{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T04:04:55Z","timestamp":1759032295713,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":69,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,9,3]],"date-time":"2018-09-03T00:00:00Z","timestamp":1535932800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"SNF","award":["PP00P2_170529"],"award-info":[{"award-number":["PP00P2_170529"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,9,3]]},"DOI":"10.1145\/3238147.3238169","type":"proceedings-article","created":{"date-parts":[[2018,8,20]],"date-time":"2018-08-20T20:04:36Z","timestamp":1534795476000},"page":"202-213","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["Mining file histories: should we consider branches?"],"prefix":"10.1145","author":[{"given":"Vladimir","family":"Kovalenko","sequence":"first","affiliation":[{"name":"Delft University of Technology, Netherlands"}]},{"given":"Fabio","family":"Palomba","sequence":"additional","affiliation":[{"name":"University of Zurich, Switzerland"}]},{"given":"Alberto","family":"Bacchelli","sequence":"additional","affiliation":[{"name":"University of Zurich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2018,9,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Bugzilla. https:\/\/www.bugzilla.org\/. Accessed: 2018-04-26.  Bugzilla. https:\/\/www.bugzilla.org\/. Accessed: 2018-04-26."},{"key":"e_1_3_2_1_2_1","unstructured":"Eclipse - the eclipse foundation open source community website. https:\/\/www. eclipse.org\/. Accessed: 2018-04-16.  Eclipse - the eclipse foundation open source community website. https:\/\/www. eclipse.org\/. Accessed: 2018-04-16."},{"key":"e_1_3_2_1_3_1","unstructured":"Eclipse code review. https:\/\/git.eclipse.org\/r\/. Accessed: 2018-04-16.  Eclipse code review. https:\/\/git.eclipse.org\/r\/. Accessed: 2018-04-16."},{"key":"e_1_3_2_1_4_1","unstructured":"Gerrit code review. https:\/\/www.gerritcodereview.com\/. Accessed: 2018-04-16.  Gerrit code review. https:\/\/www.gerritcodereview.com\/. Accessed: 2018-04-16."},{"key":"e_1_3_2_1_5_1","unstructured":"git - \ufffdnd all the direct descendants of a given commit. https:\/\/stackover\ufffdow. com\/questions\/27960605\/\ufffdnd-all-the-direct-descendants-of-a-given-commit# 27962018. Accessed: 2018-04-24.  git - \ufffdnd all the direct descendants of a given commit. https:\/\/stackover\ufffdow. com\/questions\/27960605\/\ufffdnd-all-the-direct-descendants-of-a-given-commit# 27962018. Accessed: 2018-04-24."},{"key":"e_1_3_2_1_6_1","unstructured":"git-log(1) manual page. https:\/\/mirrors.edge.kernel.org\/pub\/software\/scm\/git\/ docs\/git-log.html. Accessed: 2018-04-24.  git-log(1) manual page. https:\/\/mirrors.edge.kernel.org\/pub\/software\/scm\/git\/ docs\/git-log.html. Accessed: 2018-04-24."},{"key":"e_1_3_2_1_7_1","unstructured":"Github. https:\/\/github.com. Accessed: 2018-04-22.  Github. https:\/\/github.com. Accessed: 2018-04-22."},{"key":"e_1_3_2_1_8_1","unstructured":"A java implementation of the apriori algorithm for \ufffdnding frequent item sets and (optionally) generating association rules. https:\/\/github.com\/michael-rapp\/ Apriori\/. Accessed: 2018-04-22.  A java implementation of the apriori algorithm for \ufffdnding frequent item sets and (optionally) generating association rules. https:\/\/github.com\/michael-rapp\/ Apriori\/. Accessed: 2018-04-22."},{"key":"e_1_3_2_1_9_1","unstructured":"Jgit. https:\/\/www.eclipse.org\/jgit\/. Accessed: 2018-04-09.  Jgit. https:\/\/www.eclipse.org\/jgit\/. Accessed: 2018-04-09."},{"key":"e_1_3_2_1_10_1","volume-title":"Linus torvalds: Re: git mv (was re: {git pull} acpi &amp","author":"Lkml","year":"2009","unstructured":"Lkml : Linus torvalds: Re: git mv (was re: {git pull} acpi &amp ; suspend patches for 2.6.29-rc0). https:\/\/lkml.org\/lkml\/ 2009 \/1\/9\/323. Accessed : 2018-04-24. Lkml: Linus torvalds: Re: git mv (was re: {git pull} acpi &amp; suspend patches for 2.6.29-rc0). https:\/\/lkml.org\/lkml\/2009\/1\/9\/323. Accessed: 2018-04-24."