{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T04:08:18Z","timestamp":1746245298946,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662436097"},{"type":"electronic","value":"9783662436103"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43610-3_11","type":"book-chapter","created":{"date-parts":[[2014,4,23]],"date-time":"2014-04-23T13:00:22Z","timestamp":1398258022000},"page":"135-149","source":"Crossref","is-referenced-by-count":7,"title":["Impact Analysis of Granularity Levels on Feature Location Technique"],"prefix":"10.1007","author":[{"given":"Chakkrit","family":"Tantithamthavorn","sequence":"first","affiliation":[]},{"given":"Akinori","family":"Ihara","sequence":"additional","affiliation":[]},{"given":"Hideaki","family":"Hata","sequence":"additional","affiliation":[]},{"given":"Kenichi","family":"Matsumoto","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"8","key":"11_CR1","doi-asserted-by":"publisher","first-page":"1317","DOI":"10.1016\/j.jss.2006.11.004","volume":"80","author":"G. Canfora","year":"2007","unstructured":"Canfora, G., Cimitile, A., Garcia, F., Piattini, M., Visaggio, C.A.: Evaluating performances of pair designing in industry. Journal of Systems and Software\u00a080(8), 1317\u20131327 (2007)","journal-title":"Journal of Systems and Software"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Zhou, J., Zhang, H., Lo, D.: Where Should the Bugs Be Fixed? In: Proceedings of the 34th International Conference on Software Engineering (ICSE 2012), pp. 14\u201324 (2012)","DOI":"10.1109\/ICSE.2012.6227210"},{"issue":"9","key":"11_CR3","doi-asserted-by":"publisher","first-page":"972","DOI":"10.1016\/j.infsof.2010.04.002","volume":"52","author":"S.K. Lukins","year":"2010","unstructured":"Lukins, S.K., Kraft, N.A., Etzkorn, L.H.: Bug Localization Using Latent Dirichlet Allocation. Information and Software Technology\u00a052(9), 972\u2013990 (2010)","journal-title":"Information and Software Technology"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Wang, S., Khomh, F., Zou, Y.: Improving Bug Localization using Correlations in Crash Reports. In: Proceedings of the 10th Working Conference on Mining Software Repositories, MSR 2013 (2013)","DOI":"10.1109\/MSR.2013.6624036"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Hata, H., Mizuno, O., Kikuno, T.: Bug Prediction Based on Fine-Grained Module Histories. In: Proceedings of the 34th International Conference on Software Engineering (ICSE 2012), pp. 200\u2013210 (June 2012)","DOI":"10.1109\/ICSE.2012.6227193"},{"issue":"1","key":"11_CR6","first-page":"53","volume":"25","author":"B. Dit","year":"2013","unstructured":"Dit, B., Revelle, M., Gethers, M., Poshyvanyk, D.: Feature Location in Source Code: A Taxonomy and Survey. Journal of Software: Evolution and Process\u00a025(1), 53\u201395 (2013)","journal-title":"Journal of Software: Evolution and Process"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Manning, C.D., Raghavan, P., Sch\u00fctze, H.: Introduction to Information Retrieval, vol.\u00a0c. Cambridge Unviersity Press, New York (2008)","DOI":"10.1017\/CBO9780511809071"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Tantithamthavorn, C., Teekavanich, R., Ihara, A., Matsumoto, K.: Mining A Change History to Quickly Identify Bug Locations: A Case Study of the Eclipse Project. In: Proceedings of the 2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW 2013), pp. 108\u2013113 (2013)","DOI":"10.1109\/ISSREW.2013.6688888"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Tantithamthavorn, C., Ihara, A., Matsumoto, K.: Using Co-change Histories to Improve Bug Localization Performance. In: Proceedings of the 14th IEEE\/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD 2013), pp. 543\u2013548 (July 2013)","DOI":"10.1109\/SNPD.2013.92"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Giger, E., D\u2019Ambros, M., Pinzger, M., Gall, H.C.: Method-Level Bug Prediction. In: Proceedings of the ACM-IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM 2012), pp. 171\u2013180 (2012)","DOI":"10.1145\/2372251.2372285"},{"issue":"1","key":"11_CR11","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/j.jss.2009.06.055","volume":"83","author":"E. Arisholm","year":"2010","unstructured":"Arisholm, E., Briand, L.C., Johannessen, E.B.: A Systematic and Comprehensive Investigation of Methods to Build and Evaluate Fault Prediction Models. Journal of Systems and Software\u00a083(1), 2\u201317 (2010)","journal-title":"Journal of Systems and Software"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Hata, H., Mizuno, O., Kikuno, T.: Historage: Fine-grained Version Control System for Java. In: Proceedings of the 12th International Workshop on Principles of Software Evolution (IWPSE 2011), pp. 96\u2013100 (2011)","DOI":"10.1145\/2024445.2024463"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Zimmermann, T., Zeller, A.: When Do Changes Induce Fixes? ACM SIGSOFT Software Engineering Notes\u00a030(4), 1\u20135 (2005)","DOI":"10.1145\/1082983.1083147"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Sinha, V.S., Mani, S., Mukherjee, D.: Is Text Search an Effective Approach for Fault Localization: A Practitioners Perspective. In: Proceedings of the 3rd Annual Conference on Systems, Programming, and Applications: Software for Humanity (SPLASH 2012), pp. 159\u2013170 (2012)","DOI":"10.1145\/2384716.2384770"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Hill, E.: On the Use of Stemming for Concern Location and Bug Localization in Java. In: Proceedings of the 12th International Working Conference on Source Code Analysis and Manipulation (SCAM 2012), pp. 184\u2013193 (2012)","DOI":"10.1109\/SCAM.2012.29"},{"key":"11_CR16","unstructured":"Croft, B., Metzler, D., Strohman, T.: Search Engines: Information Retrieval in Practice. Addison-Wesley (2010)"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Bird, C., Bachmann, A., Aune, E., Duffy, J., Bernstein, A., Filkov, V., Devanbu, P.: Fair and Balanced? Bias in Bug-Fix Datasets Categories and Subject Descriptors. In: Proceedings of the the 7th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE 2009), pp. 121\u2013130 (2009)","DOI":"10.1145\/1595696.1595716"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Nguyen, A.T., Nguyen, T.T., Nguyen, H.A., Nguyen, T.N.: Multi-Layered Approach for Recovering Links Between Bug Reports and Fixes. In: Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering (FSE 2012), pp. 1\u201311 (2012)","DOI":"10.1145\/2393596.2393671"}],"container-title":["Communications in Computer and Information Science","Requirements Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43610-3_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T14:39:13Z","timestamp":1746196753000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-43610-3_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662436097","9783662436103"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43610-3_11","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}