{"id":"https://openalex.org/W7140225218","doi":"https://doi.org/10.48550/arxiv.2603.21322","title":"Which Alert Removals are Beneficial?","display_name":"Which Alert Removals are Beneficial?","publication_year":2026,"publication_date":"2026-03-22","ids":{"openalex":"https://openalex.org/W7140225218","doi":"https://doi.org/10.48550/arxiv.2603.21322"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2603.21322","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.21322","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2603.21322","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Amit, Idan","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Amit, Idan","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.6804999709129333,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.6804999709129333,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.13439999520778656,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.05770000070333481,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/psychological-intervention","display_name":"Psychological intervention","score":0.5800999999046326},{"id":"https://openalex.org/keywords/python","display_name":"Python (programming language)","score":0.5307000279426575},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.44690001010894775},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.4223000109195709},{"id":"https://openalex.org/keywords/source-lines-of-code","display_name":"Source lines of code","score":0.36800000071525574},{"id":"https://openalex.org/keywords/predictive-power","display_name":"Predictive power","score":0.367900013923645}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6517000198364258},{"id":"https://openalex.org/C27415008","wikidata":"https://www.wikidata.org/wiki/Q7256382","display_name":"Psychological intervention","level":2,"score":0.5800999999046326},{"id":"https://openalex.org/C519991488","wikidata":"https://www.wikidata.org/wiki/Q28865","display_name":"Python (programming language)","level":2,"score":0.5307000279426575},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.44690001010894775},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.4223000109195709},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.391400009393692},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3772999942302704},{"id":"https://openalex.org/C199519371","wikidata":"https://www.wikidata.org/wiki/Q942695","display_name":"Source lines of code","level":3,"score":0.36800000071525574},{"id":"https://openalex.org/C2778136018","wikidata":"https://www.wikidata.org/wiki/Q10350689","display_name":"Predictive power","level":2,"score":0.367900013923645},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.3643999993801117},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.34119999408721924},{"id":"https://openalex.org/C64357122","wikidata":"https://www.wikidata.org/wiki/Q1149766","display_name":"Causality (physics)","level":2,"score":0.3077999949455261},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.2833000123500824},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2831999957561493},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.26179999113082886},{"id":"https://openalex.org/C2984968299","wikidata":"https://www.wikidata.org/wiki/Q1077784","display_name":"Software tool","level":3,"score":0.26019999384880066},{"id":"https://openalex.org/C3018397939","wikidata":"https://www.wikidata.org/wiki/Q3644502","display_name":"Open source","level":3,"score":0.251800000667572}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2603.21322","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.21322","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2603.21322","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.21322","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Context:":[0],"Static":[1],"analysis":[2],"captures":[3],"software":[4],"engineering":[5],"knowledge":[6],"and":[7,48,72,101,172],"alerts":[8,31,60],"on":[9,45,108,146],"possibly":[10],"problematic":[11],"patterns.":[12],"Previous":[13],"work":[14],"showed":[15],"that":[16,156,203],"they":[17],"indeed":[18],"have":[19],"predictive":[20],"power":[21],"for":[22],"various":[23],"problems.":[24],"However,":[25],"the":[26,30,40,49,56,106,109,138,147,158,175,189],"impact":[27,41,57,107,145,190],"of":[28,42,58,76,118,130,160,169,191,200],"removing":[29,59],"is":[32],"unclear.":[33],"Aim:":[34],"We":[35,54,66,82,89,114,133,152,184],"would":[36],"like":[37],"to":[38,51,94,104,111,137,142,149,167,177,187],"evaluate":[39,55,188],"alert":[43,120,139],"removals":[44],"code":[46,95],"complexity":[47],"tendency":[50,110,148,176],"bugs.":[52,112,150,162],"Method:":[53],"using":[61,86],"three":[62],"complementary":[63],"methods.":[64],"1.":[65],"conducted":[67],"a":[68,74,116,197],"randomized":[69],"controlled":[70],"trial":[71],"built":[73,115],"dataset":[75,117,129],"521":[77],"manual":[78,131],"alert-removing":[79],"interventions":[80,155,164,202],"2.":[81],"profiled":[83],"intervention-like":[84,98],"events":[85],"labeling":[87,92],"functions.":[88],"applied":[90,134],"these":[91],"functions":[93],"commits,":[96],"found":[97],"natural":[99,201],"events,":[100],"used":[102],"them":[103],"analyze":[105],"3.":[113],"8,245":[119],"removals,":[121,140],"more":[122],"than":[123,127],"15":[124],"times":[125],"larger":[126],"our":[128],"interventions.":[132,192],"supervised":[135],"learning":[136],"aiming":[141],"predict":[143],"their":[144],"Results:":[151],"identified":[153],"complexity-reducing":[154],"reduce":[157,174],"probability":[159],"future":[161],"Such":[163],"are":[165,204],"relevant":[166],"33\\%":[168],"Python":[170],"files":[171],"might":[173],"bugs":[178],"by":[179],"5.5":[180],"percentage":[181],"points.":[182],"Conclusions:":[183],"presented":[185],"methods":[186,194],"The":[193],"can":[195],"identify":[196],"large":[198],"number":[199],"highly":[205],"needed":[206],"in":[207,210],"causality":[208],"research":[209],"many":[211],"domains.":[212]},"counts_by_year":[],"updated_date":"2026-04-25T08:17:42.794288","created_date":"2026-03-25T00:00:00"}
