{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T13:52:12Z","timestamp":1756993932700,"version":"3.41.0"},"reference-count":115,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2021,11,17]],"date-time":"2021-11-17T00:00:00Z","timestamp":1637107200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001659","name":"German Research Foundation","doi-asserted-by":"crossref","award":["AP 206\/5-1&2, AP 206\/6-1&2, and AP 206\/14-1"],"award-info":[{"award-number":["AP 206\/5-1&2, AP 206\/6-1&2, and AP 206\/14-1"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Bavarian State Ministry of Education, Science"},{"name":"Arts in the framework of the Center Digitisation.Bavaria"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Softw. Eng. Methodol."],"published-print":{"date-parts":[[2022,4,30]]},"abstract":"<jats:p>Many open-source software projects depend on a few core developers, who take over both the bulk of coordination and programming tasks. They are supported by peripheral developers, who contribute either via discussions or programming tasks, often for a limited time. It is unclear what role these peripheral developers play in the programming and communication efforts, as well as the temporary task-related sub-groups in the projects. We mine code-repository data and mailing-list discussions to model the relationships and contributions of developers in a social network and devise a method to analyze the temporal collaboration structures in communication and programming, learning about the strength and stability of social sub-groups in open-source software projects. Our method uses multi-modal social networks on a series of time windows. Previous work has reduced the network structure representing developer collaboration to networks with only one type of interaction, which impedes the simultaneous analysis of more than one type of interaction. We use both communication and version-control data of open-source software projects and model different types of interaction over time. To demonstrate the practicability of our measurement and analysis method, we investigate 10\u00a0substantial and popular open-source software projects and show that, if sub-groups evolve, modeling these sub-groups helps predict the future evolution of interaction levels of programmers and groups of developers. Our method allows maintainers and other stakeholders of open-source software projects to assess instabilities and organizational changes in developer interaction and can be applied to different use cases in organizational analysis, such as understanding the dynamics of a specific incident or discussion.<\/jats:p>","DOI":"10.1145\/3473139","type":"journal-article","created":{"date-parts":[[2021,11,17]],"date-time":"2021-11-17T21:57:08Z","timestamp":1637186228000},"page":"1-50","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Measuring and Modeling Group Dynamics in Open-Source Software Development: A Tensor Decomposition Approach"],"prefix":"10.1145","volume":"31","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6906-3489","authenticated-orcid":false,"given":"Thomas","family":"Bock","sequence":"first","affiliation":[{"name":"Saarland University, Saarland Informatics Campus, Saarbr\u00fccken, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9274-3666","authenticated-orcid":false,"given":"Angelika","family":"Schmid","sequence":"additional","affiliation":[{"name":"IBM, M\u00fcnchen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3687-2233","authenticated-orcid":false,"given":"Sven","family":"Apel","sequence":"additional","affiliation":[{"name":"Saarland University, Saarland Informatics Campus, Saarbr\u00fccken, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,11,17]]},"reference":[{"key":"e_1_3_3_2_2","doi-asserted-by":"publisher","DOI":"10.5555\/1390681.1442798"},{"key":"e_1_3_3_3_2","doi-asserted-by":"publisher","DOI":"10.5555\/2999134.2999237"},{"key":"e_1_3_3_4_2","doi-asserted-by":"publisher","DOI":"10.5555\/2627435.2670323"},{"key":"e_1_3_3_5_2","doi-asserted-by":"publisher","DOI":"10.5555\/2627435.2697055"},{"key":"e_1_3_3_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSP-ICGSE52873.2021.00016"},{"key":"e_1_3_3_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080832"},{"key":"e_1_3_3_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/1137983.1138016"},{"key":"e_1_3_3_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453107"},{"key":"e_1_3_3_10_2","doi-asserted-by":"publisher","DOI":"10.5555\/2819009.2819025"},{"key":"e_1_3_3_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/1460563.1460654"},{"key":"e_1_3_3_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.32"},{"key":"e_1_3_3_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/1414004.1414008"},{"key":"e_1_3_3_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/1180875.1180929"},{"key":"e_1_3_3_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2838259"},{"key":"e_1_3_3_16_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33013371"},{"key":"e_1_3_3_17_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-017-1728-9"},{"key":"e_1_3_3_18_2","doi-asserted-by":"publisher","DOI":"10.1093\/icc\/dtw027"},{"issue":"4","key":"e_1_3_3_19_2","first-page":"28","article-title":"How do committees invent?","volume":"14","author":"Conway Melvin E.","year":"1968","unstructured":"Melvin E. Conway. 