{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:20:22Z","timestamp":1740122422449,"version":"3.37.3"},"reference-count":64,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:00:00Z","timestamp":1714521600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,5,4]],"date-time":"2024-05-04T00:00:00Z","timestamp":1714780800000},"content-version":"vor","delay-in-days":3,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100007511","name":"Universidad Rey Juan Carlos","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100007511","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2024,5]]},"abstract":"Abstract<\/jats:title>\n Context<\/jats:title>\n Finding code changes that introduced bugs is important both for practitioners and researchers, but doing it precisely is a manual, effort-intensive process. The perfect test<\/jats:italic> method is a theoretical construct aimed at detecting Bug-Introducing Changes (BIC) through a theoretical perfect test<\/jats:italic>. This perfect test<\/jats:italic> always fails if the bug is present, and passes otherwise.<\/jats:p>\n <\/jats:sec>\n Objective<\/jats:title>\n To explore a possible automatic operationalization of the perfect test<\/jats:italic> method.<\/jats:p>\n <\/jats:sec>\n Method<\/jats:title>\n To use regression tests as substitutes for the perfect test<\/jats:italic>. For this, we transplant the regression tests to past snapshots of the code, and use them to identify the BIC, on a well-known collection of bugs from the Defects4J dataset.<\/jats:p>\n <\/jats:sec>\n Results<\/jats:title>\n From 809 bugs in the dataset, when running our operationalization of the perfect test method, for 95 of them the BIC was identified precisely and in the remaining 4 cases, a list of candidates including the BIC was provided.<\/jats:p>\n <\/jats:sec>\n Conclusions<\/jats:title>\n We demonstrate that the operationalization of the perfect test<\/jats:italic> method through regression tests is feasible and can be completely automated in practice when tests can be transplanted and run in past snapshots of the code. Given that implementing regression tests when a bug is fixed is considered a good practice, when developers follow it, they can detect effortlessly bug-introducing changes by using our operationalization of the perfect test<\/jats:italic> method.<\/jats:p>\n <\/jats:sec>","DOI":"10.1007\/s10664-024-10479-z","type":"journal-article","created":{"date-parts":[[2024,5,4]],"date-time":"2024-05-04T11:01:33Z","timestamp":1714820493000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Hunting bugs: Towards an automated approach to identifying which change caused a bug through regression testing"],"prefix":"10.1007","volume":"29","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8138-9702","authenticated-orcid":false,"given":"Michel","family":"Maes-Bermejo","sequence":"first","affiliation":[]},{"given":"Alexander","family":"Serebrenik","sequence":"additional","affiliation":[]},{"given":"Micael","family":"Gallego","sequence":"additional","affiliation":[]},{"given":"Francisco","family":"Gort\u00e1zar","sequence":"additional","affiliation":[]},{"given":"Gregorio","family":"Robles","sequence":"additional","affiliation":[]},{"given":"Jes\u00fas Mar\u00eda","family":"Gonz\u00e1lez\u00a0Barahona","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,4]]},"reference":[{"issue":"4","key":"10479_CR1","doi-asserted-by":"publisher","first-page":"2020","DOI":"10.1007\/s10664-018-9670-1","volume":"24","author":"NB Ali","year":"2019","unstructured":"Ali NB, Engstr\u00f6m E, Taromirad M, Mousavi MR, Minhas NM, Helgesson D, Kunze S, Varshosaz M (2019) On the search for industry-relevant regression testing research. Empir Softw Eng 24(4):2020\u20132055","journal-title":"Empir Softw Eng"},{"key":"10479_CR2","doi-asserted-by":"crossref","unstructured":"An G, Yoo S (2021) Reducing the search space of bug inducing commits using failure coverage. In: Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 1459\u20131462","DOI":"10.1145\/3468264.3473129"},{"issue":"1","key":"10479_CR3","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A