{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T06:12:18Z","timestamp":1743055938557,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030754174"},{"type":"electronic","value":"9783030754181"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-75418-1_25","type":"book-chapter","created":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T15:04:51Z","timestamp":1619795091000},"page":"542-559","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Evaluating a LSTM Neural Network and a Word2vec Model in the Classification of Self-admitted Technical Debts and Their Types in Code Comments"],"prefix":"10.1007","author":[{"given":"Rafael Meneses","family":"Santos","sequence":"first","affiliation":[]},{"given":"Israel Meneses","family":"Santos","sequence":"additional","affiliation":[]},{"given":"Methanias Cola\u00e7o","family":"J\u00fanior","sequence":"additional","affiliation":[]},{"given":"Manoel","family":"Mendon\u00e7a","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,1]]},"reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"Alves, N.S., Ribeiro, L.F., Caires, V., Mendes, T.S., Sp\u00ednola, R.O.: Towards an ontology of terms on technical debt. In: 2014 6th International Workshop on Managing Technical Debt, pp. 1\u20137. IEEE (2014)","DOI":"10.1109\/MTD.2014.9"},{"key":"25_CR2","doi-asserted-by":"publisher","first-page":"728","DOI":"10.1109\/TSE.1984.5010301","volume":"6","author":"VR Basili","year":"1984","unstructured":"Basili, V.R., Weiss, D.M.: A methodology for collecting valid software engineering data. IEEE Trans. Softw. Eng. 6, 728\u2013738 (1984)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"25_CR3","unstructured":"Chollet, F., et al.: Keras. https:\/\/keras.io (2015)"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Codabux, Z., Williams, B.: Managing technical debt: an industrial case study. In: 2013 4th International Workshop on Managing Technical Debt (MTD), pp. 8\u201315. IEEE (2013)","DOI":"10.1109\/MTD.2013.6608672"},{"issue":"2","key":"25_CR5","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/157710.157715","volume":"4","author":"W Cunningham","year":"1992","unstructured":"Cunningham, W.: The WyCash portfolio management system. ACM SIGPLAN OOPS Messenger 4(2), 29\u201330 (1992)","journal-title":"ACM SIGPLAN OOPS Messenger"},{"key":"25_CR6","doi-asserted-by":"publisher","first-page":"106270","DOI":"10.1016\/j.infsof.2020.106270","volume":"121","author":"MA de Freitas Farias","year":"2020","unstructured":"de Freitas Farias, M.A., de Mendon\u00e7a Neto, M.G., Kalinowski, M., Sp\u00ednola, R.O.: Identifying self-admitted technical debt through code comment analysis with a contextualized vocabulary. Inf. Softw. Technol. 121, 106270 (2020)","journal-title":"Inf. Softw. Technol."},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"de Freitas Farias, M.A., de Mendon\u00e7a Neto, M.G., da Silva, A.B., Sp\u00ednola, R.O.: A contextualized vocabulary model for identifying technical debt on code comments. In: 2015 IEEE 7th International Workshop on Managing Technical Debt (MTD), pp. 25\u201332. IEEE (2015)","DOI":"10.1109\/MTD.2015.7332621"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Guo, Y., Seaman, C.: A portfolio approach to technical debt management. In: Proceedings of the 2nd Workshop on Managing Technical Debt, pp. 31\u201334 (2011)","DOI":"10.1145\/1985362.1985370"},{"issue":"3","key":"25_CR9","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/s11222-017-9746-6","volume":"28","author":"D Hand","year":"2018","unstructured":"Hand, D., Christen, P.: A note on using the f-measure for evaluating record linkage algorithms. Stat. Comput. 28(3), 539\u2013547 (2018)","journal-title":"Stat. Comput."},{"issue":"8","key":"25_CR10","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"issue":"1","key":"25_CR11","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1007\/s10664-017-9522-4","volume":"23","author":"Q Huang","year":"2017","unstructured":"Huang, Q., Shihab, E., Xia, X., Lo, D., Li, S.: Identifying self-admitted technical debt in open source projects using text mining. Empirical Softw. Eng. 23(1), 418\u2013451 (2017). https:\/\/doi.org\/10.1007\/s10664-017-9522-4","journal-title":"Empirical Softw. Eng."},{"issue":"7553","key":"25_CR12","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521(7553), 436\u2013444 (2015)","journal-title":"Nature"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Liu, Z., Huang, Q., Xia, X., Shihab, E., Lo, D., Li, S.: Satd detector: a text-mining-based self-admitted technical debt detection tool. In: Proceedings of the 40th International Conference on Software Engineering: Companion Proceedings, pp. 9\u201312 (2018)","DOI":"10.1145\/3183440.3183478"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Maldonado, E.D.S., Shihab, E.: Detecting and quantifying different types of self-admitted technical debt. In: 2015 IEEE 7th International Workshop on Managing Technical Debt (MTD), pp. 9\u201315. IEEE (2015)","DOI":"10.1109\/MTD.2015.7332619"},{"issue":"5","key":"25_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1147\/JRD.2012.2204512","volume":"56","author":"R Marinescu","year":"2012","unstructured":"Marinescu, R.: Assessing technical debt by identifying design flaws in software systems. IBM J. Res. Dev. 56(5), 1\u20139 (2012)","journal-title":"IBM J. Res. Dev."