{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T21:30:56Z","timestamp":1742938256140,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030042110"},{"type":"electronic","value":"9783030042127"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-04212-7_24","type":"book-chapter","created":{"date-parts":[[2018,11,16]],"date-time":"2018-11-16T12:01:33Z","timestamp":1542369693000},"page":"281-292","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Cross-Project Issue Classification Based on Ensemble Modeling in a Social Coding World"],"prefix":"10.1007","author":[{"given":"Yarong","family":"Zeng","sequence":"first","affiliation":[]},{"given":"Yue","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Xunhui","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Huaimin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,17]]},"reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Antoniol, G., Ayari, K., Di Penta, M., Khomh, F., Gu\u00e9h\u00e9neuc, Y.G.: Is it a bug or an enhancement?: A text-based approach to classify change requests. In: Proceedings of the 2008 Conference of the Center for Advanced Studies on Collaborative Research: Meeting of Minds, p. 23. ACM (2008)","DOI":"10.1145\/1463788.1463819"},{"issue":"1","key":"24_CR2","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/1007730.1007735","volume":"6","author":"GE Batista","year":"2004","unstructured":"Batista, G.E., Prati, R.C., Monard, M.C.: A study of the behavior of several methods for balancing machine learning training data. ACM SIGKDD Explor. Newslett. 6(1), 20\u201329 (2004)","journal-title":"ACM SIGKDD Explor. Newslett."},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Bettenburg, N., Nagappan, M., Hassan, A.E.: Think locally, act globally: improving defect and effort prediction models. In: 2012 9th IEEE Working Conference on Mining Software Repositories (MSR), pp. 60\u201369. IEEE (2012)","DOI":"10.1109\/MSR.2012.6224300"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Bissyand\u00e9, T.F., Lo, D., Jiang, L., R\u00e9veillere, L., Klein, J., Le Traon, Y.: Got issues? Who cares about it? A large scale investigation of issue trackers from GitHub. In: 2013 IEEE 24th International Symposium on Software Reliability Engineering (ISSRE), pp. 188\u2013197. IEEE (2013)","DOI":"10.1109\/ISSRE.2013.6698918"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Fan, Q., Yu, Y., Yin, G., Wang, T., Wang, H.: Where is the road for issue reports classification based on text mining? In: 2017 ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM), pp. 121\u2013130. IEEE (2017)","DOI":"10.1109\/ESEM.2017.19"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Gousios, G., Pinzger, M., Deursen, A.V.: An exploratory study of the pull-based software development model. In: Proceedings of the 36th International Conference on Software Engineering, pp. 345\u2013355. ACM (2014)","DOI":"10.1145\/2568225.2568260"},{"key":"24_CR7","unstructured":"He, P., Li, B., Ma, Y.: Towards cross-project defect prediction with imbalanced feature sets. arXiv preprint arXiv:1411.4228 (2014)"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Kalliamvakou, E., Gousios, G., Blincoe, K., Singer, L., German, D.M., Damian, D.: The promises and perils of mining GitHub. In: Proceedings of the 11th Working Conference on Mining Software Repositories, pp. 92\u2013101. ACM (2014)","DOI":"10.1145\/2597073.2597074"},{"issue":"5","key":"24_CR9","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1109\/TSE.2007.1001","volume":"33","author":"BA Kitchenham","year":"2007","unstructured":"Kitchenham, B.A., Mendes, E., Travassos, G.H.: Cross versus within-company cost estimation studies: a systematic review. IEEE Trans. Softw. Eng. 33(5), 316\u2013329 (2007)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"24_CR10","doi-asserted-by":"publisher","first-page":"738","DOI":"10.1214\/12-EJS691","volume":"6","author":"F Konietschke","year":"2012","unstructured":"Konietschke, F., Hothorn, L.A., Brunner, E., et al.: Rank-based multiple test procedures and simultaneous confidence intervals. Electron. J. Stat. 6, 738\u2013759 (2012)","journal-title":"Electron. J. Stat."