{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T04:12:36Z","timestamp":1773375156300,"version":"3.50.1"},"reference-count":86,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2019,2,5]],"date-time":"2019-02-05T00:00:00Z","timestamp":1549324800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,2,5]],"date-time":"2019-02-05T00:00:00Z","timestamp":1549324800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000143","name":"Division of Computing and Communication Foundations","doi-asserted-by":"publisher","award":["1439957"],"award-info":[{"award-number":["1439957"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000143","name":"Division of Computing and Communication Foundations","doi-asserted-by":"publisher","award":["1553741"],"award-info":[{"award-number":["1553741"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000143","name":"Division of Computing and Communication Foundations","doi-asserted-by":"publisher","award":["1560526"],"award-info":[{"award-number":["1560526"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000145","name":"Division of Information and Intelligent Systems","doi-asserted-by":"publisher","award":["1559657"],"award-info":[{"award-number":["1559657"]}],"id":[{"id":"10.13039\/100000145","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1007\/s10664-018-9674-x","type":"journal-article","created":{"date-parts":[[2019,2,5]],"date-time":"2019-02-05T09:04:08Z","timestamp":1549357448000},"page":"2863-2906","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["The life-cycle of merge conflicts: processes, barriers, and strategies"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6365-7152","authenticated-orcid":false,"given":"Nicholas","family":"Nelson","sequence":"first","affiliation":[]},{"given":"Caius","family":"Brindescu","sequence":"additional","affiliation":[]},{"given":"Shane","family":"McKee","sequence":"additional","affiliation":[]},{"given":"Anita","family":"Sarma","sequence":"additional","affiliation":[]},{"given":"Danny","family":"Dig","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,5]]},"reference":[{"issue":"4","key":"9674_CR1","doi-asserted-by":"publisher","first-page":"2051","DOI":"10.1007\/s10664-017-9586-1","volume":"23","author":"P Accioly","year":"2018","unstructured":"Accioly P, Borba P, Cavalcanti G (2018a) Understanding semi-structured merge conflict characteristics in open-source Java projects. Empir Softw Eng 23(4):2051\u20132085","journal-title":"Empir Softw Eng"},{"key":"9674_CR2","doi-asserted-by":"crossref","unstructured":"Accioly P, Borba P, Silva L, Cavalcanti G (2018b) Analyzing conflict predictors in open-source Java projects. In: Proceedings of the 15th international conference on mining software repositories (MSR). ACM, pp 576\u2013586","DOI":"10.1145\/3196398.3196437"},{"key":"9674_CR3","doi-asserted-by":"crossref","unstructured":"Apel S, Liebig J, Brandl B, Lengauer C, K\u00e4stner C (2011) Semistructured merge: rethinking merge in revision control systems. In: Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on foundations of software engineering (ESEC\/FSE). ACM, pp 190\u2013200","DOI":"10.1145\/2025113.2025141"},{"key":"9674_CR4","doi-asserted-by":"crossref","unstructured":"Apel S, Lessenich O, Lengauer C (2012) Structured merge with auto-tuning: balancing precision and performance. In: Proceedings of the 27th IEEE\/ACM international conference on automated software engineering (ASE). ACM, pp 120\u2013129","DOI":"10.1145\/2351676.2351694"},{"issue":"1","key":"9674_CR5","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1023\/A:1021764731148","volume":"8","author":"S Beecham","year":"2003","unstructured":"Beecham S, Hall T, Rainer A (2003) Software process improvement problems in twelve software companies: an empirical analysis. Empir Softw Eng 8(1):7\u201342","journal-title":"Empir Softw Eng"},{"key":"9674_CR6","doi-asserted-by":"crossref","unstructured":"Begole JB, Tang JC, Smith RB, Yankelovich N (2002) Work rhythms: analyzing visualizations of awareness histories of distributed groups. In: Proceedings of the 2002 ACM conference on computer supported cooperative work (CSCW). ACM, pp 334\u2013343","DOI":"10.1145\/587078.587125"},{"key":"9674_CR7","unstructured":"Beizer B (1984) Software system testing and quality assurance. Van Nostrand Reinhold Co."