{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:25:18Z","timestamp":1772907918849,"version":"3.50.1"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2014,2,7]],"date-time":"2014-02-07T00:00:00Z","timestamp":1391731200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int J Syst Assur Eng Manag"],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1007\/s13198-014-0226-5","type":"journal-article","created":{"date-parts":[[2014,2,6]],"date-time":"2014-02-06T10:43:56Z","timestamp":1391683436000},"page":"155-164","source":"Crossref","is-referenced-by-count":25,"title":["Predicting the complexity of code changes using entropy based measures"],"prefix":"10.1007","volume":"5","author":[{"given":"K. K.","family":"Chaturvedi","sequence":"first","affiliation":[]},{"given":"P. K.","family":"Kapur","sequence":"additional","affiliation":[]},{"given":"Sameer","family":"Anand","sequence":"additional","affiliation":[]},{"given":"V. B.","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,2,7]]},"reference":[{"issue":"6","key":"226_CR1","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1109\/TSE.1983.235271","volume":"9","author":"AJ Albrecht","year":"1983","unstructured":"Albrecht AJ, Gaffney JR (1983) Software function, source lines of code and development effort prediction: a software science validation. IEEE Trans Soft Eng 9(6):639\u2013648","journal-title":"IEEE Trans Soft Eng"},{"key":"226_CR2","unstructured":"Baisli VR (1980) Qualitative software complexity models: a summary. In: Tutorial on models and methods for software management and engineering. IEEE Computer Society Press, Los Alamitos"},{"issue":"5","key":"226_CR3","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1287\/mnsc.15.5.215","volume":"15","author":"F Bass","year":"1969","unstructured":"Bass F (1969) A new product growth model for consumer durables. Manag Sci 15(5):215\u2013227","journal-title":"Manag Sci"},{"key":"226_CR26","doi-asserted-by":"crossref","unstructured":"Canfora G, Cerulo L, Di Penta M, Pacilio F (2010) An exploratory study of factors influencing change entropy. In: The 18th IEEE international conference on program comprehension, ICPC 2010, Braga, Minho, Portugal, 30 June\u20132 July 2010. IEEE Computer Society, Washington, DC, pp. 134\u2013143","DOI":"10.1109\/ICPC.2010.32"},{"issue":"6","key":"226_CR6","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1109\/32.295895","volume":"20","author":"AJ Chidamber","year":"1994","unstructured":"Chidamber AJ, Kemerer CF (1994) A metric suite for object oriented design. IEEE Trans Soft Eng 20(6):476\u2013493","journal-title":"IEEE Trans Soft Eng"},{"key":"226_CR25","doi-asserted-by":"crossref","unstructured":"D\u2019Ambros M, Lanza M, Robbes R (2010). An extensive comparison of bug prediction approaches. In: Proceedings of the seventh IEEE working conference on mining software repositories (MSR07). IEEE CS Press, pp. 31\u201341","DOI":"10.1109\/MSR.2010.5463279"},{"issue":"4\u20135","key":"226_CR7","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1007\/s10664-011-9173-9","volume":"17","author":"M D\u2019Ambros","year":"2012","unstructured":"D\u2019Ambros M, Lanza M, Robbes R (2012) Evaluating defect prediction approaches: a benchmark and an extensive comparison. Empir Softw Eng 17(4\u20135):531\u2013577","journal-title":"Empir Softw Eng"},{"key":"226_CR9","doi-asserted-by":"crossref","unstructured":"Erlikh L (2000) Leveraging legacy system dollars for E-business. (IEEE) IT Pro, May\/June 2000, pp 17\u201323","DOI":"10.1109\/6294.846201"},{"key":"226_CR11","volume-title":"Elements of software science","author":"MH Halstead","year":"1977","unstructured":"Halstead MH (1977) Elements of software science. Elsevier North Holland, New York"},{"key":"226_CR13","unstructured":"Hassan AE (2009) Predicting faults based on complexity of code change. In: proceedings of the 31st international conference on software engineering, pp 78\u201388"},{"key":"226_CR15","first-page":"69","volume-title":"Object oriented software engineering: a use case driven approach","author":"I Jacobson","year":"1992","unstructured":"Jacobson I, Christerson M, Jonsson P, Overgaard G (1992) Object oriented software engineering: a use case driven approach. ACM Press, Addison Wesley, New York, Reading, pp 69\u201370"},{"key":"226_CR16","doi-asserted-by":"crossref","unstructured":"Kagdi H (2007) Improving change prediction with fine-grained source code mining. In: Proceedings of the twenty-second IEEE\/ACM international conference on automated software engineering, Atlanta, Georgia, USA, 05\u201309 November 2007","DOI":"10.1145\/1321631.1321742"},{"key":"226_CR17","doi-asserted-by":"crossref","unstructured":"Kagdi H, Maletic JI (2006) Software-change prediction: estimated+actual. In: SOFTWARE-EVOLVABILITY \u201806 proceedings of the second international IEEE workshop on software evolvability. IEEE Computer Society, Washington, DC, pp 38\u201343","DOI":"10.1109\/SOFTWARE-EVOLVABILITY.2006.14"},{"key":"226_CR18","doi-asserted-by":"crossref","unstructured":"Kagdi H, Maletic JI (2007) Combining single-version and evolutionary dependencies for software-change prediction. In: Proceedings of the fourth international workshop on mining software repositories held during 20\u201326 May 2007","DOI":"10.1109\/MSR.2007.2"},{"issue":"6","key":"226_CR19","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1109\/TSE.1976.233837","volume":"2","author":"TH McCabe","year":"1976","unstructured":"McCabe TH (1976) A complexity measure. IEEE Trans Soft Eng 2(6):308\u2013320","journal-title":"IEEE Trans Soft Eng"},{"key":"226_CR20","unstructured":"Mockus A, Eick SG, Graves TL, Karr AF (1999) On measurement and analysis of software changes. Technical report, National Institute of Statistical Sciences"},{"issue":"4","key":"226_CR21","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1109\/TSE.1975.6312866","volume":"1","author":"MJ Rochkind","year":"1975","unstructured":"Rochkind MJ (1975) The source code control system. IEEE Trans Soft Eng 1(4):364\u2013370","journal-title":"IEEE Trans Soft Eng"},{"issue":"379\u2013423","key":"226_CR22","doi-asserted-by":"crossref","first-page":"623","DOI":"10.1002\/j.1538-7305.1948.tb00917.x","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27(379\u2013423):623\u2013656","journal-title":"Bell Syst Tech J"},{"key":"226_CR23","unstructured":"The bugZilla project (2012). http:\/\/www.bugzilla.org . Accessed 30 Nov 2012"},{"key":"226_CR24","unstructured":"The Mozilla project (2012). http:\/\/www.mozilla.org . Accessed 30 Nov 2012"}],"container-title":["International Journal of System Assurance Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-014-0226-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13198-014-0226-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-014-0226-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T07:11:24Z","timestamp":1565161884000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13198-014-0226-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2,7]]},"references-count":20,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,6]]}},"alternative-id":["226"],"URL":"https:\/\/doi.org\/10.1007\/s13198-014-0226-5","relation":{},"ISSN":["0975-6809","0976-4348"],"issn-type":[{"value":"0975-6809","type":"print"},{"value":"0976-4348","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,2,7]]}}}