{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:16:58Z","timestamp":1760955418357},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642374005"},{"type":"electronic","value":"9783642374012"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37401-2_69","type":"book-chapter","created":{"date-parts":[[2013,3,22]],"date-time":"2013-03-22T00:03:25Z","timestamp":1363910605000},"page":"709-720","source":"Crossref","is-referenced-by-count":11,"title":["Practical Duplicate Bug Reports Detection in a Large Web-Based Development Community"],"prefix":"10.1007","author":[{"given":"Liang","family":"Feng","sequence":"first","affiliation":[]},{"given":"Leyi","family":"Song","sequence":"additional","affiliation":[]},{"given":"Chaofeng","family":"Sha","sequence":"additional","affiliation":[]},{"given":"Xueqing","family":"Gong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"69_CR1","doi-asserted-by":"crossref","unstructured":"Bettenburg, N., Premraj, R., Zimmermann, T., Kim, S.: Duplicate bug reports considered harmful... really? In: ICSM, pp. 337\u2013345 (2008)","DOI":"10.1109\/ICSM.2008.4658082"},{"key":"69_CR2","first-page":"993","volume":"3","author":"D.M. Blei","year":"2003","unstructured":"Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent dirichlet allocation. Journal of Machine Learning Research\u00a03, 993\u20131022 (2003)","journal-title":"Journal of Machine Learning Research"},{"key":"69_CR3","doi-asserted-by":"crossref","unstructured":"Cavalcanti, Y.C., de Almeida, E.S., da Cunha, C.E.A., Lucr\u00e9dio, D., de Lemos Meira, S.R.: An initial study on the bug report duplication problem. In: CSMR, pp. 264\u2013267 (2010)","DOI":"10.1109\/CSMR.2010.52"},{"key":"69_CR4","unstructured":"Griffiths, T.: Gibbs sampling in the generative model of latent dirichlet allocation. Unpublished note (2002), \n                    \n                      http:\/\/citeseerx.ist.psu.edu\/viewdoc\/summary"},{"key":"69_CR5","doi-asserted-by":"crossref","unstructured":"Jalbert, N., Weimer, W.: Automated duplicate detection for bug tracking systems. In: DSN, pp. 52\u201361 (2008)","DOI":"10.1109\/DSN.2008.4630070"},{"key":"69_CR6","doi-asserted-by":"crossref","unstructured":"Kaushik, N., Tahvildari, L.: A comparative study of the performance of ir models on duplicate bug detection. In: CSMR, pp. 159\u2013168 (2012)","DOI":"10.1109\/CSMR.2012.78"},{"key":"69_CR7","doi-asserted-by":"crossref","unstructured":"Nguyen, A.T., Nguyen, T.T., Nguyen, T.N., Lo, D., Sun, C.: Duplicate bug report detection with a combination of information retrieval and topic modeling. In: ASE, pp. 70\u201379 (2012)","DOI":"10.1145\/2351676.2351687"},{"key":"69_CR8","doi-asserted-by":"crossref","unstructured":"Runeson, P., Alexandersson, M., Nyholm, O.: Detection of duplicate defect reports using natural language processing. In: ICSE, pp. 499\u2013510 (2007)","DOI":"10.1109\/ICSE.2007.32"},{"issue":"7","key":"69_CR9","first-page":"424","volume":"427","author":"M. Steyvers","year":"2007","unstructured":"Steyvers, M., Griffiths, T.: Probabilistic topic models. Handbook of Latent Semantic Analysis\u00a0427(7), 424\u2013440 (2007)","journal-title":"Handbook of Latent Semantic Analysis"},{"key":"69_CR10","doi-asserted-by":"crossref","unstructured":"Sun, C., Lo, D., Khoo, S.-C., Jiang, J.: Towards more accurate retrieval of duplicate bug reports. In: ASE, pp. 253\u2013262 (2011)","DOI":"10.1109\/ASE.2011.6100061"},{"key":"69_CR11","doi-asserted-by":"crossref","unstructured":"Sun, C., Lo, D., Wang, X., Jiang, J., Khoo, S.-C.: A discriminative model approach for accurate duplicate bug report retrieval. In: ICSE (1), pp. 45\u201354 (2010)","DOI":"10.1145\/1806799.1806811"},{"key":"69_CR12","doi-asserted-by":"crossref","unstructured":"Tian, Y., Sun, C., Lo, D.: Improved duplicate bug report identification. In: CSMR, pp. 385\u2013390 (2012)","DOI":"10.1109\/CSMR.2012.48"},{"key":"69_CR13","doi-asserted-by":"crossref","unstructured":"Wang, X., Zhang, L., Xie, T., Anvik, J., Sun, J.: An approach to detecting duplicate bug reports using natural language and execution information. In: ICSE, pp. 461\u2013470 (2008)","DOI":"10.1145\/1368088.1368151"},{"key":"69_CR14","doi-asserted-by":"crossref","unstructured":"Wei, X., Croft, W.B.: Lda-based document models for ad-hoc retrieval. In: SIGIR, pp. 178\u2013185 (2006)","DOI":"10.1145\/1148170.1148204"}],"container-title":["Lecture Notes in Computer Science","Web Technologies and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37401-2_69","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T18:34:55Z","timestamp":1557599695000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37401-2_69"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642374005","9783642374012"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37401-2_69","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}