{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T18:07:29Z","timestamp":1770919649770,"version":"3.50.1"},"reference-count":63,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,5,11]],"date-time":"2021-05-11T00:00:00Z","timestamp":1620691200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,5,11]],"date-time":"2021-05-11T00:00:00Z","timestamp":1620691200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s10664-021-09954-8","type":"journal-article","created":{"date-parts":[[2021,5,11]],"date-time":"2021-05-11T12:03:44Z","timestamp":1620734624000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["On using Stack Overflow comment-edit pairs to recommend code maintenance changes"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6771-4559","authenticated-orcid":false,"given":"Henry","family":"Tang","sequence":"first","affiliation":[]},{"given":"Sarah","family":"Nadi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,11]]},"reference":[{"key":"9954_CR1","doi-asserted-by":"publisher","unstructured":"Adaji I, Vassileva J (2016) Modelling user collaboration in social networks using edits and comments. In: Proceedings of the 2016 conference on user modeling adaptation and personalization, ser. UMAP \u201916. ACM, New York, pp 111\u2013114. [Online]. Available: https:\/\/doi.org\/10.1145\/2930238.2930289","DOI":"10.1145\/2930238.2930289"},{"key":"9954_CR2","doi-asserted-by":"crossref","unstructured":"Amann S, Nadi S, Nguyen HA, Nguyen TN, Mezini M (2016) MUBench: A benchmark for API-misuse detectors. In: 2016 IEEE\/ACM 13th working conference on mining software repositories. IEEE, pp 464\u2013467","DOI":"10.1145\/2901739.2903506"},{"key":"9954_CR3","doi-asserted-by":"crossref","unstructured":"Amann S, Nguyen HA, Nadi S, Nguyen TN, Mezini M (2018) A systematic evaluation of static API-misuse detectors. IEEE Trans Softw Eng","DOI":"10.1109\/TSE.2018.2827384"},{"key":"9954_CR4","doi-asserted-by":"publisher","unstructured":"Bachmann A, Bird C, Rahman F, Devanbu P, Bernstein A (2010) The missing links: Bugs and bug-fix commits. In: Proceedings of the Eighteenth ACM SIGSOFT international symposium on foundations of software engineering, ser. FSE \u201910. ACM, New York, pp 97\u2013106. [Online]. Available: https:\/\/doi.org\/10.1145\/1882291.1882308","DOI":"10.1145\/1882291.1882308"},{"key":"9954_CR5","unstructured":"Baltes S (2018) Edit and comment history of Stack Overflow threads. [Online]. Available: https:\/\/empirical-software.engineering\/blog\/sotorrent-edithistory"},{"key":"9954_CR6","doi-asserted-by":"crossref","unstructured":"Baltes S, Treude C, Diehl S (2018) SOTorrent: Studying the origin, evolution, and usage of Stack Overflow code snippets. arXiv:1809.02814. [Online]. Available: 1809.02814","DOI":"10.1145\/3196398.3196430"},{"issue":"3","key":"9954_CR7","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1007\/s10664-012-9231-y","volume":"19","author":"A Barua","year":"2014","unstructured":"Barua A, Thomas SW, Hassan AE (2014) What are developers talking about? An analysis of topics and trends in Stack Overflow. Empir Softw Eng 19 (3):619\u2013654. [Online]. Available: https:\/\/doi.org\/10.1007\/s10664-012-9231-y","journal-title":"Empir Softw Eng"},{"key":"9954_CR8","doi-asserted-by":"publisher","unstructured":"Bird C, Bachmann A, Aune E, Duffy J, Bernstein A, Filkov V, Devanbu P (2009) Fair and balanced?: Bias in bug-fix datasets. In: Proceedings of the 7th joint meeting of the european software engineering conference and the ACM SIGSOFT symposium on the foundations of software engineering, ser. ESEC\/FSE \u201909. ACM, New York, pp 121\u2013130. [Online]. Available: https:\/\/doi.org\/10.1145\/1595696.1595716","DOI":"10.1145\/1595696.1595716"},{"key":"9954_CR9","doi-asserted-by":"crossref","unstructured":"Bissyand\u00e9 TF, Thung F, Wang S, Lo D, Jiang L, R\u00e9 