{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:57:19Z","timestamp":1740099439475,"version":"3.37.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242886"},{"type":"electronic","value":"9783030242893"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24289-3_38","type":"book-chapter","created":{"date-parts":[[2019,6,28]],"date-time":"2019-06-28T11:03:03Z","timestamp":1561719783000},"page":"518-532","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Two-Phase Bug Localization Approach Based on Multi-layer Perceptrons and Distributional Features"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8467-535X","authenticated-orcid":false,"given":"Damiano","family":"Distante","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3684-8815","authenticated-orcid":false,"given":"Stefano","family":"Faralli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,29]]},"reference":[{"key":"38_CR1","doi-asserted-by":"publisher","unstructured":"Davies, S., Roper, M., Wood, M.: Using bug report similarity to enhance bug localisation. In: 2012 19th Working Conference on Reverse Engineering, pp. 125\u2013134, October 2012. \n                      https:\/\/doi.org\/10.1109\/WCRE.2012.22","DOI":"10.1109\/WCRE.2012.22"},{"key":"38_CR2","doi-asserted-by":"crossref","unstructured":"Dilshener, T., Wermelinger, M., Yu, Y.: Locating bugs without looking back. In: Proceedings of the 13th International Conference on Mining Software Repositories, MSR 2016, pp. 286\u2013290. ACM, New York (2016)","DOI":"10.1145\/2901739.2901775"},{"issue":"11","key":"38_CR3","doi-asserted-by":"publisher","first-page":"1597","DOI":"10.1109\/TSE.2013.24","volume":"39","author":"D Kim","year":"2013","unstructured":"Kim, D., Tao, Y., Kim, S., Zeller, A.: Where should we fix this bug? a two-phase recommendation model. IEEE Trans. Software Eng. 39(11), 1597\u20131610 (2013). \n                      https:\/\/doi.org\/10.1109\/TSE.2013.24","journal-title":"IEEE Trans. Software Eng."},{"key":"38_CR4","doi-asserted-by":"publisher","unstructured":"Lam, A.N., Nguyen, A.T., Nguyen, H.A., Nguyen, T.N.: Bug localization with combination of deep learning and information retrieval. In: 2017 IEEE\/ACM 25th International Conference on Program Comprehension (ICPC), pp. 218\u2013229, May 2017. \n                      https:\/\/doi.org\/10.1109\/ICPC.2017.24","DOI":"10.1109\/ICPC.2017.24"},{"key":"38_CR5","doi-asserted-by":"publisher","unstructured":"Li, J., He, P., Zhu, J., Lyu, M.R.: Software defect prediction via convolutional neural network. In: 2017 IEEE International Conference on Software Quality, Reliability and Security (QRS), pp. 318\u2013328, July 2017. \n                      https:\/\/doi.org\/10.1109\/QRS.2017.42","DOI":"10.1109\/QRS.2017.42"},{"issue":"9","key":"38_CR6","doi-asserted-by":"publisher","first-page":"972","DOI":"10.1016\/j.infsof.2010.04.002","volume":"52","author":"Stacy K. Lukins","year":"2010","unstructured":"Lukins, S.K., Kraft, N.A., Etzkorn, L.H.: Bug localization using latent dirichlet allocation. Inf. Softw. Technol. 52(9), 972\u2013990 (2010). \n                      https:\/\/doi.org\/10.1016\/j.infsof.2010.04.002\n                      \n                    , \n                      http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0950584910000650","journal-title":"Information and Software Technology"},{"key":"38_CR7","doi-asserted-by":"publisher","unstructured":"Murphy-Hill, E., Zimmermann, T., Bird, C., Nagappan, N.: The design of bug fixes. In: 2013 35th International Conference on Software Engineering (ICSE), pp. 332\u2013341, May 2013. \n                      https:\/\/doi.org\/10.1109\/ICSE.2013.6606579","DOI":"10.1109\/ICSE.2013.6606579"},{"key":"38_CR8","doi-asserted-by":"publisher","unstructured":"Nguyen, A.T., Nguyen, T.T., Al-Kofahi, J., Nguyen, H.V., Nguyen, T.N.: A topic-based approach for narrowing the search space of buggy files from a bug report. In: 2011 26th IEEE\/ACM