},{"key":"25_CR16","unstructured":"Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 (2013)"},{"key":"25_CR17","unstructured":"Mikolov, T., Chen, K., Corrado, G.S., Dean, J.A.: Computing numeric representations of words in a high-dimensional space. US Patent 9,037,464, 19 May 2015"},{"key":"25_CR18","unstructured":"Mikolov, T., Sutskever, I., Chen, K., Corrado, G.S., Dean, J.: Distributed representations of words and phrases and their compositionality. In: Advances in Neural Information Processing Systems, pp. 3111\u20133119 (2013)"},{"key":"25_CR19","doi-asserted-by":"crossref","unstructured":"Nord, R.L., Ozkaya, I., Kruchten, P., Gonzalez-Rojas, M.: In search of a metric for managing architectural technical debt. In: 2012 Joint Working IEEE\/IFIP Conference on Software Architecture and European Conference on Software Architecture, pp. 91\u2013100. IEEE (2012)","DOI":"10.1109\/WICSA-ECSA.212.17"},{"key":"25_CR20","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., et al.: Scikit-learn: machine learning in python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)","journal-title":"J. Mach. Learn. Res."},{"key":"25_CR21","doi-asserted-by":"crossref","unstructured":"Potdar, A., Shihab, E.: An exploratory study on self-admitted technical debt. In: 2014 IEEE International Conference on Software Maintenance and Evolution, pp. 91\u2013100. IEEE (2014)","DOI":"10.1109\/ICSME.2014.31"},{"key":"25_CR22","unstructured":"Rehurek, R., Sojka, P.: Software framework for topic modelling with large corpora. In: In Proceedings of the LREC 2010 Workshop on New Challenges for NLP Frameworks. Citeseer (2010)"},{"key":"25_CR23","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1007\/978-3-030-43020-7_93","volume-title":"17th International Conference on Information Technology\u2013New Generations (ITNG 2020)","author":"RM Santos","year":"2020","unstructured":"Santos, R.M., Junior, M.C.R., de Mendon\u00e7a Neto, M.G.: Self-admitted technical debt classification using LSTM neural network. In: Latifi, S. (ed.) 17th International Conference on Information Technology\u2013New Generations (ITNG 2020). AISC, vol. 1134, pp. 679\u2013685. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-43020-7_93"},{"key":"25_CR24","doi-asserted-by":"crossref","unstructured":"Santos, R.M., Santos, I.M., J\u00fanior, M.C.R., de Mendon\u00e7a Neto, M.G.: Long term-short memory neural networks and word2vec for self-admitted technical debt detection. In: ICEIS (2), pp. 157\u2013165 (2020)","DOI":"10.5220\/0009796001570165"},{"key":"25_CR25","doi-asserted-by":"crossref","unstructured":"Seaman, C., Guo, Y.: Measuring and monitoring technical debt. In: Advances in Computers, vol. 82, pp. 25\u201346. Elsevier (2011)","DOI":"10.1016\/B978-0-12-385512-1.00002-5"},{"issue":"11","key":"25_CR26","doi-asserted-by":"publisher","first-page":"1044","DOI":"10.1109\/TSE.2017.2654244","volume":"43","author":"E da Silva Maldonado","year":"2017","unstructured":"da Silva Maldonado, E., Shihab, E., Tsantalis, N.: Using natural language processing to automatically detect self-admitted technical debt. IEEE Trans. Softw. Eng. 43(11), 1044\u20131062 (2017)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"25_CR27","doi-asserted-by":"crossref","unstructured":"Wattanakriengkrai, S., Maipradit, R., Hata, H., Choetkiertikul, M., Sunetnanta, T., Matsumoto, K.: Identifying design and requirement self-admitted technical debt using n-gram IDF. In: 2018 9th International Workshop on Empirical Software Engineering in Practice (IWESEP), pp. 7\u201312. IEEE (2018)","DOI":"10.1109\/IWESEP.2018.00010"},{"key":"25_CR28","doi-asserted-by":"publisher","unstructured":"Wohlin, C., Runeson, P., H\u00f6st, M., Ohlsson, M.C., Regnell, B., Wessl\u00e9n, A.: Experimentation in Software Engineering. Springer Science & Business Media, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-29044-2","DOI":"10.1007\/978-3-642-29044-2"},{"key":"25_CR29","unstructured":"Zhou, C., Sun, C., Liu, Z., Lau, F.: A C-LSTM neural network for text classification. arXiv preprint arXiv:1511.08630 (2015)"},{"key":"25_CR30","unstructured":"Zhou, P., Qi, Z., Zheng, S., Xu, J., Bao, H., Xu, B.: Text classification improved by integrating bidirectional lstm with two-dimensional max pooling. arXiv preprint arXiv:1611.06639 (2016)"}],"container-title":["Lecture Notes in Business Information Processing","Enterprise Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-75418-1_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,15]],"date-time":"2021-06-15T15:32:01Z","timestamp":1623771121000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-75418-1_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030754174","9783030754181"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-75418-1_25","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"1 May 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICEIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Enterprise Information Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 May 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 May 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iceis2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iceis.org\/?y=2020","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"PRIMORIS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"255","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"90","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}