{"id":"https://openalex.org/W2514045537","doi":"https://doi.org/10.1145/2973839.2973844","title":"Characterizing Bug Workflows in Mozilla Firefox","display_name":"Characterizing Bug Workflows in Mozilla Firefox","publication_year":2016,"publication_date":"2016-08-31","ids":{"openalex":"https://openalex.org/W2514045537","doi":"https://doi.org/10.1145/2973839.2973844","mag":"2514045537"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/2973839.2973844","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064131767","display_name":"Henrique Rocha","orcid":"https://orcid.org/0000-0002-9154-0277"},"institutions":[{"id":"https://openalex.org/I110200422","display_name":"Universidade Federal de Minas Gerais","ror":"https://ror.org/0176yjw32","country_code":"BR","type":"funder","lineage":["https://openalex.org/I110200422"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Henrique Rocha","raw_affiliation_strings":["Department of Computer Science, Federal University of Minas Gerais, Belo Horizonte, Brazil"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Federal University of Minas Gerais, Belo Horizonte, Brazil","institution_ids":["https://openalex.org/I110200422"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103969223","display_name":"Guilherme de Oliveira","orcid":null},"institutions":[{"id":"https://openalex.org/I110200422","display_name":"Universidade Federal de Minas Gerais","ror":"https://ror.org/0176yjw32","country_code":"BR","type":"funder","lineage":["https://openalex.org/I110200422"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Guilherme de Oliveira","raw_affiliation_strings":["Department of Computer Science, Federal University of Minas Gerais, Belo Horizonte, Brazil"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Federal University of Minas Gerais, Belo Horizonte, Brazil","institution_ids":["https://openalex.org/I110200422"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100703246","display_name":"Marco T\u00falio Valente","orcid":"https://orcid.org/0000-0002-8180-7548"},"institutions":[{"id":"https://openalex.org/I110200422","display_name":"Universidade Federal de Minas Gerais","ror":"https://ror.org/0176yjw32","country_code":"BR","type":"funder","lineage":["https://openalex.org/I110200422"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Marco Tulio Valente","raw_affiliation_strings":["Department of Computer Science, Federal University of Minas Gerais, Belo Horizonte, Brazil"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Federal University of Minas Gerais, Belo Horizonte, Brazil","institution_ids":["https://openalex.org/I110200422"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047557288","display_name":"Humberto Torres Marques-Neto","orcid":"https://orcid.org/0000-0002-3164-8323"},"institutions":[{"id":"https://openalex.org/I170935008","display_name":"Pontif\u00edcia Universidade Cat\u00f3lica de Minas Gerais","ror":"https://ror.org/03j1rr444","country_code":"BR","type":"funder","lineage":["https://openalex.org/I170935008"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Humberto Marques-Neto","raw_affiliation_strings":["Department of Computer Science, Pontifical Catholic University of Minas Gerais, Belo Horizonte, Brazil"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Pontifical Catholic University of Minas Gerais, Belo Horizonte, Brazil","institution_ids":["https://openalex.org/I170935008"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":10,"citation_normalized_percentile":{"value":0.705556,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":86,"max":87},"biblio":{"volume":null,"issue":null,"first_page":"43","last_page":"52"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9949,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10430","display_name":"Software Engineering Techniques and Practices","score":0.9949,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-bug","display_name":"Software bug","score":0.8091345},{"id":"https://openalex.org/keywords/security-bug","display_name":"Security bug","score":0.71489793},{"id":"https://openalex.org/keywords/software-regression","display_name":"Software regression","score":0.4617107},{"id":"https://openalex.org/keywords/software-maintenance","display_name":"Software Maintenance","score":0.41557848}],"concepts":[{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.8626183},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.8091345},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7354079},{"id":"https://openalex.org/C131275738","wikidata":"https://www.wikidata.org/wiki/Q7445023","display_name":"Security