{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T04:10:31Z","timestamp":1773375031866,"version":"3.50.1"},"reference-count":92,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2018,4,1]],"date-time":"2018-04-01T00:00:00Z","timestamp":1522540800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"ONR","award":["N000141410037"],"award-info":[{"award-number":["N000141410037"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2018,4,1]]},"DOI":"10.1109\/tse.2017.2692783","type":"journal-article","created":{"date-parts":[[2017,4,12]],"date-time":"2017-04-12T18:32:15Z","timestamp":1492021935000},"page":"334-364","source":"Crossref","is-referenced-by-count":13,"title":["Hybrid Program Dependence Approximation for Effective Dynamic Impact Prediction"],"prefix":"10.1109","volume":"44","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5224-9970","authenticated-orcid":false,"given":"Haipeng","family":"Cai","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref73","article-title":"It&#x2019;s the effect size, stupid: What effect size is and why it is important","author":"coe","year":"2002","journal-title":"Proc Annu Conf British Educ Res Assoc"},{"key":"ref72","author":"cliff","year":"1996","journal-title":"Ordinal Methods for Behavioral Data Analysis"},{"key":"ref71","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1080\/00031305.1948.10483415","article-title":"Questions and answers","volume":"2","author":"mosteller","year":"1948","journal-title":"Amer Statistician"},{"key":"ref70","author":"walpole","year":"2011","journal-title":"Probability and Statistics for Engineers and Scientists"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/1596527.1596528"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2004.1357805"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2015.7081862"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368122"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2002.1167743"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134355"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/2894751"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2005.100"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.32"},{"key":"ref32","author":"rajlich","year":"2011","journal-title":"Software Engineering The Current Practice"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1997.624234"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2010.29"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1145\/2593882.2593893","article-title":"Software evolution and maintenance","author":"rajlich","year":"2014","journal-title":"Proc Conf Future Softw Eng"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1145287.1145289"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642950"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.02.018"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/1275497.1275502"},{"key":"ref62","year":"2017"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2644805"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1994.296778"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2010.48"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-005-3861-2"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ASEA.2008.62"},{"key":"ref65","year":"2005"},{"key":"ref66","year":"2012"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2006.61"},{"key":"ref67","year":"2010"},{"key":"ref68","year":"2013"},{"key":"ref69","year":"2003"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1109\/ICSM.1999.792645","article-title":"Using\n coupling measurement for impact analysis in object-oriented systems","author":"briand","year":"1999","journal-title":"Proc IEEE Int Conf Softw Maintenance"},{"key":"ref1","first-page":"1","article-title":"An introduction to software change impact analysis","author":"bohner","year":"1996","journal-title":"Software Change Impact Analysis"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2005.1"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SERE.2014.18"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2003.1251064"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/93542.93576"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(88)90054-3"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SERA.2007.109"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2004.1317472"},{"key":"ref50","author":"aho","year":"2006","journal-title":"Compilers Principles Techniques and Tools"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/1217295.1217297"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.09.048"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542527"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1993.366934"},{"key":"ref59","first-page":"1","article-title":"Soot&#x2014;a Java Bytecode Optimization Framework","author":"lam","year":"2011","journal-title":"Proc Cetus Users and Compiler Infrastructure Workshop"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2487568.2487574"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/336512.336545"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2015.2481000"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/154183.154269"},{"key":"ref54","first-page":"569","article-title":"Impact analysis in the presence\n of dependence clusters using static execute after in WebKit","volume":"26","author":"schrettner","year":"2013","journal-title":"Journal of Software: Evolution and Process"},{"key":"ref53","first-page":"49","article-title":"Abstracting program dependencies using the method dependence graph","author":"cai","year":"2015","journal-title":"Proc Int Conf Softw Quality Rel Secur"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/32.877846"},{"key":"ref10","article-title":"A review of software change impact analysis","author":"lehnert","year":"2011"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/77606.77608"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393656"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2008.4658062"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1996.565004"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/940071.940089"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2003.1201210"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1205178"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2006.33"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2010.45"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1475"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2009.5090023"},{"key":"ref18","first-page":"432","article-title":"Efficient and precise dynamic impact analysis using execute-after sequences","author":"apiwattanapong","year":"2005","journal-title":"Proc Int Conf Softw Eng"},{"key":"ref83","first-page":"247","article-title":"HSM-based change impact analysis of object-oriented Java\n programs","volume":"20","author":"sun","year":"2011","journal-title":"Chin J Electron"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2004.1357834"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985898"},{"key":"ref89","first-page":"293","article-title":"Hidden dependencies in program comprehension and change propagation","author":"yu","year":"2001","journal-title":"Proc of the Int Workshop on Program Comprehension"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICIS.2008.104"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227172"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9088-2"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2004.1317471"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.4156\/jdcta.vol3.issue4.12"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2008.25"},{"key":"ref86","article-title":"A practical interprocedural alias analysis for an\n optimizing\/parallelizing C compiler","author":"emami","year":"1993"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1028976.1029012"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/367008.367022"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(94)00099-9"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2014.25"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1982185.1982495"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2015.7081833"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.1999.756690"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/24039.24041"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/32.58784"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806829"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.32"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.90"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985898"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/8338178\/07895205.pdf?arnumber=7895205","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T07:44:01Z","timestamp":1643183041000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7895205\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,1]]},"references-count":92,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tse.2017.2692783","relation":{},"ISSN":["0098-5589","1939-3520"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,4,1]]}}}