{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T06:30:13Z","timestamp":1772519413762,"version":"3.50.1"},"reference-count":133,"publisher":"Association for Computing Machinery (ACM)","issue":"6","license":[{"start":{"date-parts":[[2023,9,30]],"date-time":"2023-09-30T00:00:00Z","timestamp":1696032000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Softw. Eng. Methodol."],"published-print":{"date-parts":[[2023,11,30]]},"abstract":"<jats:p>\n            Upon receiving a new issue report, practitioners start by investigating the defect type, the potential fixing effort needed to resolve the defect and the change impact. Moreover, issue reports contain valuable information, such as, the title, description and severity, and researchers leverage the topics of issue reports as a collective metric portraying similar characteristics of a defect. Nonetheless, none of the existing studies leverage the defect topic, i.e., a semantic cluster of defects of the same nature, such as\n            <jats:italic>Performance, GUI, and Database<\/jats:italic>\n            , to estimate the change impact that represents the amount of change needed in terms of code churn and the number of files changed. To this end, in this article, we conduct an empirical study on 298,548 issue reports belonging to three large-scale open-source systems, i.e., Mozilla, Apache, and Eclipse, to estimate the change impact in terms of code churn or the number of files changed while leveraging the topics of issue reports. First, we adopt the Embedded Topic Model (ETM), a state-of-the-art topic modelling algorithm, to identify the topics. Second, we investigate the feasibility of predicting the change impact using the identified topics and other information extracted from the issue reports by building eight prediction models that classify issue reports requiring small or large change impact along two dimensions, i.e., the code churn size and the number of files changed. Our results suggest that XGBoost is the best-performing algorithm for predicting the change impact, with an AUC of 0.84, 0.76, and 0.73 for the code churn and 0.82, 0.71, and 0.73 for the number of files changed metric for Mozilla, Apache, and Eclipse, respectively. Our results also demonstrate that the topics of issue reports improve the recall of the prediction model by up to 45%.\n          <\/jats:p>","DOI":"10.1145\/3593802","type":"journal-article","created":{"date-parts":[[2023,4,24]],"date-time":"2023-04-24T12:13:13Z","timestamp":1682338393000},"page":"1-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Predicting the Change Impact of Resolving Defects by Leveraging the Topics of Issue Reports in Open Source Software Systems"],"prefix":"10.1145","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1274-7550","authenticated-orcid":false,"given":"Maram","family":"Assi","sequence":"first","affiliation":[{"name":"Queen\u2019s University"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7090-0475","authenticated-orcid":false,"given":"Safwat","family":"Hassan","sequence":"additional","affiliation":[{"name":"University of Toronto"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3508-3163","authenticated-orcid":false,"given":"Stefanos","family":"Georgiou","sequence":"additional","affiliation":[{"name":"Queen\u2019s University"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5335-0261","authenticated-orcid":false,"given":"Ying","family":"Zou","sequence":"additional","affiliation":[{"name":"Queen\u2019s University"}]}],"member":"320","published-online":{"date-parts":[[2023,9,30]]},"reference":[{"key":"e_1_3_2_2_2","unstructured":"[n.d.]. Cambridge University Study States Software Bugs Cost Economy $312 Billion Per Year. Retrieved October 18 2022 from https:\/\/www.prweb.com\/releases\/2013\/1\/prweb10298185.htm\/."},{"key":"e_1_3_2_3_2","unstructured":"[n.d.]. This is what your developers are doing 75% of the time and this is the cost you pay. Retrieved June 17 2021 from https:\/\/coralogix.com\/log-analytics-blog\/this-is-what-your-developers-are-doing-75-of-the-time-and-this-is-the-cost-you-pay\/."},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22191-0_33"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3069248"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/3178315.3178326"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.11.009"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134336"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/3102254.3102275"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/EAIS48028.2020.9122781"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-021-09988-y"},{"key":"e_1_3_2_12_2","first-page":"1137","article-title":"A neural probabilistic language model","volume":"3","author":"Bengio Yoshua","year":"2003","unstructured":"Yoshua Bengio, R\u00e9jean Ducharme, Pascal Vincent, and Christian Janvin. 2003. A neural probabilistic language model. J. Mach. Learn. Res. 3, null (mar2003), 1137\u20131155.","journal-title":"J. Mach. Learn. Res."