{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T01:19:22Z","timestamp":1773883162472,"version":"3.50.1"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,6,20]],"date-time":"2023-06-20T00:00:00Z","timestamp":1687219200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,6,20]],"date-time":"2023-06-20T00:00:00Z","timestamp":1687219200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100000781","name":"European Research Council","doi-asserted-by":"publisher","award":["741278"],"award-info":[{"award-number":["741278"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2023,7]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Bug reports are used by software testers to identify abnormal software behaviour. In this paper, we propose a multi-objective evolutionary approach to automatically generate finite state machines (FSMs) based on bug reports written in natural language, to automatically capture incorrect software behaviour. These FSMs can then be used by testers to both exercise the reported bugs and create tests that can potentially reveal new bugs. The FSM generation is guided by a Multi-Objective Evolutionary Algorithm (MOEA) that simultaneously minimises three objectives: size of the models, number of unrealistic states (over-generalisation), and number of states not covered by the models (under-generalisation). We assess the feasibility of our approach for 10 real-world software programs by exploiting three different MOEAs (NSGA-II, NSGA-III and MOEA\/D) and benchmarking them with the baseline tool KLFA. Our results show that KLFA is not practical to be used with real-world software, because it generates models that over generalise software behaviour. Among the three MOEAs, NSGA-II obtained significantly better results than the other two for all 10 programs, detecting a greater number of bugs for 90% of the programs. We also studied the differences in quality and model performance when MOEAs are guided by only two objectives rather than three during the evolution. We found that the use of under-approximation (or over-approximation) and size as objectives generates infeasible solutions. On the other hand, using as objectives over-approximation and under-approximation generates feasible solutions yet still worse than those obtained using all three objectives for 100% of the cases. The size objective acts as a diversity factor. As a consequence, an algorithm guided by all three objectives avoids local optima, controls the size of the models, and makes the results more diverse and closer to the optimal Pareto set.<\/jats:p>","DOI":"10.1007\/s10664-023-10333-8","type":"journal-article","created":{"date-parts":[[2023,6,20]],"date-time":"2023-06-20T12:02:43Z","timestamp":1687262563000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Inferring test models from user bug reports using multi-objective search"],"prefix":"10.1007","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5361-2973","authenticated-orcid":false,"given":"Giovani","family":"Guizzo","sequence":"first","affiliation":[]},{"given":"Francesco","family":"Califano","sequence":"additional","affiliation":[]},{"given":"Federica","family":"Sarro","sequence":"additional","affiliation":[]},{"given":"Filomena","family":"Ferrucci","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Harman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,20]]},"reference":[{"key":"10333_CR1","doi-asserted-by":"publisher","unstructured":"Ahmad T, Iqbal J, Ashraf A et al (2019) Model-based testing using UML activity diagrams: a systematic mapping study. Comput Sci Rev 33:98\u2013112. https:\/\/doi.org\/10.1016\/j.cosrev.2019.07.001. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1574013718302314","DOI":"10.1016\/j.cosrev.2019.07.001"},{"key":"10333_CR2","doi-asserted-by":"publisher","unstructured":"Arcuri A, Briand L (2014) A hitchhiker\u2019s guide to statistical tests for assessing randomized algorithms in software engineering. Softw Test Verification Reliab 24(3):219\u2013250. https:\/\/doi.org\/10.1002\/stvr.1486. https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/stvr.1486","DOI":"10.1002\/stvr.1486"},{"key":"10333_CR3","unstructured":"Audet C, Digabel SL, Cartier D, et\u00a0al (2018) Performance indicators in multiobjective optimization. In: 2015 Latin American Computing Conference (CLEI)"},{"key":"10333_CR4","doi-asserted-by":"crossref","unstructured":"Barros MDO (2012) An analysis of the effects of composite objectives in multiobjective software module clustering. In: Proceedings of the 14th annual conference on Genetic and evolutionary computation. pp 1205\u20131212","DOI":"10.1145\/2330163.2330330"},{"key":"10333_CR5","doi-asserted-by":"publisher","unstructured":"Berrar D (2018) Cross-validation. Elsevier. https:\/\/doi.org\/10.1016\/B978-0-12-809633-8.20349-X","DOI":"10.1016\/B978-0-12-809633-8.20349-X"},{"key":"10333_CR6","unstructured":"Blank J (2022) Multi-objective optimization in python. https:\/\/pymoo.org\/"},{"key":"10333_CR7","doi-asserted-by":"publisher","unstructured":"Boussa\u00efd I, Siarry P, Ahmed-Nacer M (2017) A survey on search-based model-driven engineering. Autom Softw Eng 1\u201362. https:\/\/doi.org\/10.1007\/s10515-017-0215-4","DOI":"10.1007\/s10515-017-0215-4"},{"key":"10333_CR8","doi-asserted-by":"publisher","unstructured":"Carvalho G, Barros F, Lapschies F, et\u00a0al (2014) Model-based testing from controlled natural language requirements. In: International Workshop on Formal Techniques for Safety-Critical Systems. pp 19\u201335. https:\/\/doi.org\/10.1007\/978-3-319-05416-2_3","DOI":"10.1007\/978-3-319-05416-2_3"},{"key":"10333_CR9","doi-asserted-by":"publisher","unstructured":"Castro OR, Santana R, Lozano JA, et\u00a0al (2017) Combining CMA-ES and MOEA\/DD for many-objective optimization. In: 2017 IEEE Congress on Evolutionary Computation (CEC). pp 1451\u20131458. https:\/\/doi.org\/10.1109\/CEC.2017.7969474","DOI":"10.1109\/CEC.2017.7969474"},{"key":"10333_CR10","doi-asserted-by":"crossref","unstructured":"Dasgupta D, Michalewicz Z (1997) Evolutionary algorithms - an overview. Evol Algorithm Eng Appl 1st edition, pp 3\u201328","DOI":"10.1007\/978-3-662-03423-1_1"},{"issue":"4","key":"10333_CR11","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1109\/TEVC.2013.2281535","volume":"18","author":"K Deb","year":"2014","unstructured":"Deb K, Jain H (2014) An evolutionary many-objective optimization algorithm using reference-point-based nondominated sorting approach, part i: solving problems with box constraints. IEEE Trans Evol Comput 18(4):577\u2013601","journal-title":"IEEE Trans Evol Comput"},{"issue":"2","key":"10333_CR12","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/4235.996017","volume":"6","author":"K Deb","year":"2002","unstructured":"Deb K, Pratap A, Agarwal S et al (2002) A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans Evol Comput 6(2):182\u2013197","journal-title":"IEEE Trans Evol Comput"},{"key":"10333_CR13","unstructured":"Dennis A, Wixom B, Tegarden D (2015) Systems analysis and design: an object-oriented approach with UML, 5th edn"},{"key":"10333_CR14","doi-asserted-by":"publisher","unstructured":"Dias\u00a0Neto AC, Subramanyan R, Vieira M, et\u00a0al (2007) A survey on model-based testing approaches: a systematic review. In: Proceedings of the 1st ACM international workshop on Empirical assessment of software engineering languages and technologies (WEASELTech\u201907). Association for Computing Machinery, New York, NY, USA, WEASELTech \u201907. pp 31\u201336. https:\/\/doi.org\/10.1145\/1353673.1353681","DOI":"10.1145\/1353673.1353681"},{"issue":"1","key":"10333_CR15","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1002\/aris.1440380105","volume":"38","author":"ST Dumais","year":"2004","unstructured":"Dumais ST (2004) Latent semantic analysis. Ann Rev Inf Sci Technol 38(1):188\u2013230. https:\/\/doi.org\/10.1002\/aris.1440380105","journal-title":"Ann Rev Inf Sci Technol"},{"key":"10333_CR16","doi-asserted-by":"publisher","unstructured":"Emam SS, Miller J (2018) Inferring extended probabilistic finite-state automaton models from software executions. ACM Trans Softw Eng Methodol 27(1). https:\/\/doi.org\/10.1145\/3196883","DOI":"10.1145\/3196883"},{"key":"10333_CR17","doi-asserted-by":"crossref","unstructured":"Ferrucci F, Harman M, Ren J, et\u00a0al (2013) Not going to take this anymore: multi-objective overtime planning for software engineering projects. In: Proceedings of the 2013 International Conference on Software Engineering, ICSE \u201913. IEEE Press, pp 462-471","DOI":"10.1109\/ICSE.2013.6606592"},{"key":"10333_CR18","doi-asserted-by":"publisher","unstructured":"Garousi V, Bauer S, Felderer M (2020) NLP-assisted