{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T11:05:07Z","timestamp":1762254307716,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031213878"},{"type":"electronic","value":"9783031213885"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-21388-5_34","type":"book-chapter","created":{"date-parts":[[2022,11,13]],"date-time":"2022-11-13T20:22:02Z","timestamp":1668370922000},"page":"497-507","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Early Identification of\u00a0Invalid Bug Reports in\u00a0Industrial Settings \u2013 A Case Study"],"prefix":"10.1007","author":[{"given":"Muhammad","family":"Laiq","sequence":"first","affiliation":[]},{"given":"Nauman bin","family":"Ali","sequence":"additional","affiliation":[]},{"given":"J\u00fcrgen","family":"B\u00f6stler","sequence":"additional","affiliation":[]},{"given":"Emelie","family":"Engstr\u00f6m","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,14]]},"reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"Ali, N.B.: Is effectiveness sufficient to choose an intervention? considering resource use in empirical software engineering. In: 10th International Symposium on Empirical Software Engineering and Measurement, pp. 54:1\u201354:6 (2016)","DOI":"10.1145\/2961111.2962631"},{"key":"34_CR2","doi-asserted-by":"crossref","unstructured":"Bachmann, A., Bernstein, A.: Software process data quality and characteristics: a historical view on open and closed source projects. In: Joint ERCIM Workshops on Principles of Software Evolution and Software Evolution, pp. 119\u2013128 (2009)","DOI":"10.1145\/1595808.1595830"},{"key":"34_CR3","doi-asserted-by":"crossref","unstructured":"Bennin, K.E., Ali, N.B., B\u00f6rstler, J., Yu, X.: Revisiting the impact of concept drift on just-in-time quality assurance. In: 20th International Conference on Software Quality, Reliability and Security, pp. 53\u201359 (2020)","DOI":"10.1109\/QRS51102.2020.00020"},{"key":"34_CR4","doi-asserted-by":"crossref","unstructured":"Bettenburg, N., Just, S., Schr\u00f6ter, A., Weiss, C., Premraj, R., Zimmermann, T.: What makes a good bug report? In: 16th International Symposium on Foundations of Software Engineering, pp. 308\u2013318 (2008)","DOI":"10.1145\/1453101.1453146"},{"key":"34_CR5","doi-asserted-by":"crossref","unstructured":"Bettenburg, N., Premraj, R., Zimmermann, T., Kim, S.: Duplicate bug reports considered harmful...really? In: International Conference on Software Maintenance, pp. 337\u2013345 (2008)","DOI":"10.1109\/ICSM.2008.4658082"},{"issue":"5","key":"34_CR6","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1109\/TSE.2018.2864217","volume":"46","author":"Y Fan","year":"2018","unstructured":"Fan, Y., Xia, X., Lo, D., Hassan, A.E.: Chaff from the wheat: characterizing and determining valid bug reports. Trans. Softw. Eng. 46(5), 495\u2013525 (2018)","journal-title":"Trans. Softw. Eng."},{"key":"34_CR7","doi-asserted-by":"crossref","unstructured":"Halimu, C., Kasem, A., Newaz, S.S.: Empirical comparison of area under roc curve (auc) and mathew correlation coefficient (mcc) for evaluating machine learning algorithms on imbalanced datasets for binary classification. In: 3rd International Conference on Machine Learning and Soft Computing, pp. 1\u20136 (2019)","DOI":"10.1145\/3310986.3311023"},{"key":"34_CR8","unstructured":"Han, J., Pei, J., Kamber, M.: Data mining: concepts and techniques. Elsevier (2011)"},{"key":"34_CR9","doi-asserted-by":"crossref","unstructured":"He, J., Xu, L., Fan, Y., Xu, Z., Yan, M., Lei, Y.: Deep learning based valid bug reports determination and explanation. In: 31st International Symposium on Software Reliability Engineering, pp. 184\u2013194 (2020)","DOI":"10.1109\/ISSRE5003.2020.00026"},{"issue":"3","key":"34_CR10","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1109\/TKDE.2005.50","volume":"17","author":"J Huang","year":"2005","unstructured":"Huang, J., Ling, C.X.: Using auc and accuracy in evaluating learning algorithms. Trans. Knowl. Data Eng. 17(3), 299\u2013310 (2005)","journal-title":"Trans. Knowl. Data Eng."