},{"key":"9674_CR8","doi-asserted-by":"crossref","unstructured":"Biehl JT, Czerwinski M, Smith G, Robertson GG (2007) FASTDash: a visual dashboard for fostering awareness in software teams. In: Proceedings of the SIGCHI conference on human factors in computing systems (CHI). ACM, pp 1313\u20131322","DOI":"10.1145\/1240624.1240823"},{"issue":"1","key":"9674_CR9","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/201055.201056","volume":"4","author":"D Binkley","year":"1995","unstructured":"Binkley D, Horwitz S, Reps T (1995) Program integration for languages with procedure calls. ACM Trans Softw Eng Methodol (TOSEM) 4(1):3\u201335","journal-title":"ACM Trans Softw Eng Methodol (TOSEM)"},{"key":"9674_CR10","doi-asserted-by":"crossref","unstructured":"Bird C, Zimmermann T (2012) Assessing the value of branches with what-if analysis. In: International symposium on the foundations of software engineering (FSE), p 45","DOI":"10.1145\/2393596.2393648"},{"key":"9674_CR11","doi-asserted-by":"crossref","unstructured":"Blackwell A, Burnett M (2002) Applying attention investment to end-user programming. In: Symposia on human-centric computing languages and environments (HCC), pp 28\u201330","DOI":"10.1109\/HCC.2002.1046337"},{"key":"9674_CR12","doi-asserted-by":"crossref","unstructured":"Borg M, Al\u0117groth E, Runeson P, 2017 Software engineers\u2019 information seeking behavior in change impact analysis: an interview study. In: The 25th IEEE international conference on program comprehension (ICPC). IEEE, pp 12\u201322","DOI":"10.1109\/ICPC.2017.20"},{"key":"9674_CR13","unstructured":"Bradley AW, Murphy GC (2011) Supporting software history exploration. In: Working conference on mining software repositories (MSR), pp 193\u2013202"},{"key":"9674_CR14","unstructured":"Brindescu C, Codoban M, Shmarkatiuk S, Dig D (2014) How do centralized and distributed version control systems impact software changes? In: Proceedings of the 36th international conference on software engineering (ICSE). ACM, pp 322\u2013333"},{"issue":"12","key":"9674_CR15","first-page":"44","volume":"20","author":"FP Brooks","year":"1974","unstructured":"Brooks FP (1974) Mythical man-month. Datamation 20(12):44\u201352","journal-title":"Datamation"},{"key":"9674_CR16","doi-asserted-by":"crossref","unstructured":"Brun Y, Holmes R, Ernst MD, Notkin D (2011) Proactive detection of collaboration conflicts. In: International symposium and European conference on foundations of software engineering (ESEC\/FSE), pp 168\u2013178","DOI":"10.1145\/2025113.2025139"},{"issue":"3","key":"9674_CR17","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1177\/0049124113500475","volume":"42","author":"JL Campbell","year":"2013","unstructured":"Campbell JL, Quincy C, Osserman J, Pedersen OK (2013) Coding in-depth semistructured interviews: Problems of unitization and intercoder reliability and agreement. Sociol Methods Res 42(3):294\u2013320","journal-title":"Sociol Methods Res"},{"key":"9674_CR18","doi-asserted-by":"crossref","unstructured":"Cataldo M, Herbsleb JD (2008) Communication networks in geographically distributed software development. In: ACM Conference on computer supported cooperative work & social computing (CSCW), pp 579\u2013588","DOI":"10.1145\/1460563.1460654"},{"key":"9674_CR19","doi-asserted-by":"crossref","unstructured":"Codoban M, Ragavan SS, Dig D, Bailey B (2015) Software history under the lens: a study on why and how developers examine it. In: International conference on software maintenance and evolution (ICSME), pp 