{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:23:39Z","timestamp":1773840219225,"version":"3.50.1"},"reference-count":94,"publisher":"Association for Computing Machinery (ACM)","issue":"FSE","license":[{"start":{"date-parts":[[2024,7,12]],"date-time":"2024-07-12T00:00:00Z","timestamp":1720742400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"U.S. National Science Foundation","doi-asserted-by":"crossref","award":["2247141"],"award-info":[{"award-number":["2247141"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2312321"],"award-info":[{"award-number":["2312321"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100009226","name":"National Security Agency","doi-asserted-by":"publisher","award":["H98230-21-1-0175"],"award-info":[{"award-number":["H98230-21-1-0175"]}],"id":[{"id":"10.13039\/100009226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. ACM Softw. Eng."],"published-print":{"date-parts":[[2024,7,12]]},"abstract":"<jats:p>In infrastructure as code (IaC), state reconciliation is the process of querying and comparing the infrastructure state prior to changing the infrastructure. As state reconciliation is pivotal to manage IaC-based computing infrastructure at scale, defects related to state reconciliation can create large-scale consequences. A categorization of state reconciliation defects, i.e., defects related to state reconciliation, can aid in understanding the nature of state reconciliation defects. We conduct an empirical study with 5,110 state reconciliation defects where we apply qualitative analysis to categorize state reconciliation defects. From the identified defect categories, we derive heuristics to design prompts for a large language model (LLM), which in turn are used for validation of state reconciliation.<\/jats:p>\n                  <jats:p>From our empirical study, we identify 8 categories of state reconciliation defects, amongst which 3 have not been reported for previously-studied software systems. The most frequently occurring defect category is inventory, i.e., the category of defects that occur when managing infrastructure inventory. Using an LLM with heuristics-based paragraph style prompts, we identify 9 previously unknown state reconciliation defects of which 7 have been accepted as valid defects, and 4 have already been fixed. Based on our findings, we conclude the paper by providing a set of recommendations for researchers and practitioners.<\/jats:p>\n                  <jats:p>\n                    CCS Concepts: \u2022\n                    <jats:bold>Software and its engineering<\/jats:bold>\n                    \u2192\n                    <jats:bold>Software defect analysis<\/jats:bold>\n                    ;\n                    <jats:bold>Empirical software validation<\/jats:bold>\n                  <\/jats:p>","DOI":"10.1145\/3660790","type":"journal-article","created":{"date-parts":[[2024,7,12]],"date-time":"2024-07-12T10:22:09Z","timestamp":1720779729000},"page":"1865-1888","source":"Crossref","is-referenced-by-count":7,"title":["State Reconciliation Defects in Infrastructure as Code"],"prefix":"10.1145","volume":"1","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6139-3133","authenticated-orcid":false,"given":"Md Mahadi","family":"Hassan","sequence":"first","affiliation":[{"name":"Auburn University, Auburn, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-8360-4734","authenticated-orcid":false,"given":"John","family":"Salvador","sequence":"additional","affiliation":[{"name":"Auburn University, Auburn, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5744-6925","authenticated-orcid":false,"given":"Shubhra Kanti Karmaker","family":"Santu","sequence":"additional","affiliation":[{"name":"Auburn University, Auburn, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5056-757X","authenticated-orcid":false,"given":"Akond","family":"Rahman","sequence":"additional","affiliation":[{"name":"Auburn University, Auburn, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,7,12]]},"reference":[{"key":"e_1_3_1_2_1","unstructured":"abadger. 