{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:35:11Z","timestamp":1763458511820,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,25]],"date-time":"2017-08-25T00:00:00Z","timestamp":1503619200000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100005416","name":"Norges Forskningsr\u00e5d","doi-asserted-by":"publisher","award":["EvolveIT (221751\/F20), Certus SFI (203461\/030)"],"award-info":[{"award-number":["EvolveIT (221751\/F20), Certus SFI (203461\/030)"]}],"id":[{"id":"10.13039\/501100005416","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIA-1360707"],"award-info":[{"award-number":["IIA-1360707"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,8,25]]},"DOI":"10.1145\/2970276.2970327","type":"proceedings-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T08:40:09Z","timestamp":1472200809000},"page":"732-743","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Practical guidelines for change recommendation using association rule mining"],"prefix":"10.1145","author":[{"given":"Leon","family":"Moonen","sequence":"first","affiliation":[{"name":"Simula Research Laboratory, Norway"}]},{"given":"Stefano","family":"Di Alesio","sequence":"additional","affiliation":[{"name":"Simula Research Laboratory, Norway"}]},{"given":"David","family":"Binkley","sequence":"additional","affiliation":[{"name":"Loyola University Maryland, USA"}]},{"given":"Thomas","family":"Rolfsnes","sequence":"additional","affiliation":[{"name":"Simula Research Laboratory, Norway"}]}],"member":"320","published-online":{"date-parts":[[2016,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/METRICS.2005.28"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1512475.1512493"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028976.1029012"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597096"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/525066"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080786"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.58784"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.895984"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2008.47"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/170035.170072"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.72"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.52"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1137983.1137996"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.101"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/850947.853338"},{"key":"e_1_3_2_1_16_1","first-page":"73","volume-title":"International Conference on Knowledge Discovery and Data Mining (KDD). AASI","author":"Srikant R.","year":"1997","unstructured":"R. Srikant, Q. Vu, and R. Agrawal. \u201cMining Association Rules with Item Constraints\u201d. In: International Conference on Knowledge Discovery and Data Mining (KDD). AASI, 1997, pp. 67\u201373."},{"key":"e_1_3_2_1_17_1","volume-title":"ICSE Workshop on Process Modelling and Empirical Studies of Software Engineering.","author":"Ball T.","year":"1997","unstructured":"T. Ball, J. Kim, and H. P. Siy. \u201cIf your version control system could talk\u201d. In: ICSE Workshop on Process Modelling and Empirical Studies of Software Engineering. 1997."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2005.12"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1018431.1021436"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1132960.1132963"},{"key":"e_1_3_2_1_21_1","first-page":"266","volume-title":"Evaluating the Interestingness of Characteristic Rules","author":"Kamber R.","year":"1996","unstructured":"R. Kamber, Micheline and Shinghal. \u201cEvaluating the Interestingness of Characteristic Rules\u201d. In: KDD. 1996, pp. 263\u2013266."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4379(03)00072-3"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888905000408"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9233-9"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2015.7081843"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2901756"},{"key":"e_1_3_2_1_27_1","volume-title":"An Empirical Characterization of Commits in Software Repositories\u201d. Ms.c","author":"Alali A.","year":"2008","unstructured":"A. Alali. \u201cAn Empirical Characterization of Commits in Software Repositories\u201d. Ms.c. Kent State University, 2008, p. 53."},{"key":"e_1_3_2_1_28_1","volume-title":"Knowledge discovery and measures of interest","author":"Hilderman H. J.","year":"2013","unstructured":"H. J. Hilderman, Robert and Hamilton. Knowledge discovery and measures of interest. Springer Science &amp; Business Media, 2013."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/2487085.2487113"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9376-6"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/1869923"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/1972514"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014077"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502572"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013284820704"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1121995.1121998"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-015-0860-5"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1635"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-006-9004-6"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2008.24"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491055.2491073"}],"event":{"name":"ASE'16: ACM\/IEEE International Conference on Automated Software Engineering","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"],"location":"Singapore Singapore","acronym":"ASE'16"},"container-title":["Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970276.2970327","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2970276.2970327","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2970276.2970327","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:29:25Z","timestamp":1763458165000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970276.2970327"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,25]]},"references-count":41,"alternative-id":["10.1145\/2970276.2970327","10.1145\/2970276"],"URL":"https:\/\/doi.org\/10.1145\/2970276.2970327","relation":{},"subject":[],"published":{"date-parts":[[2016,8,25]]},"assertion":[{"value":"2016-08-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}