{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T04:26:26Z","timestamp":1760502386524,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T00:00:00Z","timestamp":1663545600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002322","name":"Coordena\u00e7\u00e3o de Aperfei\u00e7oamento de Pessoal de N\u00edvel Superior","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,9,19]]},"DOI":"10.1145\/3544902.3546256","type":"proceedings-article","created":{"date-parts":[[2022,9,7]],"date-time":"2022-09-07T04:07:45Z","timestamp":1662523665000},"page":"57-68","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Bayesian Analysis of Bug-Fixing Time using Report Data"],"prefix":"10.1145","author":[{"given":"Renan","family":"Vieira","sequence":"first","affiliation":[{"name":"Federal University of Cear\u00e1, Brazil"}]},{"given":"Diego","family":"Mesquita","sequence":"additional","affiliation":[{"name":"Getulio Vargas Foundation, Brazil"}]},{"given":"C\u00e9sar Lincoln","family":"Mattos","sequence":"additional","affiliation":[{"name":"Federal University of Cear\u00e1, Brazil"}]},{"given":"Ricardo","family":"Britto","sequence":"additional","affiliation":[{"name":"Ericsson \/ Blekinge Institute of Technology, Sweden"}]},{"given":"Lincoln","family":"Rocha","sequence":"additional","affiliation":[{"name":"Federal University of Cear\u00e1, Brazil"}]},{"given":"Jo\u00e3o","family":"Gomes","sequence":"additional","affiliation":[{"name":"Federal University of Cear\u00e1, Brazil"}]}],"member":"320","published-online":{"date-parts":[[2022,9,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.02.021"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3127005.3127011"},{"key":"e_1_3_2_1_3_1","volume-title":"Understanding and Characterizing Changes in Bugs Priority: The Practitioners\u2019 Perceptive. In 2020 IEEE 20th International Working Conference on Source Code Analysis and Manipulation (SCAM). 87\u201397","author":"Almhana Rafi","year":"2020","unstructured":"Rafi Almhana , Thiago Ferreira , Marouane Kessentini , and Tushar Sharma . 2020 . Understanding and Characterizing Changes in Bugs Priority: The Practitioners\u2019 Perceptive. In 2020 IEEE 20th International Working Conference on Source Code Analysis and Manipulation (SCAM). 87\u201397 . https:\/\/doi.org\/10.1109\/SCAM51674.2020.00015 10.1109\/SCAM51674.2020.00015 Rafi Almhana, Thiago Ferreira, Marouane Kessentini, and Tushar Sharma. 2020. Understanding and Characterizing Changes in Bugs Priority: The Practitioners\u2019 Perceptive. In 2020 IEEE 20th International Working Conference on Source Code Analysis and Manipulation (SCAM). 87\u201397. https:\/\/doi.org\/10.1109\/SCAM51674.2020.00015"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486957"},{"key":"e_1_3_2_1_5_1","volume-title":"Analyzing Networks of Issue Reports. In 2013 17th European Conference on Software Maintenance and Reengineering. 79\u201388","author":"Borg M.","year":"2013","unstructured":"M. Borg , D. Pfahl , and P. Runeson . 2013 . Analyzing Networks of Issue Reports. In 2013 17th European Conference on Software Maintenance and Reengineering. 79\u201388 . https:\/\/doi.org\/10.1109\/CSMR. 2013 .18 10.1109\/CSMR.2013.18 M. Borg, D. Pfahl, and P. Runeson. 2013. Analyzing Networks of Issue Reports. In 2013 17th European Conference on Software Maintenance and Reengineering. 79\u201388. https:\/\/doi.org\/10.1109\/CSMR.2013.18"},{"key":"e_1_3_2_1_6_1","volume-title":"Cambridge University report on cost of software faults","author":"Brady Fiorenza","year":"2013","unstructured":"Fiorenza Brady . 2013. Cambridge University report on cost of software faults , Press release, 2013 . http:\/\/www.prweb.com\/releases\/2013\/1\/prweb10298185.htm). Accessed : 2020-01-02. Fiorenza Brady. 2013. Cambridge University report on cost of software faults, Press release, 2013. http:\/\/www.prweb.com\/releases\/2013\/1\/prweb10298185.htm). Accessed: 2020-01-02."