{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T04:12:36Z","timestamp":1773375156306,"version":"3.50.1"},"reference-count":64,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,9,5]],"date-time":"2019-09-05T00:00:00Z","timestamp":1567641600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,9,5]],"date-time":"2019-09-05T00:00:00Z","timestamp":1567641600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000145","name":"Division of Information and Intelligent Systems","doi-asserted-by":"publisher","award":["1559657"],"award-info":[{"award-number":["1559657"]}],"id":[{"id":"10.13039\/100000145","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000143","name":"Division of Computing and Communication Foundations","doi-asserted-by":"publisher","award":["1253786"],"award-info":[{"award-number":["1253786"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1007\/s10664-019-09735-4","type":"journal-article","created":{"date-parts":[[2019,9,5]],"date-time":"2019-09-05T02:02:23Z","timestamp":1567648943000},"page":"562-590","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["An empirical investigation into merge conflicts and their effect on software quality"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1196-8749","authenticated-orcid":false,"given":"Caius","family":"Brindescu","sequence":"first","affiliation":[]},{"given":"Iftekhar","family":"Ahmed","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Jensen","sequence":"additional","affiliation":[]},{"given":"Anita","family":"Sarma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,5]]},"reference":[{"issue":"4","key":"9735_CR1","doi-asserted-by":"publisher","first-page":"2051","DOI":"10.1007\/s10664-017-9586-1","volume":"23","author":"P Accioly","year":"2018","unstructured":"Accioly P, Borba P, Cavalcanti G (2018) Understanding semi-structured merge conflict characteristics in open-source java projects. Empir Softw Eng 23(4):2051\u20132085. https:\/\/doi.org\/10.1007\/s10664-017-9586-1","journal-title":"Empir Softw Eng"},{"key":"9735_CR2","doi-asserted-by":"publisher","unstructured":"Ahmed I, Gopinath R, Brindescu C, Groce A, Jensen C (2016) Can testedness be effectively measured?. In: Proceedings of the 2016 24th ACM SIGSOFT international symposium on foundations of software engineering, FSE 2016. ACM, Seattle, pp 547\u2013558, https:\/\/doi.org\/10.1145\/2950290.2950324","DOI":"10.1145\/2950290.2950324"},{"key":"9735_CR3","doi-asserted-by":"publisher","unstructured":"Ahmed I, Brindescu C, Mannan UA, Jensen C, Sarma A (2017) An empirical examination of the relationship between code smells and merge conflicts. In: Proceedings of the 11th ACM\/IEEE international symposium on empirical software engineering and measurement, ESEM \u201917. IEEE Press, Piscataway, pp 58\u201367, https:\/\/doi.org\/10.1109\/ESEM.2017.12","DOI":"10.1109\/ESEM.2017.12"},{"key":"9735_CR4","unstructured":"Apache Maven (2018) Maven. The Apache Software Foundation. https:\/\/maven.apache.org\/ . Accessed 1 May 2018"},{"key":"9735_CR5","doi-asserted-by":"publisher","unstructured":"Apel S, Liebig J, Brandl B, Lengauer C, K\u00e4stner C (2011) Semistructured merge: rethinking merge in revision control systems. In: Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on foundations of software engineering, ESEC\/FSE \u201911. ACM, New York, pp 190\u2013200, https:\/\/doi.org\/10.1145\/2025113.2025141","DOI":"10.1145\/2025113.2025141"},{"key":"9735_CR6","doi-asserted-by":"publisher","unstructured":"Apel S, Lessenich O, Lengauer C (2012) Structured Merge with auto-tuning: balancing precision and performance. In: Proceedings of the 27th IEEE\/ACM international conference on automated software engineering, ASE 2012. ACM, Essen, pp 120\u2013129, https:\/\/doi.org\/10.1145\/2351676.2351694","DOI":"10.1145\/2351676.2351694"},{"key":"9735_CR7","doi-asserted-by":"publisher","unstructured":"Biehl JT, Czerwinski M, Smith G, Robertson GG (2007) FASTDash: a visual dashboard for fostering awareness in software