software testing: a systematic mapping of the literature. Inf Softw Technol. https:\/\/doi.org\/10.1016\/j.infsof.2020.106321","DOI":"10.1016\/j.infsof.2020.106321"},{"key":"10333_CR19","doi-asserted-by":"crossref","unstructured":"Guizzo G, Sarro F, Krinke J, et\u00a0al (2020) Sentinel: a hyper-heuristic for the generation of mutant reduction strategies. IEEE Trans Softw Eng 48(3):803\u2013818","DOI":"10.1109\/TSE.2020.3002496"},{"key":"10333_CR20","doi-asserted-by":"crossref","unstructured":"Harman M (2007) The current state and future of search based software engineering. In: Briand LC, Wolf AL (eds) International Conference on Software Engineering, ISCE 2007, Workshop on the Future of Software Engineering, FOSE 2007, May 23-25, 2007, Minneapolis, MN, USA. IEEE Computer Society, pp 342\u2013357","DOI":"10.1109\/FOSE.2007.29"},{"key":"10333_CR21","unstructured":"Harman M, McMinn P, Teixeira de Souza J et al (2010) Search based software engineering: techniques, taxonomy, tutorial. In: Meyer B, Nordio M (eds) Empirical Software Engineering and Verification - International Summer Schools, LASER 2008\u20132010, Elba Island, Italy, Revised Tutorial Lectures, vol 7007. Lecture Notes in Computer Science. Springer, pp 1\u201359"},{"key":"10333_CR22","doi-asserted-by":"publisher","unstructured":"Harman M, Mansouri SA, Zhang Y (2012) Search-based software engineering: trends, techniques and applications. ACM Comput Surv 45(1). https:\/\/doi.org\/10.1145\/2379776.2379787","DOI":"10.1145\/2379776.2379787"},{"key":"10333_CR23","volume-title":"Introduction to automata theory, languages and computation","author":"JE Hopcroft","year":"2007","unstructured":"Hopcroft JE, Motwani R, Ullman JD (2007) Introduction to automata theory, languages and computation, 3rd edn. Pearson Addison-Wesley, Boston","edition":"3"},{"key":"10333_CR24","doi-asserted-by":"crossref","unstructured":"Ishibuchi H, Nojima Y, Doi T (2006) Comparison between single-objective and multi-objective genetic algorithms: Performance comparison and performance measures. In: 2006 IEEE International Conference on Evolutionary Computation. IEEE, pp 1143\u20131150","DOI":"10.1109\/CEC.2006.1688438"},{"key":"10333_CR25","doi-asserted-by":"publisher","first-page":"992","DOI":"10.1016\/j.ress.2005.11.018","volume":"91","author":"A Konak","year":"2006","unstructured":"Konak A, Coit D, Smith A (2006) Multi-objective optimization using genetic algorithms: a tutorial. Reliab Eng Syst Saf 91:992\u20131007. https:\/\/doi.org\/10.1016\/j.ress.2005.11.018","journal-title":"Reliab Eng Syst Saf"},{"key":"10333_CR26","doi-asserted-by":"publisher","unstructured":"Liu C, van Dongen B, Assy N, et\u00a0al (2016) Component behavior discovery from software execution data. In: 2016 IEEE Symposium Series on Computational Intelligence (SSCI). pp 1\u20138. https:\/\/doi.org\/10.1109\/SSCI.2016.7849947","DOI":"10.1109\/SSCI.2016.7849947"},{"issue":"7","key":"10333_CR27","doi-asserted-by":"publisher","first-page":"1063","DOI":"10.1109\/TPAMI.2005.143","volume":"27","author":"S Lucas","year":"2005","unstructured":"Lucas S, Reynolds T (2005) Learning deterministic finite automata with a smart state labeling evolutionary algorithm. IEEE Trans Pattern Anal Mach Intell 27(7):1063\u20131074. https:\/\/doi.org\/10.1109\/TPAMI.2005.143","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"10333_CR28","doi-asserted-by":"crossref","unstructured":"Mariani L, Pastore F (2008) Automated identification of failure causes in system logs. In: 2008 19th International Symposium on Software Reliability Engineering (ISSRE). pp 117\u2013126","DOI":"10.1109\/ISSRE.2008.48"},{"issue":"8","key":"10333_CR29","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1109\/TSE.2016.2623623","volume":"43","author":"L Mariani","year":"2017","unstructured":"Mariani L, Pezz\u00e9 M, Santoro M (2017) Gk-tail+ an efficient approach to learn software models. IEEE Trans Softw Eng 43(8):715\u2013738. https:\/\/doi.org\/10.1109\/TSE.2016.2623623","journal-title":"IEEE Trans Softw Eng"},{"key":"10333_CR30","doi-asserted-by":"publisher","unstructured":"Meinke K, Walkinshaw N (2012) Model-based testing and model inference. In: Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change. Springer Berlin Heidelberg, pp 440\u2013443. https:\/\/doi.org\/10.1007\/978-3-642-34026-0_32","DOI":"10.1007\/978-3-642-34026-0_32"},{"key":"10333_CR31","doi-asserted-by":"publisher","unstructured":"Paradkar