{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T16:39:03Z","timestamp":1778344743095,"version":"3.51.4"},"reference-count":94,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,10,28]],"date-time":"2021-10-28T00:00:00Z","timestamp":1635379200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,10,28]],"date-time":"2021-10-28T00:00:00Z","timestamp":1635379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001711","name":"Schweizerischer Nationalfonds zur F\u00f6rderung der Wissenschaftlichen Forschung","doi-asserted-by":"publisher","award":["175513"],"award-info":[{"award-number":["175513"]}],"id":[{"id":"10.13039\/501100001711","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001711","name":"Schweizerischer Nationalfonds zur F\u00f6rderung der Wissenschaftlichen Forschung","doi-asserted-by":"publisher","award":["172799"],"award-info":[{"award-number":["172799"]}],"id":[{"id":"10.13039\/501100001711","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Universit\u00e0 della Svizzera italiana"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2022,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Most changes during software maintenance and evolution are not atomic changes, but rather the result of several related changes affecting different parts of the code. It may happen that developers omit needed changes, thus leaving a task partially unfinished, introducing technical debt or injecting bugs. We present a study investigating \u201c<jats:italic>quick remedy commits<\/jats:italic>\u201d performed by developers to implement changes omitted in previous commits. With <jats:italic>quick remedy commits<\/jats:italic> we refer to commits that (i) <jats:italic>quickly<\/jats:italic> follow a commit performed by the same developer, and (ii) aim at <jats:italic>remedying<\/jats:italic> issues introduced as the result of code changes omitted in the previous commit (e.g., fix references to code components that have been broken as a consequence of a rename refactoring) or simply improve the previously committed change (e.g., improve the name of a newly introduced variable). Through a manual analysis of 500 quick remedy commits, we define a taxonomy categorizing the types of changes that developers tend to omit. The taxonomy can (i) guide the development of tools aimed at detecting omitted changes and (ii) help researchers in identifying corner cases that must be properly handled. For example, one of the categories in our taxonomy groups the <jats:italic>reverted commits<\/jats:italic>, meaning changes that are undone in a subsequent commit. We show that not accounting for such commits when mining software repositories can undermine one\u2019s findings. In particular, our results show that considering completely reverted commits when mining software repositories accounts, on average, for 0.07 and 0.27 noisy data points when dealing with two typical MSR data collection tasks (i.e., bug-fixing commits identification and refactoring operations mining, respectively).<\/jats:p>","DOI":"10.1007\/s10664-021-10051-z","type":"journal-article","created":{"date-parts":[[2021,10,28]],"date-time":"2021-10-28T04:02:26Z","timestamp":1635393746000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Quick remedy commits and their impact on mining software repositories"],"prefix":"10.1007","volume":"27","author":[{"given":"Fengcai","family":"Wen","sequence":"first","affiliation":[]},{"given":"Csaba","family":"Nagy","sequence":"additional","affiliation":[]},{"given":"Michele","family":"Lanza","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2216-3148","authenticated-orcid":false,"given":"Gabriele","family":"Bavota","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,28]]},"reference":[{"key":"10051_CR1","unstructured":"About stars (GitHub) (2021) https:\/\/help.github.com\/articles\/about-stars\/"},{"key":"10051_CR2","doi-asserted-by":"crossref","unstructured":"AlOmar E, Mkaouer