veill\u00e8re L (2013) Empirical evaluation of bug linking. In: 2013 17th European conference on software maintenance and reengineering, pp 89\u201398","DOI":"10.1109\/CSMR.2013.19"},{"key":"9954_CR10","unstructured":"ChairNerd (2011) Fuzzywuzzy: Fuzzy string matching in Python. [Online]. Available: https:\/\/chairnerd.seatgeek.com\/fuzzywuzzy-fuzzy-string-matching-in-python\/"},{"issue":"1","key":"9954_CR11","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/TSMCA.2003.811129","volume":"33","author":"SWK Chan","year":"2003","unstructured":"Chan SWK, Franklin J (2003) Dynamic context generation for natural language understanding: A multifaceted knowledge approach. IEEE Trans Sys Man Cybern Part A Syst Hum 33(1):23\u201341","journal-title":"IEEE Trans Sys Man Cybern Part A Syst Hum"},{"key":"9954_CR12","doi-asserted-by":"crossref","unstructured":"Cifuentes C, Hoermann C, Keynes N, Li L, Long S, Mealy E, Mounteney M, Scholz B (2009) BegBunch: Benchmarking for C bug detection tools. In: Proceedings of the 2nd international workshop on defects in large software systems: held in conjunction with the ACM SIGSOFT international symposium on software testing and analysis, pp 16\u201320","DOI":"10.1145\/1555860.1555866"},{"key":"9954_CR13","doi-asserted-by":"crossref","unstructured":"Cort\u00e9s-Coy LF, Linares-V\u00e1squez M, Aponte J, Poshyvanyk D (2014) On automatically generating commit messages via summarization of source code changes. In: 14th IEEE international working conference on source code analysis and manipulation, pp 275\u2013284","DOI":"10.1109\/SCAM.2014.14"},{"key":"9954_CR14","doi-asserted-by":"publisher","unstructured":"Dalip DH, Gon\u00e7alves MA, Cristo M, Calado P (2013) Exploiting user feedback to learn to rank answers in Q&A forums: A case study with Stack Overflow. In: Proceedings of the 36th international ACM SIGIR conference on research and development in information retrieval, ser. SIGIR \u201913. ACM, New York. [Online]. Available: https:\/\/doi.org\/10.1145\/2484028.2484072","DOI":"10.1145\/2484028.2484072"},{"key":"9954_CR15","doi-asserted-by":"publisher","unstructured":"Dallmeier V, Zimmermann T (2007) Extraction of bug localization benchmarks from history. In: Proceedings of the Twenty-second IEEE\/ACM international conference on automated software engineering, ser. ASE \u201907. ACM, New York, pp 433\u2013436. [Online]. Available: https:\/\/doi.org\/10.1145\/1321631.1321702","DOI":"10.1145\/1321631.1321702"},{"key":"9954_CR16","doi-asserted-by":"crossref","unstructured":"Dallmeier V, Zimmermann T (2007) Extraction of bug localization benchmarks from history. In: Proceedings of the twenty-second IEEE\/ACM international conference on Automated software engineering, pp 433\u2013436","DOI":"10.1145\/1321631.1321702"},{"key":"9954_CR17","doi-asserted-by":"publisher","unstructured":"Diamantopoulos T, Sifaki M-I, Symeonidis AL (2019) Towards mining answer edits to extract evolution patterns in Stack Overflow. In: Proceedings of the 16th international conference on mining software repositories, ser. MSR \u201919. IEEE Press, Piscataway, pp 215\u2013219. [Online]. Available: https:\/\/doi.org\/10.1109\/MSR.2019.00043","DOI":"10.1109\/MSR.2019.00043"},{"key":"9954_CR18","doi-asserted-by":"crossref","unstructured":"Dit B, Holtzhauer A, Poshyvanyk D, Kagdi H (2013) A dataset from change history to support evaluation of software maintenance tasks. In: 2013 10th working conference on mining software repositories. IEEE, pp 131\u2013134","DOI":"10.1109\/MSR.2013.6624019"},{"key":"9954_CR19","doi-asserted-by":"crossref","unstructured":"Dyer R, Nguyen HA, Rajan H, Nguyen TN (2013) Boa: A language and infrastructure for analyzing ultra-large-scale software repositories. In: Proceedings of the 2013 international conference on software engineering. IEEE Press, pp 