{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T04:16:40Z","timestamp":1759033000522,"version":"3.37.3"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2022,9,20]],"date-time":"2022-09-20T00:00:00Z","timestamp":1663632000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,9,20]],"date-time":"2022-09-20T00:00:00Z","timestamp":1663632000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s10664-022-10213-7","type":"journal-article","created":{"date-parts":[[2022,9,20]],"date-time":"2022-09-20T09:04:03Z","timestamp":1663664643000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["The role of bug report evolution in reliable fixing estimation"],"prefix":"10.1007","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2510-6832","authenticated-orcid":false,"given":"Renan G.","family":"Vieira","sequence":"first","affiliation":[]},{"given":"C\u00e9sar Lincoln C.","family":"Mattos","sequence":"additional","affiliation":[]},{"given":"Lincoln S.","family":"Rocha","sequence":"additional","affiliation":[]},{"given":"Jo\u00e3o Paulo P.","family":"Gomes","sequence":"additional","affiliation":[]},{"given":"Matheus","family":"Paix\u00e3o","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,20]]},"reference":[{"key":"10213_CR1","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/j.jss.2017.02.021","volume":"136","author":"S Akbarinasaji","year":"2018","unstructured":"Akbarinasaji S, Caglayan B, Bener A (2018) Predicting bug-fixing time: a replication study using an open source software project. J Syst Softw 136:173\u2013186. https:\/\/doi.org\/10.1016\/j.jss.2017.02.021. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0164121217300365","journal-title":"J Syst Softw"},{"key":"10213_CR2","doi-asserted-by":"publisher","unstructured":"Al-Zubaidi W H A, Dam H K, Ghose A, Li X (2017) Multi-objective search-based approach to estimate issue resolution time. In: Proceedings of the 13th international conference on predictive models and data analytics in software engineering, PROMISE. https:\/\/doi.org\/10.1145\/3127005.3127011. Association for Computing Machinery, New York, pp 53\u201362","DOI":"10.1145\/3127005.3127011"},{"key":"10213_CR3","doi-asserted-by":"crossref","unstructured":"Ardimento P, Bilancia M, Monopoli S (2016) Predicting bug-fix time: using standard versus topic-based text categorization techniques. In: Calders T, Ceci M, Malerba D (eds) Discovery science. Springer International Publishing, Cham, pp 167\u2013182","DOI":"10.1007\/978-3-319-46307-0_11"},{"issue":"4","key":"10213_CR4","doi-asserted-by":"publisher","first-page":"1437","DOI":"10.1007\/s10664-015-9391-7","volume":"21","author":"S Assar","year":"2016","unstructured":"Assar S, Borg M, Pfahl D (2016) Using text clustering to predict defect resolution time: a conceptual replication and an evaluation of prediction accuracy. Empirical Softw Engg 21(4):1437\u20131475. https:\/\/doi.org\/10.1007\/s10664-015-9391-7","journal-title":"Empirical Softw Engg"},{"key":"10213_CR5","doi-asserted-by":"crossref","unstructured":"Baysal O, Holmes R, Godfrey M W (2013) Situational awareness: personalizing issue tracking systems. In: Proceedings of the 2013 international conference on software engineering, ICSE \u201913. IEEE Press, pp 1185\u20131188","DOI":"10.1109\/ICSE.2013.6606674"},{"key":"10213_CR6","doi-asserted-by":"publisher","unstructured":"Bhattacharya P, Neamtiu I (2011) Bug-fix time prediction models: can we do better?. In: Proceedings of the 8th working conference on mining software repositories, MSR \u201911. https:\/\/doi.org\/10.1145\/1985441.1985472. Association for Computing Machinery, New York, pp 207\u2013210","DOI":"10.1145\/1985441.1985472"},{"key":"10213_CR7","unstructured":"Brady F (2013) Cambridge university report on cost of software faults, press release. http:\/\/www.prweb.com\/releases\/2013\/1\/prweb10298185.htm. Accessed 2020-01-02"},{"key":"10213_CR8","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla N V, Bowyer K W, Hall L O, Kegelmeyer W P (2002) Smote: synthetic minority over-sampling technique. J Artif Intell Res 16:321\u2013357","journal-title":"J Artif Intell Res"},{"key":"10213_CR9","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.infsof.2019.05.007","volume":"113","author":"N Ebrahimi","year":"2019","unstructured":"Ebrahimi N, Trabelsi A, Islam M S, Hamou-Lhadj A, Khanmohammadi K (2019) An hmm-based approach for automatic detection and classification of duplicate bug reports. Inf Softw Technol 113:98\u2013109. https:\/\/doi.org\/10.1016\/j.infsof.2019.05.007. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S095058491930117X","journal-title":"Inf Softw Technol"},{"key":"10213_CR10","doi-asserted-by":"publisher","unstructured":"Guo P J, Zimmermann T, Nagappan N, Murphy B (2011) \u201cNot my bug!