{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T04:12:06Z","timestamp":1759032726382,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T00:00:00Z","timestamp":1565568000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["CRDPJ 502012 - 16"],"award-info":[{"award-number":["CRDPJ 502012 - 16"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,12]]},"DOI":"10.1145\/3338906.3338944","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"279-289","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Bisecting commits and modeling commit risk during testing"],"prefix":"10.1145","author":[{"given":"Armin","family":"Najafi","sequence":"first","affiliation":[{"name":"Concordia University, Canada"}]},{"given":"Peter C.","family":"Rigby","sequence":"additional","affiliation":[{"name":"Concordia University, Canada"}]},{"given":"Weiyi","family":"Shang","sequence":"additional","affiliation":[{"name":"Concordia University, Canada"}]}],"member":"320","published-online":{"date-parts":[[2019,8,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"{n. d.}. bisect - https:\/\/git-scm.com\/docs\/gitbisect. ({n. d.}). https:\/\/git-scm.com\/ docs\/gitbisect  {n. d.}. bisect - https:\/\/git-scm.com\/docs\/gitbisect. ({n. d.}). https:\/\/git-scm.com\/ docs\/gitbisect"},{"key":"e_1_3_2_1_2_1","volume-title":"IFIP Congress (1)","volume":"71","author":"Akiyama Fumio","year":"1971","unstructured":"Fumio Akiyama . 1971 . An Example of Software System Debugging .. In IFIP Congress (1) , Vol. 71 . 353\u2013359. Fumio Akiyama. 1971. An Example of Software System Debugging.. In IFIP Congress (1), Vol. 71. 353\u2013359."},{"key":"e_1_3_2_1_3_1","volume-title":"Denis Haenikel, Balaji Varadarajan, Simon Soriano, Dhaval Patel, and Ali-Reza Adl-Tabatabai.","author":"Ananthanarayanan Sundaram","year":"2019","unstructured":"Sundaram Ananthanarayanan , Masoud Saeida Ardekani , Denis Haenikel, Balaji Varadarajan, Simon Soriano, Dhaval Patel, and Ali-Reza Adl-Tabatabai. 2019 . Sundaram Ananthanarayanan, Masoud Saeida Ardekani, Denis Haenikel, Balaji Varadarajan, Simon Soriano, Dhaval Patel, and Ali-Reza Adl-Tabatabai. 2019."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302424.3303970"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597084"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609736"},{"key":"e_1_3_2_1_7_1","unstructured":"5609736  5609736"},{"key":"e_1_3_2_1_8_1","volume-title":"Dynamic Test Selection Using Source Code Changes. In 2017 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C). 597\u2013598","author":"Campbell M.","year":"2017","unstructured":"M. Campbell , K. Martin , F. Boz\u00f3ki , and M. Atkinson . 2017 . Dynamic Test Selection Using Source Code Changes. In 2017 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C). 597\u2013598 . 1109\/QRS-C. 2017 .111 M. Campbell, K. Martin, F. Boz\u00f3ki, and M. Atkinson. 2017. Dynamic Test Selection Using Source Code Changes. In 2017 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C). 597\u2013598. 1109\/QRS-C.2017.111"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.42"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2010.5463279"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635910"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.112"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.103"},{"volume-title":"2018 IEEE 18th International Working Conference on Source Code Analysis and Manipulation (SCAM). 1\u201323","author":"Harman M.","key":"e_1_3_2_1_14_1","unstructured":"M. Harman and P. O\u2019Hearn . 2018. From Start-ups to Scale-ups: Opportunities and Open Problems for Static and Dynamic Program Analysis . In 2018 IEEE 18th International Working Conference on Source Code Analysis and Manipulation (SCAM). 1\u201323 . M. Harman and P. O\u2019Hearn. 2018. From Start-ups to Scale-ups: Opportunities and Open Problems for Static and Dynamic Program Analysis. In 2018 IEEE 18th International Working Conference on Source Code Analysis and Manipulation (SCAM). 1\u201323."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070510"},{"key":"e_1_3_2_1_16_1","volume-title":"Empirically Detecting False Test Alarms Using Association Rules. In 2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering","volume":"2","author":"Herzig K.","unstructured":"K. Herzig and N. Nagappan . 2015 . Empirically Detecting False Test Alarms Using Association Rules. In 2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering , Vol. 2 . 39\u201348. K. Herzig and N. Nagappan. 2015. Empirically Detecting False Test Alarms Using Association Rules. In 2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering, Vol. 2. 39\u201348."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.71"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2012.31"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.70"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/581339.581357"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70773"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.66"},{"volume-title":"2015 12th International Conference on Electrical Engineering\/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON). 1\u20136.","author":"Konsaard P.","key":"e_1_3_2_1_23_1","unstructured":"P. Konsaard and L. Ramingwong . 2015. Total coverage based regression test case prioritization using genetic algorithm . In 2015 12th International Conference on Electrical Engineering\/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON). 1\u20136. P. Konsaard and L. Ramingwong. 2015. Total coverage based regression test case prioritization using genetic algorithm. In 2015 12th International Conference on Electrical Engineering\/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON). 1\u20136."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693122"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2263"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-39083-3_6"},{"key":"e_1_3_2_1_27_1","unstructured":"Paul Luo Li James D. Herbsleb Mary Shaw and Brian Robinson. 2006. Experiences and results from initiating field defect prediction and product test prioritization efforts at ABB Inc. In ICSE.  Paul Luo Li James D. Herbsleb Mary Shaw and Brian Robinson. 