teams. In: Proceedings of the SIGCHI conference on human factors in computing systems, CHI \u201907. ACM, New York, pp 1313\u20131322, https:\/\/doi.org\/10.1145\/1240624.1240823","DOI":"10.1145\/1240624.1240823"},{"key":"9735_CR8","doi-asserted-by":"crossref","unstructured":"Bird C, Bachmann A, Aune E, Duffy J, Bernstein A, Filkov V, Devanbu P (2009) Fair and balanced?: bias in bug-fix datasets. In: Proceedings of the the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on the foundations of software engineering, pp 121\u2013130","DOI":"10.1145\/1595696.1595716"},{"key":"9735_CR9","unstructured":"Boehm BW, Brown JR, Lipow M (1976) Quantitative evaluation of software quality. In: Proceedings of the 2nd international conference on software engineering, ICSE \u201976. IEEE Computer Society Press, Los Alamitos, pp 592\u2013605"},{"key":"9735_CR10","doi-asserted-by":"publisher","unstructured":"Brun Y, Holmes R, Ernst MD, Notkin D (2011) Proactive detection of collaboration conflicts. In: Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on foundations of software engineering, ESEC\/FSE \u201911. ACM, Szeged, pp 168\u2013178, https:\/\/doi.org\/10.1145\/2025113.2025139","DOI":"10.1145\/2025113.2025139"},{"issue":"10","key":"9735_CR11","doi-asserted-by":"publisher","first-page":"1358","DOI":"10.1109\/TSE.2013.28","volume":"39","author":"Y Brun","year":"2013","unstructured":"Brun Y, Holmes R, Ernst MD, Notkin D (2013) Early detection of collaboration conflicts and risks. IEEE Trans Softw Eng 39(10):1358\u20131375. https:\/\/doi.org\/10.1109\/TSE.2013.28","journal-title":"IEEE Trans Softw Eng"},{"issue":"5","key":"9735_CR12","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1002\/smr.319","volume":"17","author":"J Buckley","year":"2005","unstructured":"Buckley J, Mens T, Zenger M, Rashid A, Kniesel G (2005) Towards a taxonomy of software change. J Softw Maint Evol Res Pract 17(5):309\u2013332. https:\/\/doi.org\/10.1002\/smr.319","journal-title":"J Softw Maint Evol Res Pract"},{"key":"9735_CR13","doi-asserted-by":"publisher","unstructured":"Canfora G, Cerulo L, Penta MD (2007) Identifying changed source code lines from version repositories. In: Fourth international workshop on mining software repositories (MSR\u201907:ICSE Workshops 2007), pp 14\u201314, https:\/\/doi.org\/10.1109\/MSR.2007.14","DOI":"10.1109\/MSR.2007.14"},{"issue":"3","key":"9735_CR14","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1109\/TSE.2012.32","volume":"39","author":"M Cataldo","year":"2013","unstructured":"Cataldo M, Herbsleb JD (2013) Coordination breakdowns and their impact on development productivity and software failures. IEEE Trans Softw Eng 39(3):343\u2013360. https:\/\/doi.org\/10.1109\/TSE.2012.32","journal-title":"IEEE Trans Softw Eng"},{"issue":"OOPSLA","key":"9735_CR15","doi-asserted-by":"publisher","first-page":"59:1","DOI":"10.1145\/3133883","volume":"1","author":"G Cavalcanti","year":"2017","unstructured":"Cavalcanti G, Borba P, Accioly P (2017) Evaluating and improving semistructured merge. Proc ACM Program Lang 1(OOPSLA):59:1\u201359:27. https:\/\/doi.org\/10.1145\/3133883","journal-title":"Proc ACM Program Lang"},{"key":"9735_CR16","doi-asserted-by":"crossref","unstructured":"Cohen J, Cohen P, West S, Aiken L (2013) Applied multiple regression\/correlation analysis for the behavioral sciences. Taylor & Francis","DOI":"10.4324\/9780203774441"},{"key":"9735_CR17","doi-asserted-by":"crossref","unstructured":"Companion website (2016) http:\/\/caius.brindescu.com\/research\/mc-classification","DOI":"10.22233\/20412495.1116.24"},{"key":"9735_CR18","unstructured":"Corbet J, Kroah-Hartman G (2016) 2016 Linux Kernel Development Report. Tech. rep., The Linux Foundation"},{"issue":"10","key":"9735_CR19","doi-asserted-by":"publisher","first-page":"1489","DOI":"10.1142\/S0218194014400166","volume":"24","author":"C Costa","year":"2014","unstructured":"Costa C, Figueiredo JJC, Ghiotto G, Murta LGP (2014) Characterizing the problem of developers\u2019 