\u201d and other reasons for software bug report reassignments. In: Proceedings of the ACM 2011 conference on computer supported cooperative work, CSCW \u201911. https:\/\/doi.org\/10.1145\/1958824.1958887. Association for Computing Machinery, New York, pp 395\u2013404","DOI":"10.1145\/1958824.1958887"},{"issue":"12","key":"10213_CR11","doi-asserted-by":"publisher","first-page":"1224","DOI":"10.1109\/TSE.2017.2757480","volume":"44","author":"M Habayeb","year":"2018","unstructured":"Habayeb M, Murtaza S S, Miranskyy A, Bener A B (2018) On the use of hidden markov model to predict the time to fix bugs. IEEE Trans Softw Eng 44(12):1224\u20131244. https:\/\/doi.org\/10.1109\/TSE.2017.2757480","journal-title":"IEEE Trans Softw Eng"},{"key":"10213_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.infsof.2017.01.002","volume":"87","author":"M Hamill","year":"2017","unstructured":"Hamill M, Goseva-Popstojanova K (2017) Analyzing and predicting effort associated with finding and fixing software faults. Inf Softw Technol 87:1\u201318. https:\/\/doi.org\/10.1016\/j.infsof.2017.01.002. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0950584917300290","journal-title":"Inf Softw Technol"},{"issue":"11","key":"10213_CR13","doi-asserted-by":"publisher","first-page":"1133","DOI":"10.1016\/j.infsof.2010.05.008","volume":"52","author":"O Hauge","year":"2010","unstructured":"Hauge O, Ayala C, Conradi R (2010) Adoption of open source software in software-intensive organizations\u2014a systematic literature review. Inf Softw Technol 52(11):1133\u20131154. https:\/\/doi.org\/10.1016\/j.infsof.2010.05.008","journal-title":"Inf Softw Technol"},{"key":"10213_CR14","unstructured":"Hensman J, Fusi N, Lawrence N D (2013) Gaussian processes for big data. In: Proceedings of the twenty-ninth conference on uncertainty in artificial intelligence, pp 282\u2013290"},{"key":"10213_CR15","doi-asserted-by":"crossref","unstructured":"Herzig K, Just S, Zeller A (2013) It\u2019s not a bug, it\u2019s a feature: how misclassification impacts bug prediction. In: Proceedings of the 2013 international conference on software engineering, ICSE \u201913. IEEE Press, pp 392\u2013401","DOI":"10.1109\/ICSE.2013.6606585"},{"key":"10213_CR16","doi-asserted-by":"publisher","unstructured":"Hooimeijer P, Weimer W (2007) Modeling bug report quality. In: Proceedings of the twenty-second IEEE\/ACM international conference on automated software engineering, ASE \u201907. https:\/\/doi.org\/10.1145\/1321631.1321639. Association for Computing Machinery, New York, pp 34\u201343","DOI":"10.1145\/1321631.1321639"},{"key":"10213_CR17","doi-asserted-by":"publisher","unstructured":"Hu H, Zhang H, Xuan J, Sun W (2014) Effective bug triage based on historical bug-fix information. In: 2014 IEEE 25th international symposium on software reliability engineering. https:\/\/doi.org\/10.1109\/ISSRE.2014.17, pp 122\u2013132","DOI":"10.1109\/ISSRE.2014.17"},{"key":"10213_CR18","doi-asserted-by":"publisher","unstructured":"Kim S, Whitehead E J (2006) How long did it take to fix bugs?. In: Proceedings of the 2006 international workshop on mining software repositories, MSR \u201906. https:\/\/doi.org\/10.1145\/1137983.1138027. Association for Computing Machinery, New York, pp 173\u2013174","DOI":"10.1145\/1137983.1138027"},{"key":"10213_CR19","doi-asserted-by":"publisher","unstructured":"Lazar A, Ritchey S, Sharif B (2014) Improving the accuracy of duplicate bug report detection using textual similarity measures. In: Proceedings of the 11th working conference on mining software repositories, MSR 2014, p 308\u2013311. https:\/\/doi.org\/10.1145\/2597073.2597088. Association for Computing Machinery, New York","DOI":"10.1145\/2597073.2597088"},{"key":"10213_CR20","doi-asserted-by":"publisher","unstructured":"Lenarduzzi V, Taibi D, Tosi D, Lavazza L, Morasca S (2020) Open source software evaluation, selection, and adoption: a systematic literature review. In: 2020 46th Euromicro conference on software engineering and advanced applications (SEAA). https:\/\/doi.org\/10.1109\/SEAA51224.2020.00076, pp 437\u2013444","DOI":"10.1109\/SEAA51224.2020.00076"},{"issue":"1","key":"10213_CR21","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/s10664-012-9197-9","volume":"18","author":"U Raja","year":"2013","unstructured":"Raja U (2013) All complaints are not created equal: text analysis of open source software defect reports. Empir Softw Eng 18(1):117\u2013138. https:\/\/doi.org\/10.1007\/s10664-012-9197-9","journal-title":"Empir Softw Eng"},{"issue":"2","key":"10213_CR22","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/MS.2005.32","volume":"22","author":"N Serrano","year":"2005","unstructured":"Serrano N, Ciordia I (2005) Bugzilla, itracker, and other bug trackers. IEEE Softw 