{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T15:48:50Z","timestamp":1743004130246,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030473570"},{"type":"electronic","value":"9783030473587"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-47358-7_49","type":"book-chapter","created":{"date-parts":[[2020,5,5]],"date-time":"2020-05-05T20:03:35Z","timestamp":1588709015000},"page":"470-482","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Amalgamated Models for Detecting Duplicate Bug Reports"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9058-7869","authenticated-orcid":false,"given":"Sukhjit Singh","family":"Sehra","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3556-9662","authenticated-orcid":false,"given":"Tamer","family":"Abdou","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4934-8326","authenticated-orcid":false,"given":"Ay\u015fe","family":"Ba\u015far","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6321-7464","authenticated-orcid":false,"given":"Sumeet Kaur","family":"Sehra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,5,6]]},"reference":[{"key":"49_CR1","doi-asserted-by":"crossref","unstructured":"Alipour, A., Hindle, A., Stroulia, E.: A contextual approach towards more accurate duplicate bug report detection. In: Proceedings of the 10th Working Conference on Mining Software Repositories, pp. 183\u2013192. MSR 2013, IEEE Press, Piscataway (2013)","DOI":"10.1109\/MSR.2013.6624026"},{"key":"49_CR2","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/978-3-642-13657-3_43","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"R Arun","year":"2010","unstructured":"Arun, R., Suresh, V., Veni Madhavan, C.E., Narasimha Murthy, M.N.: On finding the natural number of topics with latent dirichlet allocation: some observations. In: Zaki, M.J., Yu, J.X., Ravindran, B., Pudi, V. (eds.) PAKDD 2010. LNCS (LNAI), vol. 6118, pp. 391\u2013402. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13657-3_43"},{"key":"49_CR3","doi-asserted-by":"crossref","unstructured":"Budhiraja, A., Dutta, K., Shrivastava, M., Reddy, R.: Towards word embeddings for improved duplicate bug report retrieval in software repositories. In: ICTIR 2018 Proceedings of the 2018 ACM SIGIR International Conference on Theory of Information Retrieval, pp. 167\u2013170. ACM, Tianjin (2018)","DOI":"10.1145\/3234944.3234949"},{"issue":"7\u20139","key":"49_CR4","doi-asserted-by":"publisher","first-page":"1775","DOI":"10.1016\/j.neucom.2008.06.011","volume":"72","author":"J Cao","year":"2009","unstructured":"Cao, J., Xia, T., Li, J., Zhang, Y., Tang, S.: A density-based method for adaptive LDA model selection. Neurocomputing 72(7\u20139), 1775\u20131781 (2009)","journal-title":"Neurocomputing"},{"issue":"2","key":"49_CR5","doi-asserted-by":"publisher","first-page":"902","DOI":"10.1007\/s10664-018-9643-4","volume":"24","author":"A Hindle","year":"2018","unstructured":"Hindle, A., Onuczko, C.: Preventing duplicate bug reports by continuously querying bug reports. Empirical Softw. Eng. 24(2), 902\u2013936 (2018). https:\/\/doi.org\/10.1007\/s10664-018-9643-4","journal-title":"Empirical Softw. Eng."},{"key":"49_CR6","doi-asserted-by":"crossref","unstructured":"Jalbert, N., Weimer, W.: Automated duplicate detection for bug tracking systems. In: IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN), pp. 52\u201361 (2008)","DOI":"10.1109\/DSN.2008.4630070"},{"key":"49_CR7","unstructured":"Jurafsky, D., James H.M.: Vector semantics and embeddings. In: Speech and Language Processing: An Introduction to Natural Language Processing, Computational Linguistics, and Speech Recognition, pp. 94\u2013122. Online, Stanford University, UK, third edn. (2019)"},{"key":"49_CR8","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00825-3","volume-title":"ICT Innovations 2018. Engineering and Life Sciences","year":"2018","unstructured":"Kalajdziski, S., Ackovska, N. (eds.): ICT 2018. CCIS, vol. 940. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-00825-3"},{"key":"49_CR9","doi-asserted-by":"crossref","unstructured":"Klein, N., Corley, C.S., Kraft, N.A.: New features for duplicate bug detection. In: Proceedings of the 11th Working Conference on Mining Software Repositories, pp. 324\u2013327. ACM (2014)","DOI":"10.1145\/2597073.2597090"},{"key":"49_CR10","doi-asserted-by":"crossref","unstructured":"Lazar, A., Ritchey, S., Sharif, B.: Improving the accuracy of duplicate bug report detection using textual similarity measures. In: Proceedings of the 11th Working Conference on Mining Software Repositories, pp. 308\u2013311. MSR 2014, ACM, New York (2014)","DOI":"10.1145\/2597073.2597088"},{"issue":"2","key":"49_CR11","doi-asserted-by":"publisher","first-page":"545","DOI":"10.11144\/Javeriana.upsy10-2.cdcp","volume":"10","author":"G Macbeth","year":"2011","unstructured":"Macbeth, G., Razumiejczyk, E., Ledesma, R.D.: Cliff\u2019s delta calculator: a non-parametric effect size program for two groups of observations. Universitas Psychologica 10(2), 545\u2013555 (2011)","journal-title":"Universitas Psychologica"},{"key":"49_CR12","doi-asserted-by":"crossref","unstructured":"Nagwani, N.K., Singh, P.: Weight similarity measurement model based, object oriented approach for bug databases mining to detect similar and duplicate bugs. In: Proceedings of the International Conference on Advances in Computing, Communication and Control, pp. 202\u2013207 (2009)","DOI":"10.1145\/1523103.1523145"},{"issue":"5","key":"49_CR13","doi-asserted-by":"publisher","first-page":"1960","DOI":"10.1007\/s10664-015-9404-6","volume":"21","author":"MS Rakha","year":"2015","unstructured":"Rakha, M.S., Shang, W., Hassan, A.E.: Studying the needed effort for identifying duplicate issues. Empirical Softw. Eng. 21(5), 1960\u20131989 (2015). https:\/\/doi.org\/10.1007\/s10664-015-9404-6","journal-title":"Empirical Softw. Eng."