},{"key":"e_1_3_2_1_11_1","unstructured":"Mining File Histories: Should We Consider Branches? - Online Appendix. https: \/\/github.com\/vovak\/branches. Accessed: 2018-07-24.  Mining File Histories: Should We Consider Branches? - Online Appendix. https: \/\/github.com\/vovak\/branches. Accessed: 2018-07-24."},{"key":"e_1_3_2_1_12_1","unstructured":"Open source software for creating private and public clouds. https:\/\/www. openstack.org\/. Accessed: 2018-04-16.  Open source software for creating private and public clouds. https:\/\/www. openstack.org\/. Accessed: 2018-04-16."},{"key":"e_1_3_2_1_13_1","unstructured":"Openstack code review. https:\/\/review.openstack.org\/. Accessed: 2018-04-16.  Openstack code review. https:\/\/review.openstack.org\/. Accessed: 2018-04-16."},{"key":"e_1_3_2_1_14_1","unstructured":"Quora Statistics. https:\/\/www.quora.com\/ What-are-the-most-popular-distributed-version-control-systems. Accessed: 2018-04-22.  Quora Statistics. https:\/\/www.quora.com\/ What-are-the-most-popular-distributed-version-control-systems. Accessed: 2018-04-22."},{"key":"e_1_3_2_1_15_1","unstructured":"Upsource. https:\/\/www.jetbrains.com\/upsource\/. Accessed: 2018-04-22.  Upsource. https:\/\/www.jetbrains.com\/upsource\/. Accessed: 2018-04-22."},{"key":"e_1_3_2_1_16_1","unstructured":"Why sqlite does not use git. https:\/\/sqlite.org\/whynotgit.html. Accessed: 2018- 04-18.  Why sqlite does not use git. https:\/\/sqlite.org\/whynotgit.html. Accessed: 2018- 04-18."},{"key":"e_1_3_2_1_17_1","unstructured":"R. Agrawal et al. Fast algorithms for mining association rules.  R. Agrawal et al. Fast algorithms for mining association rules."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9540-2"},{"key":"e_1_3_2_1_19_1","volume-title":"Streamed lines: Branching patterns for parallel software development","author":"Appleton B.","year":"1998","unstructured":"B. Appleton , S. Berczuk , R. Cabrera , and R. Orenstein . Streamed lines: Branching patterns for parallel software development . 1998 . B. Appleton, S. Berczuk, R. Cabrera, and R. Orenstein. Streamed lines: Branching patterns for parallel software development. 1998."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806855"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/553876"},{"key":"e_1_3_2_1_22_1","first-page":"940","volume-title":"Software Engineering (ICSE), 2013 35th International Conference on","author":"Balachandran V.","unstructured":"V. Balachandran . Reducing human e\ufffdort and improving quality in peer code reviews using automatic static analysis and reviewer recommendation . In Software Engineering (ICSE), 2013 35th International Conference on , pages 931\u2013 940 . IEEE, 2013. V. Balachandran. Reducing human e\ufffdort and improving quality in peer code reviews using automatic static analysis and reviewer recommendation. In Software Engineering (ICSE), 2013 35th International Conference on, pages 931\u2013940. IEEE, 2013."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28872-2_22"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.544352"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9178-4"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597082"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2009.5069475"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393648"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1984642.1984655"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2365324.2365338"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568322"},{"key":"e_1_3_2_1_32_1","first-page":"99","volume-title":"International Symposium on Software Con\ufffdguration Management","author":"Bu\ufffdenbarger J.","unstructured":"J. Bu\ufffdenbarger and K. Gruell . A branching\/merging strtegy for parallel software development . In International Symposium on Software Con\ufffdguration Management , pages 86\u2013 99 . Springer, 1999. J. Bu\ufffdenbarger and K. Gruell. A branching\/merging strtegy for parallel software development. In International Symposium on Software Con\ufffdguration Management, pages 86\u201399. Springer, 1999."