bug","level":5,"score":0.71489793},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.5201357},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.50800824},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4797848},{"id":"https://openalex.org/C191727507","wikidata":"https://www.wikidata.org/wiki/Q24346","display_name":"Software regression","level":5,"score":0.4617107},{"id":"https://openalex.org/C101317890","wikidata":"https://www.wikidata.org/wiki/Q940053","display_name":"Software maintenance","level":4,"score":0.41557848},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.33156493},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3145206},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.27329588},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.25389284},{"id":"https://openalex.org/C117447612","wikidata":"https://www.wikidata.org/wiki/Q1412670","display_name":"Software quality","level":4,"score":0.13554609},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.0},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/2973839.2973844","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":19,"referenced_works":["https://openalex.org/W1965709710","https://openalex.org/W1967400608","https://openalex.org/W1988771803","https://openalex.org/W2001584205","https://openalex.org/W2009263365","https://openalex.org/W2018392680","https://openalex.org/W2025320861","https://openalex.org/W2074019008","https://openalex.org/W2079317829","https://openalex.org/W2101585275","https://openalex.org/W2107294940","https://openalex.org/W2110229593","https://openalex.org/W2124482849","https://openalex.org/W2132547353","https://openalex.org/W2160198296","https://openalex.org/W2165789453","https://openalex.org/W2440701844","https://openalex.org/W2801830100","https://openalex.org/W3142566747"],"related_works":["https://openalex.org/W4317497242","https://openalex.org/W3185783519","https://openalex.org/W3048815537","https://openalex.org/W2967225146","https://openalex.org/W2135303064","https://openalex.org/W2123854374","https://openalex.org/W2095709152","https://openalex.org/W2044225531","https://openalex.org/W2038197060","https://openalex.org/W2007984522"],"abstract_inverted_index":{"Bug":[0,79],"handling":[1,42],"represents":[2],"a":[3,58,109,116,177,190],"major":[4],"effort":[5],"in":[6,33,95,142],"most":[7],"software":[8,15],"projects.":[9],"To":[10,53],"improve":[11],"this":[12,54],"relevant":[13],"task,":[14],"organizations":[16],"must":[17],"first":[18],"understand":[19,46,85],"the":[20,40,50,63,76,86,143,148],"current":[21],"status":[22],"of":[23,37,78,103,129,150],"their":[24],"bug":[25,34,41,105,110,153,191],"resolution":[26,179],"process.":[27,52],"Although":[28],"there":[29],"are":[30,132,160],"plentiful":[31],"research":[32],"reports,":[35],"few":[36],"them":[38],"address":[39],"workflow":[43,65],"to":[44,83,115,123,163,169,197],"better":[45],"and":[47,97],"reason":[48],"about":[49],"maintenance":[51],"purpose,":[55],"we":[56,98],"report":[57],"characterization":[59],"study":[60],"focused":[61],"on":[62],"typical":[64],"followed":[66],"by":[67],"Mozilla":[68],"Firefox":[69,94],"developers":[70,175,189],"when":[71,108],"resolving":[72],"bugs.":[73],"We":[74,88],"propose":[75],"concept":[77],"Flow":[80],"Graphs":[81],"(BFG)":[82],"help":[84],"characterization.":[87],"analyze":[89],"13,564":[90],"bugs":[91,131],"reported":[92],"for":[93,186],"2015":[96],"discovered":[99],"some":[100],"interesting":[101],"characteristics":[102],"Firefox's":[104,151],"workflow:":[106],"(a)":[107],"is":[111],"not":[112],"formally":[113],"assigned":[114,162,199],"developer":[117],"it":[118],"requires":[119],"ten":[120],"more":[121,173,194],"days":[122,136,168],"be":[124,170,198],"resolved;":[125],"(b)":[126],"approximately":[127],"94%":[128],"duplicate":[130,152],"closed":[133],"within":[134],"two":[135],"or":[137],"less":[138,182,187],"after":[139],"they":[140],"appear":[141],"tracking":[144],"system":[145],"(which":[146],"reveals":[147],"efficiency":[149],"detection":[154],"procedures);":[155],"(c)":[156],"incomplete":[157],"bugs,":[158],"which":[159],"never":[161],"developers,":[164],"usually":[165,192],"require":[166],"70":[167],"closed;":[171],"(d)":[172],"skilled":[174,183,188],"show":[176],"faster":[178],"time":[180,195],"than":[181,200],"ones;":[184],"(e)":[185],"spends":[193],"waiting":[196],"being":[201],"fixed.":[202]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2514045537","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3}],"updated_date":"2025-04-18T19:04:18.245586","created_date":"2016-09-16"}