{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T16:07:45Z","timestamp":1772122065295,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,5,31]],"date-time":"2014-05-31T00:00:00Z","timestamp":1401494400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,5,31]]},"DOI":"10.1145\/2591062.2591173","type":"proceedings-article","created":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T13:48:00Z","timestamp":1400593680000},"page":"205-214","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Extrinsic influence factors in software reliability: a study of 200,000 windows machines"],"prefix":"10.1145","author":[{"given":"Christian","family":"Bird","sequence":"first","affiliation":[{"name":"Microsoft Research, USA"}]},{"given":"Venkatesh-Prasad","family":"Ranganath","sequence":"additional","affiliation":[{"name":"Kansas State University, USA"}]},{"given":"Thomas","family":"Zimmermann","sequence":"additional","affiliation":[{"name":"Microsoft Research, USA"}]},{"given":"Nachiappan","family":"Nagappan","sequence":"additional","affiliation":[{"name":"Microsoft, USA"}]},{"given":"Andreas","family":"Zeller","sequence":"additional","affiliation":[{"name":"Saarland University, Germany"}]}],"member":"320","published-online":{"date-parts":[[2014,5,31]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Programs Which May Interfere with Steam. 2011. https:\/\/support.steampowered.com\/kb_article.php?ref=9828-SFLZ- 9289.  Programs Which May Interfere with Steam. 2011. https:\/\/support.steampowered.com\/kb_article.php?ref=9828-SFLZ- 9289."},{"key":"e_1_3_2_1_2_1","unstructured":"List of applications incompatible with Kaspersky Anti-Virus 2012. 2011. http:\/\/support.kaspersky.com\/faq\/?qid=20828435.  List of applications incompatible with Kaspersky Anti-Virus 2012. 2011. http:\/\/support.kaspersky.com\/faq\/?qid=20828435."},{"key":"e_1_3_2_1_3_1","unstructured":"Windows Customer Experience Improvement Program. 2011. http:\/\/technet.microsoft.com\/en-us\/library\/ee126127(WS.10).aspx.  Windows Customer Experience Improvement Program. 2011. http:\/\/technet.microsoft.com\/en-us\/library\/ee126127(WS.10).aspx."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0031619"},{"key":"e_1_3_2_1_5_1","volume-title":"The measurement of observer agreement for categorical data. Biometrics","author":"Landis J.R.","year":"1977","unstructured":"Landis , J.R. and Koch , G.G . The measurement of observer agreement for categorical data. Biometrics ( 1977 ), 159--174. Landis, J.R. and Koch, G.G. The measurement of observer agreement for categorical data. Biometrics (1977), 159--174."},{"key":"e_1_3_2_1_6_1","volume-title":"Statistics for research","author":"Dowdy S.","year":"1983","unstructured":"Dowdy , S. , Wearden , S. , and Chilko , D.M . Statistics for research . Wiley New York , 1983 . Dowdy, S., Wearden, S., and Chilko, D.M. Statistics for research. Wiley New York, 1983."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1995.tb02031.x"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/2073946.2073978"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the USENIX Annual Technical Conference","author":"Neuhaus S.","year":"2009","unstructured":"Neuhaus , S. and Zimmermann , T . The Beauty and the Beast: Vulnerabilities in Red Hat\u2019s Packages . In Proceedings of the USENIX Annual Technical Conference ( 2009 ). Neuhaus, S. and Zimmermann, T. The Beauty and the Beast: Vulnerabilities in Red Hat\u2019s Packages. In Proceedings of the USENIX Annual Technical Conference (2009)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2007.23"},{"key":"e_1_3_2_1_11_1","first-page":"487","volume-title":"Fast Algorithms for Mining Association Rules in Large Databases. In VLDB '94: Proceedings of the 20th International Conference on Very Large Data Bases","author":"Agrawal R.","year":"1994","unstructured":"Agrawal , R. and Srikant , R . Fast Algorithms for Mining Association Rules in Large Databases. In VLDB '94: Proceedings of the 20th International Conference on Very Large Data Bases ( 1994 ), 487 - 499 . Agrawal, R. and Srikant, R. Fast Algorithms for Mining Association Rules in Large Databases. In VLDB '94: Proceedings of the 20th International Conference on Very Large Data Bases (1994), 487-499."},{"key":"e_1_3_2_1_12_1","unstructured":"ARules. http:\/\/r-forge.r-project.org\/projects\/arules\/.  ARules. http:\/\/r-forge.r-project.org\/projects\/arules\/."