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.03.002"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.07.002"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2019.05.007"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2935974"},{"key":"e_1_3_2_1_11_1","first-page":"1786","article-title":"Bayesian Data Analysis in Empirical Software Engineering Research","volume":"47","author":"Furia A.","year":"2021","unstructured":"Carlo\u00a0 A. Furia , Robert Feldt , and Richard Torkar . 2021 . Bayesian Data Analysis in Empirical Software Engineering Research . IEEE Transactions on Software Engineering 47 , 9 (2021), 1786 \u2013 1810 . https:\/\/doi.org\/10.1109\/TSE.2019.2935974 10.1109\/TSE.2019.2935974 Carlo\u00a0A. Furia, Robert Feldt, and Richard Torkar. 2021. Bayesian Data Analysis in Empirical Software Engineering Research. IEEE Transactions on Software Engineering 47, 9 (2021), 1786\u20131810. https:\/\/doi.org\/10.1109\/TSE.2019.2935974","journal-title":"IEEE Transactions on Software Engineering"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3490953"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"A. Gelman J.B. Carlin H.S. Stern D.B. Dunson A. Vehtari and D.B. Rubin. 2013. Bayesian Data Analysis Third Edition. Taylor & Francis. https:\/\/books.google.com.br\/books?id=ZXL6AQAAQBAJ  A. Gelman J.B. Carlin H.S. Stern D.B. Dunson A. Vehtari and D.B. Rubin. 2013. Bayesian Data Analysis Third Edition. Taylor & Francis. https:\/\/books.google.com.br\/books?id=ZXL6AQAAQBAJ","DOI":"10.1201\/b16018"},{"key":"e_1_3_2_1_14_1","unstructured":"Andrew Gelman Aki Vehtari Daniel Simpson Charles\u00a0C. Margossian Bob Carpenter Yuling Yao Lauren Kennedy Jonah Gabry Paul-Christian B\u00fcrkner and Martin Modr\u00e1k. 2020. Bayesian Workflow. arxiv:2011.01808\u00a0[stat.ME]  Andrew Gelman Aki Vehtari Daniel Simpson Charles\u00a0C. Margossian Bob Carpenter Yuling Yao Lauren Kennedy Jonah Gabry Paul-Christian B\u00fcrkner and Martin Modr\u00e1k. 2020. Bayesian Workflow. arxiv:2011.01808\u00a0[stat.ME]"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1958824.1958887"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2757480"},{"key":"e_1_3_2_1_17_1","volume-title":"Choosing between methods of combining p-values. Biometrika 105, 1 (01","author":"Heard N\u00a0A","year":"2018","unstructured":"N\u00a0A Heard and P Rubin-Delanchy . 2018. Choosing between methods of combining p-values. Biometrika 105, 1 (01 2018 ), 239\u2013246. https:\/\/doi.org\/10.1093\/biomet\/asx076 arXiv:https:\/\/academic.oup.com\/biomet\/article-pdf\/105\/1\/239\/23884003\/asx076.pdf 10.1093\/biomet N\u00a0A Heard and P Rubin-Delanchy. 2018. Choosing between methods of combining p-values. Biometrika 105, 1 (01 2018), 239\u2013246. https:\/\/doi.org\/10.1093\/biomet\/asx076 arXiv:https:\/\/academic.oup.com\/biomet\/article-pdf\/105\/1\/239\/23884003\/asx076.pdf"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606585"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321639"},{"volume-title":"Doing Bayesian Data Analysis","author":"Kruschke John","key":"e_1_3_2_1_20_1","unstructured":"John Kruschke . 2015. Doing Bayesian Data Analysis ( Second Edition). Academic Press , Boston . John Kruschke. 2015. Doing Bayesian Data Analysis (Second Edition). Academic Press, Boston."},{"key":"#cr-split#-e_1_3_2_1_21_1.1","doi-asserted-by":"crossref","unstructured":"Madhu Kumari Ananya Misra Sanjay Misra Luis Fernandez\u00a0Sanz Robertas Damasevicius and V.B. Singh. 2019. Quantitative Quality Evaluation of Software Products by Considering Summary and Comments Entropy of a Reported Bug. Entropy 21 1 (2019). https:\/\/doi.org\/10.3390\/e21010091 10.3390\/e21010091","DOI":"10.3390\/e21010091"},{"key":"#cr-split#-e_1_3_2_1_21_1.2","doi-asserted-by":"crossref","unstructured":"Madhu Kumari Ananya Misra Sanjay Misra Luis Fernandez\u00a0Sanz Robertas Damasevicius and V.B. Singh. 