Avizienis","year":"2004","unstructured":"Avizienis A, Laprie JC, Randell B, Landwehr C (2004) Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing 1(1):11\u201333. https:\/\/doi.org\/10.1109\/TDSC.2004.2","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"10479_CR4","doi-asserted-by":"crossref","unstructured":"Barr ET, Brun Y, Devanbu P, Harman M, Sarro F (2014) The plastic surgery hypothesis. In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 306\u2013317","DOI":"10.1145\/2635868.2635898"},{"key":"10479_CR5","doi-asserted-by":"crossref","unstructured":"Barr ET, Harman M, Jia Y, Marginean A, Petke J (2015) Automated software transplantation. In: Proceedings of the 2015 International Symposium on Software Testing and Analysis, pp. 257\u2013269","DOI":"10.1145\/2771783.2771796"},{"key":"10479_CR6","doi-asserted-by":"crossref","unstructured":"Bird C, Rigby PC, Barr ET, Hamilton DJ, German DM, Devanbu P (2009) The promises and perils of mining git. In: 2009 6th IEEE International Working Conference on Mining Software Repositories, pp. 1\u201310. IEEE","DOI":"10.1109\/MSR.2009.5069475"},{"key":"10479_CR7","doi-asserted-by":"crossref","unstructured":"Bludau P, Pretschner A (2022) PR-SZZ: How pull requests can support the tracing of defects in software repositories. In: 2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 1\u201312. IEEE","DOI":"10.1109\/SANER53432.2022.00012"},{"key":"10479_CR8","doi-asserted-by":"crossref","unstructured":"Borg M, Svensson O, Berg K, Hansson D (2019) SZZ Unleashed: An open implementation of the SZZ algorithm-featuring example usage in a study of just-in-time bug prediction for the jenkins project. In: Proceedings of the 3rd ACM SIGSOFT International Workshop on Machine Learning Techniques for Software Quality Evaluation, pp. 7\u201312","DOI":"10.1145\/3340482.3342742"},{"issue":"5","key":"10479_CR9","doi-asserted-by":"publisher","first-page":"3008","DOI":"10.1007\/s10664-018-9665-y","volume":"24","author":"M Castelluccio","year":"2019","unstructured":"Castelluccio M, An L, Khomh F (2019) An empirical study of patch uplift in rapid release development pipelines. Empir Softw Eng 24(5):3008\u20133044","journal-title":"Empir Softw Eng"},{"key":"10479_CR10","unstructured":"Cormen TH, Leiserson CE, Rivest RL, Stein C (2001) Introduction to algorithms. p. 540-549. MIT press"},{"issue":"7","key":"10479_CR11","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1109\/TSE.2016.2616306","volume":"43","author":"DA Da Costa","year":"2016","unstructured":"Da Costa DA, McIntosh S, Shang W, Kulesza U, Coelho R, Hassan AE (2016) A framework for evaluating the results of the SZZ approach for identifying bug-introducing changes. IEEE Trans Softw Eng 43(7):641\u2013657","journal-title":"IEEE Trans Softw Eng"},{"issue":"1","key":"10479_CR12","first-page":"107","volume":"26","author":"S Davies","year":"2014","unstructured":"Davies S, Roper M, Wood M (2014) Comparing text-based and dependence-based approaches for determining the origins of bugs. Journal of Software: Evolution and Process 26(1):107\u2013139","journal-title":"Journal of Software: Evolution and Process"},{"key":"10479_CR13","unstructured":"Desikan S, Ramesh G (2006) Software testing: principles and practice. pp. 193\u2013208. Pearson Education India"},{"key":"10479_CR14","doi-asserted-by":"crossref","unstructured":"Engstr\u00f6m E, Runeson P (2010) A qualitative survey of regression testing practices. In: International Conference on Product Focused Software Process Improvement, pp. 3\u201316. Springer","DOI":"10.1007\/978-3-642-13792-1_3"},{"key":"10479_CR15","doi-asserted-by":"crossref","unstructured":"Gousios G, Pinzger M, Deursen Av (2014) An exploratory study of the pull-based software development model. In: Proceedings of the 36th international conference on software engineering, pp. 345\u2013355","DOI":"10.1145\/2568225.2568260"},{"key":"10479_CR16","doi-asserted-by":"crossref","unstructured":"Guo PJ, Zimmermann T, Nagappan N, Murphy B (2010) Characterizing and predicting which bugs get fixed: an empirical study of microsoft windows. In: Proceedings of the 32Nd ACM\/IEEE