},{"key":"e_1_3_2_13_2","first-page":"281","article-title":"Random search for hyper-parameter optimization","volume":"13","author":"Bergstra James","year":"2012","unstructured":"James Bergstra and Yoshua Bengio. 2012. Random search for hyper-parameter optimization. J. Mach. Learn. Res. 13, null (feb2012), 281\u2013305.","journal-title":"J. Mach. Learn. Res."},{"key":"e_1_3_2_14_2","first-page":"493","volume-title":"Proceedings of the 13th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201918)","author":"Bhagwan Ranjita","year":"2018","unstructured":"Ranjita Bhagwan, Rahul Kumar, Chandra Sekhar Maddila, and Adithya Abraham Philip. 2018. Orca: Differential bug localization in large-scale services. In Proceedings of the 13th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201918). USENIX Association, USA, 493\u2013509."},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985472"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.3115\/1219044.1219075"},{"key":"e_1_3_2_17_2","first-page":"993","article-title":"Latent dirichlet allocation","volume":"3","author":"Blei David M.","year":"2003","unstructured":"David M. Blei, Andrew Y. Ng, and Michael I. Jordan. 2003. Latent dirichlet allocation. J. Mach. Learn. Res. 3, null (mar2003), 993\u20131022.","journal-title":"J. Mach. Learn. Res."},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.5555\/1795822"},{"key":"e_1_3_2_19_2","volume-title":"Software Change Impact Analysis\/Shawn A. Bohner, Robert S. Arnold","author":"Shawn Arnold Robert S. Bohner,","year":"1996","unstructured":"Arnold Robert S. Bohner, Shawn. 1996. Software Change Impact Analysis\/Shawn A. Bohner, Robert S. Arnold. IEEE Computer Society Pres, Los Alamitos, CA."},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970352"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351752"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606604"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.03.002"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-020-09845-4"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3071473"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9402-8"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.5555\/2664446.2664476"},{"key":"e_1_3_2_28_2","doi-asserted-by":"crossref","unstructured":"Agnieszka Ciborowska Aleksandar Chakarov and Rahul Pandita. 2021. Contemporary COBOL: Developers\u2019 Perspectives on Defects and Defect Location. (2021). arxiv:2105.01830. Retrieved from https:\/\/arxiv.org\/abs\/2105.01830.","DOI":"10.1109\/ICSME52107.2021.00027"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3379597.3387487"},{"key":"e_1_3_2_30_2","unstructured":"Jacob Devlin Ming-Wei Chang Kenton Lee and Kristina Toutanova. 2018. BERT: Pre-training of deep bidirectional transformers for language understanding. (2018). arXiv:1810.04805 Retrieved from http:\/\/arxiv.org\/abs\/1810.04805."},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00325"},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-014-9304-1"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.04.066"},{"key":"e_1_3_2_34_2","first-page":"151","volume-title":"Is Late Propagation a Harmful Code Clone Evolutionary Pattern? An Empirical Study","author":"Ehsan Osama","year":"2021","unstructured":"Osama Ehsan, Lillane Barbour, Foutse Khomh, and Ying Zou. 2021. Is Late Propagation a Harmful Code Clone Evolutionary Pattern? An Empirical Study. Springer Singapore, Singapore, 151\u2013167."},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/3379597.3387456"},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100120"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/1808920.1808933"},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19721-5"},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1751"},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-1036"},{"key":"e_1_3_2_41_2","article-title":"Topic modelling of empirical text corpora: Validity, reliability, and reproducibility in comparison to semantic maps","volume":"1806","author":"Hecking Tobias","year":"2018","unstructured":"Tobias Hecking and Loet Leydesdorff. 2018. Topic modelling of empirical text corpora: Validity, reliability, and reproducibility in comparison to semantic maps. arXiv: abs\/1806.01045 (2018). Retrieved from https:\/\/arxiv.org\/abs\/1806.01045.","journal-title":"arXiv:"},{"key":"e_1_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2006.17"},{"key":"e_1_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-013-9276-6"},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW51248.2020.00067"},{"key":"e_1_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.14"},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321639"},{"key":"e_1_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/SERA.2007.109"},{"key":"e_1_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-018-9636-3"},{"key":"e_1_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380395"},{"key":"e_1_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338955"},{"key":"e_1_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2022.107025"},{"key":"e_1_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595715"},{"key":"e_1_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2891758"},{"key":"e_1_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2013.40"},{"key":"e_1_3_2_55_2","unstructured":"Guolin Ke Jia Zhang Zhenhui Xu Jiang Bian and Tie-Yan Liu. 2018. TabNN: A universal neural network solution for tabular data."