1\u201310","DOI":"10.1109\/ICSM.2015.7332446"},{"key":"9674_CR20","doi-asserted-by":"crossref","unstructured":"Convertino G, Chen J, Yost B, Ryu YS, North C (2003) Exploring context switching and cognition in dual-view coordinated visualizations. In: International conference on coordinated and multiple views in exploratory visualization (CMV), pp 55\u201362","DOI":"10.1109\/CMV.2003.1215003"},{"key":"9674_CR21","doi-asserted-by":"crossref","unstructured":"Cort\u00e9s-Coy LF, V\u00e1squez ML, Aponte J, Poshyvanyk D (2014) On automatically generating commit messages via summarization of source code changes. In: International working conference on source code analysis and manipulation (SCAM), pp 275\u2013284","DOI":"10.1109\/SCAM.2014.14"},{"key":"9674_CR22","doi-asserted-by":"crossref","unstructured":"Costa C, Figueiredo J, Murta L, Sarma A (2016) TIPMerge: recommending experts for integrating changes across branches. In: International symposium on foundations of software engineering (FSE), pp 523\u2013 534","DOI":"10.1145\/2950290.2950339"},{"key":"9674_CR23","doi-asserted-by":"crossref","unstructured":"Czerwinski M, Horvitz E, Wilhite S (2004) A diary study of task switching and interruptions. In: SIGCHI conference on human factors in computing systems (CHI), pp 175\u2013182","DOI":"10.1145\/985692.985715"},{"key":"9674_CR24","doi-asserted-by":"crossref","unstructured":"da Silva IA, Chen PH, Van der Westhuizen C, Ripley RM, van der Hoek A (2006) Lighthouse: coordination through emerging design. In: Proceedings of the 2006 OOPSLA workshop on eclipse technology eXchange. ACM, pp 11\u201315","DOI":"10.1145\/1188835.1188838"},{"key":"9674_CR25","unstructured":"da Silva JR, Clua E, Murta L, Sarma A (2015) Niche vs. breadth: calculating expertise over time through a fine-grained analysis. In: International conference on software analysis, evolution and reengineering (SANER), pp 409\u2013418"},{"key":"9674_CR26","doi-asserted-by":"crossref","unstructured":"de Mello RM, Travassos GH (2016) Surveys in software engineering: identifying representative samples. In: Proceedings of the 10th ACM\/IEEE international symposium on empirical software engineering and measurement, ESEM \u201916. ACM, pp 55:1\u201355:6","DOI":"10.1145\/2961111.2962632"},{"key":"9674_CR27","doi-asserted-by":"crossref","unstructured":"de Souza CR, Redmiles D, Dourish P (2003) Breaking the code, moving between private and public work in collaborative software development. In: International conference on supporting group work (GROUP), pp 105\u2013114","DOI":"10.1145\/958160.958177"},{"key":"9674_CR28","unstructured":"de Souza CRB, Redmiles DF (2008) An empirical study of software developers\u2019 management of dependencies and changes. In: International conference on software engineering (ICSE), pp 241\u2013250"},{"issue":"3","key":"9674_CR29","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1109\/TSE.2008.29","volume":"34","author":"D Dig","year":"2008","unstructured":"Dig D, Manzoor K, Johnson RE, Nguyen TN (2008) Effective software merging in the presence of object-oriented refactorings. IEEE Trans Softw Eng (TSE) 34(3):321\u2013335","journal-title":"IEEE Trans Softw Eng (TSE)"},{"key":"9674_CR30","doi-asserted-by":"crossref","unstructured":"Easterbrook S, Singer J, Storey MA, Damian D (2008) Selecting empirical methods for software engineering research. In: Guide to advanced empirical software engineering. Springer, pp 285\u2013311","DOI":"10.1007\/978-1-84800-044-5_11"},{"key":"9674_CR31","doi-asserted-by":"crossref","unstructured":"Estler HC, Nordio M, Furia CA, Meyer B (2013) Unifying configuration management with merge conflict detection and awareness systems. In: Proceedings of the 22nd Australian software engineering conference (ASWEC), pp 201\u2013210","DOI":"10.1109\/ASWEC.2013.32"},{"key":"9674_CR32","doi-asserted-by":"crossref","unstructured":"Estler HC, Nordio M, Furia CA, Meyer B (2014) Awareness and merge conflicts in