{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,21]],"date-time":"2026-05-21T16:09:41Z","timestamp":1779379781749,"version":"3.53.1"},"publisher-location":"New York, NY, USA","reference-count":89,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T00:00:00Z","timestamp":1540512000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the National Basic Research Program of China Grant","award":["2015CB352200"],"award-info":[{"award-number":["2015CB352200"]}]},{"name":"the National key R&D Program of China Grant","award":["2018YFB10044200"],"award-info":[{"award-number":["2018YFB10044200"]}]},{"name":"the National Natural Science Foundation of China Grants","award":["61432001, 61690200"],"award-info":[{"award-number":["61432001, 61690200"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,26]]},"DOI":"10.1145\/3236024.3236054","type":"proceedings-article","created":{"date-parts":[[2018,10,29]],"date-time":"2018-10-29T12:06:00Z","timestamp":1540814760000},"page":"307-318","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Be careful of when: an empirical study on time-related misuse of issue tracking data"],"prefix":"10.1145","author":[{"given":"Feifei","family":"Tu","sequence":"first","affiliation":[{"name":"Peking University, China"}],"role":[{"vocabulary":"crossref","role":"author"}]},{"given":"Jiaxin","family":"Zhu","sequence":"additional","affiliation":[{"name":"Institute of Software at Chinese Academy of Sciences, China \/ University of Chinese Academy of Sciences, China"}],"role":[{"vocabulary":"crossref","role":"author"}]},{"given":"Qimu","family":"Zheng","sequence":"additional","affiliation":[{"name":"Peking University, China"}],"role":[{"vocabulary":"crossref","role":"author"}]},{"given":"Minghui","family":"Zhou","sequence":"additional","affiliation":[{"name":"Peking University, China"}],"role":[{"vocabulary":"crossref","role":"author"}]}],"member":"320","published-online":{"date-parts":[[2018,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Evolution and Reengineering (SANER), 2015 IEEE 22nd International Conference on. IEEE, 211\u2013220","author":"Aggarwal Karan","year":"2015","unstructured":"Karan Aggarwal , Tanner Rutgers , Finbarr Timbers , Abram Hindle , Russ Greiner , and Eleni Stroulia . 2015 . Detecting duplicate bug reports with software engineering domain knowledge. In Software Analysis , Evolution and Reengineering (SANER), 2015 IEEE 22nd International Conference on. IEEE, 211\u2013220 . Karan Aggarwal, Tanner Rutgers, Finbarr Timbers, Abram Hindle, Russ Greiner, and Eleni Stroulia. 2015. Detecting duplicate bug reports with software engineering domain knowledge. In Software Analysis, Evolution and Reengineering (SANER), 2015 IEEE 22nd International Conference on. IEEE, 211\u2013220."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1498759.1498766"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970344"},{"key":"e_1_3_2_1_4_1","volume-title":"Software Maintenance, 2009. ICSM 2009. IEEE International Conference on. 523\u2013526","author":"Anbalagan P.","unstructured":"P. Anbalagan and M. Vouk . 2009. On predicting the time taken to correct bug reports in open source projects . In Software Maintenance, 2009. ICSM 2009. IEEE International Conference on. 523\u2013526 . P. Anbalagan and M. Vouk. 2009. On predicting the time taken to correct bug reports in open source projects. In Software Maintenance, 2009. ICSM 2009. IEEE International Conference on. 523\u2013526."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/174153.174154"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134457"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134336"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000791.2000794"},{"key":"e_1_3_2_1_9_1","volume-title":"ICSM 2008. IEEE international conference on. IEEE, 337\u2013345","author":"Bettenburg Nicolas","year":"2008","unstructured":"Nicolas Bettenburg , Rahul Premraj , Thomas Zimmermann , and Sunghun Kim . 2008 . Duplicate bug reports considered harmful... really?. In Software maintenance, 2008 . ICSM 2008. IEEE international conference on. IEEE, 337\u2013345 . Nicolas Bettenburg, Rahul Premraj, Thomas Zimmermann, and Sunghun Kim. 2008. Duplicate bug reports considered harmful... really?. In Software maintenance, 2008. ICSM 2008. IEEE international conference on. IEEE, 337\u2013345."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985472"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595716"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(96)00142-2"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/2432361"},{"key":"e_1_3_2_1_14_1","volume-title":"Paulo Anselmo da Mota Silveira Neto, Eduardo Santana de Almeida, and Silvio Romero de Lemos Meira.","author":"Albuquerque da Cunha Carlos Eduardo","year":"2010","unstructured":"Carlos Eduardo Albuquerque da Cunha , Yguarat\u00e3 Cerqueira Cavalcanti , Paulo Anselmo da Mota Silveira Neto, Eduardo Santana de Almeida, and Silvio Romero de Lemos Meira. 