{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T17:21:03Z","timestamp":1764350463842,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,11]],"date-time":"2018-10-11T00:00:00Z","timestamp":1539216000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China","award":["61602450"],"award-info":[{"award-number":["61602450"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,11]]},"DOI":"10.1145\/3239235.3239523","type":"proceedings-article","created":{"date-parts":[[2018,10,4]],"date-time":"2018-10-04T12:21:55Z","timestamp":1538655715000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":36,"title":["Is there a \"golden\" feature set for static warning identification?"],"prefix":"10.1145","author":[{"given":"Junjie","family":"Wang","sequence":"first","affiliation":[{"name":"Laboratory for Internet Software Technologies and University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Song","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Waterloo, Canada"}]},{"given":"Qing","family":"Wang","sequence":"additional","affiliation":[{"name":"Laboratory for Internet Software Technologies and Institute of Software Chinese Academy of Sciences and University of Chinese Academy of Sciences, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2018,10,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2012.37"},{"key":"e_1_3_2_1_2_1","volume-title":"ICSE","author":"Avgustinov P.","year":"2015","unstructured":"P. Avgustinov , A. I. Baars , A. S. Henriksen , G. Lavender , G. Menzel , O. d. Moor , M. Schafer , and J. Tibble . 2015. Tracking Static Analysis Violations over Time to Capture Developer Characteristics . In ICSE 2015 . 437--447. P. Avgustinov, A. I. Baars, A. S. Henriksen, G. Lavender, G. Menzel, O. d. Moor, M. Schafer, and J. Tibble. 2015. Tracking Static Analysis Violations over Time to Capture Developer Characteristics. In ICSE 2015. 437--447."},{"key":"e_1_3_2_1_3_1","first-page":"470","article-title":"Analyzing the State of Static Analysis: A Large-Scale Evaluation in Open Source Software","volume":"2016","author":"Beller M.","year":"2016","unstructured":"M. Beller , R. Bholanath , S. McIntosh , and A. Zaidman . 2016 . Analyzing the State of Static Analysis: A Large-Scale Evaluation in Open Source Software . In SANER 2016. 470 -- 481 . M. Beller, R. Bholanath, S. McIntosh, and A. Zaidman. 2016. Analyzing the State of Static Analysis: A Large-Scale Evaluation in Open Source Software. In SANER 2016. 470--481.","journal-title":"SANER"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.15"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597100"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1414004.1414013"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2009.45"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.12.007"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2499393.2499399"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486877"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2007.26"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287633"},{"volume-title":"Procedures for Performing Systematic Reviews. TR\/SE-0401","author":"Kitchenham B.","key":"e_1_3_2_1_13_1","unstructured":"B. Kitchenham . 2004. Procedures for Performing Systematic Reviews. TR\/SE-0401 . Keele University . B. Kitchenham. 2004. Procedures for Performing Systematic Reviews. TR\/SE-0401. Keele University."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029894.1029909"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859013"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568269"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368135"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2011.51"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786812"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884857"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-014-0169-8"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660339"},{"key":"e_1_3_2_1_23_1","volume-title":"Data Mining: Practical machine learning tools and techniques.","author":"Witten Ian H","year":"2005","unstructured":"Ian H Witten and Eibe Frank . 2005 . Data Mining: Practical machine learning tools and techniques. Ian H Witten and Eibe Frank. 2005. Data Mining: Practical machine learning tools and techniques."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2479232"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2006.11.004"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.89"}],"event":{"name":"ESEM '18: ACM \/ IEEE International Symposium on Empirical Software Engineering and Measurement","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Oulu Finland","acronym":"ESEM '18"},"container-title":["Proceedings of the 12th ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3239235.3239523","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3239235.3239523","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:25Z","timestamp":1750208245000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3239235.3239523"}},"subtitle":["an experimental evaluation"],"short-title":[],"issued":{"date-parts":[[2018,10,11]]},"references-count":26,"alternative-id":["10.1145\/3239235.3239523","10.1145\/3239235"],"URL":"https:\/\/doi.org\/10.1145\/3239235.3239523","relation":{},"subject":[],"published":{"date-parts":[[2018,10,11]]},"assertion":[{"value":"2018-10-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}