assignment for merging branches. Int J Softw Eng Knowl Eng 24(10):1489\u20131508. https:\/\/doi.org\/10.1142\/S0218194014400166","journal-title":"Int J Softw Eng Knowl Eng"},{"key":"9735_CR20","doi-asserted-by":"publisher","unstructured":"Cruzes DS, Dyba T (2011) Recommended steps for thematic synthesis in software engineering. In: 2011 international symposium on empirical software engineering and measurement, pp 275\u2013284, https:\/\/doi.org\/10.1109\/ESEM.2011.36","DOI":"10.1109\/ESEM.2011.36"},{"key":"9735_CR21","doi-asserted-by":"publisher","unstructured":"da Silva IA, Chen PH, Van der Westhuizen C, Ripley RM, van der Hoek A (2006) Lighthouse: coordination through emerging design. In: Proceedings of the 2006 OOPSLA workshop on Eclipse Technology eXchange, eclipse \u201906. ACM, New York, pp 11\u201315, https:\/\/doi.org\/10.1145\/1188835.1188838","DOI":"10.1145\/1188835.1188838"},{"key":"9735_CR22","doi-asserted-by":"publisher","unstructured":"de Souza CRB, Redmiles D, Dourish P (2003) \u201cBreaking the code\u201d, Moving between private and public work in collaborative software development. In: Proceedings of the 2003 International ACM SIGGROUP Conference on Supporting Group Work, GROUP \u201903. ACM, New York, pp 105\u2013114, https:\/\/doi.org\/10.1145\/958160.958177","DOI":"10.1145\/958160.958177"},{"key":"9735_CR23","unstructured":"De Souza LBL, Maia MDA (2013) Do software categories impact coupling metrics?. In: Proceedings of the 10th working conference on mining software repositories, MSR \u201913. IEEE Press, Piscataway, pp 217\u2013220"},{"key":"9735_CR24","doi-asserted-by":"publisher","unstructured":"Dewan P, Hegde R (2007) Semi-synchronous conflict detection and resolution in asynchronous software development. In: Bannon LJ, Wagner I, Gutwin C, Harper RHR, Schmidt K (eds) ECSCW 2007. Springer, London, Limerick, pp 159\u2013178, https:\/\/doi.org\/10.1007\/978-1-84800-031-5_9","DOI":"10.1007\/978-1-84800-031-5_9"},{"issue":"7","key":"9735_CR25","doi-asserted-by":"publisher","first-page":"630","DOI":"10.1109\/32.935855","volume":"27","author":"K El Emam","year":"2001","unstructured":"El Emam K, Benlarbi S, Goel N, Rai SN (2001) The confounding effect of class size on the validity of object-oriented metrics. IEEE Trans Softw Eng 27 (7):630\u2013650. https:\/\/doi.org\/10.1109\/32.935855","journal-title":"IEEE Trans Softw Eng"},{"key":"9735_CR26","doi-asserted-by":"publisher","unstructured":"Falleri JR, Morandat F, Blanc X, Martinez M, Montperrus M (2014) Fine-grained and accurate source code differencing. In: Proceedings of the 29th ACM\/IEEE international conference on automated software engineering, ASE \u201914. ACM, New York, pp 313\u2013324, https:\/\/doi.org\/10.1145\/2642937.2642982","DOI":"10.1145\/2642937.2642982"},{"key":"9735_CR27","unstructured":"GitHub (2017) https:\/\/www.github.com\/"},{"issue":"2","key":"9735_CR28","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1109\/TSE.2005.28","volume":"31","author":"MW Godfrey","year":"2005","unstructured":"Godfrey MW, Zou L (2005) Using origin analysis to detect merging and splitting of source code entities. IEEE Trans Softw Eng 31(2):166\u2013181. https:\/\/doi.org\/10.1109\/TSE.2005.28","journal-title":"IEEE Trans Softw Eng"},{"key":"9735_CR29","doi-asserted-by":"publisher","unstructured":"Gorton I, Liu A (2002) Software component quality assessment in practice: successes and practical impediments. In: Proceedings of the 24th international conference on software engineering, ICSE \u201902. ACM, New York, pp 555\u2013558, https:\/\/doi.org\/10.1145\/581339.581408","DOI":"10.1145\/581339.581408"},{"key":"9735_CR30","doi-asserted-by":"publisher","unstructured":"Grinter RE (1995) Using a configuration management tool to coordinate software development. In: Proceedings of conference on organizational computing systems, COCS \u201995. ACM, New York, pp 168\u2013177, https:\/\/doi.org\/10.1145\/224019.224036","DOI":"10.1145\/224019.224036"},{"key":"9735_CR31","doi-asserted-by":"publisher","unstructured":"Groce