1968. How do committees invent?Datamation 14, 4 (1968), 28\u201331.","journal-title":"Datamation"},{"issue":"1","key":"e_1_3_3_20_2","first-page":"10:1\u201310:11","article-title":"Core-periphery communication and the success of free\/libre open source software projects","volume":"8","author":"Crowston Kevin","year":"2017","unstructured":"Kevin Crowston and Ivan Shamshurin. 2017. Core-periphery communication and the success of free\/libre open source software projects. J. Internet Serv. Applic. 8, 1 (2017), 10:1\u201310:11.","journal-title":"J. Internet Serv. Applic."},{"issue":"5","key":"e_1_3_3_21_2","first-page":"1","article-title":"The igraph software package for complex network research","volume":"1695","author":"Cs\u00e1rdi G\u00e1bor","year":"2006","unstructured":"G\u00e1bor Cs\u00e1rdi and Tam\u00e1s Nepusz. 2006. The igraph software package for complex network research. Inter J. Complex Syst. 1695, 5 (2006), 1\u20139.","journal-title":"Inter J. Complex Syst."},{"key":"e_1_3_3_22_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-018-0583-9"},{"key":"e_1_3_3_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.140"},{"key":"e_1_3_3_24_2","doi-asserted-by":"publisher","DOI":"10.5555\/1212782"},{"key":"e_1_3_3_25_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-005-9000-1"},{"key":"e_1_3_3_26_2","doi-asserted-by":"publisher","DOI":"10.1137\/1.9780898719918.ch7"},{"key":"e_1_3_3_27_2","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.2015.1008697"},{"key":"e_1_3_3_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786870"},{"key":"e_1_3_3_29_2","doi-asserted-by":"publisher","DOI":"10.5555\/850947.853338"},{"key":"e_1_3_3_30_2","first-page":"37","volume-title":"Proceedings of the International Workshop Quantitative Approaches to Software Quality (QuASoQ)","author":"Gandhi Mahen","year":"2019","unstructured":"Mahen Gandhi, Amit Kumar, Yugandhar Desai, and Sonali Agarwal. 2019. Studying multifaceted collaboration of OSS developers and its impact on their bug fixing performance. In Proceedings of the International Workshop Quantitative Approaches to Software Quality (QuASoQ). CEUR Workshop Proceedings, 37\u201344."},{"key":"e_1_3_3_31_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0086028"},{"key":"e_1_3_3_32_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2014.01.004"},{"key":"e_1_3_3_33_2","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1060.0550"},{"key":"e_1_3_3_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/320297.320333"},{"key":"e_1_3_3_35_2","doi-asserted-by":"publisher","DOI":"10.5555\/2487085.2487139"},{"key":"e_1_3_3_36_2","first-page":"553","volume-title":"Proceedings of the International Conference on Information Systems (ICIS)","author":"Herbsleb James D.","year":"2006","unstructured":"James D. Herbsleb, Audris Mockus, and Jeffrey A. Roberts. 2006. Collaboration in software engineering projects: A theory of coordination. In Proceedings of the International Conference on Information Systems (ICIS). Association for Information Systems, 553\u2013568."},{"key":"e_1_3_3_37_2","doi-asserted-by":"publisher","DOI":"10.5555\/2981562.2981645"},{"key":"e_1_3_3_38_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10588-008-9040-4"},{"key":"e_1_3_3_39_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2010.05.020"},{"key":"e_1_3_3_40_2","doi-asserted-by":"publisher","DOI":"10.1198\/016214502388618906"},{"key":"e_1_3_3_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080799"},{"key":"e_1_3_3_42_2","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34226-5_32"},{"key":"e_1_3_3_43_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-020-09833-8"},{"key":"e_1_3_3_44_2","volume-title":"Forecast: Forecasting Functions for Time Series and Linear Models","author":"Hyndman Rob J.","year":"2018","unstructured":"Rob J. Hyndman, George Athanasopoulos, Christoph Bergmeir, Gabriel Caceres, Leanne Chhay, Mitchell O\u2019Hara-Wild, Fotios Petropoulos, Slava Razbash, Earo Wang, and Farah Yasmeen. 2018. Forecast: Forecasting Functions for Time Series and Linear Models. R package version 8.4.https:\/\/cran.r-project.org\/src\/contrib\/Archive\/forecast\/forecast_8.4.tar.gz."