distributed software development. In: International conference on global software engineering (ICGSE), pp 26\u201335","DOI":"10.1109\/ICGSE.2014.17"},{"issue":"8","key":"9674_CR33","doi-asserted-by":"publisher","first-page":"797","DOI":"10.1109\/32.879815","volume":"26","author":"NE Fenton","year":"2000","unstructured":"Fenton NE, Ohlsson N (2000) Quantitative analysis of faults and failures in a complex software system. IEEE Trans Softw Eng (TSE) 26(8):797\u2013814","journal-title":"IEEE Trans Softw Eng (TSE)"},{"issue":"1","key":"9674_CR34","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1177\/160940690600500107","volume":"5","author":"J Fereday","year":"2006","unstructured":"Fereday J, Muir-Cochrane E (2006) Demonstrating rigor using thematic analysis: a hybrid approach of inductive and deductive coding and theme development. Int J Qualitat Methods 5(1):80\u201392","journal-title":"Int J Qualitat Methods"},{"key":"9674_CR35","doi-asserted-by":"crossref","unstructured":"Forward A, Lethbridge TC (2002) The relevance of software documentation, tools and technologies: a survey. In: ACM symposium on document engineering (DocEng), pp 26\u201333","DOI":"10.1145\/585058.585065"},{"key":"9674_CR36","doi-asserted-by":"crossref","unstructured":"Fritz T, Murphy GC (2010) Using information fragments to answer the questions developers ask. In: International conference on software engineering (ICSE), pp 175\u2013184","DOI":"10.1145\/1806799.1806828"},{"issue":"9","key":"9674_CR37","first-page":"1408","volume":"20","author":"PI Fusch","year":"2015","unstructured":"Fusch PI, Ness LR (2015) Are we there yet? Sata saturation in qualitative research. Qual Rep 20(9):1408","journal-title":"Qual Rep"},{"key":"9674_CR38","unstructured":"Garmus D, Herron D (2001) Function point analysis: measurement practices for successful software projects. Addison-Wesley Longman Publishing Co"},{"issue":"1","key":"9674_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.iheduc.2005.11.001","volume":"9","author":"DR Garrison","year":"2006","unstructured":"Garrison DR, Cleveland-Innes M, Koole M, Kappelman J (2006) Revisiting methodological issues in transcript analysis: negotiated coding and reliability. Internet High Educ 9(1):1\u20138","journal-title":"Internet High Educ"},{"issue":"5","key":"9674_CR40","doi-asserted-by":"publisher","first-page":"2585","DOI":"10.1007\/s10664-017-9513-5","volume":"22","author":"Y Gil","year":"2017","unstructured":"Gil Y, Lalouche G (2017) On the correlation between size and metric validity. Empir Softw Eng 22(5):2585\u20132611","journal-title":"Empir Softw Eng"},{"key":"9674_CR41","doi-asserted-by":"crossref","unstructured":"Gligoric M, Eloussi L, Marinov D (2015) Practical regression test selection with dynamic file dependencies. In: Proceedings of the 2015 international symposium on software testing and analysis, ACM, pp 211\u2013 222","DOI":"10.1145\/2771783.2771784"},{"key":"9674_CR42","doi-asserted-by":"crossref","unstructured":"Goodman LA (1961) Snowball sampling. Ann Math Statist, 148\u2013170","DOI":"10.1214\/aoms\/1177705148"},{"issue":"3","key":"9674_CR43","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1037\/0096-3445.129.3.308","volume":"129","author":"D Gopher","year":"2000","unstructured":"Gopher D, Armony L, Greenshpan Y (2000) Switching tasks and attention policies. J Exp Psychol Gen 129(3):308","journal-title":"J Exp Psychol Gen"},{"key":"9674_CR44","doi-asserted-by":"crossref","unstructured":"Gousios G, Zaidman A, Storey MA, van Deursen A (2015) Work practices and challenges in pull-based development: the integrator\u2019s perspective. In: International conference on software engineering (ICSE), pp 358\u2013368","DOI":"10.1109\/ICSE.2015.55"},{"key":"9674_CR45","doi-asserted-by":"crossref","unstructured":"Gousios G, Storey MA, Bacchelli A (2016) Work practices and challenges in pull-based development: the contributor\u2019s perspective. In: Proceedings