22(2):11\u201313. https:\/\/doi.org\/10.1109\/MS.2005.32","journal-title":"IEEE Softw"},{"issue":"C","key":"10213_CR23","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.jss.2014.12.049","volume":"102","author":"R Shokripour","year":"2015","unstructured":"Shokripour R, Anvik J, Kasirun Z M, Zamani S (2015) A time-based approach to automatic bug report assignment. J Syst Softw 102(C):109\u2013122. https:\/\/doi.org\/10.1016\/j.jss.2014.12.049","journal-title":"J Syst Softw"},{"key":"10213_CR24","doi-asserted-by":"publisher","unstructured":"Thung F (2016) Automatic prediction of bug fixing effort measured by code churn size. In: Proceedings of the 5th international workshop on software mining, SoftwareMining 2016. https:\/\/doi.org\/10.1145\/2975961.2975964. Association for Computing Machinery, New York, pp 18\u201323","DOI":"10.1145\/2975961.2975964"},{"issue":"5","key":"10213_CR25","doi-asserted-by":"publisher","first-page":"1354","DOI":"10.1007\/s10664-014-9331-y","volume":"20","author":"Y Tian","year":"2015","unstructured":"Tian Y, Lo D, Xia X, Sun C (2015) Automated prediction of bug report priority using multi-factor analysis. Empirical Softw Engg 20(5):1354\u20131383. https:\/\/doi.org\/10.1007\/s10664-014-9331-y","journal-title":"Empirical Softw Engg"},{"key":"10213_CR26","doi-asserted-by":"publisher","unstructured":"Vieira R, da Silva A, Rocha L, Gomes JAP (2019) From reports to bug-fix commits: a 10 years dataset of bug-fixing activity from 55 apache\u2019s open source projects. In: Proceedings of the fifteenth international conference on predictive models and data analytics in software engineering, PROMISE\u201919. https:\/\/doi.org\/10.1145\/3345629.3345639. http:\/\/doi.acm.org\/10.1145\/3345629.3345639. ACM, New York, pp 80\u201389","DOI":"10.1145\/3345629.3345639"},{"key":"10213_CR27","doi-asserted-by":"publisher","unstructured":"Weiss C, Premraj R, Zimmermann T, Zeller A (2007) How long will it take to fix this bug?. In: Fourth international workshop on mining software repositories (MSR\u201907:ICSE workshops 2007). https:\/\/doi.org\/10.1109\/MSR.2007.13, pp 1\u20131","DOI":"10.1109\/MSR.2007.13"},{"key":"10213_CR28","doi-asserted-by":"crossref","unstructured":"Wohlin C, Runeson P, Hst M, Ohlsson M C, Regnell B, Wessln A (2012) Experimentation in software engineering. Springer Publishing Company, Incorporated","DOI":"10.1007\/978-3-642-29044-2"},{"key":"10213_CR29","doi-asserted-by":"publisher","unstructured":"Zhang H, Gong L, Versteeg S (2013) Predicting bug-fixing time: an empirical study of commercial software projects. In: 2013 35th International conference on software engineering (ICSE). https:\/\/doi.org\/10.1109\/ICSE.2013.6606654, pp 1042\u20131051","DOI":"10.1109\/ICSE.2013.6606654"},{"key":"10213_CR30","doi-asserted-by":"crossref","unstructured":"Zhang X, Yao L, Huang C, Sheng Q Z, Wang X (2017) Intent recognition in smart living through deep recurrent neural networks. In: Liu D, Xie S, Li Y, Zhao D, El-Alfy E S M (eds) Neural information processing. Springer International Publishing, Cham, pp 748\u2013758","DOI":"10.1007\/978-3-319-70096-0_76"},{"key":"10213_CR31","doi-asserted-by":"crossref","unstructured":"Zhang X, Chen X, Yao L, Ge C, Dong M (2019) Deep neural network hyperparameter optimization with orthogonal array tuning. In: Gedeon T, Wong K W, Lee M (eds) Neural information processing. Springer International Publishing, Cham, pp 287\u2013295","DOI":"10.1007\/978-3-030-36808-1_31"},{"issue":"5","key":"10213_CR32","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1109\/TSE.2010.63","volume":"36","author":"T Zimmermann","year":"2010","unstructured":"Zimmermann T, Premraj R, Bettenburg N, Just S, Schroter A, Weiss C (2010) What makes a good bug report? IEEE Trans Softw Eng 36 (5):618\u2013643. https:\/\/doi.org\/10.1109\/TSE.2010.63","journal-title":"IEEE Trans Softw Eng"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-022-10213-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-022-10213-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-022-10213-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,21]],"date-time":"2022-11-21T02:09:00Z","timestamp":1668996540000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-022-10213-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,20]]},"references-count":32,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["10213"],"URL":"https:\/\/doi.org\/10.1007\/s10664-022-10213-7","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"type":"print","value":"1382-3256"},{"type":"electronic","value":"1573-7616"}],"subject":[],"published":{"date-parts":[[2022,9,20]]},"assertion":[{"value":"15 July 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 September 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"164"}}