{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T12:13:15Z","timestamp":1773922395686,"version":"3.50.1"},"reference-count":41,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/msr.2012.6224284","type":"proceedings-article","created":{"date-parts":[[2012,7,9]],"date-time":"2012-07-09T19:35:00Z","timestamp":1341862500000},"page":"217-226","source":"Crossref","is-referenced-by-count":55,"title":["Can we predict types of code changes? An empirical analysis"],"prefix":"10.1109","author":[{"given":"E.","family":"Giger","sequence":"first","affiliation":[]},{"given":"M.","family":"Pinzger","sequence":"additional","affiliation":[]},{"given":"H. C.","family":"Gall","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70731"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2007.23"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(78)90021-7"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.233165"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1086\/228631"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1145\/1083142.1083163"},{"key":"15","author":"borgatti","year":"1999","journal-title":"UCINET 5 0 Version 1 00"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-005-9000-1"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/32.544352"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.2229"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368161"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609560"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1191795"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/32.295895"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1994.336789"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/PROMISE.2007.10"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1159733.1159739"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2003.1235410"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70773"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368114"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985456"},{"key":"24","article-title":"Statistics for Research","author":"dowdy","year":"2004","journal-title":"Probability and Statistics"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453105"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.35"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.256941"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985842"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2009.5314236"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.41"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2003.1287246"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2009.6"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(93)90077-B"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453107"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2008.47"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.52"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1145\/1083142.1083158"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2004.1317478"},{"key":"31","first-page":"101","article-title":"Applying social network analysis to the information in cvs repositories","author":"gonza?lez","year":"0","journal-title":"Proc Int'l Workshop on Mining Softw Repositories 2004"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2004.1357788"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2006.10.049"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.83"}],"event":{"name":"2012 9th IEEE Working Conference on Mining Software Repositories (MSR 2012)","location":"Zurich","start":{"date-parts":[[2012,6,2]]},"end":{"date-parts":[[2012,6,3]]}},"container-title":["2012 9th IEEE Working Conference on Mining Software Repositories (MSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6220358\/6224266\/06224284.pdf?arnumber=6224284","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T19:52:12Z","timestamp":1490125932000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6224284\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/msr.2012.6224284","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}