{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T00:04:59Z","timestamp":1743033899457,"version":"3.40.3"},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319221823"},{"type":"electronic","value":"9783319221830"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-22183-0_26","type":"book-chapter","created":{"date-parts":[[2015,7,27]],"date-time":"2015-07-27T11:55:37Z","timestamp":1437998137000},"page":"295-300","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Search-Based Bug Report Prioritization for Kate Editor Bugs Repository"],"prefix":"10.1007","author":[{"given":"Duany","family":"Dreyton","sequence":"first","affiliation":[]},{"given":"Allysson Allex","family":"Ara\u00fajo","sequence":"additional","affiliation":[]},{"given":"Altino","family":"Dantas","sequence":"additional","affiliation":[]},{"given":"\u00c1tila","family":"Freitas","sequence":"additional","affiliation":[]},{"given":"Jerffeson","family":"Souza","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,28]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Anvik, J., Hiew, L., Murphy, G.C.: Who should fix this bug?. In: Proceedings of the 28th international conference on Software engineering, pp. 361\u2013370. ACM (2006)","key":"26_CR1","DOI":"10.1145\/1134285.1134336"},{"doi-asserted-by":"crossref","unstructured":"Harman, M.: The current state and future of search based software engineering. In: 2007 Future of Software Engineering, pp. 342\u2013357. IEEE Computer Society (2007)","key":"26_CR2","DOI":"10.1109\/FOSE.2007.29"},{"key":"26_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-25231-0_1","volume-title":"Empirical Software Engineering and Verification","author":"M Harman","year":"2012","unstructured":"Harman, M., McMinn, P., de Souza, J.T., Yoo, S.: Search based software engineering: techniques, taxonomy, tutorial. In: Meyer, B., Nordio, M. (eds.) Empirical Software Engineering and Verification. LNCS, vol. 7007, pp. 1\u201359. Springer, Heidelberg (2012)"},{"issue":"1","key":"26_CR4","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/j.infsof.2012.07.003","volume":"55","author":"P Tonella","year":"2013","unstructured":"Tonella, P., Susi, A., Palma, F.: Interactive requirements prioritization using a genetic algorithm. Inf. Softw. Technol. 55(1), 173\u2013187 (2013)","journal-title":"Inf. Softw. Technol."},{"doi-asserted-by":"crossref","unstructured":"Vidal, S.A., Marcos, C., D\u00edaz-Pace, J.A.: An approach to prioritize code smells for refactoring. Automated Software Engineering, pp. 1\u201332 (2014)","key":"26_CR5","DOI":"10.1007\/s10515-014-0175-x"},{"unstructured":"Kanwal, J., Maqbool, O.: Managing open bug repositories through bug report prioritization using svms. In: Proceedings of the International Conference on Open-Source Systems and Technologies, Lahore, Pakistan (2010)","key":"26_CR6"},{"issue":"2","key":"26_CR7","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/s11390-012-1230-3","volume":"27","author":"J Kanwal","year":"2012","unstructured":"Kanwal, J., Maqbool, O.: Bug prioritization to facilitate bug report triage. J. Comput. Sci. Technol. 27(2), 397\u2013412 (2012)","journal-title":"J. Comput. Sci. Technol."},{"issue":"10","key":"26_CR8","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1016\/j.advengsoft.2011.05.014","volume":"42","author":"JJ Durillo","year":"2011","unstructured":"Durillo, J.J., Nebro, A.J.: jmetal: A java framework for multi-objective optimization. Adv. Eng. Softw. 42(10), 760\u2013771 (2011)","journal-title":"Adv. Eng. Softw."},{"issue":"3","key":"26_CR9","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1002\/stvr.1486","volume":"24","author":"A Arcuri","year":"2014","unstructured":"Arcuri, A., Briand, L.: A hitchhiker\u2019s guide to statistical tests for assessing randomized algorithms in software engineering. Softw. Test. Verif. Reliabi. 24(3), 219\u2013250 (2014)","journal-title":"Softw. Test. Verif. Reliabi."}],"container-title":["Lecture Notes in Computer Science","Search-Based Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-22183-0_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T14:17:59Z","timestamp":1675865879000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-22183-0_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319221823","9783319221830"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-22183-0_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"28 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}