2017. jenkins_plugin \u201cparams\u201d argument is insecure. https:\/\/github.com\/ansible\/ansible\/issues\/30874. [Online; accessed 30-March-2024]."},{"key":"e_1_3_1_3_1","article-title":"Using orthogonal defect classification to characterize nosql database defects","volume":"159","author":"Agnelo Joao","year":"2020","unstructured":"JoaoAgnelo, NunoLaranjeiro, and JorgeBernardino. 2020. Using orthogonal defect classification to characterize nosql database defects. Journal of Systems and Software159(2020), 110451.","journal-title":"Journal of Systems and Software"},{"key":"e_1_3_1_4_1","unstructured":"Amazon. 2023. Elastic Load Balancing. https:\/\/aws.amazon.com\/elasticloadbalancing\/. [Online; accessed 24-March-2023]."},{"key":"e_1_3_1_5_1","unstructured":"Ansible. 2022ADB uses Red Hat Ansible Automation Platform to boost infrastructure management. https:\/\/www.redhat.com\/en\/resources\/asian-development-bank-case-study. [Online; accessed 25-Sep-2023]."},{"key":"e_1_3_1_6_1","unstructured":"Ansible. 2023. Ansible Documentation. https:\/\/docs.ansible.com\/. [Online; accessed 19-December-2022]."},{"key":"e_1_3_1_7_1","unstructured":"ansible. 2023. ansible\/ansible. https:\/\/github.com\/ansible\/ansible. [Online; accessed 25-Sep-2023]."},{"key":"e_1_3_1_8_1","unstructured":"ansible\/ansible. 2023. Ansible command fails when we try to access it on bastion from remote server. ssh error.Unreachable nodes. https:\/\/github.com\/ansible\/ansible\/issues\/45898. [Online; accessed 28-March-2023]."},{"key":"e_1_3_1_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/1364557032000119616"},{"key":"e_1_3_1_10_1","unstructured":"bcoca. 2016a. fixed bad condition hiding results. https:\/\/github.com\/ansible\/ansible\/commit\/65c373c. [Online; accessed 20-March-2023]."},{"key":"e_1_3_1_11_1","unstructured":"bcoca. 2016b. loop to get all load balancers boto limited to 400 at a time fixes. https:\/\/github.com\/ansible\/ansible\/commit\/90d084d. [Online; accessed 23-March-2023]."},{"key":"e_1_3_1_12_1","unstructured":"bcoca. 2018. Ensure string types (#42362) * actually enforce string types. https:\/\/github.com\/ansible\/ansible\/commit\/4a7940c. [Online; accessed 10-March-2023]."},{"key":"e_1_3_1_13_1","unstructured":"bcoca. 2020. fix delegation vars usage (debug still shows inventory_hostname). https:\/\/github.com\/ansible\/ansible\/commit\/2165f9a. [Online; accessed 26-March-2023]."},{"key":"e_1_3_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1897852.1897868"},{"key":"e_1_3_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3549123"},{"key":"e_1_3_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/4236.769420"},{"key":"e_1_3_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368454"},{"key":"e_1_3_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.03.002"},{"key":"e_1_3_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485500"},{"key":"e_1_3_1_20_1","unstructured":"chef. 2009. chef\/chef: Chef. https:\/\/github.com\/chef\/chef. [Online; accessed 17-Feb-2024]."},{"key":"e_1_3_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00068"},{"key":"e_1_3_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.177364"},{"key":"e_1_3_1_23_1","doi-asserted-by":"publisher","unstructured":"MarceloCinque DominicoCotroneo Raffaele D.Corte and AntonioPecchia. 2014. Assessing Direct Monitoring Techniques to Analyze Failures of Critical Industrial Systems. In 2014 IEEE 25th International Symposium on Software Reliability Engineering. 212\u2013222. https:\/\/doi.org\/10.1109\/ISSRE.2014.30 10.1109\/ISSRE.2014.30","DOI":"10.1109\/ISSRE.2014.30"},{"key":"e_1_3_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338916"},{"key":"e_1_3_1_25_1","doi-asserted-by":"crossref","unstructured":"DomenicoCotroneo RobertoPietrantuono and StefanoRusso. 