422\u2013431","DOI":"10.1109\/ICSE.2013.6606588"},{"key":"9954_CR20","doi-asserted-by":"publisher","unstructured":"Falleri J, Morandat F, Blanc X, Martinez M, Monperrus M (2014) Fine-grained and accurate source code differencing. In: ACM\/IEEE international conference on automated software engineering, ASE \u201914, Vasteras, Sweden - September 15 - 19, 2014, pp 313\u2013324. [Online]. Available: https:\/\/doi.org\/10.1145\/2642937.2642982","DOI":"10.1145\/2642937.2642982"},{"issue":"5","key":"9954_CR21","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1109\/32.815326","volume":"25","author":"NE Fenton","year":"1999","unstructured":"Fenton NE, Neil M (1999) A critique of software defect prediction models. IEEE Trans Softw Eng 25(5):675\u2013689","journal-title":"IEEE Trans Softw Eng"},{"key":"9954_CR22","doi-asserted-by":"publisher","first-page":"110691","DOI":"10.1016\/j.jss.2020.110691","volume":"169","author":"R Ferenc","year":"2020","unstructured":"Ferenc R, Gyimesi P, Gyimesi G, T\u00f3th Z, Gyim\u00f3thy T (2020) An automatically created novel bug dataset and its validation in bug prediction. J Sys Softw 169:110691. [Online]. Available: http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0164121220301436","journal-title":"J Sys Softw"},{"key":"9954_CR23","doi-asserted-by":"crossref","unstructured":"Ganguly D, Roy D, Mitra M, Jones GJ (2015) Word embedding based generalized language model for information retrieval. In: Proceedings of the 38th international ACM SIGIR conference on research and development in information retrieval, pp 795\u2013798","DOI":"10.1145\/2766462.2767780"},{"key":"9954_CR24","doi-asserted-by":"crossref","unstructured":"Gao Q, Zhang H, Wang J, Xiong Y, Zhang L, Mei H (2015) Fixing recurring crash bugs via analyzing Q&A sites (t). In: 2015 30th IEEE\/ACM international conference on automated software engineering. IEEE, pp 307\u2013318","DOI":"10.1109\/ASE.2015.81"},{"issue":"1","key":"9954_CR25","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/TSE.2017.2755013","volume":"45","author":"L Gazzola","year":"2019","unstructured":"Gazzola L, Micucci D, Mariani L (2019) Automatic software repair: a survey. IEEE Trans Softw Eng 45(1):34\u201367","journal-title":"IEEE Trans Softw Eng"},{"key":"9954_CR26","doi-asserted-by":"crossref","unstructured":"Herzig K, Just S, Zeller A (2013) It\u2019s not a bug, it\u2019s a feature: How misclassification impacts bug prediction. In: Proceedings of the 2013 international conference on software engineering, ser. ICSE \u201913. IEEE Press, Piscataway, pp 392\u2013401. [Online]. Available: http:\/\/dl.acm.org\/citation.cfm?id=2486788.2486840","DOI":"10.1109\/ICSE.2013.6606585"},{"key":"9954_CR27","doi-asserted-by":"crossref","unstructured":"Herzig K, Zeller A (2013) The impact of tangled code changes. In: 2013 10th working conference on mining software repositories. IEEE, pp 121\u2013130","DOI":"10.1109\/MSR.2013.6624018"},{"issue":"2","key":"9954_CR28","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s10664-015-9376-6","volume":"21","author":"K Herzig","year":"2016","unstructured":"Herzig K, Just S, Zeller A (2016) The impact of tangled code changes on defect prediction models. Empir Softw Eng 21(2):303\u2013336. [Online]. Available: https:\/\/doi.org\/10.1007\/s10664-015-9376-6","journal-title":"Empir Softw Eng"},{"key":"9954_CR29","doi-asserted-by":"crossref","unstructured":"Horton E, Parnin C (2019) Dockerizeme:, Automatic inference of environment dependencies for Python code snippets. In: 41st IEEE\/ACM international conference on software engineering, pp 328\u2013338","DOI":"10.1109\/ICSE.2019.00047"},{"key":"9954_CR30","doi-asserted-by":"publisher","unstructured":"Jin X, Servant F (2019) What edits are done on the highly answered questions in Stack Overflow?: An empirical study. In: Proceedings of the 16th