A, Zhang C, Eide E, Chen Y, Regehr J (2012) Swarm Testing. In: Proceedings of the 2012 international symposium on software testing and analysis, ISSTA 2012. ACM, Minneapolis, pp 78\u201388, https:\/\/doi.org\/10.1145\/2338965.2336763","DOI":"10.1145\/2338965.2336763"},{"key":"9735_CR32","doi-asserted-by":"crossref","unstructured":"Guimar\u00e3es ML, Silva AR (2012) Improving early detection of software merge conflicts. In: Proceedings of the 34th international conference on software engineering, ICSE \u201912. IEEE Press, Zurich, pp 342\u2013352","DOI":"10.1109\/ICSE.2012.6227180"},{"key":"9735_CR33","unstructured":"Hensher D, Stopher P (1979) Behavioural travel modelling, Croom Helm, London"},{"issue":"6","key":"9735_CR34","doi-asserted-by":"publisher","first-page":"845","DOI":"10.1109\/TSE.2010.110","volume":"37","author":"GJ Holzmann","year":"2011","unstructured":"Holzmann GJ, Joshi R, Groce A (2011) Swarm verification techniques. IEEE Trans Softw Eng 37(6):845\u2013857. https:\/\/doi.org\/10.1109\/TSE.2010.110","journal-title":"IEEE Trans Softw Eng"},{"key":"9735_CR35","doi-asserted-by":"publisher","unstructured":"Johnson EJ, Goldstein D (2003) Do defaults save lives? Science 302(5649):1338\u20131339. https:\/\/doi.org\/10.1126\/science.1091721","DOI":"10.1126\/science.1091721"},{"issue":"1","key":"9735_CR36","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1015044207315","volume":"13","author":"EJ Johnson","year":"2002","unstructured":"Johnson EJ, Bellman S, Lohse GL (2002) Defaults, framing and privacy: why opting in-opting out1. Mark Lett 13(1):5\u201315. https:\/\/doi.org\/10.1023\/A:1015044207315","journal-title":"Mark Lett"},{"key":"9735_CR37","doi-asserted-by":"publisher","unstructured":"Kalliamvakou E, Gousios G, Blincoe K, Singer L, German DM, Damian D (2014) The promises and perils of mining GitHub. In: Proceedings of the 11th working conference on mining software repositories, MSR 2014. ACM, New York, pp 92\u2013101, https:\/\/doi.org\/10.1145\/2597073.2597074","DOI":"10.1145\/2597073.2597074"},{"key":"9735_CR38","unstructured":"Kasi BK, Sarma A (2013) Cassandra: proactive conflict minimization through optimized task scheduling. In: Proceedings of the 2013 international conference on software engineering, ICSE \u201913. IEEE Press, Piscataway, pp 732\u2013741"},{"key":"9735_CR39","doi-asserted-by":"publisher","unstructured":"Kim S, Zimmermann T, Pan K, Whitehead EJJ (2006) Automatic identification of bug-introducing changes. In: Proceedings of the 21st IEEE\/ACM international conference on automated software engineering, ASE \u201906. IEEE Computer Society, Washington, DC, pp 81\u201390, https:\/\/doi.org\/10.1109\/ASE.2006.23","DOI":"10.1109\/ASE.2006.23"},{"issue":"2","key":"9735_CR40","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1109\/TSE.2007.70773","volume":"34","author":"S Kim","year":"2008","unstructured":"Kim S, Whitehead EJ Jr, Zhang Y (2008) Classifying software changes: clean or buggy? IEEE Trans Softw Eng 34(2):181\u2013196. https:\/\/doi.org\/10.1109\/TSE.2007.70773","journal-title":"IEEE Trans Softw Eng"},{"key":"9735_CR41","doi-asserted-by":"publisher","unstructured":"Lippe E, van Oosterom N (1992) Operation-based merging. In: Proceedings of the fifth ACM SIGSOFT symposium on software development environments, SDE 5. ACM, New York, pp 78\u201387, https:\/\/doi.org\/10.1145\/142868.143753","DOI":"10.1145\/142868.143753"},{"key":"9735_CR42","doi-asserted-by":"crossref","unstructured":"Marinescu R (2001) Detecting design flaws via metrics in object-oriented systems. In: Proceedings of the 39th international conference and exhibition on technology of object-oriented languages and systems (TOOLS39), TOOLS \u201901. IEEE Computer Society, Washington, DC, p 173","DOI":"10.1109\/TOOLS.2001.941671"},{"key":"9735_CR43","doi-asserted-by":"crossref","unstructured":"Marinescu R (2004) Detection strategies: metrics-based rules for detecting design flaws. In: 