{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T04:03:51Z","timestamp":1775016231682,"version":"3.50.1"},"reference-count":99,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,8,17]],"date-time":"2022-08-17T00:00:00Z","timestamp":1660694400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,8,17]],"date-time":"2022-08-17T00:00:00Z","timestamp":1660694400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100000038","name":"natural sciences and engineering research council of canada","doi-asserted-by":"publisher","award":["PDF-533056-2019"],"award-info":[{"award-number":["PDF-533056-2019"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]},{"name":"eu horizon 2020","award":["H2020-ICT-2020-1-RIA"],"award-info":[{"award-number":["H2020-ICT-2020-1-RIA"]}]},{"name":"cosmos project","award":["957254"],"award-info":[{"award-number":["957254"]}]},{"DOI":"10.13039\/501100008982","name":"national science foundation","doi-asserted-by":"publisher","award":["1816594"],"award-info":[{"award-number":["1816594"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1007\/s10664-022-10193-8","type":"journal-article","created":{"date-parts":[[2022,8,17]],"date-time":"2022-08-17T04:02:45Z","timestamp":1660708965000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Revisiting the debate: Are code metrics useful for measuring maintenance effort?"],"prefix":"10.1007","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2301-6104","authenticated-orcid":false,"given":"Shaiful","family":"Chowdhury","sequence":"first","affiliation":[]},{"given":"Reid","family":"Holmes","sequence":"additional","affiliation":[]},{"given":"Andy","family":"Zaidman","sequence":"additional","affiliation":[]},{"given":"Rick","family":"Kazman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,17]]},"reference":[{"key":"10193_CR1","doi-asserted-by":"crossref","unstructured":"Abid N J, Sharif B, Dragan N, Alrasheed H, Maletic J I (2019) Developer reading behavior while summarizing java methods: Size and context matters. In: Proceedings of the 41st international conference on software engineering, pp 384\u2013395","DOI":"10.1109\/ICSE.2019.00052"},{"key":"10193_CR2","doi-asserted-by":"crossref","unstructured":"Alfadel M, Kobilica A, Hassine J (2017) Evaluation of halstead and cyclomatic complexity metrics in measuring defect density. In: 2017 9th IEEE-GCC conference and exhibition, pp 1\u20139","DOI":"10.1109\/IEEEGCC.2017.8447959"},{"key":"10193_CR3","doi-asserted-by":"crossref","unstructured":"Alsolai H, Roper M, Nassar D (2018) Predicting software maintainability in object-oriented systems using ensemble techniques. In: 2018 IEEE International conference on software maintenance and evolution, pp 716\u2013721","DOI":"10.1109\/ICSME.2018.00088"},{"key":"10193_CR4","doi-asserted-by":"crossref","unstructured":"Alves T L, Ypma C, Visser J (2010) Deriving metric thresholds from benchmark data. In: IEEE International conference on software maintenance, pp 1\u201310","DOI":"10.1109\/ICSM.2010.5609747"},{"key":"10193_CR5","doi-asserted-by":"crossref","unstructured":"Aniche M F, Treude C, Zaidman A, van Deursen A, Gerosa M A (2016) SATT: Tailoring code metric thresholds for different software architectures. In: 16th IEEE International working conference on source code analysis and manipulation, 2016, Raleigh, NC, USA, October 2-3, 2016, pp 41\u201350","DOI":"10.1109\/SCAM.2016.19"},{"key":"10193_CR6","doi-asserted-by":"crossref","unstructured":"Antinyan V, Staron M, Derehag J, Runsten M, Wikstr\u00f6m E, Meding W, Henriksson A, Hansson J (2015) Identifying complex functions: By investigating various aspects of code complexity. In: 2015 Science and information conference (SAI), pp 879\u2013888","DOI":"10.1109\/SAI.2015.7237246"},{"key":"10193_CR7","doi-asserted-by":"crossref","unstructured":"Antinyan V, Staron