},{"key":"e_1_3_2_56_2","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642997"},{"key":"e_1_3_2_57_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110892"},{"key":"e_1_3_2_58_2","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1952.10483441"},{"key":"e_1_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786880"},{"key":"e_1_3_2_60_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2017.9"},{"key":"e_1_3_2_61_2","article-title":"A survey of code-based change impact analysis techniques","volume":"23","author":"Li Bixin","year":"2013","unstructured":"Bixin Li, Xiaobing Sun, Hareton K. N. Leung, and Sai Zhang. 2013. A survey of code-based change impact analysis techniques. Software Testing 23 (2013).","journal-title":"Software Testing"},{"key":"e_1_3_2_62_2","doi-asserted-by":"publisher","DOI":"10.1145\/3196321.3196326"},{"key":"e_1_3_2_63_2","doi-asserted-by":"publisher","DOI":"10.1145\/1181309.1181314"},{"key":"e_1_3_2_64_2","doi-asserted-by":"publisher","DOI":"10.1049\/cje.2020.10.010"},{"key":"e_1_3_2_65_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44886-1_25"},{"key":"e_1_3_2_66_2","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2017.8"},{"key":"e_1_3_2_67_2","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2018.8646639"},{"key":"e_1_3_2_68_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICRITO48877.2020.9198037"},{"key":"e_1_3_2_69_2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809071"},{"key":"e_1_3_2_70_2","doi-asserted-by":"publisher","DOI":"10.11613\/BM.2012.031"},{"key":"e_1_3_2_71_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9381-9"},{"key":"e_1_3_2_72_2","doi-asserted-by":"publisher","DOI":"10.5555\/2999792.2999959"},{"key":"e_1_3_2_73_2","doi-asserted-by":"publisher","DOI":"10.5555\/2145432.2145462"},{"key":"e_1_3_2_74_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9370-z"},{"key":"e_1_3_2_75_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2007.5"},{"key":"e_1_3_2_76_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP52600.2021.00028"},{"key":"e_1_3_2_77_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2005.1553571"},{"key":"e_1_3_2_78_2","doi-asserted-by":"crossref","unstructured":"Hoda Naguib Nitesh Narayan Bernd Br\u00fcgge and Dina Helal. 2013. Bug report assignee recommendation using activity profiles(MSR\u201913). IEEE Press 22\u201330.","DOI":"10.1109\/MSR.2013.6623999"},{"key":"e_1_3_2_79_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.56"},{"key":"e_1_3_2_80_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110538"},{"key":"e_1_3_2_81_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2007.25"},{"key":"e_1_3_2_82_2","doi-asserted-by":"publisher","DOI":"10.1145\/3196398.3196418"},{"key":"e_1_3_2_83_2","article-title":"An exploratory characterization of bugs in COVID-19 software projects","volume":"2006","author":"Rahman A.","year":"2020","unstructured":"A. Rahman and Effat Farhana. 2020. An exploratory characterization of bugs in COVID-19 software projects. arXiv abs\/2006.00586 (2020). Retrieved from https:\/\/arxiv.org\/abs\/2006.0586.","journal-title":"arXiv"},{"key":"e_1_3_2_84_2","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380409"},{"key":"e_1_3_2_85_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3056941"},{"key":"e_1_3_2_86_2","unstructured":"Christian Robottom Reis Renata Pontin de Mattos Fortes Renata Pontin and Mattos Fortes. 2002. An Overview of the Software Engineering Process and Tools in the Mozilla Project. (2002)."},{"key":"e_1_3_2_87_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.03.002"},{"key":"e_1_3_2_88_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-016-6301-0"},{"key":"e_1_3_2_89_2","volume-title":"The Coding Manual for Qualitative Researchers","author":"Salda\u00f1a Johnny","year":"2015","unstructured":"Johnny Salda\u00f1a. 2015. The Coding Manual for Qualitative Researchers. Sage."},{"key":"e_1_3_2_90_2","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1614"},{"key":"e_1_3_2_91_2","doi-asserted-by":"publisher","DOI":"10.1109\/32.799955"},{"key":"e_1_3_2_92_2","doi-asserted-by":"publisher","DOI":"10.1145\/1414004.1414030"},{"key":"e_1_3_2_93_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2019.0260"},{"key":"e_1_3_2_94_2","doi-asserted-by":"publisher","DOI":"10.1109\/GAS.2012.6225927"},{"key":"e_1_3_2_95_2","doi-asserted-by":"publisher","DOI":"10.1145\/2134254.2134276"},{"key":"e_1_3_2_96_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9583-4"},{"key":"e_1_3_2_97_2","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806811"},{"key":"e_1_3_2_98_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2010.45"},{"key":"e_1_3_2_99_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA.2017.61"},{"key":"e_1_3_2_100_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3000928"},{"key":"e_1_3_2_101_2","doi-asserted-by":"crossref","unstructured":"Chakkrit Tantithamthavorn Shane McIntosh Ahmed E. Hassan and Kenichi Matsumoto. 