},{"issue":"4","key":"e_1_3_2_1_33_1","first-page":"193","article-title":"Performance evaluation metrics for software fault prediction studies","volume":"9","author":"Catal C.","year":"2012","unstructured":"C. Catal . Performance evaluation metrics for software fault prediction studies . Acta Polytechnica Hungarica , 9 ( 4 ): 193 \u2013 206 , 2012 . C. Catal. Performance evaluation metrics for software fault prediction studies. Acta Polytechnica Hungarica, 9(4):193\u2013206, 2012.","journal-title":"Acta Polytechnica Hungarica"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2017.19"},{"key":"e_1_3_2_1_35_1","first-page":"41","volume-title":"Mining Software Repositories (MSR), 2010 7th IEEE Working Conference on","author":"D\u2019Ambros M.","unstructured":"M. D\u2019Ambros , M. Lanza , and R. Robbes . An extensive comparison of bug prediction approaches . In Mining Software Repositories (MSR), 2010 7th IEEE Working Conference on , pages 31\u2013 41 . IEEE, 2010. M. D\u2019Ambros, M. Lanza, and R. Robbes. An extensive comparison of bug prediction approaches. In Mining Software Repositories (MSR), 2010 7th IEEE Working Conference on, pages 31\u201341. IEEE, 2010."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2659747"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/2487085.2487132"},{"key":"e_1_3_2_1_38_1","first-page":"12","volume-title":"Proceedings of the 12th Working Conference on Mining Software Repositories","author":"Greiler M.","unstructured":"M. Greiler , K. Herzig , and J. Czerwonka . Code ownership and software quality: a replication study . In Proceedings of the 12th Working Conference on Mining Software Repositories , pages 2\u2013 12 . IEEE Press, 2015. M. Greiler, K. Herzig, and J. Czerwonka. Code ownership and software quality: a replication study. In Proceedings of the 12th Working Conference on Mining Software Repositories, pages 2\u201312. IEEE Press, 2015."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.103"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOSM.2008.4659248"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070510"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2009.5069492"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.344"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985842"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.111"},{"key":"e_1_3_2_1_46_1","volume-title":"Version Control with Git: Powerful tools and techniques for collaborative software development. \" O\u2019Reilly Media","author":"Loeliger J.","year":"2012","unstructured":"J. Loeliger and M. McCullough . Version Control with Git: Powerful tools and techniques for collaborative software development. \" O\u2019Reilly Media , Inc .\", 2012 . J. Loeliger and M. McCullough. Version Control with Git: Powerful tools and techniques for collaborative software development. \" O\u2019Reilly Media, Inc.\", 2012."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-010-0069-5"},{"key":"e_1_3_2_1_48_1","first-page":"300","volume-title":"Software Maintenance and Evolution (ICSME), 2016 IEEE International Conference on","author":"Michaud H. M.","unstructured":"H. M. Michaud , D. T. Guarnera , M. L. Collard , and J. I. Maletic . Recovering commit branch of origin from github repositories . In Software Maintenance and Evolution (ICSME), 2016 IEEE International Conference on , pages 290\u2013 300 . IEEE, 2016. H. M. Michaud, D. T. Guarnera, M. L. Collard, and J. I. Maletic. Recovering commit branch of origin from github repositories. In Software Maintenance and Evolution (ICSME), 2016 IEEE International Conference on, pages 290\u2013300. IEEE, 2016."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2009.5069476"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.20982\/tqmp.04.1.p013"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491415"},{"key":"e_1_3_2_1_52_1","article-title":"The scent of a smell: An extensive comparison between textual and structural smells","author":"Palomba F.","year":"2017","unstructured":"F. Palomba , A. Panichella , A. Zaidman , R. Oliveto , and A. De Lucia . The scent of a smell: An extensive comparison between textual and structural smells . IEEE Transactions on Software Engineering , 2017 . F. Palomba, A. Panichella, A. Zaidman, R. Oliveto, and A. De Lucia. The scent of a smell: An extensive comparison between textual and structural smells. IEEE Transactions on Software Engineering, 2017.