{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T17:49:01Z","timestamp":1771868941293,"version":"3.50.1"},"reference-count":62,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,10,16]],"date-time":"2019-10-16T00:00:00Z","timestamp":1571184000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,10,16]],"date-time":"2019-10-16T00:00:00Z","timestamp":1571184000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61772055"],"award-info":[{"award-number":["61772055"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61872169"],"award-info":[{"award-number":["61872169"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Technical Foundation Project of Ministry of Industry and Information Technology of China","award":["JSZL2016601B003"],"award-info":[{"award-number":["JSZL2016601B003"]}]},{"DOI":"10.13039\/501100011347","name":"State Key Laboratory of Software Development Environment","doi-asserted-by":"crossref","award":["SKLSDE-2018ZX-09"],"award-info":[{"award-number":["SKLSDE-2018ZX-09"]}],"id":[{"id":"10.13039\/501100011347","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Software Qual J"],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1007\/s11219-019-09460-7","type":"journal-article","created":{"date-parts":[[2019,10,16]],"date-time":"2019-10-16T06:03:23Z","timestamp":1571205803000},"page":"107-134","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["An empirical study of factors affecting cross-project aging-related bug prediction with TLAP"],"prefix":"10.1007","volume":"28","author":[{"given":"Fangyun","family":"Qin","sequence":"first","affiliation":[]},{"given":"Xiaohui","family":"Wan","sequence":"additional","affiliation":[]},{"given":"Beibei","family":"Yin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,16]]},"reference":[{"key":"9460_CR1","unstructured":"Al Shalabi, L., & Shaaban, Z. (2006). Normalization as a preprocessing engine for data mining and the approach of preference matrix. In 2006 International conference on dependability of computer systems (pp. 207\u2013214): IEEE."},{"issue":"1","key":"9460_CR2","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1023\/A:1009794200077","volume":"2","author":"A Avritzer","year":"1997","unstructured":"Avritzer, A., & Weyuker, E.J. (1997). Monitoring smoothly degrading systems for increased dependability. Empirical Software Engineering, 2(1), 59\u201377.","journal-title":"Empirical Software Engineering"},{"key":"9460_CR3","unstructured":"Carrozza, G., Cotroneo, D., Natella, R., Pietrantuono, R., Russo, S. (2013). Analysis and prediction of mandelbugs in an industrial software system. In 2013 IEEE Sixth international conference on software testing, verification and validation (pp. 262\u2013271): IEEE."},{"key":"9460_CR4","unstructured":"Cassidy, K.J., Gross, K.C., Malekpour, A. (2002). Advanced pattern recognition for detection of complex software aging phenomena in online transaction processing servers. In Proceedings international conference on dependable systems and networks (pp. 478\u2013482): IEEE."},{"issue":"2","key":"9460_CR5","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1147\/rd.452.0311","volume":"45","author":"V Castelli","year":"2001","unstructured":"Castelli, V., Harper, R.E., Heidelberger, P., Hunter, S.W., Trivedi, K.S., Vaidyanathan, K., Zeggert, W.P. (2001). Proactive management of software aging. IBM Journal of Research and Development, 45(2), 311\u2013332.","journal-title":"IBM Journal of Research and Development"},{"issue":"4","key":"9460_CR6","doi-asserted-by":"publisher","first-page":"4626","DOI":"10.1016\/j.eswa.2010.10.024","volume":"38","author":"C Catal","year":"2011","unstructured":"Catal, C. (2011). Software fault prediction: a literature review and current trends. Expert Systems with Applications, 38(4), 4626\u20134636.","journal-title":"Expert Systems with Applications"},{"key":"9460_CR7","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.infsof.2015.01.014","volume":"62","author":"L Chen","year":"2015","unstructured":"Chen, L., Fang, B., Shang, Z., Tang, Y. (2015). Negative samples reduction in cross-company software defects prediction. Information and Software Technology, 62, 67\u201377.","journal-title":"Information and Software Technology"},{"key":"9460_CR8","unstructured":"Corazza, A, Di Martino, S, Ferrucci, F, Gravino, C, Sarro, F, Mendes, E. (2010). How effective is tabu search to configure support vector regression for effort estimation?. In Proceedings of the 6th international conference on predictive models in software engineering (p. 4): ACM."