2017. An empirical comparison of model validation techniques for defect prediction models. 1 (2017).","DOI":"10.1109\/TSE.2016.2584050"},{"key":"e_1_3_2_102_2","unstructured":"Chakkrit Tantithamthavorn Shane McIntosh Ahmed E. Hassan and Kenichi Matsumoto. 2018. The impact of automated parameter optimization for defect prediction models. (2018)."},{"key":"e_1_3_2_103_2","doi-asserted-by":"publisher","DOI":"10.1145\/2975961.2975964"},{"key":"e_1_3_2_104_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2012.22"},{"key":"e_1_3_2_105_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.159"},{"key":"e_1_3_2_106_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2018.03.053"},{"key":"e_1_3_2_107_2","doi-asserted-by":"publisher","DOI":"10.1145\/3345629.3345639"},{"key":"e_1_3_2_108_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.59"},{"key":"e_1_3_2_109_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.06.002"},{"key":"e_1_3_2_110_2","doi-asserted-by":"publisher","DOI":"10.1145\/3379597.3387464"},{"key":"e_1_3_2_111_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2007.13"},{"key":"e_1_3_2_112_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2948158"},{"key":"e_1_3_2_113_2","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970359"},{"key":"e_1_3_2_114_2","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3182516"},{"key":"e_1_3_2_115_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2576454"},{"key":"e_1_3_2_116_2","doi-asserted-by":"publisher","DOI":"10.1145\/2365324.2365329"},{"key":"e_1_3_2_117_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion.2019.00066"},{"key":"e_1_3_2_118_2","article-title":"Automatic bug triage using semi-supervised text classification","volume":"1704","author":"Xuan Jifeng","year":"2017","unstructured":"Jifeng Xuan, He Jiang, Zhilei Ren, Jun Yan, and Zhongxuan Luo. 2017. Automatic bug triage using semi-supervised text classification. CoRR abs\/1704.04769 (2017). arXiv:1704.04769. Retrieved from http:\/\/arxiv.org\/abs\/1704.04769.","journal-title":"CoRR"},{"key":"e_1_3_2_119_2","first-page":"1","article-title":"Characterizing and identifying reverted commits","author":"Yan Meng","year":"2019","unstructured":"Meng Yan, Xin Xia, D. Lo, A. Hassan, and Shanping Li. 2019. Characterizing and identifying reverted commits. Empirical Software Engineering (2019), 1\u201338.","journal-title":"Empirical Software Engineering"},{"key":"e_1_3_2_120_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2014.16"},{"key":"e_1_3_2_121_2","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635874"},{"key":"e_1_3_2_122_2","doi-asserted-by":"publisher","DOI":"10.57805\/revstat.v16i3.244"},{"key":"e_1_3_2_123_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME52107.2021.00015"},{"key":"e_1_3_2_124_2","doi-asserted-by":"publisher","DOI":"10.5555\/2664446.2664477"},{"key":"e_1_3_2_125_2","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597096"},{"key":"e_1_3_2_126_2","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2012.32"},{"key":"e_1_3_2_127_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606654"},{"key":"e_1_3_2_128_2","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3092731"},{"key":"e_1_3_2_129_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME46990.2020.00023"},{"key":"e_1_3_2_130_2","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213866"},{"key":"e_1_3_2_131_2","doi-asserted-by":"publisher","DOI":"10.1145\/3440757"},{"key":"e_1_3_2_132_2","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2892646"},{"key":"e_1_3_2_133_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.63"},{"key":"e_1_3_2_134_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2870414"}],"container-title":["ACM Transactions on Software Engineering and Methodology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3593802","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3593802","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:50Z","timestamp":1750178870000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3593802"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,30]]},"references-count":133,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,11,30]]}},"alternative-id":["10.1145\/3593802"],"URL":"https:\/\/doi.org\/10.1145\/3593802","relation":{},"ISSN":["1049-331X","1557-7392"],"issn-type":[{"value":"1049-331X","type":"print"},{"value":"1557-7392","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,30]]},"assertion":[{"value":"2022-06-26","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-03-21","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-09-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}