},{"key":"49_CR14","unstructured":"Rehurek, R., Sojka, P.: Software framework for topic modelling with large corpora. In: Proceedings of the LREC 2010 Workshop on New Challenges for NLP Frameworks, pp. 45\u201350. ELRA, Valletta, Malta (2010)"},{"key":"49_CR15","doi-asserted-by":"crossref","unstructured":"Rocha, H., Valente, M.T., Marques-Neto, H., Murphy, G.C.: An empirical study on recommendations of similar bugs. In: 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER), vol. 1, pp. 46\u201356. IEEE (2016)","DOI":"10.1109\/SANER.2016.87"},{"key":"49_CR16","doi-asserted-by":"crossref","unstructured":"Runeson, P., Alexandersson, M., Nyholm, O.: Detection of duplicate defect reports using natural language processing. In: Proceedings of the 29th International Conference on Software Engineering, pp. 499\u2013510. IEEE Computer Society (2007)","DOI":"10.1109\/ICSE.2007.32"},{"key":"49_CR17","doi-asserted-by":"crossref","unstructured":"Sadat, M., Bener, A.B., Miranskyy, A.: Rediscovery datasets: connecting duplicate reports. In: IEEE International Working Conference on Mining Software Repositories, pp. 527\u2013530 (2017)","DOI":"10.1109\/MSR.2017.50"},{"issue":"7","key":"49_CR18","doi-asserted-by":"publisher","first-page":"195","DOI":"10.3390\/ijgi6070195","volume":"6","author":"S Sehra","year":"2017","unstructured":"Sehra, S., Singh, J., Rai, H.: Using latent semantic analysis to identify research trends in OpenStreetMap. ISPRS Int. J. Geo-Inf. 6(7), 195 (2017)","journal-title":"ISPRS Int. J. Geo-Inf."},{"key":"49_CR19","doi-asserted-by":"crossref","unstructured":"Sun, C., Lo, D., Khoo, S.C., Jiang, J.: Towards more accurate retrieval of duplicate bug reports. In: Proceedings of the 26th International Conference on Automated Software Engineering, ASE 2011, pp. 253\u2013262. IEEE Computer Society (2011)","DOI":"10.1109\/ASE.2011.6100061"},{"key":"49_CR20","doi-asserted-by":"crossref","unstructured":"Sun, C., Lo, D., Wang, X., Jiang, J., Khoo, S.C.: A discriminative model approach for accurate duplicate bug report retrieval. In: Proceedings of the 32nd ACM\/IEEE International Conference on Software Engineering, vol. 1, pp. 45\u201354. ACM (2010)","DOI":"10.1145\/1806799.1806811"},{"key":"49_CR21","doi-asserted-by":"crossref","unstructured":"Sureka, A., Jalote, P.: Detecting duplicate bug report using character N-gram-based features. In: Proceedings - Asia-Pacific Software Engineering Conference, APSEC, pp. 366\u2013374 (2010)","DOI":"10.1109\/APSEC.2010.49"},{"key":"49_CR22","doi-asserted-by":"crossref","unstructured":"Wang, X., Zhang, L., Xie, T., Anvik, J., Sun, J.: An approach to detecting duplicate bug reports using natural language and execution information. In: Proceedings of the 30th International Conference on Software Engineering, pp. 461\u2013470. ACM (2008)","DOI":"10.1145\/1368088.1368151"},{"key":"49_CR23","doi-asserted-by":"crossref","unstructured":"Yang, X., Lo, D., Xia, X., Bao, L., Sun, J.: Combining word embedding with information retrieval to recommend similar bug reports. In: Proceedings - International Symposium on Software Reliability Engineering, ISSRE, pp. 127\u2013137. IEEE (2016)","DOI":"10.1109\/ISSRE.2016.33"},{"issue":"7","key":"49_CR24","doi-asserted-by":"publisher","first-page":"1762","DOI":"10.1587\/transinf.2016EDP7052","volume":"E99D","author":"J Zou","year":"2016","unstructured":"Zou, J., Xu, L., Yang, M., Zhang, X., Zeng, J., Hirokawa, S.: Automated duplicate bug report detection using multi-factor analysis. IEICE Trans. Inf. Syst. E99D(7), 1762\u20131775 (2016)","journal-title":"IEICE Trans. Inf. Syst."}],"container-title":["Lecture Notes in Computer Science","Advances in Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-47358-7_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T15:12:47Z","timestamp":1710256367000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-47358-7_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030473570","9783030473587"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-47358-7_49","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"6 May 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Canadian AI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canadian Conference on Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ottawa, ON","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 May 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 May 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"33","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"canadianai2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.caiac.ca\/en\/conferences\/canadianai-2020\/home","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"175","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the Corona pandemic. In addition, the proceedings include 4 contributions from the Graduate Student Symposium.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}