{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T14:47:32Z","timestamp":1776782852914,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T00:00:00Z","timestamp":1565568000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,12]]},"DOI":"10.1145\/3338906.3338962","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"326-337","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":50,"title":["Exploring and exploiting the correlations between bug-inducing and bug-fixing commits"],"prefix":"10.1145","author":[{"given":"Ming","family":"Wen","sequence":"first","affiliation":[{"name":"Hong Kong University of Science and Technology, China"}]},{"given":"Rongxin","family":"Wu","sequence":"additional","affiliation":[{"name":"Xiamen University, China"}]},{"given":"Yepang","family":"Liu","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology, China"}]},{"given":"Yongqiang","family":"Tian","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology, China"}]},{"given":"Xuan","family":"Xie","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, China"}]},{"given":"Shing-Chi","family":"Cheung","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology, China"}]},{"given":"Zhendong","family":"Su","sequence":"additional","affiliation":[{"name":"ETH Zurich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2019,8,12]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"https:\/\/issues.apache.org\/jira\/browse\/ACCUMULO- 2967. Accessed: 2018-02-28","year":"2018","unstructured":"2018. ACCUMULO-2967. https:\/\/issues.apache.org\/jira\/browse\/ACCUMULO- 2967. Accessed: 2018-02-28 . 2018 . AMBARI-3505. https:\/\/issues.apache.org\/jira\/browse\/AMBARI-3505. Accessed: 2018-02-28. 2018. BUG-262975. https:\/\/bugs.eclipse.org\/bugs\/show b ug.cgi?id =262975. Accessed: 2018-02-28. 2018. HADOOP-13118. https:\/\/issues.apache.org\/jira\/browse\/HADOOP-13118. Accessed: 2018-02-28. 2018. LUCENE-5786. https:\/\/issues.apache.org\/jira\/browse\/LUCENE-5786. Accessed: 2018-02-28. 2018. SOLR-2606. https:\/\/issues.apache.org\/jira\/browse\/SOLR-2606. Accessed: 2018-02-28. 2018. SOLR-8026. https:\/\/issues.apache.org\/jira\/browse\/SOLR-8026. Accessed : 2018-02-28. 2018. ACCUMULO-2967. https:\/\/issues.apache.org\/jira\/browse\/ACCUMULO- 2967. Accessed: 2018-02-28. 2018. AMBARI-3505. https:\/\/issues.apache.org\/jira\/browse\/AMBARI-3505. Accessed: 2018-02-28. 2018. BUG-262975. https:\/\/bugs.eclipse.org\/bugs\/show b ug.cgi?id =262975. Accessed: 2018-02-28. 2018. HADOOP-13118. https:\/\/issues.apache.org\/jira\/browse\/HADOOP-13118. Accessed: 2018-02-28. 2018. LUCENE-5786. https:\/\/issues.apache.org\/jira\/browse\/LUCENE-5786. Accessed: 2018-02-28. 2018. SOLR-2606. https:\/\/issues.apache.org\/jira\/browse\/SOLR-2606. Accessed: 2018-02-28. 2018. SOLR-8026. https:\/\/issues.apache.org\/jira\/browse\/SOLR-8026. Accessed: 2018-02-28."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.06.035"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/2664446.2664463"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294948.1294954"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882308"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2012.20"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2012.24"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491430"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2628058"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02294183"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2011.31"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2616306"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1619"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2487043"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985464"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642982"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597075"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9376-6"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/2487085.2487113"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Jiajun Jiang Yingfei Xiong Hongyu Zhang Qing Gao and Xiangqun Chen. 2018. Shaping Program Repair Space with Existing Patches and Similar Code. (2018).  Jiajun Jiang Yingfei Xiong Hongyu Zhang Qing Gao and Xiangqun Chen. 2018. Shaping Program Repair Space with Existing Patches and Similar Code. (2018).","DOI":"10.1145\/3213846.3213871"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2628055"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.70"},{"key":"e_1_3_2_1_23_1","volume-title":"On effect size. Psychological methods 17, 2","author":"Kelley Ken","year":"2012","unstructured":"Ken Kelley and Kristopher J Preacher . 2012. On effect size. Psychological methods 17, 2 ( 2012 ), 137. Ken Kelley and Kristopher J Preacher. 2012. On effect size. Psychological methods 17, 2 (2012), 137."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1137983.1138027"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70773"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2006.23"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.66"},{"key":"e_1_3_2_1_28_1","volume-title":"Fixminer: Mining relevant fix patterns for automated program repair. arXiv preprint arXiv:1810.01791","author":"Koyuncu Anil","year":"2018","unstructured":"Anil Koyuncu , Kui Liu , Tegawend\u00e9 F Bissyand\u00e9 , Dongsun Kim , Jacques Klein , Martin Monperrus , and Yves Le Traon . 2018 . Fixminer: Mining relevant fix patterns for automated program repair. arXiv preprint arXiv:1810.01791 (2018). Anil Koyuncu, Kui Liu, Tegawend\u00e9 F Bissyand\u00e9, Dongsun Kim, Jacques Klein, Martin Monperrus, and Yves Le Traon. 2018. Fixminer: Mining relevant fix patterns for automated program repair. arXiv preprint arXiv:1810.01791 (2018)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-013-9208-0"},{"key":"e_1_3_2_1_30_1","volume-title":"Soviet physics doklady","author":"Levenshtein Vladimir I","unstructured":"Vladimir I Levenshtein . 