{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T16:26:06Z","timestamp":1756311966660,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,8,25]],"date-time":"2016-08-25T00:00:00Z","timestamp":1472083200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"program A for Outstanding PhD candidate of Nanjing University"},{"name":"National Key Basic Research and Development Program of China","award":["2014CB340702"],"award-info":[{"award-number":["2014CB340702"]}]},{"name":"J. William Fulbright award"},{"name":"EPSRC DAASE programme grant"},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61432001, 91418202, 61272082, 61300051, 61321491, 61472178, and 91318301"],"award-info":[{"award-number":["61432001, 91418202, 61272082, 61300051, 61321491, 61472178, and 91318301"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NSF grant IIA-1360707"},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20130014"],"award-info":[{"award-number":["BK20130014"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,8,25]]},"DOI":"10.1145\/2970276.2970353","type":"proceedings-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T12:40:09Z","timestamp":1472215209000},"page":"296-307","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["An empirical study on dependence clusters for effort-aware fault-proneness prediction"],"prefix":"10.1145","author":[{"given":"Yibiao","family":"Yang","sequence":"first","affiliation":[{"name":"Nanjing University, China"}]},{"given":"Mark","family":"Harman","sequence":"additional","affiliation":[{"name":"University College London, UK"}]},{"given":"Jens","family":"Krinke","sequence":"additional","affiliation":[{"name":"University College London, UK"}]},{"given":"Syed","family":"Islam","sequence":"additional","affiliation":[{"name":"University of East London, UK"}]},{"given":"David","family":"Binkley","sequence":"additional","affiliation":[{"name":"Loyola University Maryland, USA"}]},{"given":"Yuming","family":"Zhou","sequence":"additional","affiliation":[{"name":"Nanjing University, China"}]},{"given":"Baowen","family":"Xu","sequence":"additional","affiliation":[{"name":"Nanjing University, China"}]}],"member":"320","published-online":{"date-parts":[[2016,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.1005"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.06.055"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.544352"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1995.tb02031.x"},{"key":"e_1_3_2_1_5_1","first-page":"10","volume-title":"Proceedings of the 2013 IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM \u201912","author":"Schrettner L.","year":"2013","unstructured":"\u00c1. Besz\u00e9des, L. Schrettner , B. Csaba , T. Gergely , J. J\u00e1sz , and T. Gyim\u00f3thy . Empirical investigation of SEA-based dependence cluster properties . In Proceedings of the 2013 IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM \u201912 , pages 1\u2013 10 , Sept. 2013 . \u00c1. Besz\u00e9des, L. Schrettner, B. Csaba, T. Gergely, J. J\u00e1sz, and T. Gyim\u00f3thy. Empirical investigation of SEA-based dependence cluster properties. In Proceedings of the 2013 IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM \u201912, pages 1\u201310, Sept. 2013."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2014.09.010"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332460"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2005.58"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2009.18"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.03.038"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(99)00102-8"},{"issue":"2","key":"e_1_3_2_1_12_1","first-page":"261","article-title":"Multimodel Inference Understanding AIC and BIC in Model Selection. Sociological Methods &amp;","volume":"33","author":"Burnham K. P.","year":"2004","unstructured":"K. P. Burnham and D. R. Anderson . Multimodel Inference Understanding AIC and BIC in Model Selection. Sociological Methods &amp; Research , 33 ( 2 ): 261 \u2013 304 , Nov. 2004 . K. P. Burnham and D. R. Anderson. Multimodel Inference Understanding AIC and BIC in Model Selection. Sociological Methods &amp; Research, 33(2):261\u2013304, Nov. 2004.","journal-title":"Research"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.42"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.935855"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.879815"},{"key":"e_1_3_2_1_16_1","first-page":"1998","volume-title":"Proceedings of the International Conference on Software Maintenance, ICSM \u201998","author":"Gall H.","unstructured":"H. Gall , K. Hajek , and M. Jazayeri . Detection of Logical Coupling Based on Product Release History . In Proceedings of the International Conference on Software Maintenance, ICSM \u201998 , pages 190\u2013, Washington, DC, USA, 1998 . IEEE Computer Society. H. Gall, K. Hajek, and M. Jazayeri. Detection of Logical Coupling Based on Product Release History. In Proceedings of the International Conference on Software Maintenance, ICSM \u201998, pages 190\u2013, Washington, DC, USA, 1998. IEEE Computer Society."