Exploring the relationship of a file's history and its fault-proneness: an empirical method and its application to open source programs

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Illes-Seifert, Timea (VerfasserIn) , Paech, Barbara (VerfasserIn)
Dokumenttyp: Article (Journal)
Sprache:Englisch
Veröffentlicht: 2010
In: Information & software technology
Year: 2010, Jahrgang: 52, Heft: 5, Pages: 539-558
DOI:10.1016/j.infsof.2009.11.010
Online-Zugang:Resolving-System, Volltext: http://dx.doi.org/10.1016/j.infsof.2009.11.010
Volltext
Verfasserangaben:Timea Illes-Seifert; Barbara Paech

MARC

LEADER 00000caa a22000002c 4500
001 1469234750
003 DE-627
005 20220811050446.0
007 cr uuu---uuuuu
008 131219s2010 xx |||||o 00| ||eng c
024 7 |a 10.1016/j.infsof.2009.11.010  |2 doi 
035 |a (DE-627)1469234750 
035 |a (DE-576)399234756 
035 |a (DE-599)BSZ399234756 
035 |a (OCoLC)1340543183 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
084 |a 28  |2 sdnb 
100 1 |a Illes-Seifert, Timea  |0 (DE-588)102236085X  |0 (DE-627)716959666  |0 (DE-576)365278378  |4 aut 
245 1 0 |a Exploring the relationship of a file's history and its fault-proneness  |b an empirical method and its application to open source programs  |c Timea Illes-Seifert; Barbara Paech 
264 1 |c 2010 
300 |a 20 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a Gesehen am 19.12.2013 
700 1 |a Paech, Barbara  |d 1959-  |0 (DE-588)172299799  |0 (DE-627)697208648  |0 (DE-576)133166821  |4 aut 
773 0 8 |i In  |t Information & software technology  |d Amsterdam [u.a.] : Elsevier Science, 1987  |g 52(2010), 5, Seite 539-558  |h Online-Ressource  |w (DE-627)320419185  |w (DE-600)2002332-7  |w (DE-576)259271160  |7 nnas  |a Exploring the relationship of a file's history and its fault-proneness an empirical method and its application to open source programs 
773 1 8 |g volume:52  |g year:2010  |g number:5  |g pages:539-558  |g extent:20  |a Exploring the relationship of a file's history and its fault-proneness an empirical method and its application to open source programs 
856 4 0 |u http://dx.doi.org/10.1016/j.infsof.2009.11.010  |x Resolving-System  |3 Volltext 
951 |a AR 
992 |a 20131219 
993 |a Article 
994 |a 2010 
998 |g 172299799  |a Paech, Barbara  |m 172299799:Paech, Barbara  |d 110000  |d 110300  |e 110000PP172299799  |e 110300PP172299799  |k 0/110000/  |k 1/110000/110300/  |p 2  |y j 
999 |a KXP-PPN1469234750  |e 2779069554 
BIB |a Y 
SER |a journal 
JSO |a {"person":[{"family":"Illes-Seifert","given":"Timea","display":"Illes-Seifert, Timea","role":"aut"},{"family":"Paech","given":"Barbara","role":"aut","display":"Paech, Barbara"}],"note":["Gesehen am 19.12.2013"],"recId":"1469234750","language":["eng"],"physDesc":[{"extent":"20 S."}],"relHost":[{"type":{"media":"Online-Ressource","bibl":"periodical"},"disp":"Exploring the relationship of a file's history and its fault-proneness an empirical method and its application to open source programsInformation & software technology","physDesc":[{"extent":"Online-Ressource"}],"language":["eng"],"recId":"320419185","note":["Gesehen am 28.05.2020"],"pubHistory":["29.1987 - 56.2014; Vol. 57.2015 -"],"titleAlt":[{"title":"Information and software technology"}],"title":[{"title":"Information & software technology","title_sort":"Information & software technology"}],"id":{"zdb":["2002332-7"],"eki":["320419185"]},"part":{"pages":"539-558","volume":"52","issue":"5","text":"52(2010), 5, Seite 539-558","extent":"20","year":"2010"},"origin":[{"publisherPlace":"Amsterdam [u.a.]","publisher":"Elsevier Science","dateIssuedKey":"1987","dateIssuedDisp":"1987-"}]}],"origin":[{"dateIssuedDisp":"2010","dateIssuedKey":"2010"}],"id":{"doi":["10.1016/j.infsof.2009.11.010"],"eki":["1469234750"]},"name":{"displayForm":["Timea Illes-Seifert; Barbara Paech"]},"title":[{"title":"Exploring the relationship of a file's history and its fault-proneness","title_sort":"Exploring the relationship of a file's history and its fault-proneness","subtitle":"an empirical method and its application to open source programs"}],"type":{"bibl":"article-journal","media":"Online-Ressource"}} 
SRT |a ILLESSEIFEEXPLORINGT2010