},{"key":"e_1_3_3_45_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-2070(01)00110-8"},{"key":"e_1_3_3_46_2","doi-asserted-by":"publisher","DOI":"10.1063\/1.4953161"},{"issue":"2","key":"e_1_3_3_47_2","first-page":"434","article-title":"After Woolwich: Analyzing open source communications to understand the interactive and multi-polar dynamics of the arc of conflict","volume":"58","author":"Innes Martin","year":"2017","unstructured":"Martin Innes, Colin Roberts, Alun Preece, and David Rogers. 2017. After Woolwich: Analyzing open source communications to understand the interactive and multi-polar dynamics of the arc of conflict. British J. Criminol. 58, 2 (2017), 434\u2013454.","journal-title":"British J. Criminol."},{"issue":"2","key":"e_1_3_3_48_2","first-page":"265","article-title":"Exploratory data analysis as a foundation of inductive research","volume":"27","author":"Jebb Andrew T.","year":"2017","unstructured":"Andrew T. Jebb, Scott Parrigon, and Sang Eun Woo. 2017. Exploratory data analysis as a foundation of inductive research. Hum. Resour. Manag. Rev. 27, 2 (2017), 265\u2013276.","journal-title":"Hum. Resour. Manag. Rev."},{"key":"e_1_3_3_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2005.147"},{"key":"e_1_3_3_50_2","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025127"},{"key":"e_1_3_3_51_2","doi-asserted-by":"publisher","DOI":"10.1145\/1984642.1984647"},{"key":"e_1_3_3_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.23"},{"key":"e_1_3_3_53_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-016-9478-9"},{"key":"e_1_3_3_54_2","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818824"},{"key":"e_1_3_3_55_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-014-9308-x"},{"key":"e_1_3_3_56_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2005.77"},{"key":"e_1_3_3_57_2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.263"},{"key":"e_1_3_3_58_2","doi-asserted-by":"publisher","DOI":"10.1037\/amp0000245"},{"key":"e_1_3_3_59_2","doi-asserted-by":"publisher","DOI":"10.1145\/203330.203345"},{"key":"e_1_3_3_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/2820618"},{"key":"e_1_3_3_61_2","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871533"},{"key":"e_1_3_3_62_2","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2012.3"},{"key":"e_1_3_3_63_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.29"},{"key":"e_1_3_3_64_2","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.14.6.633.24866"},{"key":"e_1_3_3_65_2","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401948"},{"key":"e_1_3_3_66_2","volume-title":"rTensor: Tools for Tensor Analysis and Decomposition","author":"Li James","year":"2015","unstructured":"James Li, Jacob Bien, and Martin Wells. 2015. rTensor: Tools for Tensor Analysis and Decomposition. R package version 1.3.https:\/\/cran.r-project.org\/src\/contrib\/Archive\/rTensor\/rTensor_1.3.tar.gz."},{"key":"e_1_3_3_67_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICGSE.2017.11"},{"key":"e_1_3_3_68_2","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12113"},{"key":"e_1_3_3_69_2","doi-asserted-by":"publisher","DOI":"10.1111\/j.1466-8238.2007.00358.x"},{"key":"e_1_3_3_70_2","doi-asserted-by":"publisher","DOI":"10.4018\/jitwe.2006070103"},{"key":"e_1_3_3_71_2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511894701"},{"key":"e_1_3_3_72_2","doi-asserted-by":"publisher","DOI":"10.1145\/3478431.3499367"},{"key":"e_1_3_3_73_2","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409707"},{"key":"e_1_3_3_74_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3082074"},{"key":"e_1_3_3_75_2","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985832"},{"key":"e_1_3_3_76_2","doi-asserted-by":"publisher","DOI":"10.5555\/2034117.2034146"},{"key":"e_1_3_3_77_2","doi-asserted-by":"publisher","DOI":"10.1145\/567793.567795"},{"key":"e_1_3_3_78_2","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368160"},{"key":"e_1_3_3_79_2","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1060.0623"},{"key":"e_1_3_3_80_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33284-5_8"},{"key":"e_1_3_3_81_2","doi-asserted-by":"publisher","DOI":"10.5465\/amj.2007.27169153"},{"key":"e_1_3_3_82_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110847"},{"key":"e_1_3_3_83_2","doi-asserted-by":"publisher","DOI":"10.1145\/361598.361623"},{"key":"e_1_3_3_84_2","doi-asserted-by":"publisher","DOI":"10.1145\/1370114.1370135"},{"key":"e_1_3_3_85_2","doi-asserted-by":"publisher","DOI":"10.1177\/1094428113517007"},{"key":"e_1_3_3_86_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00088"},{"key":"e_1_3_3_87_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2018.11.015"},{"key":"e_1_3_3_88_2","volume-title":"R: A Language and Environment for Statistical Computing","author":"Team R Core","year":"2017","unstructured":"R Core Team. 2017. R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing. http:\/\/www.R-project.org\/."