{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T17:25:21Z","timestamp":1777137921888,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T00:00:00Z","timestamp":1663545600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Hubei Provincial Natural Science Foundation of China","award":["2021CFB577"],"award-info":[{"award-number":["2021CFB577"]}]},{"name":"The Special Fund of Hubei Luojia Laboratory"},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172311"],"award-info":[{"award-number":["62172311"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NZ SfTI National Science Challenge Grant","award":["MAUX2004"],"award-info":[{"award-number":["MAUX2004"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,9,19]]},"DOI":"10.1145\/3544902.3546253","type":"proceedings-article","created":{"date-parts":[[2022,9,7]],"date-time":"2022-09-07T04:07:45Z","timestamp":1662523665000},"page":"216-226","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Potential Technical Debt and Its Resolution in Code Reviews: An Exploratory Study of the OpenStack and Qt Communities"],"prefix":"10.1145","author":[{"given":"Liming","family":"Fu","sequence":"first","affiliation":[{"name":"School of Computer Science, Wuhan University, China and Hubei Luojia Laboratory, China"}]},{"given":"Peng","family":"Liang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Wuhan University, China and Hubei Luojia Laboratory, China"}]},{"given":"Zeeshan","family":"Rasheed","sequence":"additional","affiliation":[{"name":"School of Computer Science, Wuhan University, China and Hubei Luojia Laboratory, China"}]},{"given":"Zengyang","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science &amp; Hubei Provincial Key Laboratory of Artificial Intelligence and Smart Learning, Central China Normal University, China"}]},{"given":"Amjed","family":"Tahir","sequence":"additional","affiliation":[{"name":"School of Mathematical and Computational Sciences, Massey University, New Zealand"}]},{"given":"Xiaofeng","family":"Han","sequence":"additional","affiliation":[{"name":"Wuhan University, China and Hubei Luojia Laboratory, China"}]}],"member":"320","published-online":{"date-parts":[[2022,9,19]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"The Goal Question Metric Approach. Encyclopedia of Software Engineering(1994), 528\u2013532","author":"Basili R.","unstructured":"Victor\u00a0 R. Basili , Gianluigi Caldiera , and H.\u00a0 D. Rombach . 1994. The Goal Question Metric Approach. Encyclopedia of Software Engineering(1994), 528\u2013532 . Victor\u00a0R. Basili, Gianluigi Caldiera, and H.\u00a0D. Rombach. 1994. The Goal Question Metric Approach. Encyclopedia of Software Engineering(1994), 528\u2013532."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2013.6671287"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1177\/001316446002000104"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/157710.157715"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2017.13"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TechDebt.2019.00026"},{"key":"e_1_3_2_1_7_1","unstructured":"Martin Fowler. 2009. Technical Debt Quadrant. https:\/\/martinfowler.com\/bliki\/TechnicalDebtQuadrant.html  Martin Fowler. 2009. Technical Debt Quadrant. https:\/\/martinfowler.com\/bliki\/TechnicalDebtQuadrant.html"},{"key":"e_1_3_2_1_8_1","volume-title":"Refactoring: Improving the Design of Existing Code","author":"Fowler Martin","year":"2018","unstructured":"Martin Fowler . 2018 . Refactoring: Improving the Design of Existing Code . Addison-Wesley Professional . Martin Fowler. 2018. Refactoring: Improving the Design of Existing Code. Addison-Wesley Professional."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3383219.3383241"},{"key":"#cr-split#-e_1_3_2_1_10_1.1","unstructured":"Liming Fu Peng Liang Zeeshan Rasheed Zengyang Li Amjed Tahir and Xiaofeng Han. 2022. Replication Package for the Paper: \"Understanding Potential Technical Debt and Its Resolution in Code Reviews : An Exploratory Study of the OpenStack and Qt Communities\". https:\/\/doi.org\/10.5281\/zenodo.6513444 10.5281\/zenodo.6513444"},{"key":"#cr-split#-e_1_3_2_1_10_1.2","unstructured":"Liming Fu Peng Liang Zeeshan Rasheed Zengyang Li Amjed Tahir and Xiaofeng Han. 2022. Replication Package for the Paper: \"Understanding Potential Technical Debt and Its Resolution in Code Reviews : An Exploratory Study of the OpenStack and Qt Communities\". https:\/\/doi.org\/10.5281\/zenodo.6513444"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.2307\/798843"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/2487085.2487096"},{"key":"e_1_3_2_1_13_1","unstructured":"Xiaofeng Han Amjed Tahir Peng Liang Steve Counsell Kelly Blincoe Bing Li and Yajing Luo. 2022. Code Smells Detection via Modern Code Review: A Study of the OpenStack and Qt Communities. Empirical Software Engineering(2022).  