},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Konietschke, F., Placzek, M., Schaarschmidt, F., Hothorn, L.A.: nparcomp: An R software package for nonparametric multiple comparisons and simultaneous confidence intervals (2015)","DOI":"10.18637\/jss.v064.i09"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Krishna, R., Menzies, T., Fu, W.: Too much automation? The bellwether effect and its implications for transfer learning. In: Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering, pp. 122\u2013131. ACM (2016)","DOI":"10.1145\/2970276.2970339"},{"key":"24_CR13","unstructured":"Lan, L., Tao, D., Gong, C., Guan, N., Luo, Z.: Online multi-object tracking by quadratic pseudo-boolean optimization. In: IJCAI, pp. 3396\u20133402 (2016)"},{"issue":"3","key":"24_CR14","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1016\/j.infsof.2011.09.007","volume":"54","author":"Y Ma","year":"2012","unstructured":"Ma, Y., Luo, G., Zeng, X., Chen, A.: Transfer learning for cross-company software defect prediction. Inf. Softw. Technol. 54(3), 248\u2013256 (2012)","journal-title":"Inf. Softw. Technol."},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"Menzies, T., Butcher, A., Marcus, A., Zimmermann, T., Cok, D.: Local vs. global models for effort estimation and defect prediction. In: Automated Software Engineering, pp. 343\u2013351. IEEE (2011)","DOI":"10.1109\/ASE.2011.6100072"},{"key":"24_CR16","doi-asserted-by":"crossref","unstructured":"Merten, T., Falis, M., H\u00fcbner, P., Quirchmayr, T., B\u00fcrsner, S., Paech, B.: Software feature request detection in issue tracking systems. In: 2016 IEEE 24th International Requirements Engineering Conference (RE), pp. 166\u2013175. IEEE (2016)","DOI":"10.1109\/RE.2016.8"},{"key":"24_CR17","doi-asserted-by":"crossref","unstructured":"Nagappan, N., Ball, T., Zeller, A.: Mining metrics to predict component failures. In: Proceedings of the 28th International Conference on Software Engineering, pp. 452\u2013461. ACM (2006)","DOI":"10.1145\/1134285.1134349"},{"key":"24_CR18","doi-asserted-by":"crossref","unstructured":"Nam, J., Pan, S.J., Kim, S.: Transfer defect learning. In: Proceedings of the 2013 International Conference on Software Engineering, pp. 382\u2013391. IEEE Press (2013)","DOI":"10.1109\/ICSE.2013.6606584"},{"issue":"2","key":"24_CR19","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/TNN.2010.2091281","volume":"22","author":"SJ Pan","year":"2011","unstructured":"Pan, S.J., Tsang, I.W., Kwok, J.T., Yang, Q.: Domain adaptation via transfer component analysis. IEEE Trans. Neural Netw. 22(2), 199\u2013210 (2011)","journal-title":"IEEE Trans. Neural Netw."},{"issue":"10","key":"24_CR20","doi-asserted-by":"publisher","first-page":"1345","DOI":"10.1109\/TKDE.2009.191","volume":"22","author":"SJ Pan","year":"2010","unstructured":"Pan, S.J., Yang, Q.: A survey on transfer learning. IEEE Trans. Knowl. Data Eng. 22(10), 1345\u20131359 (2010)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"24_CR21","doi-asserted-by":"crossref","unstructured":"Peters, F., Menzies, T., Marcus, A.: Better cross company defect prediction. In: Mining Software Repositories, pp. 409\u2013418 (2013)","DOI":"10.1109\/MSR.2013.6624057"},{"key":"24_CR22","doi-asserted-by":"crossref","unstructured":"Posnett, D., Filkov, V., Devanbu, P.: Ecological inference in empirical software engineering. In: Proceedings of the 2011 26th IEEE\/ACM International Conference on Automated Software Engineering, pp. 362\u2013371. IEEE Computer Society (2011)","DOI":"10.1109\/ASE.2011.6100074"},{"key":"24_CR23","doi-asserted-by":"crossref","unstructured":"Premraj, R., Herzig, K.: Network versus code metrics to predict defects: a replication study. In: 2011 International Symposium on Empirical Software Engineering and Measurement (ESEM), pp. 215\u2013224. IEEE (2011)","DOI":"10.1109\/ESEM.2011.30"},{"issue":"5","key":"24_CR24","doi-asserted-by":"publisher","first-page":"540","DOI":"10.1007\/s10664-008-9103-7","volume":"14","author":"B Turhan","year":"2009","unstructured":"Turhan, B., Menzies, T., Bener, A.B., Di Stefano, J.: On the relative value of cross-company and within-company data for defect prediction. Empirical Softw. Eng. 14(5), 540\u2013578 (2009)","journal-title":"Empirical Softw. Eng."