{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T20:25:59Z","timestamp":1725999959463},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030042714"},{"type":"electronic","value":"9783030042721"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-04272-1_9","type":"book-chapter","created":{"date-parts":[[2018,11,19]],"date-time":"2018-11-19T06:02:36Z","timestamp":1542607356000},"page":"137-153","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["CMSuggester: Method Change Suggestion to Complement Multi-entity Edits"],"prefix":"10.1007","author":[{"given":"Ye","family":"Wang","sequence":"first","affiliation":[]},{"given":"Na","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Zhong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,20]]},"reference":[{"key":"9_CR1","unstructured":"Support of compaction strategy option for stress.java. \n https:\/\/github.com\/apache\/cassandra\/commit\/f06e1d63a2006aa95d36636c56561158c8758a3c"},{"key":"9_CR2","unstructured":"Apache Aries (2018). \n http:\/\/aries.apache.org"},{"key":"9_CR3","unstructured":"apache\/cassandra (2018). \n https:\/\/github.com\/apache\/cassandra"},{"key":"9_CR4","unstructured":"apache\/derby (2018). \n https:\/\/github.com\/apache\/derby"},{"key":"9_CR5","unstructured":"apache\/mahout (2018). \n https:\/\/github.com\/apache\/mahout"},{"key":"9_CR6","unstructured":"DERBY-2201: Allow scalar functions to return LOBs (2018). \n https:\/\/github.com\/apache\/derby\/commit\/638f1b48afc27c094c7f34a6254778c1a4ad9608"},{"key":"9_CR7","unstructured":"DERBY-5162: Null out the wrapped Clob when resetting a SQLClob to NULL (2018). \n https:\/\/github.com\/apache\/derby\/commit\/e9737b6"},{"key":"9_CR8","unstructured":"Fix infinite loop when paging queries with IN (2018). \n https:\/\/github.com\/apache\/cassandra\/commit\/7c32ffb"},{"key":"9_CR9","unstructured":"MAHOUT-401: Use NamedVector in seq2sparse (2018). \n https:\/\/github.com\/apache\/mahout\/commit\/22d7d31"},{"key":"9_CR10","unstructured":"WALA (2018). \n http:\/\/wala.sourceforge.net\/wiki\/index.php\/Main_Page"},{"key":"9_CR11","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1007\/978-981-10-1678-3_73","volume-title":"Proceedings of the International Conference on Data Engineering and Communication Technology","author":"S Christa","year":"2017","unstructured":"Christa, S., Madhusudhan, V., Suma, V., Rao, J.J.: Software maintenance: from the perspective of effort and cost requirement. In: Satapathy, S., Bhateja, V., Joshi, A. (eds.) Proceedings of the International Conference on Data Engineering and Communication Technology, vol. 469, pp. 759\u2013768. Springer, Singapore (2017). \n https:\/\/doi.org\/10.1007\/978-981-10-1678-3_73"},{"key":"9_CR12","unstructured":"Gall, H., Hajek, K., Jazayeri, M.: Detection of logical coupling based on product release history. In: Proceedings of ICSM, pp. 190\u2013198 (1998)"},{"key":"9_CR13","unstructured":"Gall, H., Jazayeri, M., Krajewski, J.: CVS release history data for detecting logical couplings. In: Proceedings of IWPSE, pp. 13\u201323 (2003)"},{"key":"9_CR14","unstructured":"Hassan, A.E., Holt, R.C.: Predicting change propagation in software systems. In: Proceedings of ICSM, pp. 284\u2013293 (2004)"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Herzig, K., Just, S., Zeller, A.: It\u2019s not a bug, it\u2019s a feature: how misclassification impacts bug prediction. In: Proceedings of ICSE, pp. 392\u2013401 (2013)","DOI":"10.1109\/ICSE.2013.6606585"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Kim, D., Nam, J., Song, J., Kim, S.: Automatic patch generation learned from human-written patches. In: Proceedings of ICSE, pp. 802\u2013811 (2013)","DOI":"10.1109\/ICSE.2013.6606626"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Kim, M., Notkin, D.: Discovering and representing systematic code changes. In: Proceedings of ICSE, pp. 309\u2013319 (2009)","DOI":"10.1109\/ICSE.2009.5070531"},{"issue":"1","key":"9_CR18","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/TSE.2011.104","volume":"38","author":"C Goues Le","year":"2012","unstructured":"Le Goues, C., Nguyen, T., Forrest, S., Weimer, W.: Genprog: a generic method for automatic software repair. IEEE Trans. Softw. Eng. 38(1), 54 (2012)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"5","key":"9_CR19","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1145\/1095430.1081755","volume":"30","author":"Zhenmin Li","year":"2005","unstructured":"Li, Z., Zhou, Y.: PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code. In: Proceedings of ESEC\/FSE, pp. 306\u2013315 (2005)","journal-title":"ACM SIGSOFT Software Engineering Notes"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Long, F., Amidon, P., Rinard, M.: Automatic inference of code transforms for patch generation. In: Proceedings of ESEC\/FSE, pp. 727\u2013739 (2017)","DOI":"10.1145\/3106237.3106253"},{"issue":"1","key":"9_CR21","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1145\/2914770.2837617","volume":"51","author":"Fan Long","year":"2016","unstructured":"Long, F., Rinard, M.: Automatic patch generation by learning correct code. In: Proceedings of POPL, pp. 298\u2013312 (2016)","journal-title":"ACM SIGPLAN Notices"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Meng, N., Kim, M., McKinley, K.: LASE: locating and applying systematic edits. In: Proceedings of ICSE, pp. 502\u2013511 (2013)","DOI":"10.1109\/ICSE.2013.6606596"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Nguyen, T.T., Nguyen, H.A., Pham, N.H., Al-Kofahi, J.M., Nguyen, T.N.: Clone-aware configuration management. In: Proceedings of ASE, pp. 123\u2013134 (2009)","DOI":"10.1109\/ASE.2009.90"},{"key":"9_CR24","unstructured":"Park, J., Kim, M., Ray, B., Bae, D.H.: An empirical study of supplementary bug fixes. In: Proceedings of MSR, pp. 40\u201349 (2012)"},{"key":"9_CR25","volume-title":"Object-Oriented Modeling and Design","author":"J Rumbaugh","year":"1991","unstructured":"Rumbaugh, J., Blaha, M., Premerlani, W., Eddy, F., Lorensen, W.: Object-Oriented Modeling and Design. Prentice-Hall Inc., Upper Saddle River (1991)"},{"key":"9_CR26","unstructured":"Shirabad, J.S., Lethbridge, T.C., Matwin, S.: Mining the maintenance history of a legacy software system. In: Proceedings of ICSM, pp. 95\u2013104 (2003)"},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Tan, M.: Online defect prediction for imbalanced data. Master\u2019s thesis, University of Waterloo (2015)","DOI":"10.1109\/ICSE.2015.139"},{"key":"9_CR28","doi-asserted-by":"crossref","unstructured":"Wang, Y., Meng, N., Zhong, H.: An empirical study of multi-entity changes in real bug fixes. In: Proceedings of ICSME (2018)","DOI":"10.1109\/ICSME.2018.00038"},{"key":"9_CR29","doi-asserted-by":"crossref","unstructured":"Yin, Z., Yuan, D., Zhou, Y., Pasupathy, S., Bairavasundaram, L.: How do fixes become bugs? In: Proceedings of ESEC\/FSE, pp. 26\u201336 (2011)","DOI":"10.1145\/2025113.2025121"},{"issue":"9","key":"9_CR30","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1109\/TSE.2004.52","volume":"30","author":"ATT Ying","year":"2004","unstructured":"Ying, A.T.T., Murphy, G.C., Ng, R.T., Chu-Carroll, M.: Predicting source code changes by mining change history. IEEE Trans. Softw. Eng. 30(9), 574\u2013586 (2004)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"9_CR31","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.jss.2018.03.046","volume":"141","author":"H Zhong","year":"2018","unstructured":"Zhong, H., Mei, H.: Mining repair model for exception-related bug. J. Syst. Softw. 141, 16\u201331 (2018)","journal-title":"J. Syst. Softw."},{"key":"9_CR32","doi-asserted-by":"crossref","unstructured":"Zhong, H., Su, Z.: An empirical study on real bug fixes. In: Proceedings of ICSE, pp. 913\u2013923 (2015)","DOI":"10.1109\/ICSE.2015.101"},{"key":"9_CR33","unstructured":"Zimmermann, T., Weisgerber, P., Diehl, S., Zeller, A.: Mining version histories to guide software changes. In: Proceedings of ICSE, pp. 563\u2013572 (2004)"}],"container-title":["Lecture Notes in Computer Science","Software Analysis, Testing, and Evolution"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-04272-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T09:13:03Z","timestamp":1558343583000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-04272-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030042714","9783030042721"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-04272-1_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"20 November 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SATE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Software Analysis, Testing, and Evolution","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shenzheng","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"satev2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/xiongyingfei.github.io\/confs\/sate18\/index_en.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}