},{"key":"9460_CR9","unstructured":"Cotroneo, D., Natella, R., Pietrantuono, R. (2010). Is software aging related to software metrics?. In 2010 IEEE Second international workshop on software aging and rejuvenation (pp. 1\u20136): IEEE."},{"key":"9460_CR10","doi-asserted-by":"crossref","unstructured":"Cotroneo, D., Grottke, M., Natella, R., Pietrantuono, R., Trivedi, K.S. (2013a). Fault triggers in open-source software: an experience report. In 2013 IEEE 24th International symposium on software reliability engineering (ISSRE) (pp. 178\u2013187): IEEE.","DOI":"10.1109\/ISSRE.2013.6698917"},{"issue":"3","key":"9460_CR11","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.peva.2012.09.004","volume":"70","author":"D Cotroneo","year":"2013","unstructured":"Cotroneo, D, Natella, R, Pietrantuono, R. (2013b). Predicting aging-related bugs using software complexity metrics. Performance Evaluation, 70(3), 163\u2013178.","journal-title":"Performance Evaluation"},{"key":"9460_CR12","unstructured":"Di Martino, S, Ferrucci, F, Gravino, C, Sarro, F. (2011). A genetic algorithm to configure support vector machines for predicting fault-prone components. In International conference on product focused software process improvement (pp. 247\u2013261): Springer."},{"key":"9460_CR13","unstructured":"Gao, K., Khoshgoftaar, T.M., Napolitano, A. (2012). A hybrid approach to coping with high dimensionality and class imbalance for software defect prediction. In 2012 11th international conference on machine learning and applications, (Vol. 2 pp. 281\u2013288): IEEE."},{"key":"9460_CR14","unstructured":"Graf, A.B., & Borer, S. (2001). Normalization in support vector machines. In Joint pattern recognition symposium (pp. 277\u2013282): Springer."},{"issue":"3","key":"9460_CR15","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1109\/TR.2006.879609","volume":"55","author":"M Grottke","year":"2006","unstructured":"Grottke, M., Li, L., Vaidyanathan, K., Trivedi, K.S. (2006). Analysis of software aging in a web server. IEEE Transactions on Reliability, 55(3), 411\u2013420.","journal-title":"IEEE Transactions on Reliability"},{"key":"9460_CR16","unstructured":"Grottke, M., Matias, R., Trivedi, K.S. (2008). The fundamentals of software aging. In 2008 IEEE International conference on software reliability engineering workshops (ISSRE Wksp) (pp. 1\u20136): IEEE."},{"key":"9460_CR17","unstructured":"Grottke, M., Nikora, A.P., Trivedi, K.S. (2010). An empirical investigation of fault types in space mission system software. In 2010 IEEE\/IFIP international conference on dependable systems & networks (DSN) (pp. 447\u2013456): IEEE."},{"issue":"6","key":"9460_CR18","doi-asserted-by":"publisher","first-page":"1276","DOI":"10.1109\/TSE.2011.103","volume":"38","author":"T Hall","year":"2012","unstructured":"Hall, T., Beecham, S., Bowes, D., Gray, D., Counsell, S. (2012). A systematic literature review on fault prediction performance in software engineering. IEEE Transactions on Software Engineering, 38(6), 1276\u20131304.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"9460_CR19","unstructured":"Han, J, Pei, J, Kamber, M. (2011). Data mining: concepts and techniques. Elsevier."},{"key":"9460_CR20","unstructured":"Hassan, A.E. (2009). Predicting faults using the complexity of code changes. In Proceedings of the 31st international conference on software engineering (pp. 78\u201388): IEEE Computer Society."},{"key":"9460_CR21","unstructured":"He, Z, Peters, F, Menzies, T, Yang, Y. (2013). Learning from open-source projects: an empirical study on defect prediction. In 2013 ACM\/IEEE international symposium on empirical software engineering and measurement (pp. 45\u201354): IEEE."},{"key":"9460_CR22","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1016\/j.infsof.2014.11.006","volume":"59","author":"P He","year":"2015","unstructured":"He, P., Li, B., Liu, X., Chen, J., Ma, Y. (2015). An empirical study on software defect prediction with a simplified metric set. Information and Software Technology, 59, 170\u2013190.","journal-title":"Information and Software Technology"},{"key":"9460_CR23","unstructured":"Herbold, S. (2013). Training data selection for cross-project defect prediction. In Proceedings of the 9th international conference on predictive models in software engineering (p. 6): ACM."