MW, Ouni A (2019) Can refactoring be self-affirmed? an exploratory study on how developers document their refactoring activities in commit messages. In: 2019 IEEE\/ACM 3rd International Workshop on Refactoring (IWoR), pp 51\u201358","DOI":"10.1109\/IWoR.2019.00017"},{"key":"10051_CR3","doi-asserted-by":"crossref","unstructured":"Allamanis M, T Barr E, Bird C, Sutton C (2014) Learning natural coding conventions. In: Proceedings of the 22Nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, ser. FSE 2014, pp 281\u2013293","DOI":"10.1145\/2635868.2635883"},{"key":"10051_CR4","doi-asserted-by":"crossref","unstructured":"An L, Khomh F, Adams B (2014) Supplementary bug fixes vs. re-opened bugs. In: Proceedings of the 2014 IEEE 14th International Working Conference on Source Code Analysis and Manipulation, ser. SCAM \u201914. IEEE Computer Society, Washington, pp 205\u2013214","DOI":"10.1109\/SCAM.2014.29"},{"issue":"4","key":"10051_CR5","doi-asserted-by":"publisher","first-page":"2121","DOI":"10.1007\/s10664-017-9540-2","volume":"23","author":"MF Aniche","year":"2018","unstructured":"Aniche MF, Bavota G, Treude C, Gerosa MA, van Deursen A (2018) Code smells for model-view-controller architectures. Empir Softw Eng 23 (4):2121\u20132157","journal-title":"Empir Softw Eng"},{"key":"10051_CR6","doi-asserted-by":"crossref","unstructured":"Bavota G, Carluccio BD, Lucia AD, Penta MD, Oliveto R, Strollo O (2012) When does a refactoring induce bugs? an empirical study. In: 12th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2012, Riva del Garda, Italy, September 23-24, 2012, pp 104\u2013113","DOI":"10.1109\/SCAM.2012.20"},{"issue":"6","key":"10051_CR7","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1016\/j.scico.2010.11.010","volume":"77","author":"N Bettenburg","year":"2012","unstructured":"Bettenburg N, Shang W, Ibrahim WM, Adams B, Zou Y, Hassan AE (2012) An empirical study on inconsistent changes to code clones at the release level. Sci Comput Program 77(6):760\u2013776","journal-title":"Sci Comput Program"},{"key":"10051_CR8","doi-asserted-by":"crossref","unstructured":"Bieman JM, Andrews AA, Yang HJ (2003) Understanding change-proneness in oo software through visualization. In: 11th IEEE International Workshop on Program Comprehension, 2003, pp 44\u201353","DOI":"10.1109\/WPC.2003.1199188"},{"key":"10051_CR9","doi-asserted-by":"publisher","unstructured":"Bird C, Bachmann A, Aune E, Duffy J, Bernstein A, Filkov V, Devanbu P (2009) Fair and balanced? bias in bug-fix datasets. In: Proceedings of the 7th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, ser. ESEC\/FSE \u201909. https:\/\/doi.org\/10.1145\/1595696.1595716. Association for Computing Machinery, New York, pp 121\u2013130","DOI":"10.1145\/1595696.1595716"},{"key":"10051_CR10","doi-asserted-by":"crossref","unstructured":"Bird C, Nagappan N, Murphy B, Gall H, Devanbu P (2011) Don\u2019t touch my code!: Examining the effects of ownership on software quality. In: Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering, ser. ESEC\/FSE \u201911. ACM, New York, pp 4\u201314","DOI":"10.1145\/2025113.2025119"},{"key":"10051_CR11","doi-asserted-by":"crossref","unstructured":"Bradley NC, Fritz T, Holmes R (2018) Context-aware conversational developer assistants. In: Proceedings of the 40th International Conference on Software Engineering, ICSE 2018, Gothenburg, Sweden, May 27 - June 03, 2018, pp 993\u20131003","DOI":"10.1145\/3180155.3180238"},{"key":"10051_CR12","doi-asserted-by":"crossref","unstructured":"Catolino G, Ferrucci F (2019) An extensive evaluation of ensemble techniques for software change prediction. J Softw Evol Process 31(9)","DOI":"10.1002\/smr.2156"},{"key":"10051_CR13","doi-asserted-by":"crossref","unstructured":"Claes M, M\u00e4ntyl\u00e4 MV, Kuutila M, Adams B (2018) Do programmers work at night or during the weekend?. In: Proceedings of the 40th International Conference on Software Engineering, ser. ICSE \u201918. ACM, New York, pp 705\u2013715","DOI":"10.1145\/3180155.3180193"},{"key":"10051_CR14","unstructured":"Commit to Accumulo project on GitHub (2021) [Online]. Available: https:\/\/github.com\/apache\/accumulo\/commit\/2ad672a"},{"key":"10051_CR15","unstructured":"Commit to denominator project on GitHub (2021) [Online]. Available: https:\/\/github.com\/Netflix\/denominator\/commit\/e727b9d"},{"key":"10051_CR16","unstructured":"Commit to liferay-portal project on GitHub (2021) [Online]. Available: https:\/\/github.com\/liferay\/liferay-portal\/commit\/1b5c378d4785"},{"key":"10051_CR17","unstructured":"Commit to lombok project on GitHub (2021) [Online]. Available: https:\/\/github.com\/projectlombok\/lombok\/commit\/57f59074"},{"key":"10051_CR18","unstructured":"Commit to tomp2p project on GitHub (2021) [Online]. Available: https:\/\/github.com\/tomp2p\/TomP2P\/commit\/4bc6e824"},{"key":"10051_CR19","unstructured":"Commit to TomP2P project on GitHub (2021) [Online]. Available: https:\/\/github.com\/tomp2p\/TomP2P\/commit\/3db803c"},{"key":"10051_CR20","unstructured":"Commit to TomP2P project on GitHub (2021) [Online]. Available: https:\/\/github.com\/tomp2p\/TomP2P\/commit\/8802c5e"},{"key":"10051_CR21","unstructured":"Commit to accumulo project on GitHub (2021) [Online]. Available: https:\/\/github.com\/apache\/accumulo\/commit\/b8859513a"},{"key":"10051_CR22","unstructured":"Commit to jitsi project on GitHub (2021) [Online]. Available: https:\/\/github.com\/jitsi\/jitsi\/commit\/6a361bbf6"},{"key":"10051_CR23","unstructured":"Commit to jitsi project on GitHub (2021) [Online]. Available: https:\/\/github.com\/jitsi\/jitsi\/commit\/a74af45"},{"key":"10051_CR24","unstructured":"Commit to spacewalk project on GitHub (2021) [Online]. Available: https:\/\/github.com\/spacewalkproject\/spacewalk\/commit\/6df7327"},{"key":"10051_CR25","unstructured":"Commit to spacewalk project on GitHub (2021) [Online]. Available: https:\/\/github.com\/spacewalkproject\/spacewalk\/commit\/fec7040"},{"key":"10051_CR26","unstructured":"Commit to tinkerpop project on GitHub (2021) [Online]. Available: https:\/\/github.com\/apache\/tinkerpop\/commit\/a4c62be7a5"},{"key":"10051_CR27","unstructured":"Commit to tinkerpop project on GitHub (2021) [Online]. Available: https:\/\/github.com\/apache\/tinkerpop\/commit\/aa3d538"},{"key":"10051_CR28","unstructured":"Commit to tower project on GitHub (2021) [Online]. Available: https:\/\/github.com\/DroidPlanner\/Tower\/commit\/72132d049"},{"key":"10051_CR29","unstructured":"Commit to openpnp project on GitHub (2021) [Online]. Available: https:\/\/github.com\/openpnp\/openpnp\/commit\/aeef4cb0e4"},{"key":"10051_CR30","unstructured":"Commit to geoserver project on GitHub1 (2021) [Online]. Available: https:\/\/github.com\/geoserver\/geoserver\/commit\/22c89ad106"},{"key":"10051_CR31","doi-asserted-by":"crossref","unstructured":"Dai M, Shen B, Zhang T, Zhao M (2014) Impact of consecutive changes on later file versions. In: Proceedings of the 2014 3rd International Workshop on Evidential Assessment of Software Technologies, ser. EAST 2014. ACM, New York, pp 17\u201324","DOI":"10.1145\/2627508.2627512"},{"key":"10051_CR32","doi-asserted-by":"crossref","unstructured":"Daniel B, Dig D, Garcia K, Marinov D (2007) Automated testing of refactoring engines. In: Proceedings of the the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, ser. ESEC-FSE \u201907, pp 185\u2013194","DOI":"10.1145\/1287624.1287651"},{"key":"10051_CR33","doi-asserted-by":"crossref","unstructured":"Eyolfson J, Tan L, Lam P (2011) Do time of day and developer experience affect commit bugginess?. In: Proceedings of the 8th Working Conference on Mining Software Repositories, ser. MSR \u201911. ACM, New York, pp 153\u2013162","DOI":"10.1145\/1985441.1985464"},{"key":"10051_CR34","doi-asserted-by":"crossref","unstructured":"Fakhoury S, Roy D, Hassan A, Arnaoudova V (2019) Improving source code