international conference on mining software repositories, ser. MSR \u201919. IEEE Press, Piscataway, pp 225\u2013229. [Online]. Available: https:\/\/doi.org\/10.1109\/MSR.2019.00045","DOI":"10.1109\/MSR.2019.00045"},{"key":"9954_CR31","doi-asserted-by":"publisher","unstructured":"Just R, Jalali D, Ernst MD (2014) Defects4J: A database of existing faults to enable controlled testing studies for Java programs. In: Proceedings of the 2014 international symposium on software testing and analysis, ser. ISSTA \u201914. ACM, New York, pp 437\u2013440. [Online]. Available: https:\/\/doi.org\/10.1145\/2610384.2628055","DOI":"10.1145\/2610384.2628055"},{"key":"9954_CR32","doi-asserted-by":"crossref","unstructured":"Kim S, Zimmermann T, Pan K, Whitehead EJ Jr (2006) Automatic identification of bug-introducing changes. In: 21st IEEE\/ACM international conference on automated software engineering, pp 81\u201390","DOI":"10.1109\/ASE.2006.23"},{"issue":"18","key":"9954_CR33","first-page":"707","volume":"110","author":"VI Levenshtein","year":"1966","unstructured":"Levenshtein VI (1966) Binary codes capable of correcting deletions, insertions and reversals. Soviet Phys Doklady 110(18):707\u2013710. doklady Akademii Nauk SSSR, V163 No4, 845\u2013848 (1965)","journal-title":"Soviet Phys Doklady"},{"key":"9954_CR34","doi-asserted-by":"publisher","unstructured":"Lin B, Zampetti F, Bavota G, Di Penta M, Lanza M (2019) Pattern-based mining of opinions in Q&A websites. In: Proceedings of the 41st international conference on software engineering, ser. ICSE \u201919. IEEE Press, Piscataway, pp 548\u2013559. [Online]. Available: https:\/\/doi.org\/10.1109\/ICSE.2019.00066","DOI":"10.1109\/ICSE.2019.00066"},{"key":"9954_CR35","doi-asserted-by":"crossref","unstructured":"Liu C, Yang J, Tan L, Hafiz M (2013) r2fix: Automatically generating bug fixes from bug reports. In: 2013 IEEE Sixth international conference on software testing, verification and validation, pp 282\u2013291","DOI":"10.1109\/ICST.2013.24"},{"key":"9954_CR36","doi-asserted-by":"crossref","unstructured":"Liu X, Zhong H (2018) Mining stack overflow for program repair. In: 2018 IEEE 25th international conference on software analysis evolution and reengineering, pp 118\u2013129","DOI":"10.1109\/SANER.2018.8330202"},{"key":"9954_CR37","doi-asserted-by":"crossref","unstructured":"Maalej W, Happel H-J (2010) Can development work describe itself?. In: 2010 7th IEEE working conference on mining software repositories. IEEE, pp 191\u2013200","DOI":"10.1109\/MSR.2010.5463344"},{"issue":"3","key":"9954_CR38","doi-asserted-by":"publisher","first-page":"276","DOI":"10.11613\/BM.2012.031","volume":"22","author":"ML McHugh","year":"2012","unstructured":"McHugh ML (2012) Interrater reliability:, The kappa statistic. Biochemia medica: Biochemia medica 22(3):276\u2013282","journal-title":"Biochemia medica: Biochemia medica"},{"key":"9954_CR39","unstructured":"Menzies T, Caglayan B, Kocaguneli E, Krall J, Peters F, Turhan B (2012) The promise repository of empirical software engineering data"},{"key":"9954_CR40","doi-asserted-by":"publisher","unstructured":"Nguyen AT, Nguyen TT, Nguyen HA, Nguyen TN (2012) Multi-layered approach for recovering links between bug reports and fixes. In: Proceedings of the ACM SIGSOFT 20th international symposium on the foundations of software engineering, ser. FSE \u201912. ACM, New York, pp 63:1\u201363:11. [Online]. Available: https:\/\/doi.org\/10.1145\/2393596.2393671","DOI":"10.1145\/2393596.2393671"},{"key":"9954_CR41","doi-asserted-by":"crossref","unstructured":"Ohira M, Kashiwa Y, Yamatani Y, Yoshiyuki H, Maeda Y, Limsettho N, Fujino K, Hata H, Ihara A, Matsumoto K (2015) A dataset of high impact bugs: Manually-classified issue reports. In: 2015 IEEE\/ACM 12th working conference on mining software repositories. IEEE, pp 