},{"key":"34_CR11","doi-asserted-by":"crossref","unstructured":"Just, S., Premraj, R., Zimmermann, T.: Towards the next generation of bug tracking systems. In: Symposium on Visual Languages and Human-centric Computing, pp. 82\u201385 (2008)","DOI":"10.1109\/VLHCC.2008.4639063"},{"issue":"4","key":"34_CR12","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1109\/TSE.2008.35","volume":"34","author":"S Lessmann","year":"2008","unstructured":"Lessmann, S., Baesens, B., Mues, C., Pietsch, S.: Benchmarking classification models for software defect prediction: a proposed framework and novel findings. Trans. Softw. Eng. 34(4), 485\u2013496 (2008)","journal-title":"Trans. Softw. Eng."},{"key":"34_CR13","doi-asserted-by":"crossref","unstructured":"Matthews, B.W.: Comparison of the predicted and observed secondary structure of t4 phage lysozyme. Biochimica et Biophysica Acta (BBA)-Protein Struct. 405(2), 442\u2013451 (1975)","DOI":"10.1016\/0005-2795(75)90109-9"},{"key":"34_CR14","doi-asserted-by":"crossref","unstructured":"Rana, R., Staron, M., Hansson, J., Nilsson, M., Meding, W.: A framework for adoption of machine learning in industry for software defect prediction. In: 9th Intern. Conference on Software Engineering and Applications, pp. 383\u2013392 (2014)","DOI":"10.5220\/0005099303830392"},{"issue":"2","key":"34_CR15","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s10664-008-9102-8","volume":"14","author":"P Runeson","year":"2009","unstructured":"Runeson, P., H\u00f6st, M.: Guidelines for conducting and reporting case study research in software engineering. Empir. Softw. Eng. 14(2), 131\u2013164 (2009)","journal-title":"Empir. Softw. Eng."},{"key":"34_CR16","doi-asserted-by":"crossref","unstructured":"Tantithamthavorn, C., Hassan, A.E.: An experience report on defect modelling in practice: pitfalls and challenges. In: 40th International Conference on Software Engineering: Software Engineering in Practice, pp. 286\u2013295 (2018)","DOI":"10.1145\/3183519.3183547"},{"key":"34_CR17","doi-asserted-by":"crossref","unstructured":"Wang, S., Zhang, W., Wang, Q.: Fixercache: unsupervised caching active developers for diverse bug triage. In: 8th International Symposium on Empirical Software Engineering and Measurement, pp. 1\u201310 (2014)","DOI":"10.1145\/2652524.2652536"},{"issue":"1","key":"34_CR18","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/507338.507355","volume":"31","author":"IH Witten","year":"2002","unstructured":"Witten, I.H., Frank, E.: Data mining: practical machine learning tools and techniques with java implementations. ACM SIGMOD Rec. 31(1), 76\u201377 (2002)","journal-title":"ACM SIGMOD Rec."},{"key":"34_CR19","doi-asserted-by":"crossref","unstructured":"Zanetti, M.S., Scholtes, I., Tessone, C.J., Schweitzer, F.: Categorizing bugs with social networks: a case study on four open source software communities. In: 35th International Conference on Software Engineering, pp. 1032\u20131041 (2013)","DOI":"10.1109\/ICSE.2013.6606653"}],"container-title":["Lecture Notes in Computer Science","Product-Focused Software Process Improvement"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-21388-5_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,14]],"date-time":"2022-11-14T00:09:30Z","timestamp":1668384570000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-21388-5_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031213878","9783031213885"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-21388-5_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"14 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PROFES","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Product-Focused Software Process Improvement","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jyv\u00e4skyl\u00e4","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Finland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"profes2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.jyu.fi\/it\/en\/research\/scholarly-events\/profes2022","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"75","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.9","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6 poster paper and 8 workshop and tutorial papers included in this proceedings","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}