{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T07:09:52Z","timestamp":1743059392984,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319699035"},{"type":"electronic","value":"9783319699042"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-69904-2_37","type":"book-chapter","created":{"date-parts":[[2017,10,20]],"date-time":"2017-10-20T05:18:33Z","timestamp":1508476713000},"page":"491-505","source":"Crossref","is-referenced-by-count":4,"title":["Ontological Evolutionary Encoding to Bridge Machine Learning and Conceptual Models: Approach and Industrial Evaluation"],"prefix":"10.1007","author":[{"given":"Ana C.","family":"Marc\u00e9n","sequence":"first","affiliation":[]},{"given":"Francisca","family":"P\u00e9rez","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Cetina","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,21]]},"reference":[{"key":"37_CR1","unstructured":"Apache opennlp: Toolkit for the processing of natural language text. https:\/\/opennlp.apache.org\/ . Accessed Apr 2017"},{"key":"37_CR2","unstructured":"Efficient Java matrix library. http:\/\/ejml.org\/ . Accessed Apr 2017"},{"key":"37_CR3","unstructured":"The English (porter2) stemming algorithm. http:\/\/snowball.tartarus.org\/algorithms\/english\/stemmer.html . Accessed Apr 2017"},{"issue":"10","key":"37_CR4","doi-asserted-by":"publisher","first-page":"970","DOI":"10.1109\/TSE.2002.1041053","volume":"28","author":"G Antoniol","year":"2002","unstructured":"Antoniol, G., Canfora, G., Casazza, G., De Lucia, A., Merlo, E.: Recovering traceability links between code and documentation. IEEE Trans. Softw. Eng. 28(10), 970\u2013983 (2002)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"3","key":"37_CR5","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1002\/stvr.1486","volume":"24","author":"A Arcuri","year":"2014","unstructured":"Arcuri, A., Briand, L.: A hitchhiker\u2019s guide to statistical tests for assessing randomized algorithms in software engineering. Softw. Test. Verif. Reliab. 24(3), 219\u2013250 (2014)","journal-title":"Softw. Test. Verif. Reliab."},{"issue":"3","key":"37_CR6","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1007\/s10664-013-9249-9","volume":"18","author":"A Arcuri","year":"2013","unstructured":"Arcuri, A., Fraser, G.: Parameter tuning or default values? An empirical investigation in search-based software engineering. Empirical Softw. Eng. 18(3), 594\u2013623 (2013)","journal-title":"Empirical Softw. Eng."},{"key":"37_CR7","doi-asserted-by":"crossref","unstructured":"B Le, T.D., Lo, D., Le Goues, C., Grunske, L.: A learning-to-rank based fault localization approach using likely invariants. In: Proceedings of the 25th International Symposium on Software Testing and Analysis, pp. 177\u2013188. ACM (2016)","DOI":"10.1145\/2931037.2931049"},{"key":"37_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36657-4","volume-title":"Handbook on Neural Information Processing","author":"M Bianchini","year":"2013","unstructured":"Bianchini, M., Maggini, M., Jain, L.C.: Handbook on Neural Information Processing. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-36657-4"},{"key":"37_CR9","doi-asserted-by":"crossref","unstructured":"Cao, Z., Qin, T., Liu, T.Y., Tsai, M.F., Li, H.: Learning to rank: from pairwise approach to listwise approach. In: Proceedings of the 24th International Conference on Machine Learning, ICML 2007, pp. 129\u2013136. ACM, New York (2007)","DOI":"10.1145\/1273496.1273513"},{"issue":"1","key":"37_CR10","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.compeleceng.2013.11.024","volume":"40","author":"G Chandrashekar","year":"2014","unstructured":"Chandrashekar, G., Sahin, F.: A survey on feature selection methods. Comput. Electr. Eng. 40(1), 16\u201328 (2014)","journal-title":"Comput. Electr. Eng."