Xiaofeng Han Amjed Tahir Peng Liang Steve Counsell Kelly Blincoe Bing Li and Yajing Luo. 2022. Code Smells Detection via Modern Code Review: A Study of the OpenStack and Qt Communities. Empirical Software Engineering(2022)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC52881.2021.00038"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.2977907"},{"key":"e_1_3_2_1_16_1","volume-title":"Determining Sample Size. Fact Sheet PEOD-6. Florida Cooperative Extension Service","author":"Israel D.","unstructured":"Glenn\u00a0 D. Israel . 1992. Determining Sample Size. Fact Sheet PEOD-6. Florida Cooperative Extension Service , Institute of Food and Agricultural Sciences , University of Florida, Florida, U.S.A. Glenn\u00a0D. Israel. 1992. Determining Sample Size. Fact Sheet PEOD-6. Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida, Florida, U.S.A."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2022.106855"},{"key":"e_1_3_2_1_18_1","first-page":"223","article-title":"Importance of Software Documentation","volume":"10","author":"Kipyegen J.","year":"2013","unstructured":"Noela\u00a0 J. Kipyegen and William P.\u00a0K. Korir . 2013 . Importance of Software Documentation . International Journal of Computer Science Issues (IJCSI) 10 , 5(2013), 223 \u2013 228 . Noela\u00a0J. Kipyegen and William P.\u00a0K. Korir. 2013. Importance of Software Documentation. International Journal of Computer Science Issues (IJCSI) 10, 5(2013), 223\u2013228.","journal-title":"International Journal of Computer Science Issues (IJCSI)"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ms.2012.167"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP52600.2021.00021"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEAA51224.2020.00083"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2014.12.027"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME46990.2020.00065"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377815.3381377"},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the 7th IEEE International Workshop on Managing Technical Debt (MTD). IEEE, 9\u201315","author":"Everton","unstructured":"Everton da\u00a0S. Maldonado and Emad Shihab. 2015. Detecting and Quantifying Different Types of Self-Admitted Technical Debt . In Proceedings of the 7th IEEE International Workshop on Managing Technical Debt (MTD). IEEE, 9\u201315 . Everton da\u00a0S. Maldonado and Emad Shihab. 2015. Detecting and Quantifying Different Types of Self-Admitted Technical Debt. In Proceedings of the 7th IEEE International Workshop on Managing Technical Debt (MTD). IEEE, 9\u201315."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9381-9"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2975945.2975947"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387906.3388632"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.31"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9102-8"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MTD.2013.6608681"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the 12th Brazilian Symposium on Information Systems (SBSI). ACM, 248\u2013254","author":"Campos\u00a0Oliveira Silva Marcelino","year":"2016","unstructured":"Marcelino Campos\u00a0Oliveira Silva , Marco\u00a0Tulio Valente , and Ricardo Terra . 2016 . Does Technical Debt Lead to the Rejection of Pull Requests? . In Proceedings of the 12th Brazilian Symposium on Information Systems (SBSI). ACM, 248\u2013254 . Marcelino Campos\u00a0Oliveira Silva, Marco\u00a0Tulio Valente, and Ricardo Terra. 2016. Does Technical Debt Lead to the Rejection of Pull Requests?. In Proceedings of the 12th Brazilian Symposium on Information Systems (SBSI). ACM, 248\u2013254."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME52107.2021.00029"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-020-09910-y"},{"key":"e_1_3_2_1_35_1","volume-title":"Peer Reviews in Software: A Practical Guide","author":"Wiegers Karl\u00a0Eugene","unstructured":"Karl\u00a0Eugene Wiegers . 2002. Peer Reviews in Software: A Practical Guide . Addison-Wesley Boston . Karl\u00a0Eugene Wiegers. 2002. Peer Reviews in Software: A Practical Guide. Addison-Wesley Boston."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3239235.3239525"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985362.1985366"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2460999.2461005"}],"event":{"name":"ESEM '22: ACM \/ IEEE International Symposium on Empirical Software Engineering and Measurement","location":"Helsinki Finland","acronym":"ESEM '22","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 16th ACM \/ IEEE International Symposium on Empirical Software Engineering and Measurement"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544902.3546253","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544902.3546253","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:01Z","timestamp":1750186801000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544902.3546253"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,19]]},"references-count":39,"alternative-id":["10.1145\/3544902.3546253","10.1145\/3544902"],"URL":"https:\/\/doi.org\/10.1145\/3544902.3546253","relation":{},"subject":[],"published":{"date-parts":[[2022,9,19]]},"assertion":[{"value":"2022-09-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}