},{"key":"9460_CR24","unstructured":"Herbold, S. (2017). A systematic mapping study on cross-project defect prediction. arXiv:\n170506429\n\n."},{"key":"9460_CR25","unstructured":"Huang, Y., Kintala, C., Kolettis, N., Fulton, N.D. (1995). Software rejuvenation: analysis, module and applications. In Twenty-fifth international symposium on fault-tolerant computing. Digest of papers (pp. 381\u2013390): IEEE."},{"issue":"1","key":"9460_CR26","doi-asserted-by":"publisher","first-page":"3","DOI":"10.5540\/tema.2014.015.01.0003","volume":"15","author":"EG Jelihovschi","year":"2014","unstructured":"Jelihovschi, E.G., Faria, J.C., Allaman, I.B. (2014). Scottknott: a package for performing the scott-knott clustering algorithm in r. TEMA (S\u00e3o Carlos), 15(1), 3\u201317.","journal-title":"TEMA (S\u00e3o Carlos)"},{"key":"9460_CR27","unstructured":"Khoshgoftaar, T.M., Gao, K., Seliya, N. (2010). Attribute selection and imbalanced data: problems in software defect prediction. In 2010 22nd IEEE International conference on tools with artificial intelligence, (Vol. 1 pp. 137\u2013144): IEEE."},{"key":"9460_CR28","unstructured":"Kim, S, Zimmermann, T, Whitehead, EJ Jr, Zeller, A. (2007). Predicting faults from cached history. In Proceedings of the 29th international conference on software engineering (pp. 489\u2013498): IEEE Computer Society."},{"issue":"2","key":"9460_CR29","first-page":"111","volume":"1","author":"S Kotsiantis","year":"2006","unstructured":"Kotsiantis, S., Kanellopoulos, D., Pintelas, P. (2006). Data preprocessing for supervised leaning. International Journal of Computer Science, 1(2), 111\u2013117.","journal-title":"International Journal of Computer Science"},{"key":"9460_CR30","unstructured":"Kumar, L, & Sureka, A. (2018). Feature selection techniques to counter class imbalance problem for aging related bug prediction: aging related bug prediction. In Proceedings of the 11th innovations in software engineering conference (p. 2): ACM."},{"issue":"2","key":"9460_CR31","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/s10515-011-0092-1","volume":"19","author":"M Li","year":"2012","unstructured":"Li, M., Zhang, H., Wu, R., Zhou, Z.H. (2012). Sample-based software defect prediction with active and semi-supervised learning. Automated Software Engineering, 19(2), 201\u2013230.","journal-title":"Automated Software Engineering"},{"issue":"3","key":"9460_CR32","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1016\/j.infsof.2011.09.007","volume":"54","author":"Y Ma","year":"2012","unstructured":"Ma, Y., Luo, G., Zeng, X., Chen, A. (2012). Transfer learning for cross-company software defect prediction. Information and Software Technology, 54(3), 248\u2013256.","journal-title":"Information and Software Technology"},{"issue":"5050","key":"9460_CR33","doi-asserted-by":"publisher","first-page":"1347","DOI":"10.1126\/science.255.5050.1347","volume":"255","author":"E Marshall","year":"1992","unstructured":"Marshall, E. (1992). Fatal error: how patriot overlooked a scud. Science, 255 (5050), 1347\u20131348.","journal-title":"Science"},{"key":"9460_CR34","unstructured":"Matias, R., & Paulo Filho, J. (2006). An experimental study on software aging and rejuvenation in web servers. In 30th Annual international computer software and applications conference (COMPSAC\u201906), (Vol. 1 pp. 189\u2013196): IEEE."},{"issue":"1","key":"9460_CR35","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/TR.2009.2034292","volume":"59","author":"R Matias","year":"2010","unstructured":"Matias, R., Barbetta, P.A., Trivedi, K.S., Freitas Filho, P.J. (2010). Accelerated degradation tests applied to software aging experiments. IEEE Transactions on Reliability, 59(1), 102\u2013114.","journal-title":"IEEE Transactions on Reliability"},{"issue":"1","key":"9460_CR36","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TSE.2007.256941","volume":"33","author":"T Menzies","year":"2007","unstructured":"Menzies, T., Greenwald, J., Frank, A. (2007). Data mining static code attributes to learn defect predictors. IEEE Transactions on Software Engineering, 33(1), 2\u201313.