2013. Testing techniques selection based on ODC fault types and software metrics. Journal of Systems and Software86 6(2013) 1613\u20131637.","DOI":"10.1016\/j.jss.2013.02.020"},{"key":"e_1_3_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213848"},{"key":"e_1_3_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2014.30"},{"key":"e_1_3_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338916"},{"key":"e_1_3_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.02.020"},{"key":"e_1_3_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213848"},{"key":"e_1_3_1_31_1","unstructured":"D3DeFi. 2018. zabbix_template: fixed idempotency issues. https:\/\/github.com\/ansible\/ansible\/commit\/a9aa105. [Online; accessed 21-March-2023]."},{"key":"e_1_3_1_32_1","unstructured":"dagwieers. 2019. Use locking for concurrent file access. https:\/\/github.com\/ansible\/ansible\/commit\/e152b277cfc055a3b7bfdaa41db024168ca7a2a. [Online; accessed 31-March-2023]."},{"key":"e_1_3_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3051492"},{"key":"e_1_3_1_34_1","unstructured":"felixfontein. 2019. docker_container: fix port bindings with IPv6 addresses. https:\/\/github.com\/ansible\/ansible\/commit\/a757310. [Online; accessed 28-March-2023]."},{"key":"e_1_3_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236030"},{"key":"e_1_3_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380397"},{"key":"e_1_3_1_37_1","unstructured":"GitHub AdvisoryDatabase. 2022. Ansible Insertion of Sensitive Information into Log File vulnerability. https:\/\/github.com\/advisories\/GHSA-588w-w6mv-3cw5. [Online; accessed 31-March-2024]."},{"key":"e_1_3_1_38_1","unstructured":"hashicorp. 2015. hasicorp\/terraform - Terraform. https:\/\/github.com\/hashicorp\/terraform\/. [Online; accessed 16-Feb-2024]."},{"key":"e_1_3_1_39_1","doi-asserted-by":"publisher","DOI":"10.7748\/nr.4.1.81.s9"},{"key":"e_1_3_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380395"},{"key":"e_1_3_1_41_1","first-page":"368","article-title":"Testing idempotence for infrastructure as code","author":"Hummer Waldemar","year":"2013","unstructured":"WaldemarHummer, FlorianRosenberg, FabioOliveira, and TamarEilam. 2013. Testing idempotence for infrastructure as code. In ACM\/IFIP\/USENIX International Conference on Distributed Systems Platforms and Open Distributed ProcessingSpringer, 368\u2013388.","journal-title":"ACM\/IFIP\/USENIX International Conference on Distributed Systems Platforms and Open Distributed Processing"},{"key":"e_1_3_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2010.5399061"},{"key":"e_1_3_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338955"},{"key":"e_1_3_1_44_1","article-title":"The symptoms, causes, and repairs of bugs inside a deep learning library","volume":"177","author":"Jia Li","year":"2021","unstructured":"LiJia, HaoZhong, XiaoyinWang, LinpengHuang, and XuanshengLu. 2021. The symptoms, causes, and repairs of bugs inside a deep learning library. Journal of Systems and Software177(2021), 110935.","journal-title":"Journal of Systems and Software"},{"key":"e_1_3_1_45_1","unstructured":"JillR.. 2021. Fix to return data when using lambda_info module. https:\/\/github.com\/ansible\/ansible\/commit\/6fa070e82. [Online; accessed 25-March-2023]."},{"key":"e_1_3_1_46_1","unstructured":"JimGu. 2018. yaml callback fails on python3. https:\/\/github.com\/ansible\/ansible\/commit\/5839f07. [Online; accessed 19-March-2023]."},{"key":"e_1_3_1_47_1","unstructured":"KlausKrippendorff. 2018. Content analysis: An introduction to its methodology. Sage publications."},{"key":"e_1_3_1_48_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.acl-long.229"},{"key":"e_1_3_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3560815"},{"key":"e_1_3_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00051"},{"key":"e_1_3_1_51_1","unstructured":"marcusphi. 2013. want to be able to use a variable for the value of ignore_errors. https:\/\/github.com\/ansible\/ansible\/issues\/4892. [Online; accessed 18-Feb-2024]."},{"key":"e_1_3_1_52_1","unstructured":"mkrizek. 