M, Meding W, \u00d6sterstr\u00f6m P, Wikstrom E, Wranker J, Henriksson A, Hansson J (2014) Identifying risky areas of software code in agile\/lean software development: An industrial experience report. In: IEEE Conference on software maintenance, reengineering, and reverse engineering, pp 154\u2013163","DOI":"10.1109\/CSMR-WCRE.2014.6747165"},{"issue":"6","key":"10193_CR8","doi-asserted-by":"publisher","first-page":"3057","DOI":"10.1007\/s10664-017-9508-2","volume":"22","author":"V Antinyan","year":"2017","unstructured":"Antinyan V, Staron M, Sandberg A (2017) Evaluating code complexity triggers, use of complexity measures and the influence of code complexity on maintenance time. Empirical Softw Engg 22(6):3057\u20133087","journal-title":"Empirical Softw Engg"},{"issue":"11","key":"10193_CR9","doi-asserted-by":"publisher","first-page":"1100","DOI":"10.1109\/TSE.2014.2342227","volume":"40","author":"D Athanasiou","year":"2014","unstructured":"Athanasiou D, Nugroho A, Visser J, Zaidman A (2014) Test code quality and its relation to issue handling performance. IEEE Trans Software Eng 40(11):1100\u20131125","journal-title":"IEEE Trans Software Eng"},{"issue":"1","key":"10193_CR10","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1109\/TSE.2003.1166590","volume":"29","author":"RK Bandi","year":"2003","unstructured":"Bandi R K, Vaishnavi V K, Turk D E (2003) Predicting maintenance performance using object-oriented design complexity metrics. IEEE Trans Softw Eng 29(1):77\u201387","journal-title":"IEEE Trans Softw Eng"},{"key":"10193_CR11","doi-asserted-by":"crossref","unstructured":"Bauer J, Siegmund J, Peitek N, Hofmeister J C, Apel S (2019) Indentation: Simply a matter of style or support for program comprehension?. In: IEEE\/ACM 27th International conference on program comprehension, pp 154\u2013164","DOI":"10.1109\/ICPC.2019.00033"},{"issue":"4","key":"10193_CR12","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1109\/TSE.2014.2367027","volume":"41","author":"G Bavota","year":"2015","unstructured":"Bavota G, Linares-V\u00e1squez M, Bernal-C\u00e1rdenas C E, Penta M D, Oliveto R, Poshyvanyk D (2015) The impact of api change- and fault-proneness on the user ratings of Android apps. IEEE Trans Softw Eng 41(4):384\u2013407","journal-title":"IEEE Trans Softw Eng"},{"key":"10193_CR13","doi-asserted-by":"crossref","unstructured":"Bell R M, Ostrand T J, Weyuker E J (2011) Does measuring code change improve fault prediction?. In: Proceedings of the 7th international conference on predictive models in software engineering, Promise \u201911","DOI":"10.1145\/2020390.2020392"},{"issue":"9","key":"10193_CR14","doi-asserted-by":"publisher","first-page":"886","DOI":"10.1109\/TSE.2016.2527791","volume":"42","author":"J B\u00f6rstler","year":"2016","unstructured":"B\u00f6rstler J, Paech B (2016) The role of method chains and comments in software readability and comprehension\u2013an experiment. IEEE Trans Softw Eng 42 (9):886\u2013898","journal-title":"IEEE Trans Softw Eng"},{"issue":"3","key":"10193_CR15","first-page":"139","volume":"2","author":"JM Brittain","year":"1982","unstructured":"Brittain J M (1982) Pitfalls of user research, and some neglected areas. Soc Sci Inf Stud 2(3):139\u2013148","journal-title":"Soc Sci Inf Stud"},{"issue":"4","key":"10193_CR16","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1109\/TSE.2009.70","volume":"36","author":"RPL Buse","year":"2010","unstructured":"Buse RP L, Weimer W R (2010) Learning a metric for code readability. IEEE Trans Softw Eng 36(4):546\u2013558","journal-title":"IEEE Trans Softw Eng"},{"key":"10193_CR17","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.jss.2018.05.003","volume":"143","author":"G Catolino","year":"2018","unstructured":"Catolino G, Palomba F, De Lucia A, Ferrucci F, Zaidman A (2018) Enhancing change