International Conference on Software Engineering-Volume 1, pp. 495\u2013504","DOI":"10.1145\/1806799.1806871"},{"key":"10479_CR17","doi-asserted-by":"crossref","unstructured":"Harman M (2010) Automated patching techniques: the fix is in: technical perspective. Communications of the ACM 53(5), 108\u2013108","DOI":"10.1145\/1735223.1735248"},{"key":"10479_CR18","doi-asserted-by":"publisher","unstructured":"IEEE Standard Classification for Software Anomalies (2010) IEEE Std 1044-2009 (Revision of IEEE Std 1044-1993) pp. 1\u201323. https:\/\/doi.org\/10.1109\/IEEESTD.2010.5399061","DOI":"10.1109\/IEEESTD.2010.5399061"},{"key":"10479_CR19","unstructured":"Iida H, Matsumoto K (2016) Improving the High-Impact Bug Reports: A Case Study of Apache Projects"},{"key":"10479_CR20","doi-asserted-by":"crossref","unstructured":"Jang J, Agrawal A, Brumley D (2012) ReDeBug: finding unpatched code clones in entire OS distributions. In: 2012 IEEE Symposium on Security and Privacy, pp. 48\u201362. IEEE","DOI":"10.1109\/SP.2012.13"},{"key":"10479_CR21","doi-asserted-by":"crossref","unstructured":"Jiang Y, Liu H, Niu N, Zhang L, Hu Y (2021) Extracting concise bug-fixing patches from human-written patches in version control systems. In: 2021 IEEE\/ACM 43rd International Conference on Software Engineering (ICSE), pp. 686\u2013698. IEEE","DOI":"10.1109\/ICSE43902.2021.00069"},{"key":"10479_CR22","doi-asserted-by":"crossref","unstructured":"Just R, Jalali D, Ernst MD (2014) Defects4j: A database of existing faults to enable controlled testing studies for java programs. In: Proceedings of the 2014 International Symposium on Software Testing and Analysis, pp. 437\u2013440","DOI":"10.1145\/2610384.2628055"},{"issue":"6","key":"10479_CR23","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1109\/TSE.2012.70","volume":"39","author":"Y Kamei","year":"2012","unstructured":"Kamei Y, Shihab E, Adams B, Hassan AE, Mockus A, Sinha A, Ubayashi N (2012) A large-scale empirical study of just-in-time quality assurance. IEEE Trans Softw Eng 39(6):757\u2013773","journal-title":"IEEE Trans Softw Eng"},{"key":"10479_CR24","doi-asserted-by":"crossref","unstructured":"Khattar M, Lamba Y, Sureka A (2015) Sarathi: Characterization study on regression bugs and identification of regression bug inducing changes: A case-study on Google Chromium project. In: Proceedings of the 8th India Software Engineering Conference, pp. 50\u201359","DOI":"10.1145\/2723742.2723747"},{"key":"10479_CR25","doi-asserted-by":"crossref","unstructured":"Kim S, Whitehead\u00a0Jr EJ (2006) How long did it take to fix bugs? In: Proceedings of the 2006 international workshop on Mining software repositories, pp. 173\u2013174","DOI":"10.1145\/1137983.1138027"},{"key":"10479_CR26","doi-asserted-by":"crossref","unstructured":"Kim S, Zimmermann T, Pan K, James\u00a0Jr E et\u00a0al (2006) Automatic identification of bug-introducing changes. In: 21st IEEE\/ACM international conference on automated software engineering (ASE\u201906), pp. 81\u201390. IEEE","DOI":"10.1109\/ASE.2006.23"},{"issue":"2","key":"10479_CR27","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/2.901164","volume":"34","author":"S Lawrence","year":"2001","unstructured":"Lawrence S, Pennock DM, Flake GW, Krovetz R, Coetzee FM, Glover E, Nielsen FA, Kruger A, Giles CL (2001) Persistence of web references in scientific research. Computer 34(2):26\u201331","journal-title":"Computer"},{"key":"10479_CR28","doi-asserted-by":"crossref","unstructured":"Lenarduzzi V, Palomba F, Taibi D, Tamburri DA (2020) Openszz: A free, open-source, web-accessible implementation of the SZZ algorithm. In: Proceedings of the 28th international conference on program comprehension, pp. 446\u2013450","DOI":"10.1145\/3387904.3389295"},{"key":"10479_CR29","doi-asserted-by":"crossref","unstructured":"Levin S, Yehudai A (2017) The co-evolution of test maintenance and code maintenance through the lens of fine-grained semantic changes. In: 2017 IEEE International Conference on Software Maintenance and Evolution (ICSME), pp. 35\u201346. IEEE","DOI":"10.1109\/ICSME.2017.9"},{"key":"10479_CR30","doi-asserted-by":"crossref","unstructured":"Maes-Bermejo