{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T10:56:48Z","timestamp":1762253808714,"version":"3.37.3"},"reference-count":130,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100011688","name":"Electronic Components and Systems for European Leadership","doi-asserted-by":"publisher","award":["iDev40"],"award-info":[{"award-number":["iDev40"]}],"id":[{"id":"10.13039\/501100011688","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["AP 206\/4, AP 206\/5, AP 206\/6"],"award-info":[{"award-number":["AP 206\/4, AP 206\/5, AP 206\/6"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NSF","award":["CCF-1514561"],"award-info":[{"award-number":["CCF-1514561"]}]},{"name":"BayIntAn","award":["OTHR-2-16-144"],"award-info":[{"award-number":["OTHR-2-16-144"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2022,8,1]]},"DOI":"10.1109\/tse.2021.3082074","type":"journal-article","created":{"date-parts":[[2021,5,19]],"date-time":"2021-05-19T21:17:21Z","timestamp":1621459041000},"page":"3159-3184","source":"Crossref","is-referenced-by-count":23,"title":["In Search of Socio-Technical Congruence: A Large-Scale Longitudinal Study"],"prefix":"10.1109","volume":"48","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9765-8313","authenticated-orcid":false,"given":"Wolfgang","family":"Mauerer","sequence":"first","affiliation":[{"name":"Technical University of Applied Sciences Regensburg, Regensburg, Bavaria, Germany"}]},{"given":"Mitchell","family":"Joblin","sequence":"additional","affiliation":[{"name":"Siemens AG, Corporate Research and Technology, Munich, Bavaria, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1230-8961","authenticated-orcid":false,"given":"Damian A.","family":"Tamburri","sequence":"additional","affiliation":[{"name":"Technical University of Eindhoven, Eindhoven, The Netherlands"}]},{"given":"Carlos","family":"Paradis","sequence":"additional","affiliation":[{"name":"University of Hawaii, Honolulu, HI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0392-2783","authenticated-orcid":false,"given":"Rick","family":"Kazman","sequence":"additional","affiliation":[{"name":"University of Hawaii, Honolulu, HI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3687-2233","authenticated-orcid":false,"given":"Sven","family":"Apel","sequence":"additional","affiliation":[{"name":"Saarland University, Saarland Informatics Campus, Saarbr&#x00E4;ucken, Saarland, Germany"}]}],"member":"263","reference":[{"issue":"3","key":"ref1","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1109\/TSE.2012.32","article-title":"Coordination breakdowns and their impact on development productivity and software failures","volume":"39","author":"Cataldo","year":"2013","journal-title":"IEEE Trans. Softw. Eng."},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/302405.302455"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.24"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1080\/00031305.2018.1527253"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070530"},{"issue":"6","key":"ref6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2382756.2382785","article-title":"Interactive churn metrics: Socio-technical variants of code churn","volume":"37","author":"Meneely","year":"2012","journal-title":"ACM SIGSOFT Softw. Eng. Notes"},{"issue":"2","key":"ref7","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1016\/j.infsof.2011.09.004","article-title":"Code churn estimation using organisational and code metrics: An experimental comparison","volume":"54","author":"Karus","year":"2012","journal-title":"Inf. Softw. Technol."},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1109\/MSR.2007.33","article-title":"Using software repositories to investigate socio-technical congruence in development projects","volume-title":"Proc. 4th Int. Workshop Mining Softw. Repositories","author":"Valetto"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"38469","DOI":"10.1109\/ACCESS.2019.2905671","article-title":"How to verify Conways law for open source projects","volume":"7","author":"Kamola","year":"2019","journal-title":"IEEE Access"},{"key":"ref10","first-page":"109","article-title":"Socio-technical congruence in OSS projects: Exploring Conways law in freeBSD","volume-title":"Proc. IFIP Int. Conf. Open Source Syst.","author":"Syeed"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/RESER.2013.14"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/RESER.2013.8"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1177\/0049124102239079"},{"issue":"2\/3","key":"ref14","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/s11721-015-0105-y","article-title":"A quantitative micro-macro link for collective decisions: The shortest path discovery\/selection example","volume":"9","author":"Reina","year":"2015","journal-title":"Swarm Intell."