, Nguyen TT, Al-Kofahi JM, Nguyen TN (2009) Complete and accurate clone detection in graph-based models. In: Proceedings of the 31st international conference on software engineering. IEEE Computer Society, Washington, DC, ICSE \u201909, pp 276\u2013286. doi:\n                    10.1109\/ICSE.2009.5070528","DOI":"10.1109\/ICSE.2009.5070528"},{"issue":"6","key":"9432_CR39","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1109\/TSE.2005.74","volume":"31","author":"R Purushothaman","year":"2005","unstructured":"Purushothaman R, Perry DE (2005) Toward understanding the rhetoric of small source code changes. IEEE Trans Softw Eng 31(6):511\u2013526. doi:\n                    10.1109\/TSE.2005.74","journal-title":"IEEE Trans Softw Eng"},{"key":"9432_CR40","doi-asserted-by":"crossref","unstructured":"Rahman F, Devanbu P (2011) Ownership, experience and defects: a fine-grained study of authorship. In: Proceedings of the 33rd international conference on software engineering. ACM, pp 491\u2013500","DOI":"10.1145\/1985793.1985860"},{"issue":"4\u20135","key":"9432_CR41","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1007\/s10664-011-9195-3","volume":"17","author":"F Rahman","year":"2012","unstructured":"Rahman F, Bird C, Devanbu P (2012) Clones: what is that smell? Empir Softw Eng 17(4\u20135):503\u2013530","journal-title":"Empir Softw Eng"},{"key":"9432_CR42","doi-asserted-by":"crossref","unstructured":"Ray B, Kim M (2012a) A case study of cross-system porting in forked projects. In: Proceedings of the ACM SIGSOFT 20th international symposium on the foundations of software engineering. ACM, p 53","DOI":"10.1145\/2393596.2393659"},{"key":"9432_CR43","doi-asserted-by":"publisher","unstructured":"Ray B, Kim M (2012b) A case study of cross-system porting in forked projects. In: Proceedings of the ACM SIGSOFT 20th international symposium on the foundations of software engineering. ACM, New York, FSE \u201912, pp 53:1\u201353:11. doi:\n                    10.1145\/2393596.2393659","DOI":"10.1145\/2393596.2393659"},{"key":"9432_CR44","doi-asserted-by":"publisher","unstructured":"Robillard MP (2005) Automatic generation of suggestions for program investigation. In: ESEC\/FSE-13: Proceedings of the 10th European software engineering conference held jointly with 13th ACM SIGSOFT international symposium on foundations of software engineering. ACM, New York, pp 11\u201320. doi:\n                    10.1145\/1081706.1081711","DOI":"10.1145\/1081706.1081711"},{"issue":"4","key":"9432_CR45","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon CE (1949) Communication theory of secrecy systems*. Bell Syst Tech J 28(4):656\u2013715","journal-title":"Bell Syst Tech J"},{"issue":"5","key":"9432_CR46","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1007\/s10664-012-9228-6","volume":"18","author":"E Shihab","year":"2013","unstructured":"Shihab E, Ihara A, Kamei Y, Ibrahim WM, Ohira M, Adams B, Hassan AE, Ki M (2013) Studying re-opened bugs in open source software. Empir Softw Eng 18(5):1005\u20131042","journal-title":"Empir Softw Eng"},{"key":"9432_CR47","doi-asserted-by":"crossref","unstructured":"Tao Y, Kim S (2015) Partitioning composite code changes to facilitate code review. In: 2015 IEEE\/ACM 12th working conference on mining software repositories (MSR). IEEE, pp 180\u2013190","DOI":"10.1109\/MSR.2015.24"},{"issue":"5","key":"9432_CR48","first-page":"360","volume":"37","author":"AJ Viera","year":"2005","unstructured":"Viera AJ, Garrett JM, et al. (2005) Understanding interobserver agreement: the kappa statistic. Fam Med 37(5):360\u2013363","journal-title":"Fam Med"},{"key":"9432_CR49","doi-asserted-by":"publisher","unstructured":"Wang X, Lo D, Cheng J, Zhang L, Mei H, Yu JX (2010) Matching dependence-related queries