{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T06:10:13Z","timestamp":1759385413517},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030274542"},{"type":"electronic","value":"9783030274559"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-27455-9_2","type":"book-chapter","created":{"date-parts":[[2019,8,22]],"date-time":"2019-08-22T19:12:33Z","timestamp":1566501153000},"page":"11-26","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A Systematic Comparison of Search Algorithms for Topic Modelling\u2014A Study on Duplicate Bug Report Identification"],"prefix":"10.1007","author":[{"given":"Annibale","family":"Panichella","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,3]]},"reference":[{"key":"2_CR1","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.infsof.2018.02.005","volume":"98","author":"A Agrawal","year":"2018","unstructured":"Agrawal, A., Fu, W., Menzies, T.: What is wrong with topic modeling? and how to fix it using search-based software engineering. Inf. Softw. Technol. 98, 74\u201388 (2018)","journal-title":"Inf. Softw. Technol."},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Antoniol, G., Canfora, G., Casazza, G., De Lucia, A.: Information retrieval models for recovering traceability links between code and documentation. In: The 16th IEEE International Conference on Software Maintenance, pp. 40\u201351 (2000)","DOI":"10.1109\/ICSM.2000.883003"},{"key":"2_CR3","volume-title":"Modern Information Retrieval","author":"R Baeza-Yates","year":"1999","unstructured":"Baeza-Yates, R., Ribeiro-Neto, B.: Modern Information Retrieval. Addison-Wesley, Boston (1999)"},{"issue":"2","key":"2_CR4","first-page":"281","volume":"13","author":"J Bergstra","year":"2012","unstructured":"Bergstra, J., Bengio, Y.: Random search for hyper-parameter optimization. J. Mach. Learn. Res. 13(2), 281\u2013305 (2012)","journal-title":"J. Mach. Learn. Res."},{"key":"2_CR5","unstructured":"Binkley, D., Lawrie, D.: Information retrieval applications in software maintenance and evolution. Encycl. Softw. Eng. 454\u2013463 (2009)"},{"issue":"10","key":"2_CR6","doi-asserted-by":"publisher","first-page":"893","DOI":"10.1002\/smr.1802","volume":"28","author":"D Binkley","year":"2016","unstructured":"Binkley, D., Heinz, D., Lawrie, D., Overfelt, J.: Source code analysis with lda. J. Softw. Evol. Process 28(10), 893\u2013920 (2016)","journal-title":"J. Softw. Evol. Process"},{"key":"2_CR7","volume-title":"The Art and Science of Analyzing Software Data","author":"C Bird","year":"2015","unstructured":"Bird, C., Menzies, T., Zimmermann, T.: The Art and Science of Analyzing Software Data. Elsevier, Amsterdam (2015)"},{"key":"2_CR8","first-page":"993","volume":"3","author":"DM Blei","year":"2003","unstructured":"Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent dirichlet allocation. J. Mach. Learn. Res. 3, 993\u20131022 (2003)","journal-title":"J. Mach. Learn. Res."},{"key":"2_CR9","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1016\/j.infsof.2018.08.010","volume":"104","author":"J Campos","year":"2018","unstructured":"Campos, J., Ge, Y., Albunian, N., Fraser, G., Eler, M., Arcuri, A.: An empirical evaluation of evolutionary algorithms for unit test suite generation. Inf. Softw. Technol. 104, 207\u2013235 (2018)","journal-title":"Inf. Softw. Technol."},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Capobianco, G., De Lucia, A., Oliveto, R., Panichella, A., Panichella, S.: On the role of the nouns in IR-based traceability recovery. In: The 17th IEEE International Conference on Program Comprehension (2009)","DOI":"10.1109\/ICPC.2009.5090038"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"De Lucia, A., Di Penta, M., Oliveto, R., Panichella, A., Panichella, S.: Using IR methods for labeling source code artifacts: Is it worthwhile? In: The 20th IEEE International Conference on Program Comprehension (ICPC), pp. 193\u2013202 (2012)","DOI":"10.1109\/ICPC.2012.6240488"},{"issue":"5","key":"2_CR12","doi-asserted-by":"publisher","first-page":"1383","DOI":"10.1007\/s10664-013-9285-5","volume":"19","author":"A Lucia De","year":"2014","unstructured":"De Lucia, A., Di Penta, M., Oliveto, R., Panichella, A., Panichella, S.: Labeling source code with information retrieval methods: an empirical study. Empirical Softw. Eng. 19(5), 1383\u20131420 (2014)","journal-title":"Empirical Softw. Eng."