readability: Theory and practice. In: 2019 IEEE\/ACM 27th International Conference on Program Comprehension (ICPC), pp 2\u201312","DOI":"10.1109\/ICPC.2019.00014"},{"key":"10051_CR35","doi-asserted-by":"crossref","unstructured":"Fischer M, Pinzger M, Gall H (2003) Populating a release history database from version control and bug tracking systems. In: 19th International Conference on Software Maintenance (ICSM 2003), the Architecture of Existing Systems, 22-26 September, 2003, Amsterdam, Netherlands, p 23","DOI":"10.1109\/ICSM.2003.1235403"},{"issue":"2","key":"10051_CR36","doi-asserted-by":"publisher","first-page":"23","DOI":"10.4018\/jossp.2011040102","volume":"3","author":"JM Gonzalez-Barahona","year":"2011","unstructured":"Gonzalez-Barahona JM, Izquierdo-Cortazar D, Capiluppi A (2011) Are developers fixing their own bugs?: Tracing bug-fixing and bug-seeding committers. Int J Open Source Softw Process 3(2):23\u201342","journal-title":"Int J Open Source Softw Process"},{"key":"10051_CR37","doi-asserted-by":"crossref","unstructured":"Hattori LP, Lanza M (2008) On the nature of commits. In: Proceedings of the 23rd IEEE\/ACM International Conference on Automated Software Engineering, ser. ASE\u201908. IEEE Press, Piscataway, pp III\u201363\u2013III\u201371","DOI":"10.1109\/ASEW.2008.4686322"},{"issue":"2","key":"10051_CR38","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s10664-015-9376-6","volume":"21","author":"K Herzig","year":"2016","unstructured":"Herzig K, Just S, Zeller A (2016) The impact of tangled code changes on defect prediction models. Empir Softw Eng 21(2):303\u2013336","journal-title":"Empir Softw Eng"},{"key":"10051_CR39","doi-asserted-by":"crossref","unstructured":"Herzig K, Zeller A (2013) The impact of tangled code changes. In: Proceedings of the 10th Working Conference on Mining Software Repositories, ser. MSR \u201913. IEEE Press, Piscataway, pp 121\u2013130","DOI":"10.1109\/MSR.2013.6624018"},{"key":"10051_CR40","doi-asserted-by":"crossref","unstructured":"Hindle A, German DM, Holt R (2008) What do large commits tell us?: A taxonomical study of large commits. In: Proceedings of the 2008 International Working Conference on Mining Software Repositories, ser. MSR \u201908. ACM, New York, pp 99\u2013108","DOI":"10.1145\/1370750.1370773"},{"key":"10051_CR41","doi-asserted-by":"crossref","unstructured":"Hora A, Silva D, Valente MT, Robbes R (2018) Assessing the threat of untracked changes in software evolution. In: Proceedings of the 40th International Conference on Software Engineering, ser. ICSE \u201918. ACM, pp 1102\u20131113","DOI":"10.1145\/3180155.3180212"},{"key":"10051_CR42","doi-asserted-by":"crossref","unstructured":"Jiang S, Armaly A, McMillan C (2017) Automatically generating commit messages from diffs using neural machine translation. In: Proceedings of the 32nd IEEE\/ACM International Conference on Automated Software Engineering, ASE 2017, Urbana, IL, USA, October 30 - November 03, 2017, pp 135\u2013146","DOI":"10.1109\/ASE.2017.8115626"},{"key":"10051_CR43","doi-asserted-by":"crossref","unstructured":"Kalliamvakou E, Gousios G, Blincoe K, Singer L, German DM, Damian D (2014) The promises and perils of mining GitHub. In: Proceedings of the 11th Working Conference on Mining Software Repositories, ser. MSR 2014, pp 92\u2013101","DOI":"10.1145\/2597073.2597074"},{"key":"10051_CR44","doi-asserted-by":"crossref","unstructured":"Kawrykow D, Robillard MP (2011) Non-essential changes in version histories. In: Proceedings of the 33rd International Conference on Software Engineering, ser. ICSE \u201911. ACM, pp 351\u2013360","DOI":"10.1145\/1985793.1985842"},{"key":"10051_CR45","doi-asserted-by":"crossref","unstructured":"Kim S, Whitehead EJ Jr (2006) How long did it take to fix bugs?. In: Proceedings of the 2006 International Workshop on Mining Software Repositories, ser. MSR \u201906. ACM, New York, pp 