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"9460_CR37","unstructured":"Moser, R, Pedrycz, W, Succi, G. (2008). A comparative analysis of the efficiency of change metrics and static code attributes for defect prediction. In Proceedings of the 30th international conference on Software engineering (pp. 181\u2013190): ACM."},{"key":"9460_CR38","unstructured":"Nagappan, N, & Ball, T. (2005). Use of relative code churn measures to predict system defect density. In Proceedings of the 27th international conference on software engineering (pp. 284\u2013292): ACM."},{"key":"9460_CR39","unstructured":"Nam, J., Pan, S.J., Kim, S. (2013). Transfer defect learning. In 2013 35th International conference on software engineering (ICSE) (pp. 382\u2013391): IEEE."},{"issue":"9","key":"9460_CR40","doi-asserted-by":"publisher","first-page":"874","DOI":"10.1109\/TSE.2017.2720603","volume":"44","author":"J Nam","year":"2018","unstructured":"Nam, J., Fu, W., Kim, S., Menzies, T., Tan, L. (2018). Heterogeneous defect prediction. IEEE Transactions on Software Engineering, 44(9), 874\u2013896.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"9460_CR41","first-page":"357","volume":"6","author":"S Nayak","year":"2014","unstructured":"Nayak, S., Misra, B., Behera, H. (2014). Impact of data normalization on stock index forecasting. International Journal of Computer and Information System Industrial Management Application, 6, 357\u2013369.","journal-title":"International Journal of Computer and Information System Industrial Management Application"},{"issue":"10","key":"9460_CR42","doi-asserted-by":"publisher","first-page":"1345","DOI":"10.1109\/TKDE.2009.191","volume":"22","author":"SJ Pan","year":"2010","unstructured":"Pan, S.J., & Yang, Q. (2010). A survey on transfer learning. IEEE Transactions on Knowledge and Data Engineering, 22(10), 1345\u20131359.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"2","key":"9460_CR43","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/TNN.2010.2091281","volume":"22","author":"SJ Pan","year":"2011","unstructured":"Pan, S.J., Tsang, I.W., Kwok, J.T., Yang, Q. (2011). Domain adaptation via transfer component analysis. IEEE Transactions on Neural Networks, 22(2), 199\u2013210.","journal-title":"IEEE Transactions on Neural Networks"},{"issue":"8","key":"9460_CR44","doi-asserted-by":"publisher","first-page":"1054","DOI":"10.1109\/TSE.2013.6","volume":"39","author":"F Peters","year":"2013","unstructured":"Peters, F., Menzies, T., Gong, L., Zhang, H. (2013). Balancing privacy and utility in cross-company defect prediction. IEEE Transactions on Software Engineering, 39(8), 1054\u20131068.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"9460_CR45","unstructured":"Qiao, Y., Zheng, Z., Fang, Y., Qin, F., Trivedi, K.S., Cai, K.Y. (2018). Two-level rejuvenation for android smartphones and its optimization. IEEE Transactions on Reliability."},{"key":"9460_CR46","unstructured":"Qin, F., Zheng, Z., Bai, C., Qiao, Y., Zhang, Z., Chen, C. (2015). Cross-project aging related bug prediction. In 2015 IEEE International conference on software quality, reliability and security (pp. 43\u201348): IEEE."},{"key":"9460_CR47","unstructured":"Qin, F., Zheng, Z., Li, X., Qiao, Y., Trivedi, K.S. (2017). An empirical investigation of fault triggers in android operating system. In 2017 IEEE 22nd Pacific Rim international symposium on dependable computing (PRDC) (pp. 135\u2013*144): IEEE."},{"key":"9460_CR48","first-page":"1","volume":"99","author":"F Qin","year":"2018","unstructured":"Qin, F., Zheng, Z., Qiao, Y., Trivedi, K.S. (2018). Studying aging-related bug prediction using cross-project models. IEEE Transactions on Reliability, 99, 1\u201320.","journal-title":"IEEE Transactions on Reliability"},{"key":"9460_CR49","doi-asserted-by":"crossref","unstructured":"Ren, J., Qin, K., Ma, Y., Luo, G. (2014). On software defect prediction using machine learning. Journal of Applied Mathematics, 2014.","DOI":"10.1155\/2014\/785435"},{"issue":"1","key":"9460_CR50","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/s10664-014-9346-4","volume":"21","author":"D Ryu","year":"2016","unstructured":"Ryu, D., Choi, O., Baik, J. (2016). Value-cognitive boosting with a support vector machine for cross-project defect prediction. Empirical Software Engineering, 21 (1), 43\u201371.","journal-title":"Empirical Software Engineering"},{"issue":"1","key":"9460_CR51","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/s11219-015-9287-1","volume":"25","author":"D