},{"key":"2_CR13","unstructured":"Eberhart, R., Kennedy, J.: A new optimizer using particle swarm theory. In: The 6th International Symposium on Micro Machine and Human Science, pp. 39\u201343 (1995)"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Enslen, E., Hill, E., Pollock, L.L., Vijay-Shanker, K.: Mining source code to automatically split identifiers for software analysis. In: The 6th International Working Conference on Mining Software Repositories, pp. 71\u201380 (2009)","DOI":"10.1109\/MSR.2009.5069482"},{"issue":"6","key":"2_CR15","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1007\/s10732-008-9080-4","volume":"15","author":"S Garc\u00eda","year":"2009","unstructured":"Garc\u00eda, S., Molina, D., Lozano, M., Herrera, F.: A study on the use of non-parametric tests for analyzing the evolutionary algorithms\u2019 behaviour: a case study on the CEC\u20192005 special session on real parameter optimization. J. Heuristics 15(6), 617\u2013644 (2009)","journal-title":"J. Heuristics"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Grant, S., Cordy, J.R.: Estimating the optimal number of latent concepts in source code analysis. In: The 10th International Working Conference on Source Code Analysis and Manipulation, pp. 65\u201374 (2010)","DOI":"10.1109\/SCAM.2010.22"},{"issue":"Suppl. 1","key":"2_CR17","doi-asserted-by":"publisher","first-page":"5228","DOI":"10.1073\/pnas.0307752101","volume":"101","author":"TL Griffiths","year":"2004","unstructured":"Griffiths, T.L., Steyvers, M.: Finding scientific topics. Proc. Natl. Acad. Sci. 101(Suppl. 1), 5228\u20135235 (2004)","journal-title":"Proc. Natl. Acad. Sci."},{"issue":"13","key":"2_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.18637\/jss.v040.i13","volume":"40","author":"B Gr\u00fcn","year":"2011","unstructured":"Gr\u00fcn, B., Hornik, K.: Topicmodels: an R package for fitting topic models. J. Stat. Softw. 40(13), 1\u201330 (2011)","journal-title":"J. Stat. Softw."},{"key":"2_CR19","unstructured":"Hegerty, B., Hung, C.C., Kasprak, K.: A comparative study on differential evolution and genetic algorithms for some combinatorial problems. In: The 8th Mexican International Conference on Artificial Intelligence, pp. 9\u201313 (2009)"},{"issue":"2","key":"2_CR20","doi-asserted-by":"publisher","first-page":"902","DOI":"10.1007\/s10664-018-9643-4","volume":"24","author":"A Hindle","year":"2019","unstructured":"Hindle, A., Onuczko, C.: Preventing duplicate bug reports by continuously querying bug reports. Empirical Softw. Eng. 24(2), 902\u2013936 (2019)","journal-title":"Empirical Softw. Eng."},{"key":"2_CR21","unstructured":"Hughes, M., Kim, D.I., Sudderth, E.: Reliable and scalable variational inference for the hierarchical dirichlet process. In: Artificial Intelligence and Statistics, pp. 370\u2013378 (2015)"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Lee, J., Kim, D., Bissyand\u00e9, T.F., Jung, W., Le Traon, Y.: Bench4bl: reproducibility study on the performance of IR-based bug localization. In: The 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 61\u201372. ACM (2018)","DOI":"10.1145\/3213846.3213856"},{"key":"2_CR23","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1016\/B978-0-12-375662-6.00013-4","volume-title":"Numerical Methods and Optimization in Finance","author":"Manfred Gilli","year":"2011","unstructured":"Manfred Gilli, D.M., Schumann, E.: Numerical Methods and Optimization in Finance (NMOF) (2011)"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Mantyla, M.V., Claes, M., Farooq, U.: Measuring lda topic stability from clusters of replicated runs. In: The 12th ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement, p. 49. ACM (2018)","DOI":"10.1145\/3239235.3267435"},{"key":"2_CR25","unstructured":"Minka, T., Lafferty, J.: Expectation-propagation for the generative aspect model. In: The 18th Conference on Uncertainty in Artificial Intelligence, pp. 352\u2013359. Morgan Kaufmann Publishers Inc. (2002)"},{"issue":"6","key":"2_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.18637\/jss.v040.i06","volume":"40","author":"K Mullen","year":"2011","unstructured":"Mullen, K., Ardia, D., Gil, D., Windover, D., Cline, J.: Deoptim: an R package for global optimization by differential evolution. J. Stat. Softw. 40(6), 1\u201326 (2011)","journal-title":"J. Stat. Softw."