2010 . A Visual Bug Report Analysis and Search Tool.. In SEKE. 742\u2013747. Carlos Eduardo Albuquerque da Cunha, Yguarat\u00e3 Cerqueira Cavalcanti, Paulo Anselmo da Mota Silveira Neto, Eduardo Santana de Almeida, and Silvio Romero de Lemos Meira. 2010. A Visual Bug Report Analysis and Search Tool.. In SEKE. 742\u2013747."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SWAN.2015.7070481"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985483"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1808920.1808933"},{"key":"e_1_3_2_1_18_1","volume-title":"Software Engineering (ICSE), 2013 35th International Conference on. 392\u2013401","author":"Herzig K.","unstructured":"K. Herzig , S. Just , and A. Zeller . 2013. It\u2019s not a bug, it\u2019s a feature: how misclassification impacts bug prediction . In Software Engineering (ICSE), 2013 35th International Conference on. 392\u2013401 . K. Herzig, S. Just, and A. Zeller. 2013. It\u2019s not a bug, it\u2019s a feature: how misclassification impacts bug prediction. In Software Engineering (ICSE), 2013 35th International Conference on. 392\u2013401."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9387-3"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985482"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321639"},{"key":"e_1_3_2_1_22_1","volume-title":"Which packages would be affected by this bug report?","author":"Huang Qiao","year":"2017","unstructured":"Qiao Huang , David Lo , Xin Xia , Qingye Wang , and Shanping Li. 2017. Which packages would be affected by this bug report? ( 2017 ). Qiao Huang, David Lo, Xin Xia, Qingye Wang, and Shanping Li. 2017. Which packages would be affected by this bug report? (2017)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.22"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595715"},{"key":"e_1_3_2_1_25_1","volume-title":"BugMiner: Software reliability analysis via data mining of bug reports. delta 12, 10","author":"Boyi Xie Gail Kaiser Leon Wu","year":"2011","unstructured":"Leon Wu Boyi Xie Gail Kaiser and Rebecca Passonneau . 2011. BugMiner: Software reliability analysis via data mining of bug reports. delta 12, 10 ( 2011 ), 09\u20130500. Leon Wu Boyi Xie Gail Kaiser and Rebecca Passonneau. 2011. BugMiner: Software reliability analysis via data mining of bug reports. delta 12, 10 (2011), 09\u20130500."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597074"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382577.2382579"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.24"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1137983.1138027"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.73"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2012.47"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2013.42"},{"key":"e_1_3_2_1_33_1","volume-title":"2010 7th IEEE Working Conference on Mining Software Repositories (MSR","author":"Lamkanfi A.","year":"2010","unstructured":"A. Lamkanfi , S. Demeyer , E. Giger , and B. Goethals . 2010. Predicting the severity of a reported bug . In 2010 7th IEEE Working Conference on Mining Software Repositories (MSR 2010 ). 1\u201310. A. Lamkanfi, S. Demeyer, E. Giger, and B. Goethals. 2010. Predicting the severity of a reported bug. In 2010 7th IEEE Working Conference on Mining Software Repositories (MSR 2010). 1\u201310."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2016.156"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597088"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.02.022"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393628"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2013.6671283"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.04.002"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2009.5069491"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593882.2593889"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.70"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491415"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31057-7_5"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100062"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351687"},{"key":"e_1_3_2_1_47_1","volume-title":"Handbook of statistical analysis and data mining applications","author":"Nisbet Robert","unstructured":"Robert Nisbet , Gary Miner , and John Elder IV. 2009. Handbook of statistical analysis and data mining applications . Academic Press . Robert Nisbet, Gary Miner, and John Elder IV. 2009. Handbook of statistical analysis and data mining applications. Academic Press."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2007.25"},{"key":"e_1_3_2_1_49_1","volume-title":"Minghui Zhou Proceedings of the National Conference on Artificial Intelligence. 