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"e_1_3_2_1_53_1","article-title":"Toward a smell-aware bug prediction model","author":"Palomba F.","year":"2017","unstructured":"F. Palomba , M. Zanoni , F. A. Fontana , A. De Lucia , and R. Oliveto . Toward a smell-aware bug prediction model . IEEE Transactions on Software Engineering , 2017 . F. Palomba, M. Zanoni, F. A. Fontana, A. De Lucia, and R. Oliveto. Toward a smell-aware bug prediction model. IEEE Transactions on Software Engineering, 2017.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889244"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/584091.584093"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2372251.2372305"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2012.61"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1986020"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593702.2593705"},{"key":"e_1_3_2_1_60_1","unstructured":"ASE \u201918 September 3\u20137 2018 Montpellier France Vladimir Kovalenko Fabio Palomba and Alberto Bacchelli  ASE \u201918 September 3\u20137 2018 Montpellier France Vladimir Kovalenko Fabio Palomba and Alberto Bacchelli"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884852"},{"key":"e_1_3_2_1_62_1","first-page":"150","volume-title":"Evolution and Reengineering (SANER), 2015 IEEE 22nd International Conference on","author":"Thongtanunam P.","unstructured":"P. Thongtanunam , C. Tantithamthavorn , R. G. Kula , N. Yoshida , H. Iida , and K.-i. Matsumoto . Who should review my code? a \ufffdle location-based code-reviewer recommendation approach for modern code review. In Software Analysis , Evolution and Reengineering (SANER), 2015 IEEE 22nd International Conference on , pages 141\u2013 150 . IEEE, 2015. P. Thongtanunam, C. Tantithamthavorn, R. G. Kula, N. Yoshida, H. Iida, and K.-i. Matsumoto. Who should review my code? a \ufffdle location-based code-reviewer recommendation approach for modern code review. In Software Analysis, Evolution and Reengineering (SANER), 2015 IEEE 22nd International Conference on, pages 141\u2013150. IEEE, 2015."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970340"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1838"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818805"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9103-7"},{"key":"e_1_3_2_1_67_1","first-page":"82","volume-title":"Trec","volume":"99","author":"Voorhees E. M.","year":"1999","unstructured":"E. M. Voorhees The trec-8 question answering track report . In Trec , volume 99 , pages 77\u2013 82 , 1999 . E. M. Voorhees et al. The trec-8 question answering track report. In Trec, volume 99, pages 77\u201382, 1999."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.52"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.72"}],"event":{"name":"ASE '18: 33rd ACM\/IEEE International Conference on Automated Software Engineering","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","CNRS Centre National De La Rechercue Scientifique","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"],"location":"Montpellier France","acronym":"ASE '18"},"container-title":["Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3238147.3238169","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3238147.3238169","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:35Z","timestamp":1750210775000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3238147.3238169"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,3]]},"references-count":69,"alternative-id":["10.1145\/3238147.3238169","10.1145\/3238147"],"URL":"https:\/\/doi.org\/10.1145\/3238147.3238169","relation":{},"subject":[],"published":{"date-parts":[[2018,9,3]]},"assertion":[{"value":"2018-09-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}