{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:49:04Z","timestamp":1761709744601,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,28]],"date-time":"2020-06-28T00:00:00Z","timestamp":1593302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,28]]},"DOI":"10.1145\/3387906.3388623","type":"proceedings-article","created":{"date-parts":[[2020,9,25]],"date-time":"2020-09-25T18:17:46Z","timestamp":1601057866000},"page":"98-102","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Trade-offs in managing risk and technical debt in industrial research labs"],"prefix":"10.1145","author":[{"given":"Fran\u00e7ois","family":"Gauthier","sequence":"first","affiliation":[]},{"given":"Alexander","family":"Jordan","sequence":"additional","affiliation":[]},{"given":"Padmanabhan","family":"Krishnan","sequence":"additional","affiliation":[]},{"given":"Behnaz","family":"Hassanshahi","sequence":"additional","affiliation":[]},{"given":"J\u00f6rn Guy","family":"S\u00fc\u00df","sequence":"additional","affiliation":[]},{"given":"Sora","family":"Bae","sequence":"additional","affiliation":[]},{"given":"Hyunjun","family":"Lee","sequence":"additional","affiliation":[]}],"member":"320","published-online":{"date-parts":[[2020,9,25]]},"reference":[{"unstructured":"[n.d.]. ECMAScript Parsing Infrastructure for Multipurpose Analysis. https:\/\/esprima.org\/.  [n.d.]. ECMAScript Parsing Infrastructure for Multipurpose Analysis. https:\/\/esprima.org\/.","key":"e_1_3_2_1_1_1"},{"unstructured":"[n.d.]. Jalangi2. https:\/\/github.com\/Samsung\/jalangi2.  [n.d.]. Jalangi2. https:\/\/github.com\/Samsung\/jalangi2.","key":"e_1_3_2_1_2_1"},{"unstructured":"[n.d.]. Man-in-the-middle Proxy. https:\/\/mitmproxy.org\/.  [n.d.]. Man-in-the-middle Proxy. https:\/\/mitmproxy.org\/.","key":"e_1_3_2_1_3_1"},{"unstructured":"[n.d.]. Websockets. https:\/\/pypi.org\/project\/websockets\/.  [n.d.]. Websockets. https:\/\/pypi.org\/project\/websockets\/.","key":"e_1_3_2_1_4_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1145\/2109205.2109208"},{"volume-title":"International Conference on Software Maintenance and Evolution (ICSME). 415--425","author":"Besker T.","unstructured":"T. Besker , A. Martini , R. E. Lokuge , K. Blincoe , and J. Bosch . 2018. Embracing Technical Debt, from a Startup Company Perspective . In International Conference on Software Maintenance and Evolution (ICSME). 415--425 . T. Besker, A. Martini, R. E. Lokuge, K. Blincoe, and J. Bosch. 2018. Embracing Technical Debt, from a Startup Company Perspective. In International Conference on Software Maintenance and Evolution (ICSME). 415--425.","key":"e_1_3_2_1_6_1"},{"doi-asserted-by":"crossref","unstructured":"S. Chandra S. Sinha and S. Thummalapenta. 2016. Lessons from the tech transfer trenches. Communications of the ACM (CACM) (Feb 2016).  S. Chandra S. Sinha and S. Thummalapenta. 2016. Lessons from the tech transfer trenches. Communications of the ACM (CACM) (Feb 2016).","key":"e_1_3_2_1_7_1","DOI":"10.1145\/2811254"},{"volume-title":"Walker: DevOps Inspired Workflow for Experimentation. In IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). 277--282","author":"Chwalisz M.","unstructured":"M. Chwalisz , K. Geissdoerfer , and A. Wolisz . 2019 . Walker: DevOps Inspired Workflow for Experimentation. In IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). 277--282 . M. Chwalisz, K. Geissdoerfer, and A. Wolisz. 2019. Walker: DevOps Inspired Workflow for Experimentation. In IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). 277--282.","key":"e_1_3_2_1_8_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1007\/978-3-030-33742-1_34"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/3236454.3236502"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1109\/TSE.2015.2509970"},{"volume-title":"Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering (FSE). 121--132","author":"Kashyap V.","unstructured":"V. Kashyap , K. Dewey , E. A. Kuefner , J. Wagner , J. Gibbons , Kevin. Sarracino, B. Wiedermann , and B. Hardekopf . 2014. JSAI: A Static Analysis Platform for JavaScript . In Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering (FSE). 121--132 . V. Kashyap, K. Dewey, E. A. Kuefner, J. Wagner, J. Gibbons, Kevin. Sarracino, B. Wiedermann, and B. Hardekopf. 2014. JSAI: A Static Analysis Platform for JavaScript. In Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering (FSE). 