1966. Binary codes capable of correcting deletions, insertions, and reversals . In Soviet physics doklady , Vol. 10 . 707\u2013710. Vladimir I Levenshtein. 1966. Binary codes capable of correcting deletions, insertions, and reversals. In Soviet physics doklady, Vol. 10. 707\u2013710."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Kui Liu Anil Koyuncu Tegawend\u00e9 F Bissyand\u00e9 Dongsun Kim Jacques Klein and Yves Le Traon. 2019. You cannot fix what you cannot find! an investigation of fault localization bias in benchmarking automated program repair systems. (2019).  Kui Liu Anil Koyuncu Tegawend\u00e9 F Bissyand\u00e9 Dongsun Kim Jacques Klein and Yves Le Traon. 2019. You cannot fix what you cannot find! an investigation of fault localization bias in benchmarking automated program repair systems. (2019).","DOI":"10.1109\/ICST.2019.00020"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950297"},{"key":"e_1_3_2_1_33_1","volume-title":"On a test of whether one of two random variables is stochastically larger than the other. The annals of mathematical statistics","author":"Mann Henry B","year":"1947","unstructured":"Henry B Mann and Donald R Whitney . 1947. On a test of whether one of two random variables is stochastically larger than the other. The annals of mathematical statistics ( 1947 ), 50\u201360. Henry B Mann and Donald R Whitney. 1947. On a test of whether one of two random variables is stochastically larger than the other. The annals of mathematical statistics (1947), 50\u201360."},{"key":"e_1_3_2_1_34_1","volume-title":"Foundations of statistical natural language processing","author":"Manning Christopher D","unstructured":"Christopher D Manning and Hinrich Sch\u00fctze . 1999. Foundations of statistical natural language processing . Vol. 999 . MIT Press . Christopher D Manning and Hinrich Sch\u00fctze. 1999. Foundations of statistical natural language processing. Vol. 999. MIT Press."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-013-9282-8"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2948705"},{"key":"e_1_3_2_1_37_1","first-page":"43","article-title":"Prediction of fault-prone modules using a text filtering based metric","volume":"4","author":"Mizuno Osamu","year":"2010","unstructured":"Osamu Mizuno and Hideaki Hata . 2010 . Prediction of fault-prone modules using a text filtering based metric . International Journal of Software Engineering and Its Applications 4 , 1 (2010), 43 \u2013 52 . Osamu Mizuno and Hideaki Hata. 2010. Prediction of fault-prone modules using a text filtering based metric. International Journal of Software Engineering and Its Applications 4, 1 (2010), 43\u201352.","journal-title":"International Journal of Software Engineering and Its Applications"},{"key":"e_1_3_2_1_38_1","unstructured":"Bernard Ostle et al. 1963. Statistics in research. Statistics in research. 2nd Ed (1963).  Bernard Ostle et al. 1963. Statistics in research. Statistics in research. 2nd Ed (1963)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.62"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985860"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884835"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR-WCRE.2014.6747164"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/3155562.3155643"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393646"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.86"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.43"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095430.1081725"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1082983.1083147"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3092717"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818813"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1797"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","unstructured":"Shangwen Wang Ming Wen Liqian Chen Xin Yi and Xiaoguang Mao. 2019. How Different Is It Between Machine-Generated and Developer-Provided Patches? An Empirical Study on The Correct Patches Generated by Automated Program Repair Techniques. (2019).  Shangwen Wang Ming Wen Liqian Chen Xin Yi and Xiaoguang Mao. 2019. How Different Is It Between Machine-Generated and Developer-Provided Patches? An Empirical Study on The Correct Patches Generated by Automated Program Repair Techniques. (2019).","DOI":"10.1109\/ESEM.2019.8870172"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319008.3319349"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236056"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180233"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970359"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9567-4"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025120"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.5555\/3155562.3155644"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2015.14"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950353"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025121"}],"event":{"name":"ESEC\/FSE '19: 27th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Tallinn Estonia","acronym":"ESEC\/FSE '19","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338906.3338962","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338906.3338962","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:21Z","timestamp":1750206381000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338906.3338962"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,12]]},"references-count":62,"alternative-id":["10.1145\/3338906.3338962","10.1145\/3338906"],"URL":"https:\/\/doi.org\/10.1145\/3338906.3338962","relation":{},"subject":[],"published":{"date-parts":[[2019,8,12]]},"assertion":[{"value":"2019-08-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}