in the system dependence graph. In: ASE \u201910: Proceedings of the IEEE\/ACM international conference on Automated software engineering. ACM, New York, ASE \u201910, pp 457\u2013466. doi:\n                    10.1145\/1858996.1859091","DOI":"10.1145\/1858996.1859091"},{"key":"9432_CR50","doi-asserted-by":"publisher","unstructured":"Yin Z, Yuan D, Zhou Y, Pasupathy S, Bairavasundaram L (2011) How do fixes become bugs? In: ESEC\/FSE \u201911: Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on Foundations of software engineering. ACM, New York. doi:\n                    10.1145\/2025113.2025121","DOI":"10.1145\/2025113.2025121"},{"issue":"9","key":"9432_CR51","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1109\/TSE.2004.52","volume":"30","author":"ATT Ying","year":"2004","unstructured":"Ying A TT, Murphy GC, Ng R, Chu-Carroll M (2004) Predicting source code changes by mining change history. IEEE Trans Softw Eng 30(9):574\u2013586","journal-title":"IEEE Trans Softw Eng"},{"key":"9432_CR52","doi-asserted-by":"publisher","unstructured":"Zhang X, Tallam S, Gupta N, Gupta R (2007) Towards locating execution omission errors. In: PLDI \u201907: Proceedings of the 2007 ACM SIGPLAN conference on programming language design and implementation. ACM, New York, pp 415\u2013424. doi:\n                    10.1145\/1250734.1250782","DOI":"10.1145\/1250734.1250782"},{"key":"9432_CR53","doi-asserted-by":"publisher","unstructured":"Zimmermann T, Weisgerber P, Diehl S, Zeller A (2004) Mining version histories to guide software changes. In: ICSE \u201904: Proceedings of the 26th international conference on software engineering. IEEE Computer Society, Washington, DC, pp 563\u2013572. doi:\n                    10.1109\/ICSE.2004.1317478","DOI":"10.1109\/ICSE.2004.1317478"},{"issue":"6","key":"9432_CR54","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1109\/TSE.2005.72","volume":"31","author":"T Zimmermann","year":"2005","unstructured":"Zimmermann T, Wei\u00dfgerber P, Diehl S, Zeller A (2005) Mining version histories to guide software changes. IEEE Trans Softw Eng 31(6):429\u2013445. doi:\n                    10.1109\/TSE.2005.72","journal-title":"IEEE Trans Softw Eng"},{"issue":"5","key":"9432_CR55","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1109\/TSE.2010.63","volume":"36","author":"T Zimmermann","year":"2010","unstructured":"Zimmermann T, Premraj R, Bettenburg N, Just S, Schroter A, Weiss C (2010) What makes a good bug report? IEEE Trans Softw Eng 36(5):618\u2013643","journal-title":"IEEE Trans Softw Eng"},{"key":"9432_CR56","doi-asserted-by":"crossref","unstructured":"Zimmermann T, Nagappan N, Guo PJ, Murphy B (2012) Characterizing and predicting which bugs get reopened. In: 2012 34th international conference on software engineering (ICSE). IEEE, pp 1074\u20131083","DOI":"10.1109\/ICSE.2012.6227112"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-016-9432-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-016-9432-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-016-9432-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-016-9432-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,17]],"date-time":"2020-05-17T15:04:52Z","timestamp":1589727892000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-016-9432-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,7]]},"references-count":56,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,2]]}},"alternative-id":["9432"],"URL":"https:\/\/doi.org\/10.1007\/s10664-016-9432-x","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"type":"print","value":"1382-3256"},{"type":"electronic","value":"1573-7616"}],"subject":[],"published":{"date-parts":[[2016,5,7]]},"assertion":[{"value":"7 May 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}