},{"key":"37_CR11","unstructured":"Dang, V.: The lemur project - wiki - ranklib (2013). http:\/\/sourceforge.net\/p\/lemur\/wiki\/RankLib\/ . Accessed Apr 2017"},{"key":"37_CR12","doi-asserted-by":"crossref","unstructured":"De Lucia, A., Fasano, F., Oliveto, R., Tortora, G.: Enhancing an artefact management system with traceability recovery features. In: Proceedings of 20th IEEE International Conference on Software Maintenance, pp. 306\u2013315. IEEE (2004)","DOI":"10.1109\/ICSM.2004.1357816"},{"key":"37_CR13","unstructured":"Dyer, D.: The watchmaker framework for evolutionary computation (evolutionary\/genetic algorithms for Java). http:\/\/watchmaker.uncommons.org\/ . Accessed Apr 2017"},{"key":"37_CR14","doi-asserted-by":"crossref","unstructured":"Eaddy, M., Aho, A., Murphy, G.C.: Identifying, assigning, and quantifying crosscutting concerns. In: Proceedings of the First International Workshop on Assessment of Contemporary Modularization Techniques, p. 2 (2007)","DOI":"10.1109\/ACOM.2007.4"},{"key":"37_CR15","doi-asserted-by":"crossref","unstructured":"Eaddy, M., Aho, A.V., Antoniol, G., Gu\u00e9h\u00e9neuc, Y.G.: Cerberus: tracing requirements to source code using information retrieval, dynamic analysis, and program analysis. In: ICPC 2008 Conference, pp. 53\u201362. IEEE (2008)","DOI":"10.1109\/ICPC.2008.39"},{"issue":"Nov","key":"37_CR16","first-page":"933","volume":"4","author":"Y Freund","year":"2003","unstructured":"Freund, Y., Iyer, R., Schapire, R.E., Singer, Y.: An efficient boosting algorithm for combining preferences. J. Mach. Learn. Res. 4(Nov), 933\u2013969 (2003)","journal-title":"J. Mach. Learn. Res."},{"key":"37_CR17","doi-asserted-by":"crossref","unstructured":"Haiduc, S., Bavota, G., Oliveto, R., De Lucia, A., Marcus, A.: Automatic query performance assessment during the retrieval of software artifacts. In: International Conference on Automated Software Engineering, pp. 90\u201399. ACM (2012)","DOI":"10.1145\/2351676.2351690"},{"issue":"2","key":"37_CR18","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/j.ecolmodel.2006.05.017","volume":"199","author":"AH Hirzel","year":"2006","unstructured":"Hirzel, A.H., Le Lay, G., Helfer, V., Randin, C., Guisan, A.: Evaluating the ability of habitat suitability models to predict species presences. Ecol. Model. 199(2), 142\u2013152 (2006)","journal-title":"Ecol. Model."},{"key":"37_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/BFb0026683","volume-title":"Machine Learning: ECML-98","author":"T Joachims","year":"1998","unstructured":"Joachims, T.: Text categorization with support vector machines: learning with many relevant features. In: N\u00e9dellec, C., Rouveirol, C. (eds.) ECML 1998. LNCS, vol. 1398, pp. 137\u2013142. Springer, Heidelberg (1998). doi: 10.1007\/BFb0026683"},{"key":"37_CR20","unstructured":"Kohavi, R., et al.: A study of cross-validation and bootstrap for accuracy estimation and model selection. In: IJCAI, Stanford, CA, vol. 14, pp. 1137\u20131145 (1995)"},{"key":"37_CR21","doi-asserted-by":"crossref","unstructured":"Marcus, A., Sergeyev, A., Rajlich, V., Maletic, J.: An information retrieval approach to concept location in source code. In: Proceedings of the 11th Working Conference on Reverse Engineering, pp. 214\u2013223, November 2004","DOI":"10.1109\/WCRE.2004.10"},{"key":"37_CR22","doi-asserted-by":"crossref","unstructured":"Marcus, A., Maletic, J.I.: Recovering documentation-to-source-code traceability links using latent semantic indexing. In: Proceedings of 25th International Conference on Software Engineering, pp. 125\u2013135. IEEE (2003)","DOI":"10.1109\/ICSE.2003.1201194"},{"key":"37_CR23","first-page":"995","volume":"18","author":"A Navot","year":"2006","unstructured":"Navot, A., Shpigelman, L., Tishby, N., Vaadia, E.: Nearest neighbor based feature selection for regression and its application to neural activity. Adv. Neural Inf. Process. Syst. 18, 995 (2006)","journal-title":"Adv. Neural Inf. Process. Syst."