173\u2013174","DOI":"10.1145\/1137983.1138027"},{"key":"10051_CR46","doi-asserted-by":"crossref","unstructured":"Kim S, Zhang H, Wu R, Gong L (2011) Dealing with noise in defect prediction. In: Proceedings of the 33rd International Conference on Software Engineering, ser. ICSE \u201911. ACM, pp 481\u2013490","DOI":"10.1145\/1985793.1985859"},{"key":"10051_CR47","doi-asserted-by":"crossref","unstructured":"Kochhar PS, Tian Y, Lo D (2014) Potential biases in bug localization: Do they matter?. In: Proceedings of the 29th ACM\/IEEE International Conference on Automated Software Engineering, ser. ASE \u201914. ACM, pp 803\u2013814","DOI":"10.1145\/2642937.2642997"},{"key":"10051_CR48","doi-asserted-by":"crossref","unstructured":"Krinke J (2007) A study of consistent and inconsistent changes to code clones. In: 14th Working Conference on Reverse Engineering (WCRE 2007), pp 170\u2013178","DOI":"10.1109\/WCRE.2007.7"},{"key":"10051_CR49","doi-asserted-by":"crossref","unstructured":"Li Y, Zhu C, Rubin J, Chechik M (2016) Precise semantic history slicing through dynamic delta refinement. In: Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering, ser. ASE 2016. ACM, pp 495\u2013506","DOI":"10.1145\/2970276.2970336"},{"key":"10051_CR50","unstructured":"Liferay Portal Issue LPS-44476 (2021) [Online]. Available: https:\/\/issues.liferay.com\/browse\/LPS-44476"},{"key":"10051_CR51","doi-asserted-by":"crossref","unstructured":"Lin B, Scalabrino S, Mocci A, Oliveto R, Bavota G, Lanza M (2017, 2017) Investigating the use of code analysis and NLP to promote a consistent usage of identifiers. In: 17th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2017, Shanghai, China, September 17-18, pp 81\u201390","DOI":"10.1109\/SCAM.2017.17"},{"key":"10051_CR52","doi-asserted-by":"crossref","unstructured":"Lin B, Nagy C, Bavota G, Lanza M (2019) On the impact of refactoring operations on code naturalness. In: Wang X, Lo D, Shihab E (eds) 26th IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER. IEEE, pp 594\u2013598","DOI":"10.1109\/SANER.2019.8667992"},{"key":"10051_CR53","doi-asserted-by":"crossref","unstructured":"Mahmoudi M, Nadi S, Tsantalis N (2019) Are refactorings to blame? an empirical study of refactorings in merge conflicts. In: 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER), pp 151\u2013162","DOI":"10.1109\/SANER.2019.8668012"},{"key":"10051_CR54","doi-asserted-by":"crossref","unstructured":"Martinez M, Monperrus M (2019) Coming: A tool for mining change pattern instances from git commits. In: Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, ser. ICSE \u201919. IEEE Press, Piscataway, pp 79\u201382","DOI":"10.1109\/ICSE-Companion.2019.00043"},{"key":"10051_CR55","doi-asserted-by":"crossref","unstructured":"Mockus A, Votta LG (2000) Identifying reasons for software changes using historic databases. In: Proceedings of the International Conference on Software Maintenance (ICSM\u201900), ser. ICSM \u201900. IEEE Computer Society, Washington, pp 120\u2013","DOI":"10.1109\/ICSM.2000.883028"},{"key":"10051_CR56","doi-asserted-by":"crossref","unstructured":"Palomba F, Zaidman A, Oliveto R, De Lucia A (2017) An exploratory study on the relationship between changes and refactoring. In: Proceedings of the 25th International Conference on Program Comprehension, ser. ICPC \u201917. IEEE Press, pp 176\u2013185","DOI":"10.1109\/ICPC.2017.38"},{"issue":"3","key":"10051_CR57","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/s10664-008-9077-5","volume":"14","author":"K Pan","year":"2009","unstructured":"Pan K, Kim S, Whitehead EJ Jr (2009) Toward an understanding of bug fix patterns. Empir Softw Eng 14(3):286\u2013315","journal-title":"Empir Softw Eng"},{"key":"10051_CR58","doi-asserted-by":"crossref","unstructured":"Park J, Kim M, Bae D-H (2014) An empirical study on reducing omission errors in practice. In: Proceedings of the 29th ACM\/IEEE International Conference on Automated Software Engineering, ser. ASE \u201914. ACM, New