{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T13:28:52Z","timestamp":1778765332605,"version":"3.51.4"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100014434","name":"Narodowa Agencja Wymiany Akademickiej","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100014434","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2022,7,1]]},"DOI":"10.1109\/tse.2021.3064447","type":"journal-article","created":{"date-parts":[[2021,3,8]],"date-time":"2021-03-08T21:45:11Z","timestamp":1615239911000},"page":"2557-2569","source":"Crossref","is-referenced-by-count":9,"title":["Tracking Buggy Files: New Efficient Adaptive Bug Localization Algorithm"],"prefix":"10.1109","volume":"48","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1496-2289","authenticated-orcid":false,"given":"Mikolaj","family":"Fejzer","sequence":"first","affiliation":[{"name":"Nicolaus Copernicus University in Toru&#x0144;, Torun, Poland"}],"role":[{"role":"author","vocab":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3296-3915","authenticated-orcid":false,"given":"Jakub","family":"Narebski","sequence":"additional","affiliation":[{"name":"Nicolaus Copernicus University in Toru&#x0144;, Torun, Poland"}],"role":[{"role":"author","vocab":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9548-2388","authenticated-orcid":false,"given":"Piotr","family":"Przymus","sequence":"additional","affiliation":[{"name":"Nicolaus Copernicus University in Toru&#x0144;, Torun, Poland"}],"role":[{"role":"author","vocab":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6356-4872","authenticated-orcid":false,"given":"Krzysztof","family":"Stencel","sequence":"additional","affiliation":[{"name":"University of Warsaw, Warszawa, Poland"}],"role":[{"role":"author","vocab":"crossref"}]}],"member":"263","reference":[{"key":"ref1","article-title":"History\u2019s worst software bugs","author":"Garfinkel","year":"2005"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-014-5241-2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635874"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606617"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2005.48"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/32.295895"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368114"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100062"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1115\/1.860151"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693093"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.40"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2479232"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2017.10.048"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/smr.344"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2597008.2597148"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1801"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.11.002"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.24"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.73"},{"key":"ref20","first-page":"286","article-title":"Locating bugs without looking back","volume-title":"Proc. 13th Int. Conf. Mining Softw. Repositories","author":"Dilshener"},{"key":"ref21","first-page":"1606","article-title":"Learning unified features from natural and programming languages for locating buggy source code","volume-title":"Proc. 25th Int. Joint Conf. Artif. Intell.","author":"Huo"},{"key":"ref22","article-title":"The lemur project - wiki - ranklib","author":"Dang"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786859"},{"key":"ref24","first-page":"1","article-title":"pandas: A foundational python library for data analysis and statistics","volume":"14","author":"McKinney","year":"2011","journal-title":"Python High Perform. Sci. Comput."},{"key":"ref25","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"Pedregosa","year":"2011","journal-title":"J. Mach. Learn. Res."},{"key":"ref26","volume-title":"A Guide to NumPy","author":"Oliphant","year":"2006"},{"key":"ref27","article-title":"Exploring network structure, dynamics, and function using networkx","author":"Hagberg","year":"2008"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3115\/1118108.1118117"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150429"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1162\/153244303322753616"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1952.10483441"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1198\/tech.2001.s629"},{"key":"ref33","article-title":"Contributions to probability and statistics","volume-title":"Essays Honor Harold Hotelling","author":"Levene","year":"1960"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.4310\/SII.2009.v2.n3.a8"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-59119-2_166"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-006-6226-1"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-84858-7"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0087357"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1015330.1015332"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1090\/conm\/443\/08555"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1023\/B:STCO.0000035301.49549.88"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321702"},{"key":"ref43","article-title":"The JGAP library","author":"Meffert"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1080\/10618600.2017.1305277"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642997"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2018.00046"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771797"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/9830789\/09372820.pdf?arnumber=9372820","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T22:41:31Z","timestamp":1704840091000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9372820\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,1]]},"references-count":47,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tse.2021.3064447","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,1]]}}}