{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T03:09:43Z","timestamp":1725937783666},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319705774"},{"type":"electronic","value":"9783319705781"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-70578-1_8","type":"book-chapter","created":{"date-parts":[[2018,1,3]],"date-time":"2018-01-03T07:18:43Z","timestamp":1514963923000},"page":"73-84","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Initial Investigation of Concurrency Bugs in Open Source Systems"],"prefix":"10.1007","author":[{"given":"Paolo","family":"Ciancarini","sequence":"first","affiliation":[]},{"given":"Francesco","family":"Poggi","sequence":"additional","affiliation":[]},{"given":"Davide","family":"Rossi","sequence":"additional","affiliation":[]},{"given":"Alberto","family":"Sillitti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,4]]},"reference":[{"issue":"1","key":"8_CR1","first-page":"1991","volume":"6","author":"DW Aha","year":"1991","unstructured":"D.W. Aha, D. Kibler, M.K. Albert, Instance-based learning algorithms. Mach. Learn. 6(1), 1991 (1991)","journal-title":"Mach. Learn."},{"issue":"1","key":"8_CR2","doi-asserted-by":"crossref","first-page":"2001","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"L. Breiman, Random forests. Mach. Learn. 45(1), 2001 (2001)","journal-title":"Mach. Learn."},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"P. Ciancarini, F. Poggi, D. Rossi, A. Sillitti, Improving bug predictions in multicore cyber-physical systems, in Proceedings of 4th International Conference in Software Engineering for Defense Applications (Springer International Publishing), pp. 287\u2013295, 2016","DOI":"10.1007\/978-3-319-27896-4_24"},{"key":"8_CR4","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"N.V. Chawla, K.W. Bowyer, L.O. Hall, W.P. Kegelmeyer, SMOTE: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321\u2013357 (2002)","journal-title":"J. Artif. Intell. Res."},{"key":"8_CR5","unstructured":"P. Ciancarini, F. Poggi, D. Rossi, A. Sillitti, Mining concurrency bugs, in Embedded Multi-Core Systems for Mixed Criticality Summit 2016 at CPS Week 2016, Vienna, Austria, 11 Apr 2016"},{"key":"8_CR6","unstructured":"I. Coman, A. Sillitti, An empirical exploratory study on inferring developers activities from low-level data, in 19th International Conference on Software Engineering and Knowledge Engineering (SEKE 2007), Boston, MA, USA, 9\u201311 July 2007"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"G. Denaro, M. Pezz\u00e9, An empirical evaluation of fault proneness models, in 24th International Conference on Software Engineering (ICSE 2002) (ACM, May 2002)","DOI":"10.1145\/581368.581371"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"E. Di Bella, A. Sillitti, G. Succi, A multivariate classification of open source developers. Inf. Sci. 221 (2013)","DOI":"10.1016\/j.ins.2012.09.031"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"E. Farchi, Y. Nir, S. Ur, Concurrent bug patterns and how to test them, in International Parallel and Distributed Processing Symposium (IPDPS) (IEEE, 2003)","DOI":"10.1109\/IPDPS.2003.1213511"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"P. Fonseca, C. Li, R. Rodrigues (2011). Finding complex concurrency bugs in large multi-threaded applications, in 6th Conference on Computer Systems (ACM, Apr 2011)","DOI":"10.1145\/1966445.1966465"},{"issue":"7","key":"8_CR11","doi-asserted-by":"crossref","first-page":"2000","DOI":"10.1109\/32.859533","volume":"26","author":"TL Graves","year":"2000","unstructured":"T.L. Graves, A.F. Karr, J.S. Marron, H. Siy, Predicting fault incidence using software change history. IEEE Trans. Softw. Eng. 26(7), 2000 (2000)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"6","key":"8_CR12","doi-asserted-by":"crossref","first-page":"2012","DOI":"10.1109\/TSE.2011.103","volume":"38","author":"T Hall","year":"2012","unstructured":"T. Hall, S. Beecham, D. Bowes, D. Gray, S. Counsell, A systematic literature review on fault prediction performance in software engineering. IEEE Trans. Softw. Eng. 38(6), 2012 (2012)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"9","key":"8_CR13","first-page":"2009","volume":"21","author":"H He","year":"2009","unstructured":"H. He, E.A. Garcia, Learning from imbalanced data. IEEE Trans. Knowl. Data Eng. 21(9), 2009 (2009)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"8_CR14","unstructured":"G.H. John, P. Langley, Estimating continuous distributions in bayesian classifiers, in 11th Conference on Uncertainty in Artificial Intelligence (Morgan Kaufmann Publishers Inc., 1995), pp. 338\u2013345"},{"issue":"3","key":"8_CR15","doi-asserted-by":"crossref","first-page":"2001","DOI":"10.1162\/089976601300014493","volume":"13","author":"SS Keerthi","year":"2001","unstructured":"S.S. Keerthi, S.K. Shevade, C. Bhattacharyya, K.R.K. Murthy, Improvements to Platt\u2019s SMO algorithm for SVM classifier design. Neural Comput. 13(3), 2001 (2001)","journal-title":"Neural Comput."},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"S. Kim, T. Zimmermann, E.J. Whitehead Jr, A. Zeller (2007). Predicting faults from cached history, in 29th International Conference on Software Engineering (ICSE 2007) (ACM, May 2007)","DOI":"10.1109\/ICSE.2007.66"},{"issue":"2","key":"8_CR17","first-page":"2008","volume":"34","author":"S Kim","year":"2008","unstructured":"S. Kim, E.J. Whitehead Jr., Y. Zhang, Classifying software changes: clean or buggy? IEEE Trans. Softw. Eng. 34(2), 2008 (2008)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"T.M. Khoshgoftaar, M. Golawala, J. Van Hulse, An empirical study of learning from imbalanced data using random forest, in 19th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2007) (IEEE, 2007), pp. 310\u2013317","DOI":"10.1109\/ICTAI.2007.46"},{"issue":"3","key":"8_CR19","first-page":"2008","volume":"43","author":"S Lu","year":"2008","unstructured":"S. Lu, S. Park, E. Seo, Y. Zhou, Learning from mistakes: a comprehensive study on real world concurrency bug characteristics. ACM SIGPLAN Not. 43(3), 2008 (2008)","journal-title":"ACM SIGPLAN Not."},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"A.H. Moin, M. Khansari, Bug localization using revision log analysis and open bug repository text categorization, in International Conference on Open Source Systems (OSS 2010) (Springer Berlin Heidelberg, May 2010), pp. 188\u2013199","DOI":"10.1007\/978-3-642-13244-5_15"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"R. Moser, W. Pedrycz, G. Succi, A comparative analysis of the efficiency of change metrics and static code attributes for defect prediction, in 30th International Conference on Software Engineering (ICSE 2008) (ACM, May 2008), pp. 181\u2013190","DOI":"10.1145\/1368088.1368114"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"N. Nagappan, T. Ball, Use of relative code churn measures to predict system defect density, in 27th International Conference on Software Engineering (ICSE 2005) (IEEE, May 2005), pp. 284\u2013292","DOI":"10.1145\/1062455.1062514"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"N. Nagappan, T. Ball, A. Zeller, Mining metrics to predict component failures, in 28th International Conference on Software Engineering (ICSE 2006) (ACM, May 2006), pp. 452\u2013461","DOI":"10.1145\/1134285.1134349"},{"key":"8_CR24","first-page":"2015","volume":"80","author":"W Pedrycz","year":"2015","unstructured":"W. Pedrycz, G. Succi, A. Sillitti, J. Iljazi, Data description: a