prediction models using developer-related factors. J Syst Softw 143:14\u201328","journal-title":"J Syst Softw"},{"key":"10193_CR18","doi-asserted-by":"crossref","unstructured":"Chen Y T, Gopinath R, Tadakamalla A, Ernst M D, Holmes R, Fraser G, Ammann P, Just R (2020) Revisiting the relationship between fault detection, test adequacy criteria, and test set size. In: 2020 35th IEEE\/ACM International conference on automated software engineering (ASE), pp 237\u2013249","DOI":"10.1145\/3324884.3416667"},{"issue":"6","key":"10193_CR19","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1109\/32.295895","volume":"20","author":"SR Chidamber","year":"1994","unstructured":"Chidamber S R, Kemerer C F (1994) A metrics suite for object oriented design. IEEE Trans Softw Eng 20(6):476\u2013493","journal-title":"IEEE Trans Softw Eng"},{"issue":"4","key":"10193_CR20","doi-asserted-by":"publisher","first-page":"1649","DOI":"10.1007\/s10664-018-9640-7","volume":"24","author":"S Chowdhury","year":"2019","unstructured":"Chowdhury S, Borle S, Romansky S, Hindle A (2019) Greenscaler: Training software energy models with automatic test generation. Emp Softw Eng: Int J 24(4):1649\u20131692","journal-title":"Emp Softw Eng: Int J"},{"issue":"8","key":"10193_CR21","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/2.303623","volume":"27","author":"D Coleman","year":"1994","unstructured":"Coleman D, Ash D, Lowther B, Oman P (1994) Using metrics to evaluate software system maintainability. Computer 27(8):44\u201349","journal-title":"Computer"},{"key":"10193_CR22","doi-asserted-by":"crossref","unstructured":"Cruz L, Abreu R, Grundy J, Li L, Xia X (2019) Do energy-oriented changes hinder maintainability?. In: 2019 IEEE International conference on software maintenance and evolution, pp 29\u201340","DOI":"10.1109\/ICSME.2019.00013"},{"issue":"2","key":"10193_CR23","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/TSE.1979.234165","volume":"SE-5","author":"B Curtis","year":"1979","unstructured":"Curtis B, Sheppard S B, Milliman P, Borst M A, Love T (1979) Measuring the psychological complexity of software maintenance tasks with the halstead and mccabe metrics. IEEE Trans Softw Eng SE-5(2):96\u2013104","journal-title":"IEEE Trans Softw Eng"},{"issue":"11","key":"10193_CR24","doi-asserted-by":"publisher","first-page":"982","DOI":"10.1109\/TSE.2005.130","volume":"31","author":"DP Darcy","year":"2005","unstructured":"Darcy D P, Kemerer C F, Slaughter S A, Tomayko J E (2005) The structural complexity of software an experimental test. IEEE Trans Softw Eng 31(11):982\u2013995","journal-title":"IEEE Trans Softw Eng"},{"issue":"6","key":"10193_CR25","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/MS.2016.147","volume":"33","author":"C Ebert","year":"2016","unstructured":"Ebert C, Cain J, Antoniol G, Counsell S, Laplante P (2016) Cyclomatic complexity. IEEE Softw 33(6):27\u201329","journal-title":"IEEE Softw"},{"issue":"7","key":"10193_CR26","doi-asserted-by":"publisher","first-page":"630","DOI":"10.1109\/32.935855","volume":"27","author":"K El Emam","year":"2001","unstructured":"El Emam K, Benlarbi S, Goel N, Rai S N (2001) The confounding effect of class size on the validity of object-oriented metrics. IEEE Trans Softw Eng 27(7):630\u2013650","journal-title":"IEEE Trans Softw Eng"},{"issue":"2","key":"10193_CR27","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1002\/stvr.4370010204","volume":"1","author":"N Fenton","year":"1991","unstructured":"Fenton N, Kitchenham B (1991) Validating software measures. Softw Test Verif Reliab 1(2):27\u201342","journal-title":"Softw Test Verif Reliab"},{"key":"10193_CR28","doi-asserted-by":"crossref","unstructured":"Giger E, D\u2019Ambros M, Pinzger M, Gall H C (2012) Method-level bug prediction. In: Proceedings of the 2012 ACM-IEEE international