A (2004) Plannable test selection criteria for fsms extracted from operational specifications. In: 15th International Symposium on Software Reliability Engineering. pp 173\u2013184. https:\/\/doi.org\/10.1109\/ISSRE.2004.28","DOI":"10.1109\/ISSRE.2004.28"},{"issue":"2","key":"10333_CR32","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1147\/rd.32.0114","volume":"3","author":"MO Rabin","year":"1959","unstructured":"Rabin MO, Scott D (1959) Finite automata and their decision problems. IBM J Res Dev 3(2):114\u2013125","journal-title":"IBM J Res Dev"},{"key":"10333_CR33","doi-asserted-by":"publisher","unstructured":"Riquelme N, Lucken CV, Baran B (2015) Performance metrics in multi-objective optimization. In: 2015 Latin American Computing Conference (CLEI). IEEE. https:\/\/doi.org\/10.1109\/clei.2015.7360024","DOI":"10.1109\/clei.2015.7360024"},{"issue":"2","key":"10333_CR34","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1006\/inco.1993.1021","volume":"103","author":"R Rivest","year":"1993","unstructured":"Rivest R, Schapire R (1993) Inference of finite automata using homing sequences. Inf Comput 103(2):299\u2013347. https:\/\/doi.org\/10.1006\/inco.1993.1021","journal-title":"Inf Comput"},{"key":"10333_CR35","doi-asserted-by":"publisher","first-page":"1094","DOI":"10.1016\/j.asoc.2016.08.030","volume":"49","author":"A Saeed","year":"2016","unstructured":"Saeed A, Ab Hamid SH, Mustafa MB (2016) The experimental applications of search-based techniques for model-based testing: taxonomy and systematic literature review. Appl Soft Comput 49:1094\u20131117. https:\/\/doi.org\/10.1016\/j.asoc.2016.08.030","journal-title":"Appl Soft Comput"},{"key":"10333_CR36","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s11219-011-9155-6","volume":"20","author":"V Santiago J\u00fanior","year":"2012","unstructured":"Santiago J\u00fanior V, Vijaykumar N (2012) Generating model-based test cases from natural language requirements for space application software. Softw Qual J 20:77\u2013143. https:\/\/doi.org\/10.1007\/s11219-011-9155-6","journal-title":"Softw Qual J"},{"key":"10333_CR37","doi-asserted-by":"crossref","unstructured":"Sarro F, Petrozziello A, Harman M (2016) Multi-objective software effort estimation. In: 2016 IEEE\/ACM 38th International Conference on Software Engineering (ICSE). pp 619\u2013630","DOI":"10.1145\/2884781.2884830"},{"issue":"10","key":"10333_CR38","doi-asserted-by":"publisher","first-page":"898","DOI":"10.1109\/TSE.2017.2650914","volume":"43","author":"F Sarro","year":"2017","unstructured":"Sarro F, Ferrucci F, Harman M et al (2017) Adaptive multi-objective evolutionary algorithms for overtime planning in software projects. IEEE Trans Softw Eng 43(10):898\u2013917","journal-title":"IEEE Trans Softw Eng"},{"key":"10333_CR39","doi-asserted-by":"publisher","unstructured":"Shin D, Bianculli D, Briand L (2022) Prins: scalable model inference for component-based system logs. Empir Softw Eng 27. https:\/\/doi.org\/10.1007\/s10664-021-10111-4","DOI":"10.1007\/s10664-021-10111-4"},{"key":"10333_CR40","doi-asserted-by":"publisher","unstructured":"Stobie K (2005) Model based testing in practice at microsoft. Electron Notes Theor Comput Sci 111:5\u201312. https:\/\/doi.org\/10.1016\/j.entcs.2004.12.004. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1571066104052296. Proceedings of the Workshop on Model Based Testing (MBT 2004)","DOI":"10.1016\/j.entcs.2004.12.004"},{"key":"10333_CR41","doi-asserted-by":"publisher","unstructured":"Tawosi V, Sarro F, Petrozziello A et al (2021) Multi-objective software effort estimation: A replication study. IEEE Trans Softw Eng (TSE). https:\/\/doi.org\/10.1109\/TSE.2021.3083360","DOI":"10.1109\/TSE.2021.3083360"},{"key":"10333_CR42","doi-asserted-by":"publisher","unstructured":"Tonella P, Marchetto A, Nguyen C, et\u00a0al (2012) Finding the optimal balance between over and under approximation of models inferred from execution logs. Proceedings - IEEE 5th International Conference on Software Testing, Verification and Validation, ICST 2012. https:\/\/doi.org\/10.1109\/ICST.2012.82","DOI":"10.1109\/ICST.2012.82"},{"key":"10333_CR43","doi-asserted-by":"publisher","unstructured":"Tonella P, Tiella R, Nguyen CD (2014) Interpolated N-grams for model based testing. In: Proceedings of the 36th International Conference on Software Engineering. Association for Computing Machinery, New York, NY, USA, ICSE 2014, pp 562\u2013572. https:\/\/doi.org\/10.1145\/2568225.2568242","DOI":"10.1145\/2568225.2568242"},{"key":"10333_CR44","doi-asserted-by":"publisher","unstructured":"Walkinshaw N, Lambeau B, Damas C et al (2013) STAMINA: A competition to encourage the development and assessment of software model inference techniques. Empir Softw Eng 18. https:\/\/doi.org\/10.1007\/s10664-012-9210-3","DOI":"10.1007\/s10664-012-9210-3"},{"key":"10333_CR45","doi-asserted-by":"publisher","unstructured":"Walkinshaw N, Taylor R, Derrick J (2013b) Inferring extended finite state machine models from software executions. In: 2013 20th Working Conference on Reverse Engineering (WCRE). pp 301\u2013310. https:\/\/doi.org\/10.1109\/WCRE.2013.6671305","DOI":"10.1109\/WCRE.2013.6671305"},{"key":"10333_CR46","doi-asserted-by":"publisher","unstructured":"Wang C, Pastore F, Goknil A et al (2020) Automatic generation of acceptance test cases from use case specifications: an NLP-based approach. IEEE Trans Softw Eng. https:\/\/doi.org\/10.1109\/TSE.2020.2998503","DOI":"10.1109\/TSE.2020.2998503"},{"key":"10333_CR47","doi-asserted-by":"publisher","unstructured":"Yin Z, Yuan D, Zhou Y, et\u00a0al (2011) How do fixes become bugs? In: Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering. Association for Computing Machinery, New York, NY, USA, ESEC\/FSE\u201911. pp 26\u201336. https:\/\/doi.org\/10.1145\/2025113.2025121","DOI":"10.1145\/2025113.2025121"},{"issue":"6","key":"10333_CR48","doi-asserted-by":"publisher","first-page":"712","DOI":"10.1109\/TEVC.2007.892759","volume":"11","author":"Q Zhang","year":"2007","unstructured":"Zhang Q, Li H (2007) MOEA\/D: a multiobjective evolutionary algorithm based on decomposition. IEEE Trans Evol Comput 11(6):712\u2013731","journal-title":"IEEE Trans Evol Comput"},{"key":"10333_CR49","doi-asserted-by":"publisher","unstructured":"Zhang Y, Harman M, Jia Y, et\u00a0al (2015) Inferring test models from Kate\u2019s bug reports using multi-objective search. In: Symposium on Search-Based Software Engineering. Springer International Publishing, pp 301\u2013307. https:\/\/doi.org\/10.1007\/978-3-319-22183-0_27","DOI":"10.1007\/978-3-319-22183-0_27"},{"key":"10333_CR50","doi-asserted-by":"publisher","unstructured":"Zhao Y, Yu T, Su T, et\u00a0al (2019) Recdroid: automatically reproducing android application crashes from bug reports. In: 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE), pp 128\u2013139. https:\/\/doi.org\/10.1109\/ICSE.2019.00030","DOI":"10.1109\/ICSE.2019.00030"},{"issue":"2","key":"10333_CR51","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1109\/TEVC.2003.810758","volume":"7","author":"E Zitzler","year":"2003","unstructured":"Zitzler E, Thiele L, Laumanns M et al (2003) Performance assessment of multiobjective optimizers: an analysis and review. IEEE Trans Evol Comput 7(2):117\u2013132","journal-title":"IEEE Trans Evol Comput"},{"key":"10333_CR52","doi-asserted-by":"publisher","unstructured":"Zitzler E, Laumanns M, Bleuler S (2004) A tutorial on evolutionary multiobjective optimization. In: Lecture Notes in Economics and Mathematical Systems, vol 535. Springer Berlin Heidelberg, p 3\u201337. https:\/\/doi.org\/10.1007\/978-3-642-17144-4_1","DOI":"10.1007\/978-3-642-17144-4_1"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-023-10333-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-023-10333-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-023-10333-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,27]],"date-time":"2023-09-27T09:19:47Z","timestamp":1695806387000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-023-10333-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,20]]},"references-count":52,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,7]]}},"alternative-id":["10333"],"URL":"https:\/\/doi.org\/10.1007\/s10664-023-10333-8","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,20]]},"assertion":[{"value":"23 April 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 June 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Prof. Federica Sarro is an Associate Editor of the Empirical Software Engineering journal.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}],"article-number":"95"}}