M, Gallego M, Gort\u00e1zar F, Robles G, Gonzalez-Barahona JM (2022) Revisiting the building of past snapshots \u2014 a replication and reproduction study. Empir Softw Eng 27(3)","DOI":"10.1007\/s10664-022-10117-6"},{"issue":"5","key":"10479_CR31","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1109\/TSE.2017.2693980","volume":"44","author":"S McIntosh","year":"2018","unstructured":"McIntosh S, Kamei Y (2018) Are fix-inducing changes a moving target? a longitudinal case study of just-in-time defect prediction. IEEE Trans Softw Eng 44(5):412\u2013428","journal-title":"IEEE Trans Softw Eng"},{"key":"10479_CR32","doi-asserted-by":"crossref","unstructured":"Neto EC, Da\u00a0Costa DA, Kulesza U (2018) The impact of refactoring changes on the SZZ algorithm: An empirical study. In: 2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 380\u2013390. IEEE","DOI":"10.1109\/SANER.2018.8330225"},{"key":"10479_CR33","doi-asserted-by":"crossref","unstructured":"Neto EC, Da\u00a0Costa DA, Kulesza U (2019) Revisiting and improving SZZ implementations. In: 2019 ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM), pp. 1\u201312. IEEE","DOI":"10.1109\/ESEM.2019.8870178"},{"issue":"5","key":"10479_CR34","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1145\/274946.274960","volume":"41","author":"AK Onoma","year":"1998","unstructured":"Onoma AK, Tsai WT, Poonawala M, Suganuma H (1998) Regression testing in an industrial environment. Commun ACM 41(5):81\u201386","journal-title":"Commun ACM"},{"issue":"1","key":"10479_CR35","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/s11219-015-9294-2","volume":"25","author":"M Perscheid","year":"2017","unstructured":"Perscheid M, Siegmund B, Taeumel M, Hirschfeld R (2017) Studying the advancement in debugging practice of professional software developers. Software Quality Journal 25(1):83\u2013110","journal-title":"Software Quality Journal"},{"key":"10479_CR36","unstructured":"Petrulio F, Ackermann D, Fregnan E, \u00c7alikli G, Castelluccio M, Ledru S, Denizet C, Humphries E, Bacchelli A (2022) SZZ in the time of Pull Requests. IEEE Trans Softw Eng"},{"key":"10479_CR37","doi-asserted-by":"crossref","unstructured":"Pinto LS, Sinha S, Orso A (2012) Understanding myths and realities of test-suite evolution. In: Proceedings of the ACM SIGSOFT 20th international symposium on the foundations of software engineering, pp. 1\u201311","DOI":"10.1145\/2393596.2393634"},{"key":"10479_CR38","doi-asserted-by":"crossref","unstructured":"Pokropi\u0144ski, J., Gasiorek, J., Kramarczyk, P., Madeyski, L.: SZZ Unleashed-RA-C: An Improved Implementation of the SZZ Algorithm and Empirical Comparison with Existing Open Source Solutions. In: Developments in Information & Knowledge Management for Business Applications, pp. 181\u2013199. Springer (2022)","DOI":"10.1007\/978-3-030-77916-0_7"},{"issue":"6","key":"10479_CR39","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1109\/TSE.2005.74","volume":"31","author":"R Purushothaman","year":"2005","unstructured":"Purushothaman R, Perry DE (2005) Toward understanding the rhetoric of small source code changes. IEEE Transactions on Software Engineering 31(6):511\u2013526","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10479_CR40","unstructured":"Rodr\u00edguez-P\u00e9rez G, Nagappan M, Robles G (2020) Watch out for extrinsic bugs! a case study of their impact in just-in-time bug prediction models on the OpenStack project. IEEE Trans Softw Eng"},{"key":"10479_CR41","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1016\/j.infsof.2018.03.009","volume":"99","author":"G Rodr\u00edguez-P\u00e9rez","year":"2018","unstructured":"Rodr\u00edguez-P\u00e9rez G, Robles G, Gonz\u00e1lez-Barahona JM (2018) Reproducibility and credibility in empirical software engineering: A case study based on a systematic literature review of the use of the SZZ algorithm. Inf Softw Technol 99:164\u2013176","journal-title":"Inf Softw Technol"},{"issue":"2","key":"10479_CR42","doi-asserted-by":"publisher","first-page":"1294","DOI":"10.1007\/s10664-019-09781-y","volume":"25","author":"G