symposium on empirical software engineering and measurement, pp 171\u2013180","DOI":"10.1145\/2372251.2372285"},{"issue":"1","key":"10193_CR29","doi-asserted-by":"publisher","first-page":"2:1","DOI":"10.5381\/jot.2016.15.1.a2","volume":"15","author":"Y Gil","year":"2016","unstructured":"Gil Y, Lalouche G (2016) When do software complexity metrics mean nothing? \u2014 when examined out of context. J Obj Technol 15(1):2:1\u201325","journal-title":"J Obj Technol"},{"issue":"5","key":"10193_CR30","doi-asserted-by":"publisher","first-page":"2585","DOI":"10.1007\/s10664-017-9513-5","volume":"22","author":"Y Gil","year":"2017","unstructured":"Gil Y, Lalouche G (2017) On the correlation between size and metric validity. Empir Softw Eng 22(5):2585\u20132611","journal-title":"Empir Softw Eng"},{"key":"10193_CR31","doi-asserted-by":"crossref","unstructured":"Gopinath R, Jensen C, Groce A (2014) Code coverage for suite evaluation by developers. In: Proceedings of the 36th international conference on software engineering, pp 72\u201382","DOI":"10.1145\/2568225.2568278"},{"key":"10193_CR32","doi-asserted-by":"crossref","unstructured":"Grund F, Chowdhury S, Bradley N C, Hall B, Holmes R (2021) Codeshovel: A reusable and available tool for extracting source code histories. In: 2021 IEEE\/ACM 43rd international conference on software engineering: Companion proceedings (ICSE-Companion), pp 221\u2013222","DOI":"10.1109\/ICSE-Companion52605.2021.00100"},{"key":"10193_CR33","doi-asserted-by":"crossref","unstructured":"Grund F, Chowdhury S, Bradley N C, Hall B, Holmes R (2021) Codeshovel: Constructing method-level source code histories. In: 2021 IEEE\/ACM 43rd international conference on software engineering (ICSE), pp 1510\u20131522","DOI":"10.1109\/ICSE43902.2021.00135"},{"key":"10193_CR34","doi-asserted-by":"crossref","unstructured":"Hata H, Mizuno O, Kikuno T (2011) Historage: Fine-grained version control system for java. In: Proc. International workshop on principles of software evolution and ERCIM workshop on software evolution, pp 96\u2013100","DOI":"10.1145\/2024445.2024463"},{"key":"10193_CR35","doi-asserted-by":"crossref","unstructured":"Herraiz I, Gonzalez-Barahona J M, Robles G (2007) Towards a theoretical model for software growth. In: Fourth international workshop on mining software repositories, pp 21\u201321","DOI":"10.1109\/MSR.2007.31"},{"key":"10193_CR36","doi-asserted-by":"crossref","unstructured":"Herzig K, Zeller A (2013) The impact of tangled code changes. In: 2013 10th Working conference on mining software repositories, pp 121\u2013130","DOI":"10.1109\/MSR.2013.6624018"},{"key":"10193_CR37","doi-asserted-by":"publisher","first-page":"110571","DOI":"10.1016\/j.jss.2020.110571","volume":"165","author":"Y Higo","year":"2020","unstructured":"Higo Y, Hayashi S, Kusumoto S (2020) On tracking java methods with git mechanisms. J Syst Softw 165:110571","journal-title":"J Syst Softw"},{"key":"10193_CR38","doi-asserted-by":"crossref","unstructured":"Hindle A, Godfrey M W, Holt R C (2008) Reading beside the lines: Indentation as a proxy for complexity metric. In: 16th IEEE International conference on program comprehension, pp 133\u2013142","DOI":"10.1109\/ICPC.2008.13"},{"key":"10193_CR39","doi-asserted-by":"crossref","unstructured":"Hofmeister J, Siegmund J, Holt D V (2017) Shorter identifier names take longer to comprehend. In: IEEE 24th International conference on software analysis, evolution and reengineering, pp 217\u2013227","DOI":"10.1109\/SANER.2017.7884623"},{"key":"10193_CR40","doi-asserted-by":"crossref","unstructured":"Inozemtseva L, Holmes R (2014) Coverage is not strongly correlated with test suite effectiveness. In: Proceedings of the 36th international conference on software engineering, pp 435\u2013445","DOI":"10.1145\/2568225.2568271"},{"key":"10193_CR41","doi-asserted-by":"crossref","unstructured":"Islam