International Conference on Automated Software Engineering (ASE 2011), pp. 263\u2013272, November 2011. \n                      https:\/\/doi.org\/10.1109\/ASE.2011.6100062","DOI":"10.1109\/ASE.2011.6100062"},{"key":"38_CR9","doi-asserted-by":"crossref","unstructured":"Pennington, J., Socher, R., Manning, C.D.: Glove: global vectors for word representation. In: EMNLP, vol. 14, pp. 1532\u20131543 (2014)","DOI":"10.3115\/v1\/D14-1162"},{"key":"38_CR10","doi-asserted-by":"publisher","unstructured":"Rao, S., Kak, A.: Retrieval from software libraries for bug localization: a comparative study of generic and composite text models. In: Proceedings of the 8th Working Conference on Mining Software Repositories, MSR 2011, pp. 43\u201352. ACM, New York (2011). \n                      https:\/\/doi.org\/10.1145\/1985441.1985451\n                      \n                    , \n                      https:\/\/doi.org\/10.1145\/1985441.1985451","DOI":"10.1145\/1985441.1985451"},{"key":"38_CR11","doi-asserted-by":"publisher","unstructured":"Wang, S., Lo, D., Lawall, J.: Compositional vector space models for improved bug localization. In: 2014 IEEE International Conference on Software Maintenance and Evolution, pp. 171\u2013180, September 2014. \n                      https:\/\/doi.org\/10.1109\/ICSME.2014.39","DOI":"10.1109\/ICSME.2014.39"},{"key":"38_CR12","doi-asserted-by":"publisher","unstructured":"Wang, S., Lo, D.: Version history, similar report, and structure: putting them together for improved bug localization. In: Proceedings of the 22nd International Conference on Program Comprehension, ICPC 2014, pp. 53\u201363. ACM, New York (2014). \n                      https:\/\/doi.org\/10.1145\/2597008.2597148","DOI":"10.1145\/2597008.2597148"},{"key":"38_CR13","doi-asserted-by":"publisher","unstructured":"Wei, X., Croft, W.B.: Lda-based document models for ad-hoc retrieval. In: Proceedings of the 29th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 2006, pp. 178\u2013185. ACM, New York (2006). \n                      https:\/\/doi.org\/10.1145\/1148170.1148204","DOI":"10.1145\/1148170.1148204"},{"key":"38_CR14","doi-asserted-by":"publisher","unstructured":"Ye, X., Bunescu, R., Liu, C.: Learning to rank relevant files for bug reports using domain knowledge. In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, FSE 2014, pp. 689\u2013699. ACM, New York (2014). \n                      https:\/\/doi.org\/10.1145\/2635868.2635874","DOI":"10.1145\/2635868.2635874"},{"issue":"5","key":"38_CR15","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1093\/comjnl\/bxv114","volume":"59","author":"T Zhang","year":"2016","unstructured":"Zhang, T., Jiang, H., Luo, X., Chan, A.T.: A literature review of research in bug resolution: tasks, challenges and future directions. Comput. J. 59(5), 741\u2013773 (2016). \n                      https:\/\/doi.org\/10.1093\/comjnl\/bxv114","journal-title":"Comput. J."},{"key":"38_CR16","doi-asserted-by":"publisher","unstructured":"Zhou, J., Zhang, H., Lo, D.: Where should the bugs be fixed? more accurate information retrieval-based bug localization based on bug reports. In: 2012 34th International Conference on Software Engineering (ICSE), pp. 14\u201324, June 2012. \n                      https:\/\/doi.org\/10.1109\/ICSE.2012.6227210","DOI":"10.1109\/ICSE.2012.6227210"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2019"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24289-3_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,28]],"date-time":"2019-06-28T11:12:43Z","timestamp":1561720363000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24289-3_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242886","9783030242893"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24289-3_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"29 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Saint Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}