York, pp 121\u2013126","DOI":"10.1145\/2642937.2642956"},{"issue":"1","key":"10051_CR59","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1007\/s10664-016-9432-x","volume":"22","author":"J Park","year":"2017","unstructured":"Park J, Kim M, Bae D-H (2017) An empirical study of supplementary patches in open source projects. Empir Softw Eng 22(1):436\u2013473","journal-title":"Empir Softw Eng"},{"key":"10051_CR60","doi-asserted-by":"crossref","unstructured":"Park J, Kim M, Ray B, Bae D (2012) An empirical study of supplementary bug fixes. In: 2012 9th IEEE Working Conference on Mining Software Repositories (MSR), pp 40\u201349","DOI":"10.1109\/MSR.2012.6224298"},{"key":"10051_CR61","doi-asserted-by":"crossref","unstructured":"Penta MD, Bavota G, Zampetti F (2020) On the relationship between refactoring actions and bugs: a differentiated replication. In: Devanbu P, Cohen MB, Zimmermann T (eds) ESEC\/FSE \u201920: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. ACM, pp 556\u2013567","DOI":"10.1145\/3368089.3409695"},{"key":"10051_CR62","doi-asserted-by":"crossref","unstructured":"Peruma A (2019) A preliminary study of android refactorings. In: 2019 IEEE\/ACM 6th International Conference on Mobile Software Engineering and Systems (MOBILESoft), pp 148\u2013149","DOI":"10.1109\/MOBILESoft.2019.00030"},{"key":"10051_CR63","doi-asserted-by":"crossref","unstructured":"Potdar A, Shihab E (2014) An exploratory study on self-admitted technical debt. In: 2014 IEEE International Conference on Software Maintenance and Evolution, pp 91\u2013100","DOI":"10.1109\/ICSME.2014.31"},{"key":"10051_CR64","unstructured":"Project FindBugs on GitHub (2021) [Online]. Available: https:\/\/github.com\/findbugsproject\/findbugs"},{"key":"10051_CR65","unstructured":"Project SpotBugs on GitHub (2021) [Online]. Available: https:\/\/github.com\/spotbugs\/spotbugs"},{"key":"10051_CR66","unstructured":"Project java-design-patterns on GitHub (2021) [Online]. Available: https:\/\/github.com\/iluwatar\/java-design-patterns"},{"key":"10051_CR67","unstructured":"Project spring-petclinic on GitHub (2021) [Online]. Available: https:\/\/github.com\/spring-projects\/spring-petclinic"},{"issue":"6","key":"10051_CR68","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1109\/TSE.2005.74","volume":"31","author":"R Purushothaman","year":"2005","unstructured":"Purushothaman R, Perry DE (2005) Toward understanding the rhetoric of small source code changes. IEEE Trans Softw Eng 31(6):511\u2013526","journal-title":"IEEE Trans Softw Eng"},{"key":"10051_CR69","doi-asserted-by":"crossref","unstructured":"Rahman F, Devanbu P (2011) Ownership, experience and defects: A fine-grained study of authorship. In: Proceedings of the 33rd International Conference on Software Engineering, ser. ICSE \u201911. ACM, New York, pp 491\u2013500","DOI":"10.1145\/1985793.1985860"},{"key":"10051_CR70","doi-asserted-by":"crossref","unstructured":"Rahman F, Posnett D, Herraiz I, Devanbu P (2013) Sample size vs. bias in defect prediction. In: Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering, ser. ESEC\/FSE 2013. ACM, pp 147\u2013157","DOI":"10.1145\/2491411.2491418"},{"key":"10051_CR71","doi-asserted-by":"crossref","unstructured":"Rahman MM, Roy CK, Kula RG (2017) Predicting usefulness of code review comments using textual features and developer experience. In: 2017 IEEE\/ACM 14th International Conference on Mining Software Repositories (MSR), pp 215\u2013226","DOI":"10.1109\/MSR.2017.17"},{"key":"10051_CR72","unstructured":"Replication package (2021) https:\/\/github.com\/USI-INF-Software\/EMSE-ICPC2020-quick-remedy-commit"},{"key":"10051_CR73","doi-asserted-by":"crossref","unstructured":"Rigby PC, Robillard MP (2013) Discovering essential code elements in informal documentation Notkin D, Cheng BHC, Pohl K (eds), IEEE Computer Society","DOI":"10.1109\/ICSE.2013.6606629"},{"key":"10051_CR74","doi-asserted-by":"crossref","unstructured":"Robillard