M R, Zibran M F (2020) How bugs are fixed: Exposing bug-fix patterns with edits and nesting levels. In: Proceedings of the 35th annual ACM symposium on applied computing, pp 1523\u20131531","DOI":"10.1145\/3341105.3373880"},{"key":"10193_CR42","doi-asserted-by":"crossref","unstructured":"Johnson J, Lubo S, Yedla N, Aponte J, Sharif B (2019) An empirical study assessing source code readability in comprehension. In: 2019 IEEE International conference on software maintenance and evolution, pp 513\u2013523","DOI":"10.1109\/ICSME.2019.00085"},{"key":"10193_CR43","doi-asserted-by":"crossref","unstructured":"Just R, Jalali D, Inozemtseva L, Ernst M D, Holmes R, Fraser G (2014) Are mutants a valid substitute for real faults in software testing?. In: Proceedings of the 22nd ACM SIGSOFT international symposium on foundations of software engineering, pp 654\u2013665","DOI":"10.1145\/2635868.2635929"},{"issue":"3","key":"10193_CR44","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1109\/TSE.1987.233164","volume":"SE-13","author":"D Kafura","year":"1987","unstructured":"Kafura D, Reddy G R (1987) The use of software complexity metrics in software maintenance. IEEE Trans Softw Eng SE-13(3):335\u2013343","journal-title":"IEEE Trans Softw Eng"},{"issue":"3","key":"10193_CR45","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s10664-011-9171-y","volume":"17","author":"F Khomh","year":"2012","unstructured":"Khomh F, Penta M D, Gu\u00e9h\u00e9neuc Y-G, Antoniol G (2012) An exploratory study of the impact of antipatterns on class change- and fault-proneness. Emp Softw Eng: Int J 17(3):243\u2013275","journal-title":"Emp Softw Eng: Int J"},{"issue":"1","key":"10193_CR46","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1007\/s10664-019-09736-3","volume":"25","author":"M Kondo","year":"2020","unstructured":"Kondo M, German D M, Mizuno O, Choi E-H (2020) The impact of context metrics on just-in-time defect prediction. Emp Softw Eng 25(1):890\u2013939","journal-title":"Emp Softw Eng"},{"key":"10193_CR47","doi-asserted-by":"crossref","unstructured":"Kotu V, Deshpande B (2015) Chapter 2 - data mining process. In: Kotu V, Deshpande B (eds) Predictive analytics and data mining. Morgan Kaufmann, Boston, pp 17\u201336 LakeA,CookC R:Useoffactoranalysistodevelopoopsoftware complexitymetrics.USA,1994.","DOI":"10.1016\/B978-0-12-801460-8.00002-1"},{"key":"10193_CR48","unstructured":"LandmanD,SerebrenikA,VinjuJ(2014)Empiricalanalysisoftherelationship betweenccandslocinalargecorpusofjavamethods.In: IEEEInternationalconference onsoftwaremaintenanceandevolution,pp221\u2013230"},{"key":"10193_CR49","unstructured":"LehmanM M,RamilJ F,WernickP D,PerryD E,TurskiW M (1997)Metricsandlawsofsoftwareevolution-theninetiesview.In: International softwaremetricssymposium,pp20\u201332"},{"key":"10193_CR50","unstructured":"LenarduzziV,SillittiA,TaibiD(2017)Analyzingfortyyearsofsoftware maintenancemodels.In: Internationalconferenceonsoftwareengineeringcompanion (ICSE-C),pp146\u2013148"},{"key":"10193_CR51","unstructured":"LevenshteinV I(1966)Binarycodescapableofcorrectingdeletions,insertions,and reversals.In: Sovietphysicsdoklady,vol 10,pp707\u2013710"},{"key":"10193_CR52","unstructured":"MatterD,KuhnA,NierstraszO(2009)Assigningbugreportsusinga vocabulary-basedexpertisemodelofdevelopers.In: 20096thIEEEInternationalworking conferenceonminingsoftwarerepositories,pp131\u2013140"},{"issue":"4","key":"10193_CR53","first-page":"308","volume":"SE-2","author":"TJ McCabe","year":"1976","unstructured":"McCabeT J(1976)Acomplexitymeasure.IEEETransSoftwEng SE-2(4):308\u2013320","journal-title":"IEEETransSoftwEng"},{"key":"10193_CR54","unstructured":"McClureC L(1978)Amodelforprogramcomplexityanalysis.In: Proceedings