Ryu","year":"2017","unstructured":"Ryu, D., Jang, J.I., Baik, J. (2017). A transfer cost-sensitive boosting approach for cross-project defect prediction. Software Quality Journal, 25(1), 235\u2013272.","journal-title":"Software Quality Journal"},{"key":"9460_CR52","doi-asserted-by":"crossref","unstructured":"Scott, A.J., & Knott, M. (1974). A cluster analysis method for grouping means in the analysis of variance. Biometrics, 507\u2013512.","DOI":"10.2307\/2529204"},{"key":"9460_CR53","unstructured":"Tai, A.T., Chau, S.N., Alkalaj, L., Hecht, H. (1997). On-board preventive maintenance: analysis of effectiveness and optimal duty period. In Proceedings Third international workshop on object-oriented real-time dependable systems (pp. 40\u201347): IEEE."},{"issue":"5","key":"9460_CR54","doi-asserted-by":"publisher","first-page":"540","DOI":"10.1007\/s10664-008-9103-7","volume":"14","author":"B Turhan","year":"2009","unstructured":"Turhan, B., Menzies, T., Bener, A.B., Di Stefano, J. (2009). On the relative value of cross-company and within-company data for defect prediction. Empirical Software Engineering, 14(5), 540\u2013578.","journal-title":"Empirical Software Engineering"},{"issue":"6","key":"9460_CR55","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1016\/j.infsof.2012.10.003","volume":"55","author":"B Turhan","year":"2013","unstructured":"Turhan, B., M\u0131s\u0131rl\u0131, A.T., Bener, A. (2013). Empirical evaluation of the effects of mixed project data on learning defect predictors. Information and Software Technology, 55(6), 1101\u20131118.","journal-title":"Information and Software Technology"},{"issue":"2","key":"9460_CR56","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1109\/TDSC.2005.15","volume":"2","author":"K Vaidyanathan","year":"2005","unstructured":"Vaidyanathan, K., & Trivedi, K.S. (2005). A comprehensive model for software rejuvenation. IEEE Transactions on Dependable and Secure Computing, 2(2), 124\u2013137.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"9460_CR57","unstructured":"Watanabe, S, Kaiya, H., Kaijiri, K. (2008). Adapting a fault prediction model to allow inter languagereuse. In Proceedings of the 4th international workshop on predictor models in software engineering (pp. 19\u201324): ACM."},{"issue":"1","key":"9460_CR58","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1186\/s40537-016-0043-6","volume":"3","author":"K Weiss","year":"2016","unstructured":"Weiss, K., Khoshgoftaar, T.M., Wang, D. (2016). A survey of transfer learning. Journal of Big data, 3(1), 9.","journal-title":"Journal of Big data"},{"key":"9460_CR59","unstructured":"Xiao, G., Zheng, Z., Yin, B., Trivedi, K.S., Du, X., Cai, K. (2017). Experience report: fault triggers in linux operating system: from evolution perspective. In 2017 IEEE 28th international symposium on software reliability engineering (ISSRE) (pp. 101\u2013111): IEEE."},{"key":"9460_CR60","unstructured":"Zhao, L, Song, Q, Zhu, L. (2008). Common software-aging-related faults in fault-tolerant systems. In 2008 International conference on computational intelligence for modelling control & automation (pp. 327\u2013331): IEEE."},{"key":"9460_CR61","unstructured":"Zhao, J, Jin, Y, Trivedi, K.S., Matias, R. Jr. (2011). Injecting memory leaks to accelerate software failures. In 2011 IEEE 22nd international symposium on software reliability engineering (pp. 260\u2013269): IEEE."},{"key":"9460_CR62","unstructured":"Zhou, Z. (2016). Machine learning. Tsinghua Press."}],"container-title":["Software Quality Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-019-09460-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11219-019-09460-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-019-09460-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T23:05:24Z","timestamp":1602716724000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11219-019-09460-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,16]]},"references-count":62,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,3]]}},"alternative-id":["9460"],"URL":"https:\/\/doi.org\/10.1007\/s11219-019-09460-7","relation":{},"ISSN":["0963-9314","1573-1367"],"issn-type":[{"value":"0963-9314","type":"print"},{"value":"1573-1367","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,10,16]]},"assertion":[{"value":"16 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}