{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T06:25:05Z","timestamp":1766298305717,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030232801"},{"type":"electronic","value":"9783030232818"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-23281-8_20","type":"book-chapter","created":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T07:38:05Z","timestamp":1561016285000},"page":"247-260","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Bug Severity Prediction Using a Hierarchical One-vs.-Remainder Approach"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5064-2621","authenticated-orcid":false,"given":"Nonso","family":"Nnamoko","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9881-9799","authenticated-orcid":false,"given":"Luis Adri\u00e1n","family":"Cabrera-Diego","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4244-9458","authenticated-orcid":false,"given":"Daniel","family":"Campbell","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8052-2471","authenticated-orcid":false,"given":"Yannis","family":"Korkontzelos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,21]]},"reference":[{"key":"20_CR1","doi-asserted-by":"publisher","unstructured":"Chaturvedi, K.K., Singh, V.B.: Determining Bug severity using machine learning techniques. In: 2012 CSI 6th International Conference on Software Engineering. CONSEG 2012, pp. 1\u20136. IEEE (2012). https:\/\/doi.org\/10.1109\/CONSEG.2012.6349519","DOI":"10.1109\/CONSEG.2012.6349519"},{"issue":"1","key":"20_CR2","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: Smote: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16(1), 321\u2013357 (2002). http:\/\/dl.acm.org\/citation.cfm?id=1622407.1622416","journal-title":"J. Artif. Intell. Res."},{"key":"20_CR3","doi-asserted-by":"publisher","unstructured":"Gegick, M., Rotella, P., Xie, T.: Identifying security bug reports via text mining: an industrial case study. In: Proceedings - International Conference on Software Engineering, pp. 11\u201320. IEEE (2010). https:\/\/doi.org\/10.1109\/MSR.2010.5463340","DOI":"10.1109\/MSR.2010.5463340"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Joulin, A., Grave, E., Bojanowski, P., Mikolov, T.: Bag of tricks for efficient text classification. In: Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics, Valencia, Spain, vol. 2, pp. 427\u2013431 (2017)","DOI":"10.18653\/v1\/E17-2068"},{"key":"20_CR5","doi-asserted-by":"publisher","unstructured":"Lamkanfi, A., Demeyer, S., Giger, E., Goethals, B.: Predicting the severity of a reported bug. In: Proceedings - International Conference on Software Engineering, pp. 1\u201310. IEEE (2010). https:\/\/doi.org\/10.1109\/MSR.2010.5463284","DOI":"10.1109\/MSR.2010.5463284"},{"key":"20_CR6","doi-asserted-by":"publisher","unstructured":"Lamkanfi, A., Demeyer, S., Soetens, Q.D., Verdonckz, T.: Comparing mining algorithms for predicting the severity of a reported bug. In: Proceedings of the European Conference on Software Maintenance and Reengineering. CSMR, pp. 249\u2013258. IEEE (2011). https:\/\/doi.org\/10.1109\/CSMR.2011.31","DOI":"10.1109\/CSMR.2011.31"},{"key":"20_CR7","doi-asserted-by":"publisher","unstructured":"Menzies, T., Marcus, A.: Automated severity assessment of software defect reports. In: IEEE International Conference on Software Maintenance. ICSM, pp. 346\u2013355 (2008). https:\/\/doi.org\/10.1109\/ICSM.2008.4658083","DOI":"10.1109\/ICSM.2008.4658083"},{"key":"20_CR8","unstructured":"Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 (2013)"},{"key":"20_CR9","unstructured":"Mikolov, T., Sutskever, I., Chen, K., Corrado, G.S., Dean, J.: Distributed representations of words and phrases and their compositionality. In: Advances in Neural Information Processing Systems, pp. 3111\u20133119 (2013)"},{"key":"20_CR10","unstructured":"Mo\u010dkus, J., Tie\u0161is, V., \u017dilinskas, A.: The application of Bayesian methods for seeking the extremum. In: Szeg\u00f6, G.P., Dixon, L.C.W. (eds.) Towards Global Optimisation, vol. 2, pp. 117\u2013128, North-Holland (1978)"},{"key":"20_CR11","doi-asserted-by":"publisher","unstructured":"Ramage, D., Hall, D., Nallapati, R., Manning, C.D.: Labeled LDA: a supervised topic model for credit attribution in multi-labeled corpora. In: EMNLP 2009 Proceedings of the 2009 Conference on Empirical Methods in Natural Language Processing, pp. 248\u2013256 (2009). https:\/\/doi.org\/10.3115\/1699510.1699543","DOI":"10.3115\/1699510.1699543"},{"key":"20_CR12","doi-asserted-by":"publisher","unstructured":"Roy, N.K.S., Rossi, B.: Towards an improvement of bug severity classification. Proceedings - 40th Euromicro Conference Series on Software Engineering and Advanced Applications. SEAA 2014, pp. 269\u2013276 (2014). https:\/\/doi.org\/10.1109\/SEAA.2014.51","DOI":"10.1109\/SEAA.2014.51"},{"key":"20_CR13","doi-asserted-by":"publisher","unstructured":"Singh, V.B., Misra, S., Sharma, M.: Bug severity assessment in cross project context and identifying training candidates. J. Inf. Knowl. Manag. 16(01), 1750005 1\u201330 (2017). https:\/\/doi.org\/10.1142\/S0219649217500058, http:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0219649217500058","DOI":"10.1142\/S0219649217500058"},{"key":"20_CR14","doi-asserted-by":"publisher","unstructured":"Sun, C., Lo, D., Khoo, S.C., Jiang, J.: Towards more accurate retrieval of duplicate bug reports. In: Proceedings of the 2011 26th IEEE\/ACM International Conference on Automated Software Engineering. ASE 2011, pp. 253\u2013262 (2011). https:\/\/doi.org\/10.1109\/ASE.2011.6100061","DOI":"10.1109\/ASE.2011.6100061"},{"key":"20_CR15","doi-asserted-by":"publisher","unstructured":"Tian, Y., Lo, D., Sun, C.: Information retrieval based nearest neighbor classification for fine-grained bug severity prediction. In: Proceedings - Working Conference on Reverse Engineering. WCRE, pp. 215\u2013224 (2012). https:\/\/doi.org\/10.1109\/WCRE.2012.31","DOI":"10.1109\/WCRE.2012.31"},{"key":"20_CR16","doi-asserted-by":"publisher","unstructured":"Yang, C.Z., Hou, C.C., Kao, W.C., Chen, I.X.: An empirical study on improving severity prediction of defect reports using feature selection. In: Proceedings - Asia-Pacific Software Engineering Conference, APSEC. vol. 1, pp. 240\u2013249. IEEE (2012). https:\/\/doi.org\/10.1109\/APSEC.2012.144","DOI":"10.1109\/APSEC.2012.144"},{"key":"20_CR17","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1016\/j.jss.2016.02.034","volume":"117","author":"T Zhang","year":"2016","unstructured":"Zhang, T., Chen, J., Yang, G., Lee, B., Luo, X.: Towards more accurate severity prediction and fixer recommendation of software bugs. J. Syst. Software 117, 166\u2013184 (2016). https:\/\/doi.org\/10.1016\/j.jss.2016.02.034","journal-title":"J. Syst. Software"},{"key":"20_CR18","unstructured":"Zolotov, V., Kung, D.: Analysis and optimization of fast text linear text classifier. arXiv preprint arXiv:1702.05531 (2017)"}],"container-title":["Lecture Notes in Computer Science","Natural Language Processing and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-23281-8_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T19:05:30Z","timestamp":1710270330000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-23281-8_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030232801","9783030232818"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-23281-8_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"21 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NLDB","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applications of Natural Language to Information Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Salford","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nldb2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.salford.ac.uk\/conferencing-at-salford\/conference-management\/current-conference\/nldb-conference-2019","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}