2019. Quantitative Quality Evaluation of Software Products by Considering Summary and Comments Entropy of a Reported Bug. Entropy 21 1 (2019). https:\/\/doi.org\/10.3390\/e21010091","DOI":"10.3390\/e21010091"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597088"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1201\/9780429029608"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062514"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC52881.2021.00014"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR-WCRE.2014.6747164"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2016.28"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2005.32"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.81"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2014.12.049"},{"key":"e_1_3_2_1_31_1","volume-title":"The significance of bug report elements. Empirical Software Engineering 25, 6 (01","author":"Soltani Mozhan","year":"2020","unstructured":"Mozhan Soltani , Felienne Hermans , and Thomas B\u00e4ck . 2020. The significance of bug report elements. Empirical Software Engineering 25, 6 (01 Nov 2020 ), 5255\u20135294. https:\/\/doi.org\/10.1007\/s10664-020-09882-z 10.1007\/s10664-020-09882-z Mozhan Soltani, Felienne Hermans, and Thomas B\u00e4ck. 2020. The significance of bug report elements. Empirical Software Engineering 25, 6 (01 Nov 2020), 5255\u20135294. https:\/\/doi.org\/10.1007\/s10664-020-09882-z"},{"key":"e_1_3_2_1_32_1","volume-title":"How Software Developers Use Work Breakdown Relationships in Issue Repositories. In 2016 IEEE\/ACM 13th Working Conference on Mining Software Repositories (MSR). 281\u2013285","author":"Thompson Albert","year":"2016","unstructured":"C.\u00a0 Albert Thompson , Gail\u00a0 C. Murphy , Marc Palyart , and Marko Ga\u0161paric . 2016 . How Software Developers Use Work Breakdown Relationships in Issue Repositories. In 2016 IEEE\/ACM 13th Working Conference on Mining Software Repositories (MSR). 281\u2013285 . C.\u00a0Albert Thompson, Gail\u00a0C. Murphy, Marc Palyart, and Marko Ga\u0161paric. 2016. How Software Developers Use Work Breakdown Relationships in Issue Repositories. In 2016 IEEE\/ACM 13th Working Conference on Mining Software Repositories (MSR). 281\u2013285."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-014-9331-y"},{"volume-title":"Poster: Use of Trace Link Types in Issue Tracking Systems. In 2018 IEEE\/ACM 40th International Conference on Software Engineering: Companion (ICSE-Companion). 181\u2013182","author":"Tomova T.","key":"e_1_3_2_1_34_1","unstructured":"M.\u00a0 T. Tomova , M. Rath , and P. M\u00e4der . 2018 . Poster: Use of Trace Link Types in Issue Tracking Systems. In 2018 IEEE\/ACM 40th International Conference on Software Engineering: Companion (ICSE-Companion). 181\u2013182 . M.\u00a0T. Tomova, M. Rath, and P. M\u00e4der. 2018. Poster: Use of Trace Link Types in Issue Tracking Systems. In 2018 IEEE\/ACM 40th International Conference on Software Engineering: Companion (ICSE-Companion). 181\u2013182."},{"key":"e_1_3_2_1_35_1","volume-title":"Lucas Gren, Per Lenberg, and Neil\u00a0A. Ernst.","author":"Torkar Richard","year":"2021","unstructured":"Richard Torkar , Carlo\u00a0Alberto Furia , Robert Feldt , Francisco Gomes\u00a0de Oliveira\u00a0Neto , Lucas Gren, Per Lenberg, and Neil\u00a0A. Ernst. 2021 . A Method to Assess and Argue for Practical Significance in Software Engineering. IEEE Transactions on Software Engineering( 2021), 1\u20131. https:\/\/doi.org\/10.1109\/TSE.2020.3048991 10.1109\/TSE.2020.3048991 Richard Torkar, Carlo\u00a0Alberto Furia, Robert Feldt, Francisco Gomes\u00a0de Oliveira\u00a0Neto, Lucas Gren, Per Lenberg, and Neil\u00a0A. Ernst. 