2006. Experiences and results from initiating field defect prediction and product test prioritization efforts at ABB Inc. In ICSE."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597076"},{"key":"e_1_3_2_1_29_1","unstructured":"John Micco. 2016. Flaky Tests at Google and How We Mitigate Them. https: \/\/goo.gl\/rxFGiw. (2016).  John Micco. 2016. Flaky Tests at Google and How We Mitigate Them. https: \/\/goo.gl\/rxFGiw. (2016)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882311"},{"key":"e_1_3_2_1_31_1","first-page":"2","article-title":"Predicting risk of software changes","volume":"5","author":"Mockus A.","year":"2000","unstructured":"A. Mockus and D. M. Weiss . 2000 . Predicting risk of software changes . Bell Labs Technical Journal 5 , 2 (April 2000), 169\u2013180. A. Mockus and D. M. Weiss. 2000. Predicting risk of software changes. Bell Labs Technical Journal 5, 2 (April 2000), 169\u2013180.","journal-title":"Bell Labs Technical Journal"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368114"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.135775"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2010.25"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1572"},{"key":"e_1_3_2_1_36_1","unstructured":"Cu Nguyen Paolo Tonella Tanja Vos Nelly Condori Bilha Mendelson Daniel Citron and Onn Shehory. 2014. Test prioritization based on change sensitivity: an industrial case study. (2014).  Cu Nguyen Paolo Tonella Tanja Vos Nelly Condori Bilha Mendelson Daniel Citron and Onn Shehory. 2014. Test prioritization based on change sensitivity: an industrial case study. (2014)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3127005.3127006"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.10"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390630.1390641"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2013.02.009"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025157"},{"volume-title":"The principles of product development flow: second generation lean product development","author":"Reinertsen Donald G","key":"e_1_3_2_1_42_1","unstructured":"Donald G Reinertsen . 2009. The principles of product development flow: second generation lean product development . Vol. 62 . Celeritas Redondo Beach . Donald G Reinertsen. 2009. The principles of product development flow: second generation lean product development. Vol. 62. Celeritas Redondo Beach."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786878"},{"key":"e_1_3_2_1_44_1","volume-title":"Walid M. Ibrahim, Bram Adams, and Ahmed E. Hassan.","author":"Shihab Emad","year":"2010","unstructured":"Emad Shihab , Zhen Ming Jiang , Walid M. Ibrahim, Bram Adams, and Ahmed E. Hassan. 2010 . Emad Shihab, Zhen Ming Jiang, Walid M. Ibrahim, Bram Adams, and Ahmed E. Hassan. 2010."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1852786.1852792"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025155"},{"key":"e_1_3_2_1_47_1","unstructured":"Satwinder Singh and Fategarh Sahib. 2014. Optimized Test Case Prioritization with multi criteria for Regression Testing.  Satwinder Singh and Fategarh Sahib. 2014. Optimized Test Case Prioritization with multi criteria for Regression Testing."},{"key":"e_1_3_2_1_48_1","volume-title":"The Impact of Mislabelling on the Performance and Interpretation of Defect Prediction Models. In 2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering","volume":"1","author":"Tantithamthavorn C.","unstructured":"C. Tantithamthavorn , S. McIntosh , A. E. Hassan , A. Ihara , and K. Matsumoto . 2015 . The Impact of Mislabelling on the Performance and Interpretation of Defect Prediction Models. In 2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering , Vol. 1 . 812\u2013823. C. Tantithamthavorn, S. McIntosh, A. E. Hassan, A. Ihara, and K. Matsumoto. 2015. The Impact of Mislabelling on the Performance and Interpretation of Defect Prediction Models. In 2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering, Vol. 1. 812\u2013823."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106258"},{"volume-title":"2012 34th International Conference on Software Engineering (ICSE). 25\u201335","author":"Xuan J.","key":"e_1_3_2_1_50_1","unstructured":"J. Xuan , H. Jiang , Z. Ren , and W. Zou . 2012. Developer prioritization in bug repositories . In 2012 34th International Conference on Software Engineering (ICSE). 25\u201335 . J. Xuan, H. Jiang, Z. Ren, and W. Zou. 2012. Developer prioritization in bug repositories. In 2012 34th International Conference on Software Engineering (ICSE). 25\u201335."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.03.007"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2015.14"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3194104.3194110"},{"volume-title":"Test Re-Prioritization in Continuous Testing Environments. In 2018 IEEE International Conference on Software Maintenance and Evolution (ICSME). 69\u201379","author":"Zhu Y.","key":"e_1_3_2_1_54_1","unstructured":"Y. Zhu , E. Shihab , and P. C. Rigby . 2018 . Test Re-Prioritization in Continuous Testing Environments. In 2018 IEEE International Conference on Software Maintenance and Evolution (ICSME). 69\u201379 . Y. Zhu, E. Shihab, and P. C. Rigby. 2018. Test Re-Prioritization in Continuous Testing Environments. In 2018 IEEE International Conference on Software Maintenance and Evolution (ICSME). 69\u201379."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2017.13"}],"event":{"name":"ESEC\/FSE '19: 27th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Tallinn Estonia","acronym":"ESEC\/FSE '19"},"container-title":["Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338906.3338944","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338906.3338944","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:21Z","timestamp":1750206381000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338906.3338944"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,12]]},"references-count":55,"alternative-id":["10.1145\/3338906.3338944","10.1145\/3338906"],"URL":"https:\/\/doi.org\/10.1145\/3338906.3338944","relation":{},"subject":[],"published":{"date-parts":[[2019,8,12]]},"assertion":[{"value":"2019-08-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}