},{"key":"e_1_3_2_1_13_1","volume-title":"International Symposium on Software Reliability Engineering","author":"Farr W.","year":"1996","unstructured":"Farr , W. Software reliability modeling survey . In International Symposium on Software Reliability Engineering ( 1996 ). Farr, W. Software reliability modeling survey. In International Symposium on Software Reliability Engineering (1996)."},{"key":"e_1_3_2_1_14_1","volume-title":"Five misunderstandings about case-study research. Qualitative inquiry, 12, 2","author":"Flyvbjerg B.","year":"2006","unstructured":"Flyvbjerg , B. Five misunderstandings about case-study research. Qualitative inquiry, 12, 2 ( 2006 ), 219-245. Flyvbjerg, B. Five misunderstandings about case-study research. Qualitative inquiry, 12, 2 (2006), 219-245."},{"key":"e_1_3_2_1_15_1","volume-title":"The Social Science Encyclopedia","author":"Kuper A.","year":"1985","unstructured":"Kuper , A. and Kuper , J . The Social Science Encyclopedia . Routledge , 1985 . Kuper, A. and Kuper, J. The Social Science Encyclopedia. Routledge, 1985."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.799939"},{"key":"e_1_3_2_1_17_1","volume-title":"No Starch Press","author":"Wanniner S.","year":"2003","unstructured":"Wanniner , S. and Richmond , R . The Book of Overclocking . No Starch Press , 2003 . Wanniner, S. and Richmond, R. The Book of Overclocking. No Starch Press, 2003."},{"key":"e_1_3_2_1_18_1","volume-title":"Symposium on reliability in distributed software and database systems","author":"Gray J.","year":"1986","unstructured":"Gray , J. Why do computers stop and what can be done about it . In Symposium on reliability in distributed software and database systems ( 1986 ). Gray, J. Why do computers stop and what can be done about it. In Symposium on reliability in distributed software and database systems (1986)."},{"key":"e_1_3_2_1_19_1","volume-title":"Osborne\/McGraw-Hill","author":"Musa J.","year":"1998","unstructured":"Musa , J. Software Reliability Engineering . Osborne\/McGraw-Hill , 1998 . Musa, J. Software Reliability Engineering. Osborne\/McGraw-Hill, 1998."},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the IEEE 21st International Symposium on Software Reliability","author":"Marathe M.","year":"2010","unstructured":"Marathe , M. and Cukier , M . In Proceedings of the IEEE 21st International Symposium on Software Reliability ( 2010 ). Marathe, M. and Cukier, M. In Proceedings of the IEEE 21st International Symposium on Software Reliability (2010)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1975.6312856"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/356674.356676"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.1979.5220576"},{"key":"e_1_3_2_1_24_1","first-page":"1","article-title":"Effect of testing techniques on software reliability estimates obtained using a time-domain model","volume":"44","author":"Chen M.-H.","year":"1995","unstructured":"Chen , M.-H. , Mathur , A.P. , and Rego , V.J . Effect of testing techniques on software reliability estimates obtained using a time-domain model . IEEE Transactions on Reliability , 44 , 1 ( 1995 ), 97--103. Chen, M.-H., Mathur, A.P., and Rego, V.J. Effect of testing techniques on software reliability estimates obtained using a time-domain model. IEEE Transactions on Reliability, 44, 1 (1995), 97--103.","journal-title":"IEEE Transactions on Reliability"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2005.25"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966477"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985894"}],"event":{"name":"ICSE '14: 36th International Conference on Software Engineering","location":"Hyderabad India","acronym":"ICSE '14","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","TCSE IEEE Computer Society's Tech. Council on Software Engin."]},"container-title":["Companion Proceedings of the 36th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2591062.2591173","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2591062.2591173","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:01:29Z","timestamp":1750230089000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2591062.2591173"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,31]]},"references-count":27,"alternative-id":["10.1145\/2591062.2591173","10.1145\/2591062"],"URL":"https:\/\/doi.org\/10.1145\/2591062.2591173","relation":{},"subject":[],"published":{"date-parts":[[2014,5,31]]},"assertion":[{"value":"2014-05-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}