2021. A Method to Assess and Argue for Practical Significance in Software Engineering. IEEE Transactions on Software Engineering(2021), 1\u20131. https:\/\/doi.org\/10.1109\/TSE.2020.3048991"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-016-9478-6"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2019.2959624"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2850910"},{"key":"e_1_3_2_1_39_1","volume-title":"Multiple Perspectives on Inference for Two Simple Statistical Scenarios. The American Statistician 73, sup1","author":"van Dongen Noah","year":"2019","unstructured":"Noah N.\u00a0N. van Dongen , Johnny\u00a0 B. van Doorn , Quentin\u00a0 F. Gronau , Don van Ravenzwaaij , Rink Hoekstra , Matthias\u00a0 N. Haucke , Daniel Lakens , Christian Hennig , Richard\u00a0 D. Morey , Saskia Homer , Andrew Gelman , Jan Sprenger , and Eric-Jan Wagenmakers . 2019. Multiple Perspectives on Inference for Two Simple Statistical Scenarios. The American Statistician 73, sup1 ( 2019 ), 328\u2013339. https:\/\/doi.org\/10.1080\/00031305.2019.1565553 arXiv:https:\/\/doi.org\/10.1080\/00031305.2019.1565553 10.1080\/00031305.2019.1565553 Noah N.\u00a0N. van Dongen, Johnny\u00a0B. van Doorn, Quentin\u00a0F. Gronau, Don van Ravenzwaaij, Rink Hoekstra, Matthias\u00a0N. Haucke, Daniel Lakens, Christian Hennig, Richard\u00a0D. Morey, Saskia Homer, Andrew Gelman, Jan Sprenger, and Eric-Jan Wagenmakers. 2019. Multiple Perspectives on Inference for Two Simple Statistical Scenarios. The American Statistician 73, sup1 (2019), 328\u2013339. https:\/\/doi.org\/10.1080\/00031305.2019.1565553 arXiv:https:\/\/doi.org\/10.1080\/00031305.2019.1565553"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3345629.3345639"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2007.13"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-4625-2"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2576454"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606654"},{"key":"e_1_3_2_1_45_1","unstructured":"Jie Zhou Ganqu Cui Zhengyan Zhang Cheng Yang Zhiyuan Liu and Maosong Sun. 2018. Graph Neural Networks: A Review of Methods and Applications. CoRR abs\/1812.08434(2018). arXiv:1812.08434http:\/\/arxiv.org\/abs\/1812.08434  Jie Zhou Ganqu Cui Zhengyan Zhang Cheng Yang Zhiyuan Liu and Maosong Sun. 2018. Graph Neural Networks: A Review of Methods and Applications. CoRR abs\/1812.08434(2018). arXiv:1812.08434http:\/\/arxiv.org\/abs\/1812.08434"},{"key":"#cr-split#-e_1_3_2_1_46_1.1","doi-asserted-by":"crossref","unstructured":"T. Zimmermann R. Premraj N. Bettenburg S. Just A. Schroter and C. Weiss. 2010. What Makes a Good Bug Report?IEEE Transactions on Software Engineering 36 5 (Sep. 2010) 618-643. https:\/\/doi.org\/10.1109\/TSE.2010.63 10.1109\/TSE.2010.63","DOI":"10.1109\/TSE.2010.63"},{"key":"#cr-split#-e_1_3_2_1_46_1.2","doi-asserted-by":"crossref","unstructured":"T. Zimmermann R. Premraj N. Bettenburg S. Just A. Schroter and C. Weiss. 2010. What Makes a Good Bug Report?IEEE Transactions on Software Engineering 36 5 (Sep. 2010) 618-643. https:\/\/doi.org\/10.1109\/TSE.2010.63","DOI":"10.1109\/TSE.2010.63"}],"event":{"name":"ESEM '22: ACM \/ IEEE International Symposium on Empirical Software Engineering and Measurement","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Helsinki Finland","acronym":"ESEM '22"},"container-title":["Proceedings of the 16th ACM \/ IEEE International Symposium on Empirical Software Engineering and Measurement"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544902.3546256","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544902.3546256","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:01Z","timestamp":1750186801000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544902.3546256"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,19]]},"references-count":48,"alternative-id":["10.1145\/3544902.3546256","10.1145\/3544902"],"URL":"https:\/\/doi.org\/10.1145\/3544902.3546256","relation":{},"subject":[],"published":{"date-parts":[[2022,9,19]]},"assertion":[{"value":"2022-09-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}