{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T16:27:56Z","timestamp":1776184076887,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,5,10]],"date-time":"2008-05-10T00:00:00Z","timestamp":1210377600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,5,10]]},"DOI":"10.1145\/1368088.1368161","type":"proceedings-article","created":{"date-parts":[[2008,5,15]],"date-time":"2008-05-15T14:36:48Z","timestamp":1210862208000},"page":"531-540","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":390,"title":["Predicting defects using network analysis on dependency graphs"],"prefix":"10.1145","author":[{"given":"Thomas","family":"Zimmermann","sequence":"first","affiliation":[{"name":"University of Calgary, Calgary, AB, Canada"}]},{"given":"Nachiappan","family":"Nagappan","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,5,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/525586.823874"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.544352"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.799939"},{"key":"e_1_3_2_1_4_1","unstructured":"J. Bevan \"Software Instability Analysis: Co-Change Analysis Across Configuration-Based Dependence Relationships.\" PhD Thesis: University of California Santa Cruz 2006."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/950792.951382"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/302163.302212"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/776816.776856"},{"key":"e_1_3_2_1_8_1","volume-title":"Ucinet for Windows: Software for Social Network Analysis,\" Analytic Technologies","author":"Borgatti S. P.","year":"2002","unstructured":"S. P. Borgatti, M. G. Everett, and L. C. Freeman, \"Ucinet for Windows: Software for Social Network Analysis,\" Analytic Technologies, Harvard, MA, 2002."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/253228.253367"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.748920"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019484"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/362342.362367"},{"key":"e_1_3_2_1_13_1","volume-title":"Structural Holes: The Social Structure of Competition","author":"Burt R.","year":"1995","unstructured":"R. Burt, Structural Holes: The Social Structure of Competition. Cambridge, MA: Harvard University Press, 1995."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/297805.297835"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.879815"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/580949"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/24039.24041"},{"key":"e_1_3_2_1_18_1","volume-title":"Methodology and tools,\" First Monday","author":"Ghosh R. A.","year":"2003","unstructured":"R. A. Ghosh, \"Clustering and dependencies in free\/open source software development: Methodology and tools,\" First Monday, vol. 8, 2003."},{"key":"e_1_3_2_1_19_1","volume-title":"Introduction to social network methods","author":"Hanneman R. A.","year":"2005","unstructured":"R. A. Hanneman and M. Riddle, Introduction to social network methods. Riverside, CA: University of California, Riverside 2005."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1038267.1039059"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1981.231113"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1083142.1083158"},{"key":"e_1_3_2_1_23_1","volume-title":"A Users Guide to Principal Components","author":"Jackson E. J.","year":"2003","unstructured":"E. J. Jackson, A Users Guide to Principal Components. Hoboken, NJ: John Wiley &amp; Sons Inc., 2003."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2004.08.003"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(87)90102-5"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1181309.1181314"},{"key":"e_1_3_2_1_27_1","first-page":"101","article-title":"Applying Social Network Analysis to the Information in CVS Repositories,\" in International Workshop on Mining Software Repositories, Edinburgh, Scotland","author":"Lopez-Fernandez L.","year":"2004","unstructured":"L. Lopez-Fernandez, G. Robles, and J. M. Gonzalez-Barahona, \"Applying Social Network Analysis to the Information in CVS Repositories,\" in International Workshop on Mining Software Repositories, Edinburgh, Scotland, UK, 2004, pp. 101--105.","journal-title":"UK"},{"key":"e_1_3_2_1_28_1","volume-title":"The open source software development phenomenon: An analysis based on social network theory,\" Americas Conference on Information Systems","author":"Madey G.","year":"2002","unstructured":"G. Madey, V. Freeh, and R. Tynan, \"The open source software development phenomenon: An analysis based on social network theory,\" Americas Conference on Information Systems, 2002."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.298.5594.824"},{"key":"e_1_3_2_1_30_1","first-page":"82","article-title":"An empirical investigation of software fault distribution","author":"M\u00f6ller K.-H.","year":"1993","unstructured":"K.-H. M\u00f6ller and D. J. Paulish, \"An empirical investigation of software fault distribution,\" in International Software Metrics Symposium, 1993, pp. 82--90.","journal-title":"International Software Metrics Symposium"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.135775"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062514"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2007.87"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2006.50"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134349"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/78.3.691"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1137\/S003614450342480"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1083142.1083163"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.553637"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1018210.1018212"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.49"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.58784"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02289527"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159733.1159739"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/367008.367022"},{"key":"e_1_3_2_1_46_1","volume-title":"echnical Report, MSR-TR-2005-94","author":"Srivastava A.","year":"2005","unstructured":"A. Srivastava, T. J., and C. Schertz, \"Efficient Integration Testing using Dependency Analysis,\" Microsoft Research-Technical Report, MSR-TR-2005-94, 2005."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1191795"},{"key":"e_1_3_2_1_48_1","unstructured":"G. Tassey \"The Economic Impacts of Inadequate Infrastructure for Software Testing \" National Institute of Standards and Technology 2002."},{"key":"e_1_3_2_1_49_1","volume-title":"Social Network Analysis: Methods and Applications","author":"Wasserman S.","year":"1984","unstructured":"S. Wasserman and K. Faust, Social Network Analysis: Methods and Applications. Cambridge: Cambridge University Press, 1984."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2007.19"}],"event":{"name":"ICSE '08: International Conference on Software Engineering","location":"Leipzig Germany","acronym":"ICSE '08","sponsor":["ACM Association for Computing Machinery","SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 30th international conference on Software engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1368088.1368161","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1368088.1368161","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T13:49:51Z","timestamp":1773582591000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1368088.1368161"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,5,10]]},"references-count":50,"alternative-id":["10.1145\/1368088.1368161","10.1145\/1368088"],"URL":"https:\/\/doi.org\/10.1145\/1368088.1368161","relation":{},"subject":[],"published":{"date-parts":[[2008,5,10]]},"assertion":[{"value":"2008-05-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}