{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T14:24:15Z","timestamp":1775571855985,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,5,31]],"date-time":"2014-05-31T00:00:00Z","timestamp":1401494400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,5,31]]},"DOI":"10.1145\/2568225.2568279","type":"proceedings-article","created":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T13:48:00Z","timestamp":1400593680000},"page":"199-210","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Does latitude hurt while longitude kills? geographical and temporal separation in a large scale software development project"],"prefix":"10.1145","author":[{"given":"Patrick","family":"Wagstrom","sequence":"first","affiliation":[{"name":"IBM Research, USA"}]},{"given":"Subhajit","family":"Datta","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2014,5,31]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"China, India, Ireland, and Israel","author":"Arora A.","year":"2006","unstructured":"Arora , A. , and Gambardella , A . From underdogs to tigers: the rise and growth of the software industry in Brazil , China, India, Ireland, and Israel . Oxford University Press , Oxford , 2006 . Arora, A., and Gambardella, A. From underdogs to tigers: the rise and growth of the software industry in Brazil, China, India, Ireland, and Israel. Oxford University Press, Oxford, 2006."},{"key":"e_1_3_2_1_2_1","volume-title":"Manifesto for agile software development. Last visited","author":"Beck K.","year":"2013","unstructured":"Beck , K. , Beedle , M. , van Bennekum , A. , Cockburn , A. , Cunningham , W. , Fowler , M. , Grenning , J. , Highsmith , J. , Hunt , A. , Je\u21b5ries , R. , Kern , J. , Marick , B. , Martin , R. C. , Mellor , S. , Schwaber , K. , Sutherland , J. , and Thomas , D . Manifesto for agile software development. Last visited : May 15, 2013 . http:\/\/agilemanifesto.org\/principles.html, 2001. Beck, K., Beedle, M., van Bennekum, A., Cockburn, A., Cunningham, W., Fowler, M., Grenning, J., Highsmith, J., Hunt, A., Je\u21b5ries, R., Kern, J., Marick, B., Martin, R. C., Mellor, S., Schwaber, K., Sutherland, J., and Thomas, D. Manifesto for agile software development. Last visited: May 15, 2013. http:\/\/agilemanifesto.org\/principles.html, 2001."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536616.1536639"},{"key":"e_1_3_2_1_4_1","volume-title":"Anniversary Edition, 2 ed","author":"Brooks F. P.","year":"1995","unstructured":"Brooks , F. P. The Mythical Man-Month: Essays on Software Engineering , Anniversary Edition, 2 ed . Addison-Wesley Professional , Boston, MA, USA , Aug. 1995 . Brooks, F. P. The Mythical Man-Month: Essays on Software Engineering, Anniversary Edition, 2 ed. Addison-Wesley Professional, Boston, MA, USA, Aug. 1995."},{"key":"e_1_3_2_1_5_1","volume-title":"Global Software Teams: Collaborating Across Borders and Time Zones","author":"Carmel E.","year":"1999","unstructured":"Carmel , E. Global Software Teams: Collaborating Across Borders and Time Zones . Prentice Hall , Upper Saddle River, NJ, 1999 . Carmel, E. Global Software Teams: Collaborating Across Borders and Time Zones. Prentice Hall, Upper Saddle River, NJ, 1999."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222270102"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1414004.1414008"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ADC.2005.40"},{"key":"e_1_3_2_1_9_1","volume-title":"The mirroring hypothesis: Theory, evidence and exceptions. Working Paper ID 1539592","author":"Colfer L.","year":"2010","unstructured":"Colfer , L. , and Baldwin , C. Y . The mirroring hypothesis: Theory, evidence and exceptions. Working Paper ID 1539592 , Harvard University Working Paper , June 2010 . Colfer, L., and Baldwin, C. Y. The mirroring hypothesis: Theory, evidence and exceptions. Working Paper ID 1539592, Harvard University Working Paper, June 2010."},{"key":"e_1_3_2_1_10_1","first-page":"5","article-title":"How do communities invent?","volume":"14","author":"Conway M","year":"1968","unstructured":"Conway , M . How do communities invent? Datamation 14 , 5 ( Apr. 1968 ), 28\u201331. Conway, M. How do communities invent? Datamation 14, 5 (Apr. 1968), 28\u201331.","journal-title":"Datamation"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.12.3.346.10098"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2007.51"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2384616.2384664"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145345"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1170744.1171374"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICGSE.2007.39"},{"key":"e_1_3_2_1_17_1","volume-title":"O\u2019Reilly & Associates","author":"Fogel K.","year":"2005","unstructured":"Fogel , K. Producing Open Source Software . O\u2019Reilly & Associates , Sebastapol, CA , 2005 . Fogel, K. Producing Open Source Software. O\u2019Reilly & Associates, Sebastapol, CA, 2005."