general framework of information granules. Knowledge-Based Systems, Elsevier 80, 2015 (2015)","journal-title":"Knowledge-Based Systems, Elsevier"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"E. Petrinja, A. Sillitti, G. Succi (2010). Comparing OpenBRR, QSOS, and OMM assessment models, in 6th International Conference on Open Source Systems (OSS 2010), Notre Dame, IN, USA, 30 May\u20132 June 2010","DOI":"10.1007\/978-3-642-13244-5_18"},{"key":"8_CR26","unstructured":"J. Quinlan, C 4.5: Programs for Machine Learning (Elsevier, 2014)"},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"S. Rao, A. Kak, Retrieval from software libraries for bug localization: a comparative study of generic and composite text models, in 8th Working Conference on Mining Software Repositories (MSR 2011) (ACM, May 2011), pp. 43\u201352","DOI":"10.1145\/1985441.1985451"},{"key":"8_CR28","doi-asserted-by":"crossref","unstructured":"R. Shatnawi, W. Li, The Effectiveness of software metrics in identifying error-prone classes in post-release software evolution process. J. Syst. Softw. 81(11), 1868\u20131882 (2008)","DOI":"10.1016\/j.jss.2007.12.794"},{"issue":"4","key":"8_CR29","first-page":"2005","volume":"30","author":"J \u015aliwerski","year":"2005","unstructured":"J. \u015aliwerski, T. Zimmermann, A. Zeller, When do changes induce fixes? ACM SIGSOFT Soft. Eng. Notes 30(4), 2005 (2005)","journal-title":"ACM SIGSOFT Soft. Eng. Notes"},{"key":"8_CR30","doi-asserted-by":"crossref","unstructured":"K. Sparck Jones, A statistical interpretation of term specificity and its application in retrieval. J. Doc. 28(1) (1972)","DOI":"10.1108\/eb026526"},{"key":"8_CR31","doi-asserted-by":"crossref","unstructured":"J. Su, H. Zhang, C.X. Ling, S. Matwin, Discriminative parameter learning for Bayesian networks, in 25th International Conference on Machine Learning (ACM, 2008), pp. 1016\u20131023","DOI":"10.1145\/1390156.1390284"},{"key":"8_CR32","doi-asserted-by":"crossref","unstructured":"E. Weyuker, T. Ostrand, R. Bell, Using developer information as a factor for fault prediction, in International Workshop on Predictor Models in Software Engineering (IEEE, May 2007)","DOI":"10.1109\/PROMISE.2007.14"},{"issue":"5","key":"8_CR33","doi-asserted-by":"crossref","first-page":"2008","DOI":"10.1007\/s10664-008-9082-8","volume":"13","author":"E Weyuker","year":"2008","unstructured":"E. Weyuker, T. Ostrand, R. Bell, Do Roo Many Cooks Spoil the Broth? Using the number of developers to enhance defect prediction models. Empir. Softw. Eng. 13(5), 2008 (2008)","journal-title":"Empir. Softw. Eng."},{"issue":"2","key":"8_CR34","first-page":"2010","volume":"52","author":"K Youil","year":"2010","unstructured":"K. Youil, L. Jooyong, H. Hwansoo, C. Kwang-Moo, Filtering false alarms of buffer overflow analysis using SMT solvers. Inf. Softw. Technol. 52(2), 2010 (2010)","journal-title":"Inf. Softw. Technol."},{"key":"8_CR35","doi-asserted-by":"crossref","unstructured":"B. Zhou, I. Neamtiu, R. Gupta, Predicting concurrency bugs: how many, what kind and where are they?, in 19th International Conference on Evaluation and Assessment in Software Engineering (ACM, 2015)","DOI":"10.1145\/2745802.2745807"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of 5th International Conference in Software Engineering for Defence Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-70578-1_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,8]],"date-time":"2019-10-08T23:36:00Z","timestamp":1570577760000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-70578-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319705774","9783319705781"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-70578-1_8","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018]]}}}