of the 38th international conference on software engineering (ICSE). ACM, pp 285\u2013296","DOI":"10.1145\/2884781.2884826"},{"key":"9674_CR46","doi-asserted-by":"crossref","unstructured":"Grinter RE (1995) Using a configuration management tool to coordinate software development. In: Proceedings of conference on organizational computing systems. ACM, pp 168\u2013177","DOI":"10.1145\/224019.224036"},{"key":"9674_CR47","doi-asserted-by":"crossref","unstructured":"Guimar\u00e3es ML, Silva AR (2012) Improving early detection of software merge conflicts. In: International conference on software engineering (ICSE), pp 342\u2013352","DOI":"10.1109\/ICSE.2012.6227180"},{"key":"9674_CR48","doi-asserted-by":"crossref","unstructured":"Guo J, Rahimi M, Cleland-Huang J, Rasin A, Hayes JH, Vierhauser M (2016) Cold-start software analytics. In: International conference on mining software repositories (MSR), pp 142\u2013153","DOI":"10.1145\/2901739.2901740"},{"key":"9674_CR49","doi-asserted-by":"crossref","unstructured":"Guzzi A, Bacchelli A, Riche Y, van Deursen A (2015) Supporting developers\u2019 coordination in the IDE. In: Computer supported cooperative work & social computing (CSCW), pp 518\u2013532","DOI":"10.1145\/2675133.2675177"},{"key":"9674_CR50","unstructured":"Hattori LP, Lanza M (2008) On the nature of commits. In: International workshop on automated engineering of autonomous and run-time evolving systems (ARAMIS). ASE Workshops, pp 63\u201371"},{"key":"9674_CR51","doi-asserted-by":"crossref","unstructured":"Hattori L, Lanza M (2010) Syde: a tool for collaborative software development. In: International conference on software engineering (ICSE), pp 235\u2013238","DOI":"10.1145\/1810295.1810339"},{"key":"9674_CR52","unstructured":"Hindle A, German DM, Godfrey MW, Holt RC (2009) Automatic classification of large changes into maintenance categories. In: International conference on program comprehension (ICPC), pp 30\u201339"},{"key":"9674_CR53","unstructured":"Hudson W (2013) Card sorting. In: The encyclopedia of human-computer interaction. Interaction Design Foundation"},{"key":"9674_CR54","unstructured":"Hunt JJ, Tichy WF (2002) Extensible language-aware merging. In: International conference on software maintenance (ICSM), pp 511\u2013520"},{"key":"9674_CR55","unstructured":"Kasi BK, Sarma A (2013) Cassandra: proactive conflict minimization through optimized task scheduling. In: International conference on software engineering (ICSE), pp 732\u2013741"},{"key":"9674_CR56","unstructured":"Ko AJ, DeLine R, Venolia G (2007) Information needs in collocated software development teams. In: International conference on software engineering (ICSE), pp 344\u2013353"},{"key":"9674_CR57","doi-asserted-by":"crossref","unstructured":"Li C, Ding C, Shen K (2007) Quantifying the cost of context switch. In: Workshop on experimental computer science (ExpCS). FCRC Workshop, p 2","DOI":"10.1145\/1281700.1281702"},{"key":"9674_CR58","doi-asserted-by":"crossref","unstructured":"Lippe E, van Oosterom N (1992) Operation-based merging. In: Proceedings of the fifth ACM SIGSOFT symposium on software development environments (SDE). ACM, pp 78\u201387","DOI":"10.1145\/142868.143753"},{"key":"9674_CR59","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1109\/TSE.1976.233837","volume":"4","author":"TJ McCabe","year":"1976","unstructured":"McCabe TJ (1976) A complexity measure. IEEE Trans Softw Eng (TSE) 4:308\u2013320","journal-title":"IEEE Trans Softw Eng (TSE)"},{"key":"9674_CR60","doi-asserted-by":"crossref","unstructured":"McKee S, Nelson N, Sarma A, Dig D (2017) Software practitioner perspectives on merge conflicts and resolutions. In: 2017 IEEE international conference on software maintenance and evolution (ICSME). IEEE, pp 467\u2013478","DOI":"10.1109\/ICSME.2017.53"},{"issue":"3","key":"9674_CR61","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/s004269900004","volume":"63","author":"N