ofthe3rdinternationalconferenceonsoftwareengineering,pp149\u2013157"},{"issue":"1","key":"10193_CR55","first-page":"2","volume":"33","author":"T Menzies","year":"2007","unstructured":"MenziesT,GreenwaldJ,FrankA(2007)Dataminingstaticcodeattributes tolearndefectpredictors.IEEETransSoftwEng 33(1):2\u201313","journal-title":"IEEETransSoftwEng"},{"key":"10193_CR56","unstructured":"MoR,CaiY,KazmanR,XiaoL,FengQ(2016)Decoupling level:Anewmetricforarchitecturalmaintenancecomplexity.In: 2016IEEE\/ACM38th internationalconferenceonsoftwareengineering,pp499\u2013510"},{"key":"10193_CR57","unstructured":"MockuA,VottaL G(2000)Identifyingreasonsforsoftwarechangesusinghistoric databases.In: Proceedings2000Internationalconferenceonsoftwaremaintenance,pp 120\u2013130"},{"key":"10193_CR58","unstructured":"MondenA,NakaeD,KamiyaT,SatoS,MatsumotoK(2002) Softwarequalityanalysisbycodeclonesinindustriallegacysoftware.In: Proceedings IEEEsymposiumonsoftwaremetrics,pp87\u201394"},{"key":"10193_CR59","unstructured":"MoserR,PedryczW,SucciG(2008)Analysisofthereliabilityofa subsetofchangemetricsfordefectprediction.In: ProceedingsoftheSecondACM-IEEE internationalsymposiumonempiricalsoftwareengineeringandmeasurement,ESEM\u201908, pp309\u2013311"},{"key":"10193_CR60","unstructured":"NagappanN,BallT(2005)Useofrelativecodechurnmeasurestopredictsystem defectdensity.In: Proceedings.27thInternationalconferenceonsoftwareengineering, pp284\u2013292"},{"key":"10193_CR61","unstructured":"OmanP,HagemeisterJ(1992)Metricsforassessingasoftwaresystem\u2019s maintainability.In: Proceedingsconferenceonsoftwaremaintenance1992,pp337\u2013344"},{"key":"10193_CR62","unstructured":"PalombaF,ZaidmanA,OlivetoR,De LuciaA(2017)Anexploratory studyontherelationshipbetweenchangesandrefactoring.In: Proceedingsofthe25th internationalconferenceonprogramcomprehension,pp176\u2013185"},{"key":"10193_CR63","unstructured":"PantiuchinaJ,LanzaM,BavotaG(2018)Improvingcode:The(mis) perceptionofqualitymetrics.In: IEEEInternationalconferenceonsoftwaremaintenance andevolution,pp80\u201391"},{"key":"10193_CR64","unstructured":"PapadakisM,ShinD,YooS,BaeD-H(2018)Aremutationscores correlatedwithrealfaultdetection? Alargescaleempiricalstudyontherelationship betweenmutantsandrealfaults.In: Proceedingsofthe40thinternationalconference onsoftwareengineering,pp537\u2013548"},{"key":"10193_CR65","unstructured":"PascarellaL,PalombaF,BacchelliA(2020)Ontheperformanceofmethod-level bugprediction:Anegativeresult.JSystSoftw,161"},{"key":"10193_CR66","unstructured":"PosnettD,HindleA,DevanbuP(2011)Asimplermodelofsoftwarereadability. In: Proceedingsofthe8thworkingconferenceonminingsoftwarerepositories,pp73\u201382"},{"issue":"8","key":"10193_CR67","first-page":"1397","volume":"55","author":"D Radjenovi\u0107","year":"2013","unstructured":"Radjenovi\u0107D,Heri\u010dkoM,TorkarR,\u017eivkovi\u010dA(2013)Softwarefault predictionmetrics:Asystematicliteraturereview.InfSoftwTechnol 55 (8):1397\u20131418","journal-title":"InfSoftwTechnol"},{"key":"10193_CR68","unstructured":"RahmanM S,RoyC K(2017)Ontherelationshipsbetweenstabilityand bug-pronenessofcodeclones:Anempiricalstudy.In: 2017IEEE17thInternational workingconferenceonsourcecodeanalysisandmanipulation(SCAM),pp131\u2013140"},{"key":"10193_CR69","unstructured":"RalphP,TemperoE(2018)Constructvalidityinsoftwareengineeringresearch andsoftwaremetrics.In: Proceedingsofthe22ndInternationalconferenceonevaluation andassessmentinsoftwareengineering2018,pp13\u201323"},{"key":"10193_CR70","unstructured":"RayB,HellendoornV,GodhaneS,TuZ,BacchelliA,DevanbuP (2016)Onthe\u201cnaturalness\u201dofbuggycode.In: Proceedingsofthe38thinternational conferenceonsoftwareengineering.ICSE\u201916,pp428\u2013439"},{"key":"10193_CR71","first-page":"287","volume":"20","author":"B Robert","year":"2012","unstructured":"RobertB,CorreiaJ P,SchillK,VisserJ(2012)Standardizedcode qualitybenchmarkingforimprovingsoftwaremaintainability.SoftwQual