Rodr\u00edguez-P\u00e9rez","year":"2020","unstructured":"Rodr\u00edguez-P\u00e9rez G, Robles G, Serebrenik A, Zaidman A, Germ\u00e1n DM, Gonzalez-Barahona JM (2020) How bugs are born: a model to identify how bugs are introduced in software components. Empir Softw Eng 25(2):1294\u20131340","journal-title":"Empir Softw Eng"},{"key":"10479_CR43","doi-asserted-by":"crossref","unstructured":"Rosa G, Pascarella L, Scalabrino S, Tufano R, Bavota G, Lanza M, Oliveto R (2021) Evaluating SZZ implementations through a developer-informed oracle. In: 2021 IEEE\/ACM 43rd International Conference on Software Engineering (ICSE), pp. 436\u2013447. IEEE","DOI":"10.1109\/ICSE43902.2021.00049"},{"key":"10479_CR44","doi-asserted-by":"crossref","unstructured":"Saha R, Gligoric M (2017) Selective bisection debugging. In: International Conference on Fundamental Approaches to Software Engineering, pp. 60\u201377. Springer","DOI":"10.1007\/978-3-662-54494-5_4"},{"key":"10479_CR45","unstructured":"Schmidt DC, Porter A (2001) Leveraging open-source communities to improve the quality & performance of open-source software. In: Proceedings of the 1st Workshop on Open Source Software Engineering, vol.\u00a01. Citeseer"},{"key":"10479_CR46","doi-asserted-by":"crossref","unstructured":"Sidiroglou-Douskos S, Lahtinen E, Eden A, Long F, Rinard M (2017) Codecarboncopy. In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, pp. 95\u2013105","DOI":"10.1145\/3106237.3106269"},{"key":"10479_CR47","doi-asserted-by":"crossref","unstructured":"Sinha VS, Sinha S, Rao S (2010) Buginnings: identifying the origins of a bug. In: Proceedings of the 3rd India software engineering conference, pp. 3\u201312","DOI":"10.1145\/1730874.1730879"},{"issue":"4","key":"10479_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1082983.1083147","volume":"30","author":"J \u015aliwerski","year":"2005","unstructured":"\u015aliwerski J, Zimmermann T, Zeller A (2005) When do changes induce fixes? ACM sigsoft software engineering notes 30(4):1\u20135","journal-title":"ACM sigsoft software engineering notes"},{"issue":"6","key":"10479_CR49","doi-asserted-by":"publisher","first-page":"1665","DOI":"10.1007\/s10664-013-9258-8","volume":"19","author":"L Tan","year":"2014","unstructured":"Tan L, Liu C, Li Z, Wang X, Zhou Y, Zhai C (2014) Bug characteristics in open source software. Empirical Softw Eng 19(6):1665\u20131705","journal-title":"Empirical Softw Eng"},{"key":"10479_CR50","doi-asserted-by":"crossref","unstructured":"Tantithamthavorn C, Teekavanich R, Ihara A, Matsumoto Ki (2013) Mining a change history to quickly identify bug locations: A case study of the eclipse project. In: 2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), pp. 108\u2013113. IEEE","DOI":"10.1109\/ISSREW.2013.6688888"},{"issue":"4","key":"10479_CR51","volume":"29","author":"M Tufano","year":"2017","unstructured":"Tufano M, Palomba F, Bavota G, Di Penta M, Oliveto R, De Lucia A, Poshyvanyk D (2017) There and back again: Can you compile that snapshot? Journal of Software: Evolution and Process 29(4):e1838","journal-title":"Journal of Software: Evolution and Process"},{"issue":"1","key":"10479_CR52","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/308769.308790","volume":"24","author":"NJ Wahl","year":"1999","unstructured":"Wahl NJ (1999) An overview of regression testing. ACM SIGSOFT Software Engineering Notes 24(1):69\u201373","journal-title":"ACM SIGSOFT Software Engineering Notes"},{"key":"10479_CR53","doi-asserted-by":"crossref","unstructured":"Weiss C, Premraj R, Zimmermann T, Zeller A (2007) How long will it take to fix this bug? In: Fourth International Workshop on Mining Software Repositories (MSR\u201907: ICSE Workshops 2007), pp. 1\u20131. IEEE","DOI":"10.1109\/MSR.2007.13"},{"key":"10479_CR54","doi-asserted-by":"crossref","unstructured":"Wen M, Wu R, Liu Y, Tian Y, Xie X, Cheung SC, Su Z (2019) Exploring and exploiting the correlations between bug-inducing and bug-fixing commits. In: Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. ACM","DOI":"10.1145\/3338906.3338962"},{"key":"10479_CR55","doi-asserted-by":"crossref","unstructured":"Williams