Meiran","year":"2000","unstructured":"Meiran N (2000) Modeling cognitive control in task-switching. Psychol Res 63(3):234\u2013249","journal-title":"Psychol Res"},{"issue":"5","key":"9674_CR62","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1109\/TSE.2002.1000449","volume":"28","author":"T Mens","year":"2002","unstructured":"Mens T (2002) A state-of-the-art survey on software merging. IEEE Trans Softw Eng (TSE) 28(5):449\u2013 462","journal-title":"IEEE Trans Softw Eng (TSE)"},{"issue":"3","key":"9674_CR63","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MS.2014.58","volume":"31","author":"M Meyer","year":"2014","unstructured":"Meyer M (2014) Continuous integration and its tools. IEEE Softw 31(3):14\u201316","journal-title":"IEEE Softw"},{"key":"9674_CR64","doi-asserted-by":"crossref","unstructured":"Nabi T, Sweeney KM, Lichlyter S, Piorkowski D, Scaffidi C, Burnett M, Fleming SD (2016) Putting information foraging theory to work: community-based design patterns for programming tools. In: Symposium on visual languages and human-centric computing (VL\/HCC), pp 129\u2013133","DOI":"10.1109\/VLHCC.2016.7739675"},{"key":"9674_CR65","doi-asserted-by":"crossref","unstructured":"Nishimura Y, Maruyama K (2016) Supporting merge conflict resolution by using fine-grained code change history. In: International conference on software analysis, evolution, and reengineering (SANER), pp 661\u2013664","DOI":"10.1109\/SANER.2016.46"},{"key":"9674_CR66","doi-asserted-by":"crossref","unstructured":"Panichella S, Canfora G, Di Penta M, Oliveto R (2014) How the evolution of emerging collaborations relates to code changes: an empirical study. In: Proceedings of the 22nd IEEE international conference on program comprehension (ICPC). ACM, pp 177\u2013188","DOI":"10.1145\/2597008.2597145"},{"key":"9674_CR67","doi-asserted-by":"crossref","unstructured":"Phillips S, Sillito J, Walker R (2011) Branching and merging: an investigation into current version control practices. In: International workshop on cooperative and human aspects of software engineering (CHASE), pp 9\u201315","DOI":"10.1145\/1984642.1984645"},{"key":"9674_CR68","doi-asserted-by":"crossref","unstructured":"Ragavan SS, Pandya B, Piorkowski D, Hill C, Kuttal SK, Sarma A, Burnett M (2017) PFIS-V: modeling foraging behavior in the presence of variants. In: Proceedings of the 2017 SIGCHI conference on human factors in computing systems (CHI). ACM, pp 6232\u20136244","DOI":"10.1145\/3025453.3025818"},{"key":"9674_CR69","unstructured":"Ritchie J, Lewis J, Nicholls CM, Ormston R, et al. (2013), Qualitative research practice: a guide for social science students and researchers. Sage"},{"key":"9674_CR70","unstructured":"Robillard MP, Manggala P (2008) Reusing program investigation knowledge for code understanding. In: The 16th IEEE international conference on program comprehension (ICPC). IEEE, pp 202\u2013211"},{"key":"9674_CR71","unstructured":"Sarma A (2008) Palantir: enhancing configuration management systems with workspace awareness to detect and resolve emerging conflicts. PhD thesis, University of California, Irvine"},{"key":"9674_CR72","doi-asserted-by":"crossref","unstructured":"Sarma A, Noroozi Z, Van Der Hoek A (2003) Palant\u00edr: raising awareness among configuration management workspaces. In: Proceedings of the 25th international conference on software engineering (ICSE). IEEE, pp 444\u2013454","DOI":"10.1109\/ICSE.2003.1201222"},{"key":"9674_CR73","doi-asserted-by":"crossref","unstructured":"Sarma A, Bortis G, Van Der Hoek A (2007) Towards supporting awareness of indirect conflicts across software configuration management workspaces. In: Proceedings of the twenty-second IEEE\/ACM international conference on automated software engineering. ACM, pp 94\u2013103","DOI":"10.1145\/1321631.1321647"},{"key":"9674_CR74","doi-asserted-by":"crossref","unstructured":"Seaman CB (2008) Qualitative methods. In: Guide to advanced empirical software