MP, Nassif M, McIntosh S (2018) Threats of aggregating software repository data. In: 2018 IEEE International Conference on Software Maintenance and Evolution (ICSME), pp 508\u2013518","DOI":"10.1109\/ICSME.2018.00009"},{"key":"10051_CR75","doi-asserted-by":"crossref","unstructured":"Rodriguez-Perez G, Robles G, Gonzalez-Barahona JM (2017) How much time did it take to notify a bug?: Two case studies: Elasticsearch and nova. In: Proceedings of the 8th Workshop on Emerging Trends in Software Metrics, ser. WETSoM \u201917. IEEE Press, Piscataway, pp 29\u201335","DOI":"10.1109\/WETSoM.2017.6"},{"key":"10051_CR76","doi-asserted-by":"crossref","unstructured":"Rodriguez-Perez G, Robles G, Gonzalez-Barahona JM (2017) How much time did it take to notify a bug? two case studies: Elasticsearch and nova. In: 2017 IEEE\/ACM 8th Workshop on Emerging Trends in Software Metrics (WETSoM), pp 29\u201335","DOI":"10.1109\/WETSoM.2017.6"},{"key":"10051_CR77","doi-asserted-by":"publisher","unstructured":"Rodr\u00edguez-P\u00e9rez G., Zaidman A, Serebrenik A, Robles G, Gonz\u00e1lez-Barahona J.M. (2018) What if a bug has a different origin? making sense of bugs without an explicit bug introducing change. In: Proceedings of the 12th ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement, ser. ESEM \u201918. Association for Computing Machinery, New York. https:\/\/doi.org\/10.1145\/3239235.3267436","DOI":"10.1145\/3239235.3267436"},{"issue":"7","key":"10051_CR78","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1016\/j.scico.2009.02.007","volume":"74","author":"CK Roy","year":"2009","unstructured":"Roy CK, Cordy JR, Koschke R (2009) Comparison and evaluation of code clone detection techniques and tools: A qualitative approach, Sci. Comput Program 74(7):470\u2013495","journal-title":"Comput Program"},{"key":"10051_CR79","doi-asserted-by":"crossref","unstructured":"Shimagaki J, Kamei Y, McIntosh S, Pursehouse D, Ubayashi N (2016) Why are commits being reverted?: A comparative study of industrial and open source projects","DOI":"10.1109\/ICSME.2016.83"},{"key":"10051_CR80","doi-asserted-by":"crossref","unstructured":"\u015aliwerski J., Zimmermann T, Zeller A (2005) When do changes induce fixes?. In: Proceedings of the 2005 International Workshop on Mining Software Repositories, ser. MSR \u201905. ACM, New York, pp 1\u20135","DOI":"10.1145\/1083142.1083147"},{"key":"10051_CR81","doi-asserted-by":"crossref","unstructured":"Tsantalis N, Ketkar A, Dig D (2020) Refactoringminer 2.0 IEEE Transactions on Software Engineering","DOI":"10.1109\/TSE.2020.3007722"},{"key":"10051_CR82","doi-asserted-by":"publisher","unstructured":"Tsantalis N, Mansouri M, M Eshkevari L, Mazinanian D, Dig D (2018) Accurate and efficient refactoring detection in commit history. In: Proceedings of the 40th International Conference on Software Engineering, ser. ICSE \u201918. ACM, New York, pp 483\u2013494. https:\/\/doi.org\/10.1145\/3180155.3180206","DOI":"10.1145\/3180155.3180206"},{"key":"10051_CR83","doi-asserted-by":"crossref","unstructured":"Tufano M, Bavota G, Poshyvanyk D, Penta MD, Oliveto R, Lucia AD (2017) An empirical study on developer-related factors characterizing fix-inducing commits. J Softw Evol Process 29(1)","DOI":"10.1002\/smr.1797"},{"key":"10051_CR84","doi-asserted-by":"crossref","unstructured":"Tufano M, Pantiuchina J, Watson C, Bavota G, Poshyvanyk D (2019) On learning meaningful code changes via neural machine translation. In: Proceedings of the 41st International Conference on Software Engineering, ICSE 2019, Montreal, QC, Canada, May 25-31, 2019, pp 25\u201336","DOI":"10.1109\/ICSE.2019.00021"},{"key":"10051_CR85","doi-asserted-by":"crossref","unstructured":"Tufano M, Watson C, Bavota G, Penta MD, White M, Poshyvanyk D (2018) An empirical investigation into learning bug-fixing patches in the wild via neural machine translation. In: Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, ASE 