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/320297.320333"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1596527.1596528"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1205177"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/2747015.2747183"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806672.1806683"},{"key":"e_1_3_2_1_22_1","volume-title":"Quality control handbook","author":"Juran J. M.","year":"1962","unstructured":"J. M. Juran . Quality control handbook. In Quality control handbook . McGraw-Hill , 1962 . J. M. Juran. Quality control handbook. In Quality control handbook. McGraw-Hill, 1962."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.09.001"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2010.18"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/1248721.1248734"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-010-0069-5"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.2229"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062514"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368160"},{"key":"e_1_3_2_1_30_1","volume-title":"Cengage Learning","author":"Ott R.","year":"2008","unstructured":"R. Ott and M. Longnecker . An Introduction to Statistical Methods and Data Analysis . Cengage Learning , Dec. 2008 . R. Ott and M. Longnecker. An Introduction to Statistical Methods and Data Analysis. Cengage Learning, Dec. 2008."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.07.039"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453105"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486846"},{"key":"e_1_3_2_1_34_1","unstructured":"IEEE Press.  IEEE Press."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393669"},{"key":"e_1_3_2_1_36_1","first-page":"33","volume-title":"meeting of the Florida Association of Institutional Research","author":"Romano J.","year":"2006","unstructured":"J. Romano , J. D. Kromrey , J. Coraggio , and J. Skowronek . Appropriate statistics for ordinal level data: Should we really be using t-test and cohen\u2019s d for evaluating group differences on the nsse and other surveys. In annual meeting of the Florida Association of Institutional Research , pages 1\u2013 33 , 2006 . J. Romano, J. D. Kromrey, J. Coraggio, and J. Skowronek. Appropriate statistics for ordinal level data: Should we really be using t-test and cohen\u2019s d for evaluating group differences on the nsse and other surveys. In annual meeting of the Florida Association of Institutional Research, pages 1\u201333, 2006."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781420036268"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2370048"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.32"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556777"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368161"},{"key":"e_1_3_2_1_43_1","first-page":"2007","volume-title":"Proceedings of the Third International Workshop on Predictor Models in Software Engineering, PROMISE \u201907","author":"Zimmermann T.","unstructured":"T. Zimmermann , R. Premraj , and A. Zeller . Predicting Defects for Eclipse . In Proceedings of the Third International Workshop on Predictor Models in Software Engineering, PROMISE \u201907 , pages 9\u2013, Washington, DC, USA, 2007 . IEEE Computer Society. T. Zimmermann, R. Premraj, and A. Zeller. Predicting Defects for Eclipse. In Proceedings of the Third International Workshop on Predictor Models in Software Engineering, PROMISE \u201907, pages 9\u2013, Washington, DC, USA, 2007. IEEE Computer Society."}],"event":{"name":"ASE'16: ACM\/IEEE International Conference on Automated Software Engineering","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"],"location":"Singapore Singapore","acronym":"ASE'16"},"container-title":["Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970276.2970353","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2970276.2970353","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:01Z","timestamp":1750218601000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970276.2970353"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,25]]},"references-count":43,"alternative-id":["10.1145\/2970276.2970353","10.1145\/2970276"],"URL":"https:\/\/doi.org\/10.1145\/2970276.2970353","relation":{},"subject":[],"published":{"date-parts":[[2016,8,25]]},"assertion":[{"value":"2016-08-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}