engineering. Springer, pp 35\u201362","DOI":"10.1007\/978-1-84800-044-5_2"},{"key":"9674_CR75","doi-asserted-by":"crossref","unstructured":"Servant F, Jones JA, van der Hoek A (2010) CASI: preventing indirect conflicts through a live visualization. In: Proceedings of the 2010 ICSE workshop on cooperative and human aspects of software engineering (CHASE). ACM, pp 39\u201346","DOI":"10.1145\/1833310.1833317"},{"key":"9674_CR76","doi-asserted-by":"crossref","unstructured":"Sillito J, Murphy GC, De Volder K (2006) Questions programmers ask during software evolution tasks. In: International symposium on foundations of software engineering (FSE), pp 23\u201334","DOI":"10.1145\/1181775.1181779"},{"key":"9674_CR77","unstructured":"Spencer D (2009) Card sorting: designing usable categories. Rosenfeld Media"},{"key":"9674_CR78","doi-asserted-by":"crossref","unstructured":"Sun X, Li B, Li Y, Chen Y (2015) What information in software historical repositories do we need to support software maintenance tasks? An approach based on topic model. Springer, pp 27\u201337","DOI":"10.1007\/978-3-319-10509-3_3"},{"issue":"1","key":"9674_CR79","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/32.4618","volume":"14","author":"CR Symons","year":"1988","unstructured":"Symons CR (1988) Function point analysis: difficulties and improvements. IEEE Trans Softw Eng (TSE) 14(1):2\u201311","journal-title":"IEEE Trans Softw Eng (TSE)"},{"key":"9674_CR80","unstructured":"Tao Y, Dang Y, Xie T, Zhang D, Kim S (2012) How do software engineers understand code changes? An exploratory study in industry. In: International symposium on the foundations of software engineering (FSE), p 51"},{"key":"9674_CR81","doi-asserted-by":"crossref","unstructured":"Tian J (2005) Software quality engineering, testing, quality assurance, and quantifiable improvement. Wiley","DOI":"10.1002\/0471722324"},{"key":"9674_CR82","doi-asserted-by":"crossref","unstructured":"Wang S, Lo D (2014) Version history, similar report, and structure: putting them together for improved bug localization. In: The 22nd IEEE international conference on program comprehension (ICPC). ACM, pp 53\u201363","DOI":"10.1145\/2597008.2597148"},{"key":"9674_CR83","unstructured":"Weinberg GM (1992) Quality software management, vol. 1: systems thinking. Dorset House Publishing Co."},{"key":"9674_CR84","doi-asserted-by":"crossref","unstructured":"Westfechtel B (1991) Structure-oriented merging of revisions of software documents. In: Proceedings of the 3rd international workshop on software configuration management (SCM). ACM, pp 68\u201379","DOI":"10.1145\/111062.111071"},{"key":"9674_CR85","doi-asserted-by":"crossref","unstructured":"Yamauchi K, Yang J, Hotta K, Higo Y, Kusumoto S (2014) Clustering commits for understanding the intents of implementation. In: International conference on software maintenance and evolution (ICSME), pp 406\u2013410","DOI":"10.1109\/ICSME.2014.63"},{"key":"9674_CR86","doi-asserted-by":"crossref","unstructured":"Yan Y, Menarini M, Griswold W (2014) Mining software contracts for software evolution. In: International conference on software maintenance and evolution (ICSME), pp 471\u2013475","DOI":"10.1109\/ICSME.2014.76"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-018-9674-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-018-9674-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-018-9674-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,26]],"date-time":"2020-11-26T13:43:11Z","timestamp":1606398191000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-018-9674-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,5]]},"references-count":86,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,10]]}},"alternative-id":["9674"],"URL":"https:\/\/doi.org\/10.1007\/s10664-018-9674-x","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,2,5]]},"assertion":[{"value":"5 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}