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2007.170"},{"key":"e_1_3_2_1_19_1","volume-title":"Mar.","author":"Handcock M. S.","year":"2012","unstructured":"Handcock , M. S. , Hunter , D. R. , Butts , C. T. , Goodreau , S. M. , and Morris , M . Statnet: Software tools for the statistical modeling of network data. version 3.0 ., Mar. 2012 . Last visited: May 30, 2013. http:\/\/statnet.org\/. Handcock, M. S., Hunter, D. R., Butts, C. T., Goodreau, S. M., and Morris, M. Statnet: Software tools for the statistical modeling of network data. version 3.0., Mar. 2012. Last visited: May 30, 2013. http:\/\/statnet.org\/."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1205177"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.914732"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.795103"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180875.1180928"},{"key":"e_1_3_2_1_24_1","volume-title":"Aug.","author":"Holman Z.","year":"2011","unstructured":"Holman , Z. How GitHub works , Aug. 2011 . Last visited: May 15, 2013. http:\/\/zachholman.com\/posts\/how-github-works\/. Holman, Z. How GitHub works, Aug. 2011. Last visited: May 15, 2013. http:\/\/zachholman.com\/posts\/how-github-works\/."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v024.i03"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.29"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2010.39"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2010.112"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.respol.2012.04.011"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2141512.2141568"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/515230"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985813"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368160"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICGSE.2008.39"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327051HCI1523_4"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1002\/spip.v13:6"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/645541.657997"},{"key":"e_1_3_2_1_38_1","volume-title":"R Language and Environment for Statistical Computing","author":"Core Team","year":"2012","unstructured":"R Core Team . R Language and Environment for Statistical Computing . R Foundation for Statistical Computing , Vienna, Austria , 2012 . R Core Team. R Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria, 2012."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/236297"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/580808"},{"key":"e_1_3_2_1_41_1","first-page":"2","article-title":"An introduction to exponential random graph (p*) models for social networks","volume":"29","author":"Robins G.","year":"2007","unstructured":"Robins , G. , Pattison , P. , Kalish , Y. , and Lusher , D . An introduction to exponential random graph (p*) models for social networks . Social Networks 29 , 2 ( May 2007 ), 173\u2013191. Robins, G., Pattison, P., Kalish, Y., and Lusher, D. An introduction to exponential random graph (p*) models for social networks. Social Networks 29, 2 (May 2007), 173\u2013191.","journal-title":"Social Networks"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2011.05.005"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1232743.1232750"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2005.32"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2009.12.002"},{"key":"e_1_3_2_1_46_1","volume-title":"Pearson Education","author":"Tabachnick B. G.","year":"2012","unstructured":"Tabachnick , B. G. , and Fidell , L. S . Using multivariate statistics . Pearson Education , Boston , June 2012 . Tabachnick, B. G., and Fidell, L. S. Using multivariate statistics. Pearson Education, Boston, June 2012."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1958824.1958860"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.5465\/ambpp.2010.54500789"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/CHASE.2013.6614753"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070503"}],"event":{"name":"ICSE '14: 36th International Conference on Software Engineering","location":"Hyderabad India","acronym":"ICSE '14","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","TCSE IEEE Computer Society's Tech. Council on Software Engin."]},"container-title":["Proceedings of the 36th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2568225.2568279","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2568225.2568279","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:10:30Z","timestamp":1750234230000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2568225.2568279"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,31]]},"references-count":50,"alternative-id":["10.1145\/2568225.2568279","10.1145\/2568225"],"URL":"https:\/\/doi.org\/10.1145\/2568225.2568279","relation":{},"subject":[],"published":{"date-parts":[[2014,5,31]]},"assertion":[{"value":"2014-05-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}