20th IEEE international conference on software maintenance, 2004. Proceedings, pp 350\u2013359","DOI":"10.1109\/ICSM.2004.1357820"},{"key":"9735_CR44","doi-asserted-by":"publisher","unstructured":"McKee S, Nelson N, Sarma A, Dig D (2017) Software practitioner perspectives on merge conflicts and resolutions. In: 2017 IEEE international conference on software maintenance and evolution, ICSME 2017, Shanghai, China, September 17\u201322, 2017, pp 467\u2013478, https:\/\/doi.org\/10.1109\/ICSME.2017.53","DOI":"10.1109\/ICSME.2017.53"},{"key":"9735_CR45","unstructured":"Menezes GGLD (2016) On the nature of software merge conflicts. Ph.D. thesis, Universidade Federal Fluminense"},{"issue":"5","key":"9735_CR46","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1109\/TSE.2002.1000449","volume":"28","author":"T Mens","year":"2002","unstructured":"Mens T (2002) A state-of-the-art survey on software merging. IEEE Trans Softw Eng 28(5):449\u2013462. https:\/\/doi.org\/10.1109\/TSE.2002.1000449","journal-title":"IEEE Trans Softw Eng"},{"issue":"2","key":"9735_CR47","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1002\/bltj.2229","volume":"5","author":"A Mockus","year":"2000","unstructured":"Mockus A, Weiss DM (2000) Predicting risk of software changes. Bell Labs Tech J 5(2):169\u2013180. https:\/\/doi.org\/10.1002\/bltj.2229","journal-title":"Bell Labs Tech J"},{"issue":"3","key":"9735_CR48","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1145\/567793.567795","volume":"11","author":"A Mockus","year":"2002","unstructured":"Mockus A, Fielding RT, Herbsleb JD (2002) Two case studies of open source software development: Apache and Mozilla. ACM Trans Softw Eng Methodol 11 (3):309\u2013346. https:\/\/doi.org\/10.1145\/567793.567795","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"9735_CR49","doi-asserted-by":"publisher","unstructured":"Nieminen A (2012) Real-time collaborative resolving of merge conflicts. In: Proceedings of the 2012 8th international conference on collaborative computing: networking, applications and worksharing (CollaborateCom 2012), COLLABORATECOM \u201912. IEEE Computer Society, Washington, DC, pp 540\u2013543, https:\/\/doi.org\/10.4108\/icst.collaboratecom.2012.250435","DOI":"10.4108\/icst.collaboratecom.2012.250435"},{"issue":"12","key":"9735_CR50","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1109\/TSE.2004.94","volume":"30","author":"J Parsons","year":"2004","unstructured":"Parsons J, Saunders C (2004) Cognitive heuristics in software engineering applying and extending anchoring and adjustment to artifact reuse. IEEE Trans Softw Eng 30 (12):873\u2013888","journal-title":"IEEE Trans Softw Eng"},{"key":"9735_CR51","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa F, Varoquaux G, Gramfort A, Michel V, Thirion B, Grisel O, Blondel M, Prettenhofer P, Weiss R, Dubourg V, Vanderplas J, Passos A, Cournapeau D, Brucher M, Perrot M, Duchesnay E (2011) Scikit-learn: machine learning in python. J Mach Learn Res 12:2825\u20132830","journal-title":"J Mach Learn Res"},{"issue":"3","key":"9735_CR52","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1145\/383876.383878","volume":"10","author":"DE Perry","year":"2001","unstructured":"Perry DE, Siy HP, Votta LG (2001) Parallel changes in large-scale software development: an observational case study. ACM Trans Softw Eng Methodol 10(3):308\u2013337. https:\/\/doi.org\/10.1145\/383876.383878","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"9735_CR53","volume-title":"The Cathedral and the bazaar, 1st edn","author":"ES Raymond","year":"1999","unstructured":"Raymond ES (1999) The Cathedral and the bazaar, 1st edn. O\u2019Reilly & Associates, Inc., Sebastopol"},{"key":"9735_CR54","doi-asserted-by":"publisher","unstructured":"Ripley RM, Yasui RY, Sarma A, van der Hoek A (2004) Workspace awareness in application development. In: Proceedings of the 2004 OOPSLA workshop on Eclipse Technology eXchange, eclipse \u201904. ACM, New York, pp 