},{"issue":"77","key":"e_1_3_3_89_2","first-page":"1","article-title":"pROC: An open-source package for R and S+ to analyze and compare ROC curves","volume":"12","author":"Robin Xavier","year":"2011","unstructured":"Xavier Robin, Natacha Turck, Alexandre Hainard, Natalia Tiberti, Fr\u00e9d\u00e9rique Lisacek, Jean-Charles Sanchez, and Markus M\u00fcller. 2011. pROC: An open-source package for R and S+ to analyze and compare ROC curves. BMC Bioinf. 12, 77 (2011), 1\u20138.","journal-title":"BMC Bioinf."},{"key":"e_1_3_3_90_2","doi-asserted-by":"publisher","DOI":"10.2307\/2685263"},{"key":"e_1_3_3_91_2","doi-asserted-by":"publisher","DOI":"10.1080\/01605682.2021.1892460"},{"key":"e_1_3_3_92_2","first-page":"209","volume-title":"Dynamic Social Network Modeling and Analysis: Workshop Summary and Papers","author":"Seary Andrew J.","year":"2003","unstructured":"Andrew J. Seary and William D. Richards. 2003. Spectral methods for analyzing and visualizing networks: An introduction. In Dynamic Social Network Modeling and Analysis: Workshop Summary and Papers. National Academy of Science, 209\u2013228."},{"key":"e_1_3_3_93_2","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1100.0311"},{"key":"e_1_3_3_94_2","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2017.37"},{"key":"e_1_3_3_95_2","doi-asserted-by":"publisher","DOI":"10.1145\/1102351.1102451"},{"key":"e_1_3_3_96_2","doi-asserted-by":"publisher","DOI":"10.5555\/1881958.1881969"},{"key":"e_1_3_3_97_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28320-8_9"},{"key":"e_1_3_3_98_2","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2018.110162131"},{"key":"e_1_3_3_99_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2584053"},{"issue":"10","key":"e_1_3_3_100_2","first-page":"1","article-title":"Social debt in software engineering: Insights from industry","volume":"6","author":"Tamburri Damian A.","year":"2015","unstructured":"Damian A. Tamburri, Philippe Kruchten, Patricia Lago, and Hans van Vliet. 2015. Social debt in software engineering: Insights from industry. J. Internet Serv. Applic. 6, 10 (2015), 1\u201317.","journal-title":"J. Internet Serv. Applic."},{"key":"e_1_3_3_101_2","doi-asserted-by":"publisher","DOI":"10.1145\/2522968.2522971"},{"key":"e_1_3_3_102_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-018-9659-9"},{"key":"e_1_3_3_103_2","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380920"},{"key":"e_1_3_3_104_2","doi-asserted-by":"publisher","DOI":"10.1109\/SBES.2010.26"},{"key":"e_1_3_3_105_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2009.10.007"},{"key":"e_1_3_3_106_2","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597093"},{"key":"e_1_3_3_107_2","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2017.8081290"},{"key":"e_1_3_3_108_2","doi-asserted-by":"publisher","DOI":"10.1145\/2639490.2639505"},{"key":"e_1_3_3_109_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2016.13"},{"key":"e_1_3_3_110_2","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.2020.1409"},{"key":"e_1_3_3_111_2","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568238"},{"key":"e_1_3_3_112_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-014-0789-0"},{"key":"e_1_3_3_113_2","doi-asserted-by":"publisher","DOI":"10.1145\/2024445.2024459"},{"key":"e_1_3_3_114_2","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106287"},{"key":"e_1_3_3_115_2","volume-title":"Recall, Precision and Average Precision","author":"Zhu Mu","year":"2004","unstructured":"Mu Zhu. 2004. Recall, Precision and Average Precision. Technical Report. University of Waterloo, Waterloo, Canada."},{"key":"e_1_3_3_116_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.72"}],"container-title":["ACM Transactions on Software Engineering and Methodology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3473139","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3473139","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:11:58Z","timestamp":1750191118000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3473139"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,17]]},"references-count":115,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,4,30]]}},"alternative-id":["10.1145\/3473139"],"URL":"https:\/\/doi.org\/10.1145\/3473139","relation":{},"ISSN":["1049-331X","1557-7392"],"issn-type":[{"type":"print","value":"1049-331X"},{"type":"electronic","value":"1557-7392"}],"subject":[],"published":{"date-parts":[[2021,11,17]]},"assertion":[{"value":"2020-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-06-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-11-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}