2021. yum: avoid storing unnecessary cache data. https:\/\/github.com\/ansible\/ansible\/commit\/461f30c. [Online; accessed 25-March-2023]."},{"key":"e_1_3_1_53_1","unstructured":"mmeintker-tc. 2023. Terraform ignores skip_credentials_validation flag for s3 backend with custom endpoint. https:\/\/github.com\/hashicorp\/terraform\/issues\/33983. [Online; accessed 15-Feb-2024]."},{"key":"e_1_3_1_54_1","unstructured":"mscherer. 2016. Do not leak mail password by error. https:\/\/github.com\/ansible\/ansible\/commit\/b8706a1. [Online; accessed 31-March-2023]."},{"key":"e_1_3_1_55_1","unstructured":"NIST. 2023. infrastructure as code. https:\/\/csrc.nist.gov\/glossary\/term\/infrastructure_as_code. [Online; accessed 25-Sep- 2023]."},{"key":"e_1_3_1_56_1","doi-asserted-by":"publisher","unstructured":"RubenOpdebeeck AhmedZerouali and Coen DeRoover. 2023.Control and Data Flow in Security Smell Detection for Infrastructure as Code: Is It Worth the Effort?. In 2023 IEEE\/ACM 20th International Conference on Mining Software Repositories (MSR).534\u2013535. https:\/\/doi.org\/10.1109\/MSR59073.2023.00079 10.1109\/MSR59073.2023.00079","DOI":"10.1109\/MSR59073.2023.00079"},{"key":"e_1_3_1_57_1","unstructured":"OpenAI. 2023. GPT-4 Technical Report. http:\/\/arxiv.org\/abs\/2303.08774arXiv:2303.08774 [cs]."},{"issue":"93","key":"e_1_3_1_58_1","first-page":"33","article-title":"Come for Syntax, Stay for Speed, Understand Defects: An Empirical Study of Defects in Julia Programs","volume":"28","author":"Rahman Akond","year":"2023","unstructured":"AkondRahman, Dibyendu BrintoBose, RaunakShakya, and RahulPandita. 2023a. Come for Syntax, Stay for Speed, Understand Defects: An Empirical Study of Defects in Julia Programs. Empirical Software Engineering28, 93(2023), 33.","journal-title":"Empirical Software Engineering"},{"key":"e_1_3_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380409"},{"key":"e_1_3_1_60_1","doi-asserted-by":"publisher","unstructured":"AkondRahman Md MahdiHassan and JohnSalvador. 2023b. Artifact for Paper. https:\/\/doi.org\/10.6084\/m9.figshare.24129996.v1 10.6084\/m9.figshare.24129996.v1[Online;accessed 19-April-2024].","DOI":"10.6084\/m9.figshare.24129996.v1"},{"key":"e_1_3_1_61_1","doi-asserted-by":"publisher","unstructured":"AkondRahman Md MahdiHassan and JohnSalvador. 2024. Verifiability Package for Paper. https:\/\/doi.org\/10.6084\/m9.figshare.24129996.v1 10.6084\/m9.figshare.24129996.v1[Online;accessed 15-April-2024].","DOI":"10.6084\/m9.figshare.24129996.v1"},{"key":"e_1_3_1_62_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.12.004"},{"key":"e_1_3_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2023.3265962"},{"key":"e_1_3_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579639"},{"key":"e_1_3_1_65_1","unstructured":"rahulgoel1. 2021. Yum package idempotency fixes. https:\/\/github.com\/chef\/chef\/issues\/12382. [Online; accessed 12-Feb- 2024]."},{"key":"e_1_3_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635922"},{"key":"e_1_3_1_67_1","unstructured":"RedHat. 2022a. Customer Case Study - NEC. https:\/\/www.ansible.com\/hubfs\/pdf\/Ansible-Case-Study-NEC.pdf. [Online; accessed 12-Sep-2023]."},{"key":"e_1_3_1_68_1","unstructured":"RedHat. 2022b. Customer Case Study - NetApp. https:\/\/www.ansible.com\/hubfs\/2018_Content\/RH-netapp-case-study.pdf. [Online; accessed 02-Sep-2023]."},{"key":"e_1_3_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3560419"},{"key":"e_1_3_1_70_1","unstructured":"resmo. 2016. cloudstack: fix state=expunged in cs_instance. https:\/\/github.com\/ansible\/ansible\/commit\/4020ebaecff. [Online; accessed 29-March-2023]."},{"key":"e_1_3_1_71_1","unstructured":"RickElrod. 2020. sysctl\/openbsd fact fixes. https:\/\/github.com\/ansible\/ansible\/commit\/7094849. [Online; accessed 24-March- 2023]."