{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,22]],"date-time":"2025-03-22T08:58:47Z","timestamp":1742633927099,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006,9]]},"DOI":"10.1109\/ase.2006.23","type":"proceedings-article","created":{"date-parts":[[2006,12,13]],"date-time":"2006-12-13T15:33:43Z","timestamp":1166024023000},"page":"81-90","source":"Crossref","is-referenced-by-count":209,"title":["Automatic Identification of Bug-Introducing Changes"],"prefix":"10.1109","author":[{"given":"Sunghun","family":"Kim","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Zimmermann","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Pan","sequence":"additional","affiliation":[]},{"given":"E. James","family":"Jr. Whitehead","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Data Mining Practical Machine Learning Tools and Techniques","year":"2005","author":"witten","key":"17"},{"year":"0","key":"18"},{"key":"15","first-page":"107","article-title":"HATARI: Raising Risk Awareness. Research Demonstration","author":"s?liwerski","year":"2005","journal-title":"Proc Of the 2005 European Software Engineering Conference and 2005 Foundations of Software Engineering (ESEC\/FSE"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1083142.1083147"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2005.1553571"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1007512.1007524"},{"key":"11","article-title":"Properties of Signature Change Patterns","author":"kim","year":"2006","journal-title":"21st IEEE International Conference on Software Maintenance (ICSM)"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2000.883028"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2006.51"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2003.1201219"},{"key":"1","first-page":"177","article-title":"Facilitating Software Evolution with Kenyon","author":"bevan","year":"2005","journal-title":"Proc Of the 2005 European Software Engineering Conference and 2005 Foundations of Software Engineering (ESEC\/FSE"},{"year":"0","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2005.91"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.28"},{"key":"5","first-page":"97","article-title":"Micro Patterns in Java Code","author":"gil","year":"2005","journal-title":"Proc of the 20th Object Oriented Programming Systems Languages and Applications (OOPSLA '05)"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2003.1235403"},{"year":"0","key":"9"},{"key":"8","article-title":"IEEE Standard Classification for Software Anomalies","volume":"1044","year":"1993","journal-title":"IEEE Std"}],"event":{"name":"Proceedings. 21st IEEE International Conference on Automated Software Engineering","start":{"date-parts":[[2006,9,18]]},"location":"Tokyo","end":{"date-parts":[[2006,9,22]]}},"container-title":["21st IEEE\/ACM International Conference on Automated Software Engineering (ASE'06)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4019543\/4019544\/04019564.pdf?arnumber=4019564","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,5]],"date-time":"2019-02-05T02:55:40Z","timestamp":1549335340000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4019564\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,9]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/ase.2006.23","relation":{},"subject":[],"published":{"date-parts":[[2006,9]]}}}