J 20:287\u2013307","journal-title":"SoftwQual J"},{"key":"10193_CR72","unstructured":"RomanoD,PinzgerM(2011)Usingsourcecodemetricstopredictchange-prone javainterfaces.In: 201127thIEEEInternationalconferenceonsoftwaremaintenance, pp303\u2013312"},{"key":"10193_CR73","unstructured":"RomanoJ,KromreyJ D,CoraggioJ,SkowronekJ(2006)Appropriate statisticsforordinalleveldata:Shouldwereallybeusingt-testandcohen\u2019sdforevaluating groupdifferencesonthensseandothersurveys.In: AnnualmeetingoftheFlorida associationofinstitutionalresearch,pp1\u201333"},{"key":"10193_CR74","unstructured":"ScalabrinoS,BavotaG,VendomeC,Linares-V\u00e1squezM,Poshyvanyk D,OlivetoR(2017)Automaticallyassessingcodeunderstandability:Howfararewe?. In: 32ndIEEE\/ACMInternationalconferenceonautomatedsoftwareengineering,pp 417\u2013427"},{"key":"10193_CR75","unstructured":"ScalabrinoS,Linares-V\u00e1squezM,PoshyvanykD,OlivetoR(2016) Improvingcodereadabilitymodelswithtextualfeatures.In: IEEE24thInternational conferenceonprogramcomprehension,pp1\u201310"},{"issue":"2","key":"10193_CR76","first-page":"642","volume":"21","author":"I Scholtes","year":"2016","unstructured":"ScholtesI,MavrodievP,SchweitzerF(2016)Fromaristotletoringelmann:A large-scaleanalysisofteamproductivityandcoordinationinopensourcesoftwareprojects. EmpSoftwEng:IntJ 21(2):642\u2013683","journal-title":"EmpSoftwEng:IntJ"},{"issue":"2","key":"10193_CR77","first-page":"30","volume":"3","author":"M Shepperd","year":"1988","unstructured":"ShepperdM(1988)Acritiqueofcyclomaticcomplexityasasoftwaremetric. SoftwEngJ 3(2):30\u201336","journal-title":"SoftwEngJ"},{"key":"10193_CR78","unstructured":"SheskinD J(2020)Handbookofparametricandnonparametricstatistical procedures.CRCPress"},{"key":"10193_CR79","unstructured":"ShihabE,HassanA E,AdamsB,JiangZ M(2012)Anindustrialstudyon theriskofsoftwarechanges.In: ProceedingsoftheACMSIGSOFT20thinternational symposiumonthefoundationsofsoftwareengineering"},{"issue":"6","key":"10193_CR80","first-page":"772","volume":"37","author":"Y Shin","year":"2011","unstructured":"ShinY,MeneelyA,WilliamsL,OsborneJ A(2011)Evaluatingcomplexity, codechurn,anddeveloperactivitymetricsasindicatorsofsoftwarevulnerabilities. IEEETransSoftwEng 37(6):772\u2013787","journal-title":"IEEETransSoftwEng"},{"issue":"8","key":"10193_CR81","first-page":"1144","volume":"39","author":"DIK Sj\u00f8berg","year":"2013","unstructured":"Sj\u00f8bergDI K,YamashitaA,AndaBC D,MockusA,Dyb\u00e5T (2013)Quantifyingtheeffectofcodesmellsonmaintenanceeffort.IEEE TransSoftwEng 39(8):1144\u20131156","journal-title":"IEEE TransSoftwEng"},{"key":"10193_CR82","unstructured":"SpadiniD,PalombaF,ZaidmanA,BruntinkM,BacchelliA(2018) Ontherelationoftestsmellstosoftwarecodequality.In: 2018IEEEInternational conferenceonsoftwaremaintenanceandevolution,pp1\u201312"},{"key":"10193_CR83","unstructured":"SridharaG,HillE,MuppaneniD,PollockL,Vijay-ShankerK(2010) Towardsautomaticallygeneratingsummarycommentsforjavamethods.In: Proceedings oftheIEEE\/ACMInternationalconferenceonautomatedsoftwareengineering,pp43\u201352"},{"key":"10193_CR84","unstructured":"St\u00e5hlD,MartiniA,M\u00e5rtenssonT(2019)Bigbangsandsmallpops:On criticalcyclomaticcomplexityanddeveloperintegrationbehavior.In: 2019IEEE\/ACM 41stInternationalconferenceonsoftwareengineering:(ICSE-SEIP),pp81\u201390"},{"key":"10193_CR85","first-page":"478","volume":"124","author":"MA Subandri","year":"2017","unstructured":"SubandriM A,SarnoR(2017)Cyclomaticcomplexityfordeterminingproduct complexitylevelincocomoii.ProcedComputSci 124:478\u2013486.4th Informationsystemsinternationalconference2017,ISICO2017,6-8November2017,Bali, Indonesia","journal-title":"ProcedComputSci"},{"key":"10193_CR86","unstructured":"SuhS D,NeamtiuI(2010)Studyingsoftwareevolutionfortamingsoftware complexity.In: 