518\u2013521","DOI":"10.1109\/MSR.2015.78"},{"key":"9954_CR42","doi-asserted-by":"publisher","unstructured":"Online artifact page https:\/\/doi.org\/10.5281\/zenodo.4458586","DOI":"10.5281\/zenodo.4458586"},{"key":"9954_CR43","doi-asserted-by":"publisher","unstructured":"Ponzanelli L, Bavota G, Di Penta M, Oliveto R, Lanza M (2014) Mining Stack Overflow to turn the IDE into a self-confident programming prompter. In: Proceedings of the 11th working conference on mining software repositories, ser. MSR \u201914. ACM, New York, pp 102\u2013111. [Online]. Available: https:\/\/doi.org\/10.1145\/2597073.2597077","DOI":"10.1145\/2597073.2597077"},{"key":"9954_CR44","doi-asserted-by":"publisher","unstructured":"Radu A, Nadi S (2019) A dataset of non-functional bugs. In: Proceedings of the 16th international conference on mining software repositories, ser. MSR \u201919. IEEE Press, Piscataway, pp 399\u2013403. [Online]. Available: https:\/\/doi.org\/10.1109\/MSR.2019.00066","DOI":"10.1109\/MSR.2019.00066"},{"issue":"3","key":"9954_CR45","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1109\/TSE.2019.2900307","volume":"47","author":"C Ragkhitwetsagul","year":"2019","unstructured":"Ragkhitwetsagul C, Krinke J, Paixao M, Bianco G, Oliveto R (2019) Toxic code snippets on stack overflow. IEEE Trans Softw Eng 47(3):560\u2013581. https:\/\/doi.org\/10.1109\/TSE.2019.2900307","journal-title":"IEEE Trans Softw Eng"},{"issue":"4","key":"9954_CR46","doi-asserted-by":"publisher","first-page":"1869","DOI":"10.1007\/s10664-018-9671-0","volume":"24","author":"MM Rahman","year":"2019","unstructured":"Rahman MM, Roy CK, Lo D (2019) Automatic query reformulation for code search using crowdsourced knowledge. Empir Softw Eng 24(4):1869\u20131924","journal-title":"Empir Softw Eng"},{"key":"9954_CR47","doi-asserted-by":"crossref","unstructured":"Rao S, III HD (2018) Learning to ask good questions: Ranking clarification questions using neural expected value of perfect information. [Online]. Available: arXiv:1805.04655.","DOI":"10.18653\/v1\/P18-1255"},{"key":"9954_CR48","doi-asserted-by":"crossref","unstructured":"Rastkar S., Murphy GC, Murray G (2010) Summarizing software artifacts:, A case study of bug reports. In: 2010 ACM\/IEEE 32nd international conference on software engineering, vol 1, pp 505\u2013514","DOI":"10.1145\/1806799.1806872"},{"key":"9954_CR49","doi-asserted-by":"crossref","unstructured":"Saifullah CMK, Asaduzzaman M, Roy CK (2019) Learning from examples to find fully qualified names of API elements in code snippets. In: 2019 34th IEEE\/ACM international conference on automated software engineering, pp 243\u2013254","DOI":"10.1109\/ASE.2019.00032"},{"key":"9954_CR50","doi-asserted-by":"publisher","unstructured":"\u015aliwerski J, Zimmermann T, Zeller A (2005) When do changes induce fixes?. In: Proceedings of the 2005 international workshop on mining software repositories, ser. MSR \u201905. ACM, New York, pp 1\u20135. [Online]. Available: https:\/\/doi.org\/10.1145\/1082983.1083147","DOI":"10.1145\/1082983.1083147"},{"key":"9954_CR51","doi-asserted-by":"publisher","unstructured":"Soni A, Nadi S (2019) Analyzing comment-induced updates on stack overflow. In: Proceedings of the 16th international conference on mining software repositories, ser. MSR \u201919. IEEE Press, Piscataway, pp 220\u2013234. [Online]. Available: https:\/\/doi.org\/10.1109\/MSR.2019.00044","DOI":"10.1109\/MSR.2019.00044"},{"key":"9954_CR52","doi-asserted-by":"publisher","unstructured":"Subramanian S, Inozemtseva L, Holmes R (2014) Live API documentation. In: Proceedings of the 36th international conference on software engineering, ser. ICSE \u201914. ACM, New York, pp 643\u2013652. [Online]. Available: https:\/\/doi.org\/10.1145\/2568225.2568313","DOI":"10.1145\/2568225.2568313"},{"key":"9954_CR53","doi-asserted-by":"crossref","unstructured":"Subramanian