139","author":"Park Jinwoo","year":"2011","unstructured":"Jinwoo Park , Muwoong Lee , Jinhan Kim , Seungwon Hwang , and Sunghun Kim . 2011 . Costriage: A cost-aware triage algorithm for bug reporting systems. In ESEC\/FSE \u201918, November 4\u20139, 2018, Lake Buena Vista, FL, USA Feifei Tu, Jiaxin Zhu, Qimu Zheng, and Minghui Zhou Proceedings of the National Conference on Artificial Intelligence. 139 . Jinwoo Park, Muwoong Lee, Jinhan Kim, Seungwon Hwang, and Sunghun Kim. 2011. Costriage: A cost-aware triage algorithm for bug reporting systems. In ESEC\/FSE \u201918, November 4\u20139, 2018, Lake Buena Vista, FL, USA Feifei Tu, Jiaxin Zhu, Qimu Zheng, and Minghui Zhou Proceedings of the National Conference on Artificial Intelligence. 139."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031171.1031181"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-009-0158-x"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1287\/opre.33.3.661"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693093"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9228-6"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.5555\/2487085.2487089"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2014.12.049"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.97"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1810295.1810368"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100061"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806811"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985934"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2648627"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405302"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2012.22"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693088"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2012.31"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.31"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-014-9331-y"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2012.48"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2016.7503715"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597099"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597008.2597148"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368151"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985479"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"crossref","unstructured":"C. Weiss R. Premraj T. Zimmermann and A. Zeller. May 2007. How Long Will It Take to Fix This Bug? 20\u201326.  C. Weiss R. Premraj T. Zimmermann and A. Zeller. May 2007. How Long Will It Take to Fix This Bug? 20\u201326.","DOI":"10.1109\/MSR.2007.13"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.29"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.40"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591073"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2013.62"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337227"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.33"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635874"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2479232"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.11.002"},{"key":"e_1_3_2_1_85_1","first-page":"1","article-title":"Microsoft Cambridge at TREC 13: Web and Hard Tracks","volume":"4","author":"Zaragoza Hugo","year":"2004","unstructured":"Hugo Zaragoza , Nick Craswell , Michael J Taylor , Suchi Saria , and Stephen E Robertson . 2004 . Microsoft Cambridge at TREC 13: Web and Hard Tracks .. In TREC , Vol. 4. 1 \u2013 1 . Hugo Zaragoza, Nick Craswell, Michael J Taylor, Suchi Saria, and Stephen E Robertson. 2004. Microsoft Cambridge at TREC 13: Web and Hard Tracks.. In TREC, Vol. 4. 1\u20131.","journal-title":"TREC"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.10.004"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786866"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337226"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2349496"}],"event":{"name":"ESEC\/FSE '18: 26th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Lake Buena Vista FL USA","acronym":"ESEC\/FSE '18","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3236024.3236054","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3236024.3236054","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:26Z","timestamp":1750208246000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3236024.3236054"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,26]]},"references-count":89,"alternative-id":["10.1145\/3236024.3236054","10.1145\/3236024"],"URL":"https:\/\/doi.org\/10.1145\/3236024.3236054","relation":{},"subject":[],"published":{"date-parts":[[2018,10,26]]},"assertion":[{"value":"2018-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}