{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T18:21:43Z","timestamp":1776277303260,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,9,9]],"date-time":"2011-09-09T00:00:00Z","timestamp":1315526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,9,9]]},"DOI":"10.1145\/2025113.2025121","type":"proceedings-article","created":{"date-parts":[[2011,9,6]],"date-time":"2011-09-06T15:10:46Z","timestamp":1315321846000},"page":"26-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":187,"title":["How do fixes become bugs?"],"prefix":"10.1145","author":[{"given":"Zuoning","family":"Yin","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Ding","family":"Yuan","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Yuanyuan","family":"Zhou","sequence":"additional","affiliation":[{"name":"University of California, San Diego, San Diego, CA, USA"}]},{"given":"Shankar","family":"Pasupathy","sequence":"additional","affiliation":[{"name":"NetApp Inc., Sunnyvale, CA, USA"}]},{"given":"Lakshmi","family":"Bairavasundaram","sequence":"additional","affiliation":[{"name":"NetApp Inc., Sunnyvale, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,9,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Microsoft security bulletin. http:\/\/www.microsoft.com\/technet\/security\/current.aspx.  Microsoft security bulletin. http:\/\/www.microsoft.com\/technet\/security\/current.aspx."},{"key":"e_1_3_2_1_2_1","unstructured":"After buggy patch criminals exploit Windows flaw. http:\/\/www.infoworld.com\/d\/security-central\/after-buggy-patch-criminals-exploit-windows-flaw-848.  After buggy patch criminals exploit Windows flaw. http:\/\/www.infoworld.com\/d\/security-central\/after-buggy-patch-criminals-exploit-windows-flaw-848."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134336"},{"key":"e_1_3_2_1_4_1","unstructured":"Apple updates leopard again. http:\/\/voices.washingtonpost.com\/fasterforward\/2008\/~02\/apple_updates_leopardagain.html.  Apple updates leopard again. http:\/\/voices.washingtonpost.com\/fasterforward\/2008\/~02\/apple_updates_leopardagain.html."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882308"},{"key":"e_1_3_2_1_6_1","volume-title":"ICSE'94","author":"Baker M. J.","unstructured":"M. J. Baker and S. G. Eick . Visualizing software systems . In ICSE'94 . M. J. Baker and S. G. Eick. Visualizing software systems. In ICSE'94."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070550"},{"key":"e_1_3_2_1_8_1","unstructured":"Buggy McAfee update whacks Windows XP PCs. http:\/\/news.cnet.com\/8301-1009_3-20003074-83.html.  Buggy McAfee update whacks Windows XP PCs. http:\/\/news.cnet.com\/8301-1009_3-20003074-83.html."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945468"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502041"},{"key":"e_1_3_2_1_11_1","volume-title":"ICSM'03","author":"Fischer M.","unstructured":"M. Fischer , M. Pinzger , and H. Gall . Populating a release history database from version control and bug tracking systems . In ICSM'03 . M. Fischer, M. Pinzger, and H. Gall. Populating a release history database from version control and bug tracking systems. In ICSM'03."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.83912"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806812"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(02)00135-8"},{"key":"e_1_3_2_1_15_1","unstructured":"Intel reissues buggy patch. http:\/\/www.pcworld.com\/businesscenter\/article\/126918\/rss.html.  Intel reissues buggy patch. http:\/\/www.pcworld.com\/businesscenter\/article\/126918\/rss.html."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985842"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1181775.1181781"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70773"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1181309.1181314"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081755"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346323"},{"key":"e_1_3_2_1_22_1","unstructured":"McAfee to reimburse customers for bad patch. http:\/\/www.computerworlduk.com\/technology\/security-products\/~prevention\/news\/index.cfm?newsId=20005.  McAfee to reimburse customers for bad patch. http:\/\/www.computerworlduk.com\/technology\/security-products\/~prevention\/news\/index.cfm?newsId=20005."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/940071.940110"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/358916.358994"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653717"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.2229"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368160"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806847"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029894.1029928"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352618"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9077-5"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629585"},{"key":"e_1_3_2_1_33_1","volume-title":"MSR'04","author":"Purushothaman R.","unstructured":"R. Purushothaman and D. E. Perry . Towards understanding the rhetoric of small changes . In MSR'04 . R. Purushothaman and D. E. Perry. Towards understanding the rhetoric of small changes. In MSR'04."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.962562"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1083142.1083147"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081725"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294276"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508267"},{"key":"e_1_3_2_1_40_1","volume-title":"ICSE'03","author":"Murphy D.","unstructured":"D. Cubrani? and G. C. Murphy . Hipikat: Recommending pertinent software development artifacts . In ICSE'03 . D. Cubrani? and G. C. Murphy. Hipikat: Recommending pertinent software development artifacts. In ICSE'03."},{"key":"e_1_3_2_1_41_1","volume-title":"ICSE'83","author":"Weiser M.","unstructured":"M. Weiser . Program slicing . In ICSE'83 . M. Weiser. Program slicing. In ICSE'83."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1823844.1823849"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736038"},{"key":"e_1_3_2_1_44_1","volume-title":"FSE'99","author":"Zeller A.","unstructured":"A. Zeller . Yesterday, my program worked. today, it does not. why? In FSE'99 . A. Zeller. Yesterday, my program worked. today, it does not. why? In FSE'99."}],"event":{"name":"ESEC\/FSE'11: Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering","location":"Szeged Hungary","acronym":"ESEC\/FSE'11","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on Foundations of software engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2025113.2025121","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2025113.2025121","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:06:00Z","timestamp":1750244760000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2025113.2025121"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9,9]]},"references-count":43,"alternative-id":["10.1145\/2025113.2025121","10.1145\/2025113"],"URL":"https:\/\/doi.org\/10.1145\/2025113.2025121","relation":{},"subject":[],"published":{"date-parts":[[2011,9,9]]},"assertion":[{"value":"2011-09-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}