},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"Nguyen, A.T., Nguyen, T.T., Nguyen, T.N., Lo, D., Sun, C.: Duplicate bug report detection with a combination of information retrieval and topic modeling. In: The 27th IEEE\/ACM International Conference on Automated Software Engineering, pp. 70\u201379 (2012)","DOI":"10.1145\/2351676.2351687"},{"key":"2_CR28","doi-asserted-by":"crossref","unstructured":"Panichella, A., Dit, B., Oliveto, R., Di Penta, M., Poshyvanyk, D., De Lucia, A.: How to effectively use topic models for software engineering tasks? An approach based on genetic algorithms. In: The International Conference on Software Engineering, pp. 522\u2013531. IEEE Press (2013)","DOI":"10.1109\/ICSE.2013.6606598"},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Panichella, A., Dit, B., Oliveto, R., Di Penta, M., Poshyvanyk, D., De Lucia, A.: Parameterizing and assembling IR-based solutions for se tasks using genetic algorithms. In: 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER), vol. 1, pp. 314\u2013325. IEEE (2016)","DOI":"10.1109\/SANER.2016.97"},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"Panichella, S., Panichella, A., Beller, M., Zaidman, A., Gall, H.C.: The impact of test case summaries on bug fixing performance: an empirical investigation. In: 2016 IEEE\/ACM 38th International Conference on Software Engineering (ICSE), pp. 547\u2013558, May 2016","DOI":"10.1145\/2884781.2884847"},{"key":"2_CR31","doi-asserted-by":"crossref","unstructured":"Porteous, I., Newman, D., Ihler, A., Asuncion, A., Smyth, P., Welling, M.: Fast collapsed gibbs sampling for latent dirichlet allocation. In: The 14th ACM SIGKDD international conference on Knowledge discovery and data mining. pp. 569\u2013577. ACM (2008)","DOI":"10.1145\/1401890.1401960"},{"key":"2_CR32","unstructured":"Richter, J.: Randomsearch: Random Search for Expensive Functions (2019)"},{"issue":"4","key":"2_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.18637\/jss.v053.i04","volume":"53","author":"L Scrucca","year":"2013","unstructured":"Scrucca, L.: GA: a package for genetic algorithms in R. J. Stat. Softw. 53(4), 1\u201337 (2013)","journal-title":"J. Stat. Softw."},{"key":"2_CR34","doi-asserted-by":"crossref","unstructured":"Sridhara, G., Hill, E., Muppaneni, D., Pollock, L.L., Vijay-Shanker, K.: Towards automatically generating summary comments for java methods. In: The 25th IEEE\/ACM International Conference on Automated Software Engineering, pp. 43\u201352. ACM Press (2010)","DOI":"10.1145\/1858996.1859006"},{"issue":"476","key":"2_CR35","doi-asserted-by":"publisher","first-page":"1566","DOI":"10.1198\/016214506000000302","volume":"101","author":"Y Teh","year":"2006","unstructured":"Teh, Y., Jordan, M., Beal, M., Blei, D.: Hierarchical Dirichlet processes. J. Am. Stat. Assoc. 101(476), 1566\u20131581 (2006)","journal-title":"J. Am. Stat. Assoc."},{"key":"2_CR36","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/978-94-015-7744-1_2","volume-title":"Simulated Annealing: Theory and Applications","author":"Peter J. M. van Laarhoven","year":"1987","unstructured":"Van Laarhoven, P.J., Aarts, E.H.: Simulated annealing. In: Simulated annealing: Theory and applications, pp. 7\u201315, vol 37. Springer, Dordrecht (1987). \n                      https:\/\/doi.org\/10.1007\/978-94-015-7744-1_2"},{"key":"2_CR37","doi-asserted-by":"crossref","unstructured":"Wei, X., Croft, W.B.: Lda-based document models for ad-hoc retrieval. In: The 29th Annual International Conference on Research and Development in Information Retrieval, pp. 178\u2013185. ACM (2006)","DOI":"10.1145\/1148170.1148204"},{"key":"2_CR38","doi-asserted-by":"crossref","unstructured":"Xiang, Y., Gubian, S., Suomela, B., Hoeng, J.: Generalized simulated annealing for efficient global optimization: the GenSA package for R. R J. 5(1) (2013)","DOI":"10.32614\/RJ-2013-002"}],"container-title":["Lecture Notes in Computer Science","Search-Based Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-27455-9_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,22]],"date-time":"2019-08-22T19:23:36Z","timestamp":1566501816000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-27455-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030274542","9783030274559"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-27455-9_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"3 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SSBSE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Search Based Software Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tallinn","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Estonia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ssbse2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ssbse19.mines-albi.fr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easy chair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}