},{"key":"ref15","article-title":"The mirroring hypothesis: Theory, evidence and exceptions","author":"Colfer","year":"2010","journal-title":"Working Paper"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/WICSA.2008.49"},{"issue":"1","key":"ref17","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1109\/MS.2012.3","article-title":"Conways law revisited: The evidence for a task-based perspective","volume":"29","author":"Kwan","year":"2012","journal-title":"IEEE Softw."},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/52.795103"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368160"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38928-3_8"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2009.17"},{"key":"ref22","first-page":"24","article-title":"Latent social structure in open source projects","volume-title":"Proc. 16th ACM SIGSOFT Int. Symp. Found. Softw. Eng.","author":"Bird"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2901490"},{"key":"ref24","first-page":"18","article-title":"Social debt analytics for improving the management of software evolution tasks","author":"Palomba","year":"2017","journal-title":"BENEVOL"},{"issue":"1","key":"ref25","first-page":"1","article-title":"Social debt in software engineering: Insights from industry","volume":"6","author":"Tamburri","year":"2015","journal-title":"J. Internet Services Appl."},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1882362.1882373"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.146"},{"article-title":"Alone together: A socio-technical theory of motivation, coordination and collaboration technologies in organizing for free and open source software development","year":"2012","author":"Howison","key":"ref28"},{"article-title":"Modularity and organizational dynamics in open source software (OSS) production","volume-title":"Proc. Americas Conf. Inf. Syst.","author":"Moon","key":"ref29"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1038\/nrg2102"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-020-09833-8"},{"issue":"1","key":"ref32","doi-asserted-by":"crossref","first-page":"29","DOI":"10.25300\/MISQ\/2014\/38.1.02","article-title":"Collaboration through open superposition: A theory of the open source way","volume":"38","author":"Howison","year":"2014","journal-title":"MIS Quart."},{"key":"ref33","first-page":"19","article-title":"Do open projects \u201dbreak the mirror\u201d?: Re-conceptualization of organizational configurations in open source software (OSS) production","volume-title":"Proc. 9th Int. Workshop Cooperative Hum. Aspects Softw. Eng.","author":"Moon"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2737791"},{"key":"ref35","first-page":"601","article-title":"Motifs in temporal networks","volume-title":"Proc. 10th ACM Int. Conf. Web Search Data Mining","author":"Paranjape"},{"key":"ref36","first-page":"444","article-title":"Palant\u00ecr: Raising awareness among configuration management workspaces","volume-title":"Proc. 25th Int. Conf. Softw. Eng.","author":"Sarma"},{"key":"ref37","first-page":"23","article-title":"Tesseract: Interactive visual exploration of socio-technical relationships in software development","volume-title":"Proc. IEEE 31st Int. Conf. Softw. Eng.","author":"Sarma"},{"issue":"2","key":"ref38","doi-asserted-by":"crossref","first-page":"25","DOI":"10.4018\/jdm.2007040102","article-title":"Social network structures in open source software development teams","volume":"18","author":"Long","year":"2007","journal-title":"J. Database Manage."},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453105"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2013.13"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2465387"},{"article-title":"Social network analysis of software development mailing lists","year":"2014","author":"Borsos","key":"ref42"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2957792.2957810"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.73"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1002\/hrm.21544"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s10111-014-0284-0"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/1414004.1414008"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/1137983.1138016"},{"issue":"1","key":"ref49","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/TEM.2015.2491283","article-title":"Design structure matrix extensions and innovations: A survey and new opportunities","volume":"63","author":"Browning","year":"2016","journal-title":"IEEE Trans. Eng. Manag."