{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T18:26:20Z","timestamp":1763663180382,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,5,31]],"date-time":"2014-05-31T00:00:00Z","timestamp":1401494400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,5,31]]},"DOI":"10.1145\/2597073.2597108","type":"proceedings-article","created":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T13:48:00Z","timestamp":1400593680000},"page":"82-91","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":60,"title":["An empirical study of dormant bugs"],"prefix":"10.1145","author":[{"given":"Tse-Hsun","family":"Chen","sequence":"first","affiliation":[{"name":"Queen's University, Canada"}]},{"given":"Meiyappan","family":"Nagappan","sequence":"additional","affiliation":[{"name":"Queen's University, Canada"}]},{"given":"Emad","family":"Shihab","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology, USA"}]},{"given":"Ahmed E.","family":"Hassan","sequence":"additional","affiliation":[{"name":"Queen's University, Canada"}]}],"member":"320","published-online":{"date-parts":[[2014,5,31]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062514"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1260984.1261267"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070510"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134349"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025155"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1852786.1852792"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/2664446.2664476"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595713"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 5th International Symposium on Empirical Software Engineering","volume":"20","author":"Zter Adrian Schr\u02c7","year":"2006","unstructured":"Adrian Schr\u02c7 Zter , Thomas Zimmermann , Rahul Premraj , and Andreas Zeller . If your bug database could talk . In Proceedings of the 5th International Symposium on Empirical Software Engineering , Volume II: Short Papers and Posters, pages 18\u2013 20 , 2006 . Adrian Schr\u02c7 Zter, Thomas Zimmermann, Rahul Premraj, and Andreas Zeller. If your bug database could talk. In Proceedings of the 5th International Symposium on Empirical Software Engineering, Volume II: Short Papers and Posters, pages 18\u201320, 2006."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254075"},{"key":"e_1_3_2_1_11_1","volume-title":"Workshop on the Evaluation of Software Defect Detection Tools","author":"Lu Shan","year":"2005","unstructured":"Shan Lu , Zhenmin Li , Feng Qin , Lin Tan , Pin Zhou , and Yuanyuan Zhou . Bugbench : Benchmarks for evaluating bug detection tools . In Workshop on the Evaluation of Software Defect Detection Tools , 2005 . Shan Lu, Zhenmin Li, Feng Qin, Lin Tan, Pin Zhou, and Yuanyuan Zhou. Bugbench: Benchmarks for evaluating bug detection tools. In Workshop on the Evaluation of Software Defect Detection Tools, 2005."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025119"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062558"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROMISE.2007.10"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2012.6224279"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2010.32"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1181309.1181314"},{"key":"e_1_3_2_1_18_1","volume-title":"MSR \u201913","author":"Nistor Adrian","year":"2013","unstructured":"Adrian Nistor , Tian Jiang , and Lin Tan . Discovering , reporting, and fixing performance bugs . In MSR \u201913 , May 2013 . Adrian Nistor, Tian Jiang, and Lin Tan. Discovering, reporting, and fixing performance bugs. In MSR \u201913, May 2013."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985457"},{"key":"e_1_3_2_1_20_1","volume-title":"https:\/\/issues.apache.org\/jira\/","author":"Foundation Apache Software","year":"2013","unstructured":"Apache Software Foundation . Jira. https:\/\/issues.apache.org\/jira\/ , 2013 . Apache Software Foundation. Jira. https:\/\/issues.apache.org\/jira\/, 2013."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985859"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393669"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2011.33"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491418"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/567793.567795"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595715"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025121"},{"key":"e_1_3_2_1_28_1","volume-title":"Empirical Software Engineering","author":"Shihab Emad","year":"2012","unstructured":"Emad Shihab , Akinori Ihara , Yasutaka Kamei , Walid M. Ibrahim , Masao Ohira , Bram Adams , Ahmed E. Hassan , and Ken-ichi Matsumoto. Studying re-opened bugs in open source software . Empirical Software Engineering , 2012 . Emad Shihab, Akinori Ihara, Yasutaka Kamei, Walid M. Ibrahim, Masao Ohira, Bram Adams, Ahmed E. Hassan, and Ken-ichi Matsumoto. Studying re-opened bugs in open source software. Empirical Software Engineering, 2012."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/581339.581401"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2008.4658064"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985860"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2009.46"},{"key":"e_1_3_2_1_33_1","volume-title":"O\u2019Reilly Media","author":"Boslaugh S.","year":"2008","unstructured":"S. Boslaugh and P.A. Watters . Statistics in a Nutshell: A Desktop Quick Reference. In a Nutshell (O\u2019Reilly) . O\u2019Reilly Media , 2008 . S. Boslaugh and P.A. Watters. Statistics in a Nutshell: A Desktop Quick Reference. In a Nutshell (O\u2019Reilly). O\u2019Reilly Media, 2008."},{"key":"e_1_3_2_1_34_1","volume-title":"https: \/\/issues.apache.org\/jira\/browse\/DERBY-1661","author":"Derby Apache","year":"2013","unstructured":"Apache Derby . Derby-1661. https: \/\/issues.apache.org\/jira\/browse\/DERBY-1661 , 2013 . Apache Derby. Derby-1661. https: \/\/issues.apache.org\/jira\/browse\/DERBY-1661, 2013."},{"key":"e_1_3_2_1_35_1","unstructured":"Apache Wicket. Wicket-4161. 2013.  Apache Wicket. Wicket-4161. 2013."},{"key":"e_1_3_2_1_36_1","volume-title":"https: \/\/issues.apache.org\/jira\/browse\/FELIX-1460","author":"Felix Apache","year":"2013","unstructured":"Apache Felix . Felix-1460. https: \/\/issues.apache.org\/jira\/browse\/FELIX-1460 , 2013 . Apache Felix. Felix-1460. https: \/\/issues.apache.org\/jira\/browse\/FELIX-1460, 2013."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1083142.1083147"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2007.02.015"}],"event":{"name":"ICSE '14: 36th International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","TCSE IEEE Computer Society's Tech. Council on Software Engin."],"location":"Hyderabad India","acronym":"ICSE '14"},"container-title":["Proceedings of the 11th Working Conference on Mining Software Repositories"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2597073.2597108","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2597073.2597108","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:56:03Z","timestamp":1750229763000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2597073.2597108"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,31]]},"references-count":38,"alternative-id":["10.1145\/2597073.2597108","10.1145\/2597073"],"URL":"https:\/\/doi.org\/10.1145\/2597073.2597108","relation":{},"subject":[],"published":{"date-parts":[[2014,5,31]]},"assertion":[{"value":"2014-05-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}