{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,20]],"date-time":"2025-09-20T21:49:15Z","timestamp":1758404955190,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,11,6]],"date-time":"2015-11-06T00:00:00Z","timestamp":1446768000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the High-Tech Research and Development Program of China","award":["2015AA01A202"],"award-info":[{"award-number":["2015AA01A202"]}]},{"name":"the National Natural Science Foundation of China","award":["61421091, 61529201, and 61272157"],"award-info":[{"award-number":["61421091, 61529201, and 61272157"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,11,6]]},"DOI":"10.1145\/2875913.2875922","type":"proceedings-article","created":{"date-parts":[[2016,10,11]],"date-time":"2016-10-11T16:59:00Z","timestamp":1476205140000},"page":"43-51","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Enhancing Defect Prediction with Static Defect Analysis"],"prefix":"10.1145","author":[{"given":"Hao","family":"Tang","sequence":"first","affiliation":[{"name":"Key Laboratory of High Confidence Software Technologies, Ministry of Education, Peking University, Beijing, China"}]},{"given":"Tian","family":"Lan","sequence":"additional","affiliation":[{"name":"Key Laboratory of High Confidence Software Technologies, Ministry of Education, Peking University, Beijing, China"}]},{"given":"Dan","family":"Hao","sequence":"additional","affiliation":[{"name":"Key Laboratory of High Confidence Software Technologies, Ministry of Education, Peking University, Beijing, China"}]},{"given":"Lu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Key Laboratory of High Confidence Software Technologies, Ministry of Education, Peking University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2015,11,6]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"353","volume-title":"Proceedings of the International Federation of Information Processing Societies Congress","author":"Akiyama F.","year":"1971"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.10.024"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.10.027"},{"key":"e_1_3_2_1_4_1","unstructured":"R. Chansler R. Bryant R. Bryant R. Canino-Koening F. Cesarini E. Allman K. Bostic and T. Brown. The architecture of open source applications. 2011.  R. Chansler R. Bryant R. Bryant R. Canino-Koening F. Cesarini E. Allman K. Bostic and T. Brown. The architecture of open source applications. 2011."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.295895"},{"volume-title":"Software Engineering Symposium, IEEE Computer Press","year":"2001","author":"Clark B.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1631687.1596591"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2010.5463279"},{"volume-title":"Cleveland State University","year":"2011","author":"Dutko A. M.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.879815"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.859533"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.103"},{"volume-title":"Elsevier Science Inc.","year":"1977","author":"Halstead M. H.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.689404"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1052883.1052895"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1337691.1338390"},{"issue":"1","key":"e_1_3_2_1_17_1","first-page":"86","article-title":"Significance of different software metrics in defect prediction","volume":"1","author":"Jureczko M.","year":"2011","journal-title":"Software Engineering: An International Journal"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868328.1868342"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.35"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095430.1081755"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1982.235579"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233837"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"H. Mei and X. Liu. Internetware: An emerging software paradigm for internet computing. Journal of computer science and technology 26(4):588--599 2011.  H. Mei and X. Liu. Internetware: An emerging software paradigm for internet computing. Journal of computer science and technology 26(4):588--599 2011.","DOI":"10.1007\/s11390-011-1159-y"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.10"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368114"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062514"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159733.1159785"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1013886.1007524"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486846"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568269"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393669"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2004.1"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818828"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/823457.824031"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/319568.319666"},{"key":"e_1_3_2_1_36_1","first-page":"1748","volume-title":"Proceedings of the 22th Innovative Applications of Artificial Intelligence Conference","author":"Tosun A.","year":"2010"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.40"},{"key":"e_1_3_2_1_38_1","first-page":"1","volume-title":"Science and Technologies Facilities Council","author":"Worth D.","year":"2009"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-014-5241-2"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROMISE.2007.10"}],"event":{"name":"Internetware '15: The Seventh Asia-Pacific Symposium on Internetware","sponsor":["Key Laboratory of High Confidence Software Technologies Key Laboratory of High Confidence Software Technologies, Ministry of Education"],"location":"Wuhan China","acronym":"Internetware '15"},"container-title":["Proceedings of the 7th Asia-Pacific Symposium on Internetware"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2875913.2875922","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2875913.2875922","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:39:18Z","timestamp":1750221558000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2875913.2875922"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,6]]},"references-count":40,"alternative-id":["10.1145\/2875913.2875922","10.1145\/2875913"],"URL":"https:\/\/doi.org\/10.1145\/2875913.2875922","relation":{},"subject":[],"published":{"date-parts":[[2015,11,6]]},"assertion":[{"value":"2015-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}