17\u201321, https:\/\/doi.org\/10.1145\/1066129.1066133","DOI":"10.1145\/1066129.1066133"},{"issue":"1","key":"9735_CR55","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/BF00055564","volume":"1","author":"W Samuelson","year":"1988","unstructured":"Samuelson W, Zeckhauser R (1988) Status quo bias in decision making. J Risk Uncertain 1(1):7\u201359","journal-title":"J Risk Uncertain"},{"key":"9735_CR56","doi-asserted-by":"publisher","unstructured":"Sarma A, Noroozi Z, Hoek AVD (2003) Palant\u00edr: raising awareness among configuration management workspaces. In: Proceedings of the 25th international conference on software engineering, May 3-10, 2003, Portland, Oregon, USA, pp 444\u2013454. https:\/\/doi.org\/10.1109\/ICSE.2003.1201222","DOI":"10.1109\/ICSE.2003.1201222"},{"key":"9735_CR57","doi-asserted-by":"publisher","unstructured":"Servant F, Jones JA, van der Hoek A (2010) CASI: preventing indirect conflicts through a live visualization. In: Proceedings of the 2010 ICSE workshop on cooperative and human aspects of software engineering, CHASE \u201910. ACM, New York, pp 39\u201346, https:\/\/doi.org\/10.1145\/1833310.1833317","DOI":"10.1145\/1833310.1833317"},{"key":"9735_CR58","doi-asserted-by":"publisher","unstructured":"Shihab E, Bird C, Zimmermann T (2012) The effect of branching strategies on software quality. In: Proceedings of the ACM-IEEE international symposium on empirical software engineering and measurement, ESEM \u201912. ACM, New York, pp 301\u2013310, https:\/\/doi.org\/10.1145\/2372251.2372305","DOI":"10.1145\/2372251.2372305"},{"issue":"6","key":"9735_CR59","doi-asserted-by":"publisher","first-page":"1806","DOI":"10.1109\/TSMCC.2012.2226152","volume":"42","author":"Z Sun","year":"2012","unstructured":"Sun Z, Song Q, Zhu X (2012) Using coding-based ensemble learning to improve software defect prediction. IEEE Trans Syst Man Cybern Part C Appl Rev 42 (6):1806\u20131817","journal-title":"IEEE Trans Syst Man Cybern Part C Appl Rev"},{"key":"9735_CR60","unstructured":"Sunstein CR, Thaler RH (2003) Libertarian paternalism is not an oxymoron. The University of Chicago Law Review, pp 1159\u20131202"},{"key":"9735_CR61","doi-asserted-by":"crossref","unstructured":"Tian Y, Lawall J, Lo D (2012) Identifying linux bug fixing patches. In: 2012 34th international conference on software engineering (ICSE), pp 386\u2013396","DOI":"10.1109\/ICSE.2012.6227176"},{"key":"9735_CR62","unstructured":"Understand \u2122 (2017) Static Code Analysis Tool"},{"issue":"5","key":"9735_CR63","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/s10664-008-9082-8","volume":"13","author":"EJ Weyuker","year":"2008","unstructured":"Weyuker EJ, Ostrand TJ, Bell RM (2008) Do too many cooks spoil the broth? Using the number of developers to enhance defect prediction models. Empir Softw Eng 13(5):539\u2013559. https:\/\/doi.org\/10.1007\/s10664-008-9082-8","journal-title":"Empir Softw Eng"},{"key":"9735_CR64","doi-asserted-by":"publisher","unstructured":"Zimmermann T, Kim S, Zeller A, Whitehead EJ Jr (2006) Mining version archives for co-changed lines. In: Proceedings of the 2006 international workshop on mining software repositories, MSR \u201906. ACM, New York, pp 72\u201375, https:\/\/doi.org\/10.1145\/1137983.1138001","DOI":"10.1145\/1137983.1138001"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-019-09735-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-019-09735-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-019-09735-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,22]],"date-time":"2024-07-22T23:53:05Z","timestamp":1721692385000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-019-09735-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,5]]},"references-count":64,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,1]]}},"alternative-id":["9735"],"URL":"https:\/\/doi.org\/10.1007\/s10664-019-09735-4","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9,5]]},"assertion":[{"value":"5 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}