},{"key":"e_1_3_1_72_1","unstructured":"BaptisteRozi\u00e8re JonasGehring FabianGloeckle StenSootla ItaiGat XiaoqingEllen YossiAdi JingyuLiu TalRemez J\u00e9r\u00e9myRapin ArtyomKozhevnikov IvanEvtimov JoannaBitton ManishBhatt Cristian CantonFerrer AaronGrattafiori WenhanXiong AlexandreD\u00e8fossez JadeCopet FaisalAzhar HugoTouvron LouisMartin NicolasUsunier ThomasScialom and GabrielSynnaeve. 2023. Code Llama: Open Foundation Models for Code. (2023)."},{"key":"e_1_3_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3556945"},{"key":"e_1_3_1_74_1","unstructured":"JohnnySalda\u00f1a. 2015. The coding manual for qualitative researchers.Sage."},{"key":"e_1_3_1_75_1","doi-asserted-by":"crossref","unstructured":"Shubhra KantiKarmakerSantu and DongjiFeng. 2023. TELeR: A General Taxonomy of LLM Prompts for Benchmarking Complex Tasks. arXiv:2305.11430 [cs.AI]","DOI":"10.18653\/v1\/2023.findings-emnlp.946"},{"key":"e_1_3_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/1414004.1414030"},{"key":"e_1_3_1_77_1","unstructured":"seventieskid. 2022. Invalid index - Output from a conditional resource contained in a module. https:\/\/github.com\/hashicorp\/terraform\/issues\/32044. [Online; accessed 09-Feb-2024]."},{"key":"e_1_3_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908083"},{"key":"e_1_3_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2901761"},{"key":"e_1_3_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468591"},{"key":"e_1_3_1_81_1","unstructured":"sivel. 2022. Resolve perf issue with async callback events. https:\/\/github.com\/ansible\/ansible\/commit\/96ce480. [Online; accessed 25-March-2023]."},{"key":"e_1_3_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380384"},{"key":"e_1_3_1_83_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-013-9258-8"},{"key":"e_1_3_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.148"},{"key":"e_1_3_1_85_1","unstructured":"ttdgcp. 2018. Chef14: broken powershell version check. https:\/\/github.com\/chef\/chef\/issues\/7166. [Online; accessed 11-Feb-2024]."},{"key":"e_1_3_1_86_1","unstructured":"Cornelis JVan Rijsbergen Stephen EdwardRobertson and Martin FPorter. 1980. New models in probabilistic information retrieval. Vol. 5587. British Library Research and Development Department London."},{"key":"e_1_3_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468559"},{"key":"e_1_3_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510114"},{"key":"e_1_3_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3558489.3559072"},{"key":"e_1_3_1_90_1","unstructured":"Zabbix. 2018. Monitoring and Integration Solutions. https:\/\/www.zabbix.com\/integrations?cat=monitoring_systems. [Online; accessed 22-March-2023]."},{"key":"e_1_3_1_91_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111425"},{"key":"e_1_3_1_92_1","unstructured":"zenbot. 2016. Don\u2019t assume a task with non-dict loop results has been skipped.). https:\/\/github.com\/ansible\/ansible\/commit\/85868e07a9a4641c845ad1be3d036e716ff89bad. [Online; accessed 27-March-2023]."},{"key":"e_1_3_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380362"},{"key":"e_1_3_1_94_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.02.025"},{"key":"e_1_3_1_95_1","unstructured":"ZimKalinowski. 2018. fix for security group description crash. https:\/\/github.com\/ansible\/ansible\/commit\/5d2c23e2a3ec9ed81a4cbb8bd6bf28785fbadf4d. [Online; accessed 30-March-2023]."}],"container-title":["Proceedings of the ACM on Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3660790","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3660790","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3660790","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T07:54:31Z","timestamp":1770191671000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3660790"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,12]]},"references-count":94,"journal-issue":{"issue":"FSE","published-print":{"date-parts":[[2024,7,12]]}},"alternative-id":["10.1145\/3660790"],"URL":"https:\/\/doi.org\/10.1145\/3660790","relation":{},"ISSN":["2994-970X"],"issn-type":[{"value":"2994-970X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,12]]}}}