21stAustraliansoftwareengineeringconference,pp3\u201312"},{"key":"10193_CR87","unstructured":"TantithamthavornC,McIntoshS,HassanA E,MatsumotoK (2016)Automatedparameteroptimizationofclassificationtechniquesfordefectprediction models.In: IEEE\/ACM38thInternationalconferenceonsoftwareengineering,pp 321\u2013332"},{"key":"10193_CR88","unstructured":"TerceiroA,RiosL R,ChavezC(2010)Anempiricalstudyonthestructural complexityintroducedbycoreandperipheraldevelopersinfreesoftwareprojects.In: Braziliansymposiumonsoftwareengineering,pp21\u201329"},{"key":"10193_CR89","unstructured":"ThodeH C(2002)Testingfornormality,vol164.CRCpress"},{"issue":"1","key":"10193_CR90","first-page":"1","volume":"39","author":"U Tiwari","year":"2014","unstructured":"TiwariU,KumarS(2014)Cyclomaticcomplexitymetricforcomponentbased software.SIGSOFTSoftwEngNotes 39(1):1\u20136","journal-title":"SIGSOFTSoftwEngNotes"},{"issue":"11","key":"10193_CR91","first-page":"1242","volume":"52","author":"A Tosun","year":"2010","unstructured":"TosunA,BenerA,TurhanB,MenziesT(2010)Practicalconsiderations indeployingstatisticalmethodsfordefectprediction:Acasestudywithintheturkish telecommunicationsindustry.InfSoftwTechnol 52(11):1242\u20131257","journal-title":"InfSoftwTechnol"},{"key":"10193_CR92","unstructured":"ViggiatoM,OliveiraJ,FigueiredoE,JamshidiP,K\u00e4stnerC(2019)How docodechangesevolveindifferentplatforms? Amining-basedinvestigation.In: 2019 IEEEInternationalconferenceonsoftwaremaintenanceandevolution,pp218\u2013222"},{"key":"10193_CR93","first-page":"108","volume":"110","author":"Q Wang","year":"2019","unstructured":"WangQ,XiaX,LoD,LiS(2019)Whyismycodechangeabandoned? InfSoftwTechnol 110:108\u2013120","journal-title":"InfSoftwTechnol"},{"issue":"9","key":"10193_CR94","first-page":"1357","volume":"14","author":"EJ Weyuker","year":"1988","unstructured":"WeyukerE J(1988)Evaluatingsoftwarecomplexitymeasures.IEEE TransSoftwEng 14(9):1357\u20131365","journal-title":"IEEE TransSoftwEng"},{"issue":"9","key":"10193_CR95","first-page":"574","volume":"30","author":"ATT Ying","year":"2004","unstructured":"YingATT,MurphyG C,NgR,Chu-CarrollM C(2004)Predicting sourcecodechangesbyminingchangehistory.IEEETransSoftwEng 30 (9):574\u2013586","journal-title":"IEEETransSoftwEng"},{"key":"10193_CR96","unstructured":"YuL,MishraA(2013)AnempiricalstudyofLehman\u2019slawonsoftwarequality evolution"},{"key":"10193_CR97","unstructured":"ZhangF,MockusA,ZouY,KhomhF,HassanA E(2013)How doescontextaffectthedistributionofsoftwaremaintainabilitymetrics?.In: IEEE Internationalconferenceonsoftwaremaintenance,pp350\u2013359"},{"issue":"4","key":"10193_CR98","first-page":"660","volume":"83","author":"Y Zhou","year":"2010","unstructured":"ZhouY,XuB,LeungH(2010)Ontheabilityofcomplexitymetricstopredict fault-proneclassesinobject-orientedsystems.JSystSoftw 83(4):660\u2013674","journal-title":"JSystSoftw"},{"key":"10193_CR99","unstructured":"ZimmermannT,PremrajR,ZellerA(2007)Predictingdefectsforeclipse. In: Proceedingsofthethirdinternationalworkshoponpredictormodelsinsoftware engineering,p9"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-022-10193-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-022-10193-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-022-10193-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T08:35:57Z","timestamp":1664181357000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-022-10193-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,17]]},"references-count":99,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,11]]}},"alternative-id":["10193"],"URL":"https:\/\/doi.org\/10.1007\/s10664-022-10193-8","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,17]]},"assertion":[{"value":"15 June 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 August 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}],"article-number":"158"}}