},{"issue":"2","key":"24_CR25","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/s10462-016-9478-6","volume":"47","author":"J Uddin","year":"2017","unstructured":"Uddin, J., Ghazali, R., Deris, M.M., Naseem, R., Shah, H.: A survey on bug prioritization. Artif. Intell. Rev. 47(2), 145\u2013180 (2017)","journal-title":"Artif. Intell. Rev."},{"key":"24_CR26","doi-asserted-by":"crossref","unstructured":"Van Der Veen, E., Gousios, G., Zaidman, A.: Automatically prioritizing pull requests. In: Proceedings of the 12th Working Conference on Mining Software Repositories, pp. 357\u2013361. IEEE Press (2015)","DOI":"10.1109\/MSR.2015.40"},{"key":"24_CR27","doi-asserted-by":"crossref","unstructured":"Yu, Y., Wang, H., Filkov, V., Devanbu, P., Vasilescu, B.: Wait for it: determinants of pull request evaluation latency on GitHub. In: 2015 IEEE\/ACM 12th Working Conference on Mining Software Repositories (MSR), pp. 367\u2013371. IEEE (2015)","DOI":"10.1109\/MSR.2015.42"},{"key":"24_CR28","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1016\/j.infsof.2016.01.004","volume":"74","author":"Y Yu","year":"2016","unstructured":"Yu, Y., Wang, H., Yin, G., Wang, T.: Reviewer recommendation for pull-requests in github: what can we learn from code review and bug assignment? Inf. Softw. Technol. 74, 204\u2013218 (2016)","journal-title":"Inf. Softw. Technol."},{"key":"24_CR29","doi-asserted-by":"crossref","unstructured":"Zanetti, M.S., Scholtes, I., Tessone, C.J., Schweitzer, F.: Categorizing bugs with social networks: a case study on four open source software communities. In: Proceedings of the 35th International Conference on Software Engineering, pp. 1032\u20131041. IEEE (2013)","DOI":"10.1109\/ICSE.2013.6606653"},{"key":"24_CR30","doi-asserted-by":"crossref","unstructured":"Zhang, F., Mockus, A., Keivanloo, I., Zou, Y.: Towards building a universal defect prediction model. In: Proceedings of the 11th Working Conference on Mining Software Repositories, pp. 182\u2013191. ACM (2014)","DOI":"10.1145\/2597073.2597078"},{"key":"24_CR31","doi-asserted-by":"crossref","unstructured":"Zhang, F., Zheng, Q., Zou, Y., Hassan, A.E.: Cross-project defect prediction using a connectivity-based unsupervised classifier. In: Proceedings of the 38th International Conference on Software Engineering, pp. 309\u2013320. ACM (2016)","DOI":"10.1145\/2884781.2884839"},{"issue":"3","key":"24_CR32","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1002\/smr.1770","volume":"28","author":"Y Zhou","year":"2016","unstructured":"Zhou, Y., Tong, Y., Gu, R., Gall, H.: Combining text mining and data mining for bug report classification. J. Softw. Evol. Process 28(3), 150\u2013176 (2016)","journal-title":"J. Softw. Evol. Process"},{"key":"24_CR33","doi-asserted-by":"crossref","unstructured":"Zimmermann, T., Nagappan, N., Gall, H., Giger, E., Murphy, B.: Cross-project defect prediction: a large scale experiment on data vs. domain vs. process. In: Proceedings of the 7th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, pp. 91\u2013100. ACM (2009)","DOI":"10.1145\/1595696.1595713"}],"container-title":["Lecture Notes in Computer Science","Neural Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-04212-7_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T17:07:47Z","timestamp":1710263267000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-04212-7_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030042110","9783030042127"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-04212-7_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"17 November 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICONIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Neural Information Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Siem Reap","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cambodia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iconip2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conference.cs.cityu.edu.hk\/iconip\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"575","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"401","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"70% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}