{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T21:35:26Z","timestamp":1763156126478,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T00:00:00Z","timestamp":1603065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,19]]},"DOI":"10.1145\/3425269.3425280","type":"proceedings-article","created":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T16:04:58Z","timestamp":1604073898000},"page":"121-130","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Measuring Unique Changes"],"prefix":"10.1145","author":[{"given":"Daniel Augusto Nunes da","family":"Silva","sequence":"first","affiliation":[{"name":"Federal University of Acre, Brazil"}]},{"given":"Daric\u00e9lio Moreira","family":"Soares","sequence":"additional","affiliation":[{"name":"Federal University of Acre, Brazil"}]},{"given":"Silvana Andrade","family":"Gon\u00e7alves","sequence":"additional","affiliation":[{"name":"Federal University of Acre, Brazil"}]}],"member":"320","published-online":{"date-parts":[[2020,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/645920.672836"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818773"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1717171"},{"volume-title":"Best Kept Secrets of Peer Code Review","author":"Cohen Jason Aaron","key":"e_1_3_2_1_4_1","unstructured":"Jason Aaron Cohen . 2006. Code Review at Cisco Systems . In Best Kept Secrets of Peer Code Review . Smart Bear Inc., Austin, TX, USA. Jason Aaron Cohen. 2006. Code Review at Cisco Systems. In Best Kept Secrets of Peer Code Review. Smart Bear Inc., Austin, TX, USA."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1600-0587.2012.07348.x"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882315"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/2487085.2487132"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568260"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597122"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818800"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"volume-title":"Data mining: concepts and techniques (3 ed.). Morgan Kaufmann","author":"Han Jiawei","key":"e_1_3_2_1_12_1","unstructured":"Jiawei Han , Micheline Kamber , and Jian Pei . 2011. Data mining: concepts and techniques (3 ed.). Morgan Kaufmann , San Francisco . Jiawei Han, Micheline Kamber, and Jian Pei. 2011. Data mining: concepts and techniques (3 ed.). Morgan Kaufmann, San Francisco."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337322"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2517747"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/2487085.2487111"},{"key":"e_1_3_2_1_16_1","first-page":"71","article-title":"Association Rules Mining: A Recent Overview","volume":"32","author":"Kotsiantis Sotiris","year":"2006","unstructured":"Sotiris Kotsiantis and Dimitris Kanellopoulos . 2006 . Association Rules Mining: A Recent Overview . International Transactions on Computer Science and Engineering 32 (2006), 71 -- 82 . Sotiris Kotsiantis and Dimitris Kanellopoulos. 2006. Association Rules Mining: A Recent Overview. International Transactions on Computer Science and Engineering 32 (2006), 71--82.","journal-title":"International Transactions on Computer Science and Engineering"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3340457"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693078"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3239235.3240504"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/2820518.2820526"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2695664.2695856"},{"key":"e_1_3_2_1_23_1","volume-title":"What factors influence the reviewer assignment to pull requests? Information and Software Technology 98 (June","author":"Soares Daric\u00e9lio M.","year":"2018","unstructured":"Daric\u00e9lio M. Soares , Manoel L. de Lima J\u00fanior , Alexandre Plastino , and Leonardo Murta . 2018. What factors influence the reviewer assignment to pull requests? Information and Software Technology 98 (June 2018 ), 32--43. 10.1016\/j.infsof.2018.01.015 Daric\u00e9lio M. Soares, Manoel L. de Lima J\u00fanior, Alexandre Plastino, and Leonardo Murta. 2018. What factors influence the reviewer assignment to pull requests? Information and Software Technology 98 (June 2018), 32--43. 10.1016\/j.infsof.2018.01.015"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-8-25"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568315"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1972514"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/2820518.2820564"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-016-5595-8"}],"event":{"name":"SBCARS '20: 14th Brazilian Symposium on Software Components, Architectures, and Reuse","sponsor":["SBC Brazilian Computer Society"],"location":"Natal Brazil","acronym":"SBCARS '20"},"container-title":["Proceedings of the 14th Brazilian Symposium on Software Components, Architectures, and Reuse"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3425269.3425280","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3425269.3425280","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:54Z","timestamp":1750195914000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3425269.3425280"}},"subtitle":["How do Distinct Changes Affect the Size and Lifetime of Pull Requests?"],"short-title":[],"issued":{"date-parts":[[2020,10,19]]},"references-count":28,"alternative-id":["10.1145\/3425269.3425280","10.1145\/3425269"],"URL":"https:\/\/doi.org\/10.1145\/3425269.3425280","relation":{},"subject":[],"published":{"date-parts":[[2020,10,19]]},"assertion":[{"value":"2020-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}