},{"key":"ref50","first-page":"197","article-title":"Design rule hierarchies and parallelism in software development tasks","volume-title":"Proc. IEEE\/ACM Int. Conf. Automated Softw. Eng.","author":"Wong"},{"key":"ref51","first-page":"219","article-title":"Exploratory analysis of co-change graphs for code refactoring","volume-title":"Proc. Can. Conf. AI","author":"Khosravi"},{"issue":"10","key":"ref52","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1145\/1103845.1094824","article-title":"Using dependency models to manage complex software architecture","volume":"40","author":"Sangal","year":"2005","journal-title":"ACM SIGPLAN Notices"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.47"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-016-9478-9"},{"key":"ref55","first-page":"113","article-title":"Analyzing social behavior of software developers across different communication channels (S)","volume-title":"Proc. 25th Int. Conf. Softw. Eng. Knowl. Eng.","author":"Iqbal"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985832"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199206650.001.0001"},{"issue":"17","key":"ref58","first-page":"617","article-title":"Fast randomization of large genomic datasets while preserving alteration counts","volume":"30","author":"Gobbi","year":"2014","journal-title":"BMC Bioinf."},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1186\/s12859-016-1402-1"},{"key":"ref60","first-page":"547","article-title":"\u00c9tude comparative de la distribution florale dans une portion des Alpes et des Jura","volume":"37","author":"Jaccard","year":"1901","journal-title":"Bulletin Del La Soci\u00e9t\u00e9 Vaudoise des Sciences Naturelles"},{"issue":"2","key":"ref61","doi-asserted-by":"crossref","first-page":"474","DOI":"10.32614\/RJ-2016-060","article-title":"ggfortify: Unified interface to visualize statistical result of popular r packages","volume":"8","author":"Tang","year":"2016","journal-title":"R J."},{"key":"ref62","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-21706-2","author":"Venables","year":"2002","journal-title":"Modern Applied Statistics with S"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v082.i13"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v067.i01"},{"journal-title":"An R Companion to Applied Regression","year":"2011","author":"Fox","key":"ref65"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1111\/1467-9868.00374"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1201\/9781315370279"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1198\/016214504000000980"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9868.2010.00749.x"},{"issue":"12","key":"ref70","doi-asserted-by":"crossref","first-page":"1","DOI":"10.18637\/jss.v021.i12","article-title":"Reshaping data with the reshape package","volume":"21","author":"Wickham","year":"2007","journal-title":"J. Statist. Softw."},{"issue":"1","key":"ref71","doi-asserted-by":"crossref","first-page":"1","DOI":"10.18637\/jss.v040.i01","article-title":"The split-apply-combine strategy for data analysis","volume":"40","author":"Wickham","year":"2011","journal-title":"J. Statist. Softw."},{"key":"ref72","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-24277-4","author":"Wickham","year":"2016","journal-title":"ggplot2: Elegant Graphics for Data Analysis"},{"volume-title":"R: A Language and Environment for Statistical Computing, R Foundation for Statistical Computing, Vienna, Austria","year":"2018","key":"ref73"},{"journal-title":"Statistics Done Wrong: The Woefully Complete Guide","year":"2015","author":"Reinhart","key":"ref74"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1995.tb02031.x"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1093\/bja\/aew146"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1080\/00031305.2019.1583913"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1080\/00031305.2016.1154108"},{"key":"ref79","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-84858-7","volume-title":"The Elements of Statistical Learning: Data Mining, Inference, and Prediction, ser. Springer series in statistics","author":"Hastie","year":"2009"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34333-9"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/s10654-016-0149-3"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1214\/ss\/1009213726"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9868.2005.00503.x"},{"issue":"4","key":"ref84","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1016\/j.csda.2004.03.015","article-title":"Sensitivity analysis of constrained linear L1 regression: Perturbations to response and predictor variables","volume":"48","author":"Shi","year":"2005","journal-title":"Comput. Statist. Data Anal."},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2883603"},{"issue":"5","key":"ref86","doi-asserted-by":"crossref","first-page":"462","DOI":"10.1109\/TSE.2014.2372760","article-title":"Mining version histories for detecting code smells","volume":"41","author":"Palomba","year":"2015","journal-title":"IEEE Trans. Softw. Eng."