2018, Montpellier, France, September 3-7, 2018, pp 832\u2013837","DOI":"10.1145\/3238147.3240732"},{"issue":"4","key":"10051_CR86","doi-asserted-by":"publisher","first-page":"19,1","DOI":"10.1145\/3340544","volume":"28","author":"M Tufano","year":"2019","unstructured":"Tufano M, Watson C, Bavota G, Penta MD, White M, Poshyvanyk D (2019) An empirical study on learning bug-fixing patches in the wild via neural machine translation. ACM Trans Softw Eng Methodol 28(4):19,1\u201319,29","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"10051_CR87","doi-asserted-by":"publisher","first-page":"110667","DOI":"10.1016\/j.jss.2020.110667","volume":"169","author":"C Wang","year":"2020","unstructured":"Wang C, Li Y, Chen L, Huang W, Zhou Y, Xu B (2020) Examining the effects of developer familiarity on bug fixing. J Syst Softw 169:110667. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0164121220301266","journal-title":"J Syst Softw"},{"key":"10051_CR88","doi-asserted-by":"crossref","unstructured":"Wen F, Nagy C, Bavota G, Lanza M (2019) A large-scale empirical study on code-comment inconsistencies. In: Proceedings of the 27th International Conference on Program Comprehension, ICPC 2019, Montreal, QC, Canada, May 25-31, 2019, pp 53\u201364","DOI":"10.1109\/ICPC.2019.00019"},{"key":"10051_CR89","doi-asserted-by":"crossref","unstructured":"Wen F, Nagy C, Lanza M, Bavota G (2020) An empirical study of quick remedy commits. In: ICPC \u201920: 28th International Conference on Program Comprehension. ACM, pp 60\u201371","DOI":"10.1145\/3387904.3389266"},{"key":"10051_CR90","doi-asserted-by":"publisher","unstructured":"Yan M, Xia X, Lo D, Hassan AE, Li S (2019) Characterizing and identifying reverted commits. https:\/\/doi.org\/10.1007\/s10664-019-09688-8, vol 24, pp 2171\u20132208","DOI":"10.1007\/s10664-019-09688-8"},{"key":"10051_CR91","doi-asserted-by":"crossref","unstructured":"Yin Z, Yuan D, Zhou Y, Pasupathy S, Bairavasundaram L (2011) How do fixes become bugs?. In: Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering, ser. ESEC\/FSE \u201911. ACM, New York, pp 26\u201336","DOI":"10.1145\/2025113.2025121"},{"issue":"C","key":"10051_CR92","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.infsof.2017.02.003","volume":"86","author":"Y Zhao","year":"2017","unstructured":"Zhao Y, Leung H, Yang Y, Zhou Y, Xu B (2017) Towards an understanding of change types in bug fixing code. Inf Softw Technol 86(C):37\u201353","journal-title":"Inf Softw Technol"},{"key":"10051_CR93","doi-asserted-by":"crossref","unstructured":"Zimmermann T, Weisgerber P, Diehl S, Zeller A (2004) Mining version histories to guide software changes. In: Proceedings of the 26th International Conference on Software Engineering, ser. ICSE \u201904. IEEE Computer Society, pp 563\u2013572","DOI":"10.1109\/ICSE.2004.1317478"},{"issue":"6","key":"10051_CR94","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1109\/TSE.2005.72","volume":"31","author":"T Zimmermann","year":"2005","unstructured":"Zimmermann T, Zeller A, Weissgerber P, Diehl S (2005) Mining version histories to guide software changes. IEEE Trans Softw Eng 31(6):429\u2013445","journal-title":"IEEE Trans Softw Eng"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-021-10051-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-021-10051-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-021-10051-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T08:08:42Z","timestamp":1643184522000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-021-10051-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,28]]},"references-count":94,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["10051"],"URL":"https:\/\/doi.org\/10.1007\/s10664-021-10051-z","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,28]]},"assertion":[{"value":"13 September 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 October 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"14"}}