S, Inozemtseva L, Holmes R (2014) Live API documentation. In: Proceedings of the 36th international conference on software engineering, pp 643\u2013652","DOI":"10.1145\/2568225.2568313"},{"key":"9954_CR54","unstructured":"Swanson EB (1976) The dimensions of maintenance. In: Proceedings of the 2nd international conference on Software engineering, pp 492\u2013497"},{"key":"9954_CR55","doi-asserted-by":"crossref","unstructured":"Thiselton E, Treude C (2019) Enhancing Python compiler error messages via Stack Overflow, [Online]. Available: arXiv:1906.11456","DOI":"10.1109\/ESEM.2019.8870155"},{"key":"9954_CR56","doi-asserted-by":"crossref","unstructured":"Tomassi DA, Dmeiri N, Wang Y, Bhowmick A, Liu Y-C, Devanbu PT, Vasilescu B, Rubio-Gonz\u00e1lez C (2019) Bugswarm: Mining and continuously growing a dataset of reproducible failures and fixes. In: 2019 IEEE\/ACM 41st international conference on software engineering. IEEE, pp 339\u2013349","DOI":"10.1109\/ICSE.2019.00048"},{"key":"9954_CR57","doi-asserted-by":"crossref","unstructured":"Treude C, Robillard MP (2016) Augmenting API documentation with insights from stack overflow. In: 2016 IEEE\/ACM 38th international conference on software engineering, pp 392\u2013403","DOI":"10.1145\/2884781.2884800"},{"issue":"5","key":"9954_CR58","first-page":"360","volume":"37","author":"AJ Viera","year":"2005","unstructured":"Viera AJ, Garrett JM et al (2005) Understanding interobserver agreement: the kappa statistic. Fam med 37(5):360\u2013363","journal-title":"Fam med"},{"key":"9954_CR59","first-page":"1","volume":"PP","author":"S Wang","year":"2018","unstructured":"Wang S, Chen T-HP, Hassan AE (2018) How do users revise answers on technical Q&A websites? A case study on Stack Overflow. IEEE Trans Softw Eng PP:1\u20131","journal-title":"IEEE Trans Softw Eng"},{"key":"9954_CR60","doi-asserted-by":"crossref","unstructured":"Wong AW, Salimi A, Chowdhury S, Hindle A (2019) Syntax and stack overflow: A methodology for extracting a corpus of syntax errors and fixes. In: 2019 IEEE international conference on software maintenance and evolution, pp 318\u2013322","DOI":"10.1109\/ICSME.2019.00048"},{"key":"9954_CR61","doi-asserted-by":"crossref","unstructured":"Zhang H, Wang S, Chen T, Hassan AE (2019a) Reading answers on Stack overflow: not enough!. IEEE Trans Softw Eng 1\u20131","DOI":"10.1109\/TSE.2019.2954319"},{"key":"9954_CR62","doi-asserted-by":"publisher","unstructured":"Zhang H, Wang S, Chen TP, Zou Y, Hassan AE (2019b) An empirical study of obsolete answers on stack overflow. IEEE Trans Softw Eng 47 (4):850\u2013862. https:\/\/doi.org\/10.1109\/TSE.2019.2906315","DOI":"10.1109\/TSE.2019.2906315"},{"key":"9954_CR63","doi-asserted-by":"publisher","unstructured":"Zhang T, Yang D, Lopes C, Kirnt M (2019c) Analyzing and supporting adaptation of online code examples. In: Proceedings of the 41st international conference on software engineering, ser. ICSE \u201919. IEEE Press, Piscataway, pp 316\u2013327. [Online]. Available: https:\/\/doi.org\/10.1109\/ICSE.2019.00046","DOI":"10.1109\/ICSE.2019.00046"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-021-09954-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-021-09954-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-021-09954-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T12:34:52Z","timestamp":1624451692000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-021-09954-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,11]]},"references-count":63,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["9954"],"URL":"https:\/\/doi.org\/10.1007\/s10664-021-09954-8","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,11]]},"assertion":[{"value":"26 February 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 May 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"68"}}