C, Spacco J (2008) Branching and merging in the repository. In: Proceedings of the 2008 international working conference on Mining software repositories, pp. 19\u201322","DOI":"10.1145\/1370750.1370754"},{"key":"10479_CR56","doi-asserted-by":"crossref","unstructured":"Williams C, Spacco J (2008) SZZ revisited: verifying when changes induce fixes. In: Proceedings of the 2008 workshop on Defects in large software systems, pp. 32\u201336","DOI":"10.1145\/1390817.1390826"},{"key":"10479_CR57","doi-asserted-by":"crossref","unstructured":"Yang D, Mao X, Chen L, Xu X, Lei Y, Lo D, He J (2022) Transplantfix: Graph differencing-based code transplantation for automated program repair. In: Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering, pp. 1\u201313","DOI":"10.1145\/3551349.3556893"},{"key":"10479_CR58","doi-asserted-by":"crossref","unstructured":"Yin Z, Yuan D, Zhou Y, Pasupathy S, Bairavasundaram L (2011) How do fixes become bugs? In: Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on Foundations of software engineering, pp. 26\u201336","DOI":"10.1145\/2025113.2025121"},{"key":"10479_CR59","doi-asserted-by":"crossref","unstructured":"Yoon YS, Myers,BA (2012) An exploratory study of backtracking strategies used by developers. In: 2012 5th International Workshop on Co-operative and Human Aspects of Software Engineering (CHASE), pp. 138\u2013144. IEEE","DOI":"10.1109\/CHASE.2012.6223012"},{"key":"10479_CR60","doi-asserted-by":"crossref","unstructured":"Yoon YS, Myers BA (2014) A longitudinal study of programmers\u2019 backtracking. In: 2014 IEEE Symposium on Visual Languages and Human-Centric Computing (VL\/HCC), pp. 101\u2013108. IEEE","DOI":"10.1109\/VLHCC.2014.6883030"},{"issue":"6","key":"10479_CR61","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/605466.605468","volume":"27","author":"A Zeller","year":"2002","unstructured":"Zeller A (2002) Isolating cause-effect chains from computer programs. ACM SIGSOFT Software Engineering Notes 27(6):1\u201310","journal-title":"ACM SIGSOFT Software Engineering Notes"},{"issue":"2","key":"10479_CR62","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1109\/32.988498","volume":"28","author":"A Zeller","year":"2002","unstructured":"Zeller A, Hildebrandt R (2002) Simplifying and isolating failure-inducing input. IEEE Trans Softw Eng 28(2):183\u2013200","journal-title":"IEEE Trans Softw Eng"},{"key":"10479_CR63","doi-asserted-by":"crossref","unstructured":"Zerouali A, Constantinou E, Mens T, Robles G, Gonz\u00e1lez-Barahona J (2018) An empirical analysis of technical lag in npm package dependencies. In: International Conference on Software Reuse, pp. 95\u2013110. Springer","DOI":"10.1007\/978-3-319-90421-4_6"},{"key":"10479_CR64","doi-asserted-by":"crossref","unstructured":"Zhang T, Kim M (2017) Automated transplantation and differential testing for clones. In: 2017 IEEE\/ACM 39th International Conference on Software Engineering (ICSE), pp. 665\u2013676. IEEE","DOI":"10.1109\/ICSE.2017.67"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-024-10479-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-024-10479-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-024-10479-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T02:13:55Z","timestamp":1717208035000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-024-10479-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5]]},"references-count":64,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,5]]}},"alternative-id":["10479"],"URL":"https:\/\/doi.org\/10.1007\/s10664-024-10479-z","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"type":"print","value":"1382-3256"},{"type":"electronic","value":"1573-7616"}],"subject":[],"published":{"date-parts":[[2024,5]]},"assertion":[{"value":"19 March 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 May 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This research has not involved human participants and\/or animals.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The authors declared that they have no conflict of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}],"article-number":"66"}}