},{"issue":"6","key":"37_CR24","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1109\/TSE.2007.1016","volume":"33","author":"D Poshyvanyk","year":"2007","unstructured":"Poshyvanyk, D., Gueheneuc, Y.G., Marcus, A., Antoniol, G., Rajlich, V.: Feature location using probabilistic ranking of methods based on execution scenarios and information retrieval. IEEE Trans. Softw. Eng. 33(6), 420\u2013432 (2007)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"37_CR25","doi-asserted-by":"crossref","unstructured":"Sayyad, A.S., Ingram, J., Menzies, T., Ammar, H.: Scalable product line configuration: a straw to break the camel\u2019s back. In: 2013 IEEE\/ACM 28th International Conference on Automated Software Engineering (ASE), pp. 465\u2013474, November 2013","DOI":"10.1109\/ASE.2013.6693104"},{"issue":"1","key":"37_CR26","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.istr.2009.03.003","volume":"14","author":"A Shabtai","year":"2009","unstructured":"Shabtai, A., Moskovitch, R., Elovici, Y., Glezer, C.: Detection of malicious code by applying machine learning classifiers on static features: a state-of-the-art survey. Inf. Secur. Tech. Rep. 14(1), 16\u201329 (2009)","journal-title":"Inf. Secur. Tech. Rep."},{"key":"37_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-3-642-15579-6_8","volume-title":"Software Product Lines: Going Beyond","author":"A Svendsen","year":"2010","unstructured":"Svendsen, A., Zhang, X., Lind-Tviberg, R., Fleurey, F., Haugen, \u00d8., M\u00f8ller-Pedersen, B., Olsen, G.K.: Developing a software product line for train control: a case study of CVL. In: Bosch, J., Lee, J. (eds.) SPLC 2010. LNCS, vol. 6287, pp. 106\u2013120. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-15579-6_8"},{"issue":"2","key":"37_CR28","first-page":"101","volume":"25","author":"A Vargha","year":"2000","unstructured":"Vargha, A., Delaney, H.D.: A critique and improvement of the CL common language effect size statistics of McGraw and Wong. J. Educ. Behav. Stat. 25(2), 101\u2013132 (2000)","journal-title":"J. Educ. Behav. Stat."},{"key":"37_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29044-2","volume-title":"Experimentation in Software Engineering","author":"C Wohlin","year":"2012","unstructured":"Wohlin, C., Runeson, P., H\u00f6st, M., Ohlsson, M.C., Regnell, B., Wessl\u00e9n, A.: Experimentation in Software Engineering. Springer Science & Business Media, Heidelberg (2012). doi: 10.1007\/978-3-642-29044-2"},{"key":"37_CR30","doi-asserted-by":"crossref","unstructured":"Wolf, L., Martin, I.: Robust boosting for learning from few examples. In: Computer Vision and Pattern Recognition, vol. 1, pp. 359\u2013364. IEEE (2005)","DOI":"10.1109\/CVPR.2005.305"},{"key":"37_CR31","doi-asserted-by":"crossref","unstructured":"Xuan, J., Monperrus, M.: Learning to combine multiple ranking metrics for fault localization. In: Proceedings of the 30th International Conference on Software Maintenance and Evolution (2014)","DOI":"10.1109\/ICSME.2014.41"},{"issue":"4","key":"37_CR32","doi-asserted-by":"publisher","first-page":"606","DOI":"10.1109\/TEVC.2015.2504420","volume":"20","author":"B Xue","year":"2016","unstructured":"Xue, B., Zhang, M., Browne, W.N., Yao, X.: A survey on evolutionary computation approaches to feature selection. IEEE Trans. Evol. Comput. 20(4), 606\u2013626 (2016)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"37_CR33","doi-asserted-by":"crossref","unstructured":"Ye, X., Bunescu, R., Liu, C.: Learning to rank relevant files for bug reports using domain knowledge. In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 689\u2013699. ACM (2014)","DOI":"10.1145\/2635868.2635874"},{"issue":"4","key":"37_CR34","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1109\/TSE.2015.2479232","volume":"42","author":"X Ye","year":"2016","unstructured":"Ye, X., Bunescu, R., Liu, C.: Mapping bug reports to relevant files: a ranking model, a fine-grained benchmark, and feature evaluation. IEEE Trans. Softw. Eng. 42(4), 379\u2013402 (2016)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"37_CR35","unstructured":"Zisman, A., Spanoudakis, G., P\u00e9rez-Mi\u00f1ana, E., Krause, P.: Tracing software requirements artifacts. In: Software Engineering Research and Practice, pp. 448\u2013455 (2003)"}],"container-title":["Lecture Notes in Computer Science","Conceptual Modeling"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-69904-2_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,4]],"date-time":"2019-10-04T19:09:56Z","timestamp":1570216196000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-69904-2_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319699035","9783319699042"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-69904-2_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}