{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T19:08:34Z","timestamp":1768417714430,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,11,9]],"date-time":"2008-11-09T00:00:00Z","timestamp":1226188800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,11,9]]},"DOI":"10.1145\/1453101.1453105","type":"proceedings-article","created":{"date-parts":[[2008,11,11]],"date-time":"2008-11-11T12:59:40Z","timestamp":1226408380000},"page":"2-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":182,"title":["Can developer-module networks predict failures?"],"prefix":"10.1145","author":[{"given":"Martin","family":"Pinzger","sequence":"first","affiliation":[{"name":"University of Zurich, Zurich, Switzerland"}]},{"given":"Nachiappan","family":"Nagappan","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond"}]},{"given":"Brendan","family":"Murphy","sequence":"additional","affiliation":[{"name":"Microsoft Research, Cambridge, UK"}]}],"member":"320","published-online":{"date-parts":[[2008,11,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.544352"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.799939"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294948.1294953"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2007.23"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1086\/228631"},{"key":"e_1_3_2_1_6_1","volume-title":"Analytic Technologies","author":"Borgatti S. P.","year":"2002","unstructured":"S. P. Borgatti , M. G. Everett , and L. C. Freeman . Ucinet for Windows: Software for Social Network Analysis . Analytic Technologies , Harvard, MA , 2002 . S. P. Borgatti, M. G. Everett, and L. C. Freeman. Ucinet for Windows: Software for Social Network Analysis. Analytic Technologies, Harvard, MA, 2002."},{"key":"e_1_3_2_1_7_1","volume-title":"Addison-Wesley","author":"Cockburn A.","year":"2001","unstructured":"A. Cockburn . Agile Software Development . Addison-Wesley , Boston , 2001 . A. Cockburn. Agile Software Development. Addison-Wesley, Boston, 2001."},{"key":"e_1_3_2_1_8_1","volume-title":"Peopleware: Productive Projects and Teams","author":"DeMarco T.","year":"1999","unstructured":"T. DeMarco and T. Lister . Peopleware: Productive Projects and Teams , 2 nd edition, Dorset House Publishing , New York , 1999 . T. DeMarco and T. Lister. Peopleware: Productive Projects and Teams, 2nd edition, Dorset House Publishing, New York, 1999.","edition":"2"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.879815"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-005-9000-1"},{"key":"e_1_3_2_1_11_1","volume-title":"Software Metrics: A Rigorous and Practical Approach","author":"Fenton N. E.","year":"1997","unstructured":"N. E. Fenton and S. L. Pfleeger . Software Metrics: A Rigorous and Practical Approach . PWS Publishing Co. , Boston, MA, USA , 1997 . N. E. Fenton and S. L. Pfleeger. Software Metrics: A Rigorous and Practical Approach. PWS Publishing Co., Boston, MA, USA, 1997."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.815326"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(78)90021-7"},{"key":"e_1_3_2_1_14_1","volume-title":"Clustering and dependencies in free\/open source software development: Methodology and tools. First Monday, 8(4)","author":"Ghosh R. A.","year":"2003","unstructured":"R. A. Ghosh . Clustering and dependencies in free\/open source software development: Methodology and tools. First Monday, 8(4) , 2003 . R. A. Ghosh. Clustering and dependencies in free\/open source software development: Methodology and tools. First Monday, 8(4), 2003."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.859533"},{"key":"e_1_3_2_1_16_1","volume-title":"Signal detection theory and psychophysics","author":"Green D. M.","year":"1966","unstructured":"D. M. Green and J. M. Swets . Signal detection theory and psychophysics . John Wiley & amp; Sons, Inc. New York, 1966 . D. M. Green and J. M. Swets. Signal detection theory and psychophysics. John Wiley &amp; Sons, Inc. New York, 1966."},{"key":"e_1_3_2_1_17_1","volume-title":"Introduction to social network methods","author":"Hanneman R. A.","year":"2005","unstructured":"R. A. Hanneman and M. Riddle . Introduction to social network methods . University of California , Riverside, California , 2005 . R. A. Hanneman and M. Riddle. Introduction to social network methods. University of California, Riverside, California, 2005."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1205177"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34226-5_32"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1083142.1083158"},{"key":"e_1_3_2_1_21_1","volume-title":"TSP: Leading a Development Team","author":"Humphrey W. S.","year":"2006","unstructured":"W. S. Humphrey . TSP: Leading a Development Team . Addison-Wesley , Boston , 2006 . W. S. Humphrey. TSP: Leading a Development Team. Addison-Wesley, Boston, 2006."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","DOI":"10.1002\/0471725331","volume-title":"A User's Guide to Principal Components","author":"Jackson J. E.","year":"1991","unstructured":"J. E. Jackson . A User's Guide to Principal Components . John Wiley & amp; Sons, Inc., New York, 1991 . J. E. Jackson. A User's Guide to Principal Components. John Wiley &amp; Sons, Inc., New York, 1991."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.66"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1137983.1138012"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.666844"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1049\/ic:20040485"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.10"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.2229"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368114"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.135775"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/850947.853326"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134349"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062514"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368160"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1083142.1083163"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.49"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/1759394.1759399"},{"issue":"3","key":"e_1_3_2_1_38_1","first-page":"73","article-title":"An Interface for Very Large-Scale Conversations","volume":"17","author":"Sack W.","year":"2001","unstructured":"W. Sack . Conversation Map : An Interface for Very Large-Scale Conversations . Journal of Management Information Systems , 17 ( 3 ), pp. 73 -- 92 , 2001 . W. Sack. Conversation Map: An Interface for Very Large-Scale Conversations. Journal of Management Information Systems, 17(3), pp. 73--92, 2001.","journal-title":"Journal of Management Information Systems"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-006-9020-5"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROMISE.2007.14"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2005.57"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368161"}],"event":{"name":"SIGSOFT '08\/FSE-16: SIGSOFT 2008 -16th International Symposium on the Foundations of Software Engineering","location":"Atlanta Georgia","acronym":"SIGSOFT '08\/FSE-16","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of software engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1453101.1453105","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1453101.1453105","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:44Z","timestamp":1750253384000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1453101.1453105"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,11,9]]},"references-count":43,"alternative-id":["10.1145\/1453101.1453105","10.1145\/1453101"],"URL":"https:\/\/doi.org\/10.1145\/1453101.1453105","relation":{},"subject":[],"published":{"date-parts":[[2008,11,9]]},"assertion":[{"value":"2008-11-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}