},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1080\/00031305.2016.1256839"},{"key":"ref88","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4899-3242-6","volume-title":"Generalized Linear Models","author":"McCullagh","year":"1989"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v027.i08"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1201\/9780203753781-6"},{"key":"ref91","first-page":"130","article-title":"Small is beautiful: The use and interpretation of $R^{2}$R2 in social research","author":"Moksony","year":"1999","journal-title":"Szociologiai Szemle"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1049\/sej.1988.0003"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1032181158"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.2307\/1267352"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1996.tb02080.x"},{"issue":"1","key":"ref96","doi-asserted-by":"crossref","first-page":"1","DOI":"10.18637\/jss.v033.i01","article-title":"Regularization paths for generalized linear models via coordinate descent","volume":"33","author":"Friedman","year":"2010","journal-title":"J. Statist. Softw."},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1348\/000712608x377117"},{"key":"ref98","doi-asserted-by":"crossref","DOI":"10.1002\/0470114754","author":"Agresti","year":"2007","journal-title":"An Introduction to Categorical Data Analysis"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1214\/10-BA607"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1002\/bimj.200900028"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76440-3_4"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00088"},{"key":"ref103","first-page":"392","article-title":"Its not a bug, its a feature: How misclassification impacts bug prediction","volume-title":"Proc. Int. Conf. Softw. Eng.","author":"Herzig"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.1274044"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9360-1"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38928-3_18"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884825"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1938.10502329"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1037\/h0020412"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1214\/ss\/1177011945"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1177\/0149206314525208"},{"issue":"11","key":"ref112","doi-asserted-by":"crossref","first-page":"1359","DOI":"10.1177\/0956797611417632","article-title":"False-positive psychology undisclosed flexibility in data collection and analysis allows presenting anything as significant","volume":"22","author":"Simmons","year":"2011","journal-title":"Psychol. Sci."},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.29"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.19"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1145\/302405.302455"},{"issue":"4","key":"ref116","first-page":"28","article-title":"How do committees invent?","volume":"14","author":"Conway","year":"1968","journal-title":"Datamation J."},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1145\/2522968.2522971"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453105"},{"key":"ref119","article-title":"The structure of scientific theories","volume-title":"The Stanford Encyclopedia of Philosophy, E. N. Zalta, Ed","author":"Winther","year":"2016"},{"key":"ref120","article-title":"Scientific method","volume-title":"The Stanford Encyclopedia of Philosophy","author":"Andersen","year":"2016"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.103"},{"key":"ref122","doi-asserted-by":"crossref","DOI":"10.1109\/TSE.1976.233837","article-title":"A complexity measure","volume-title":"Proc. 2nd Int. Conf. Softw. Eng.","author":"McCabe"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1145\/947825.947829"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1007\/s11135-006-9018-6"},{"volume-title":"Multivariate Data Analysis","year":"2018","author":"Hair","key":"ref125"},{"article-title":"Structural and evolutionary analysis of developer networks","year":"2017","author":"Joblin","key":"ref126"},{"volume-title":"Modern Information Retrieval","year":"2000","author":"Baeza-Yates","key":"ref127"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606615"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.47"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1080\/00031305.1973.10478966"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/32\/9857502\/9436025-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/9857502\/09436025.pdf?arnumber=9436025","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T04:36:04Z","timestamp":1725165364000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9436025\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,1]]},"references-count":130,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tse.2021.3082074","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"type":"print","value":"0098-5589"},{"type":"electronic","value":"1939-3520"},{"type":"electronic","value":"2326-3881"}],"subject":[],"published":{"date-parts":[[2022,8,1]]}}}