121--132.","key":"e_1_3_2_1_12_1"},{"volume-title":"Proceedings of the 40th International Conference on Software Engineering: Software Engineering in Practice. ACM, 75--84","author":"Klotins E.","unstructured":"E. Klotins , M. Unterkalmsteiner , P. Chatzipetrou , T. Gorschek , R. Prikladnicki , N. Tripathi , and L. B. Pompermaier . 2018. Exploration of Technical Debt in Startups . In Proceedings of the 40th International Conference on Software Engineering: Software Engineering in Practice. ACM, 75--84 . E. Klotins, M. Unterkalmsteiner, P. Chatzipetrou, T. Gorschek, R. Prikladnicki, N. Tripathi, and L. B. Pompermaier. 2018. Exploration of Technical Debt in Startups. In Proceedings of the 40th International Conference on Software Engineering: Software Engineering in Practice. ACM, 75--84.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","volume-title":"Safe: Formal specification and implementation of a scalable analysis framework for ecmascript. In FOOL.","author":"Lee H.","year":"2012","unstructured":"H. Lee , S. Won , J. Jin , J. Cho , and S. Ryu . 2012 . Safe: Formal specification and implementation of a scalable analysis framework for ecmascript. In FOOL. H. Lee, S. Won, J. Jin, J. Cho, and S. Ryu. 2012. Safe: Formal specification and implementation of a scalable analysis framework for ecmascript. In FOOL."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1080\/09537325.2019.1628937"},{"unstructured":"I. Ozkaya R. L. Nord Z. Kurtz and R. S. Sangwan. 2019. Automatically Detecting Technical Debt Discussions. Technical Report. Carnegie Mellon University: Software Engineering Institute.  I. Ozkaya R. L. Nord Z. Kurtz and R. S. Sangwan. 2019. Automatically Detecting Technical Debt Discussions. Technical Report. Carnegie Mellon University: Software Engineering Institute.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the 37th International Conference on Software Engineering -","volume":"2","author":"Shepherd D.","unstructured":"D. Shepherd , K. Damevski , and L. Pollock . 2015. How and when to Transfer Software Engineering Research via Extensions . In Proceedings of the 37th International Conference on Software Engineering - Volume 2 . IEEE Press, 239--240. D. Shepherd, K. Damevski, and L. Pollock. 2015. How and when to Transfer Software Engineering Research via Extensions. In Proceedings of the 37th International Conference on Software Engineering - Volume 2. IEEE Press, 239--240."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 27th International Conference on Compiler Construction (CC","author":"Sun H.","year":"2018","unstructured":"H. Sun , D. Bonetta , C. Humer , and W. Binder . 2018. Efficient Dynamic Analysis for Node.Js . In Proceedings of the 27th International Conference on Compiler Construction (CC 2018 ). ACM, 196--206. H. Sun, D. Bonetta, C. Humer, and W. Binder. 2018. Efficient Dynamic Analysis for Node.Js. In Proceedings of the 27th International Conference on Compiler Construction (CC 2018). ACM, 196--206."},{"volume-title":"Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI. ACM, 87--97","author":"Tripp O.","unstructured":"O. Tripp , M. Pistoia , S. J. Fink , M. Sridharan , and O. Weisman . 2009. TAJ: effective taint analysis of web applications . In Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI. ACM, 87--97 . O. Tripp, M. Pistoia, S. J. Fink, M. Sridharan, and O. Weisman. 2009. TAJ: effective taint analysis of web applications. In Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI. ACM, 87--97.","key":"e_1_3_2_1_19_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1145\/3140587.3062381"}],"event":{"sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"acronym":"TechDebt '20","name":"TechDebt '20: International Conference on Technical Debt","location":"Seoul Republic of Korea"},"container-title":["Proceedings of the 3rd International Conference on Technical Debt"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387906.3388623","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3387906.3388623","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:42Z","timestamp":1750200102000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387906.3388623"}},"subtitle":["an experience report"],"short-title":[],"issued":{"date-parts":[[2020,6,28]]},"references-count":20,"alternative-id":["10.1145\/3387906.3388623","10.1145\/3387906"],"URL":"https:\/\/doi.org\/10.1145\/3387906.3388623","relation":{},"subject":[],"published":{"date-parts":[[2020,6,28]]},"assertion":[{"value":"2020-09-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}