{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T20:09:42Z","timestamp":1775246982727,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":32,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811329210","type":"print"},{"value":"9789811329227","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-13-2922-7_23","type":"book-chapter","created":{"date-parts":[[2018,10,10]],"date-time":"2018-10-10T14:30:24Z","timestamp":1539181824000},"page":"336-349","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Identification of High Priority Bug Reports via Integration Method"],"prefix":"10.1007","author":[{"given":"Guofeng","family":"Gao","sequence":"first","affiliation":[]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[]},{"given":"Rong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Ge","sequence":"additional","affiliation":[]},{"given":"Shikai","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,11]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Xia, X., Lo, D., Wang, X., Zhou, B.: Accurate developer recommendation for bug resolution. In: Conference: Reverse Engineering, pp. 72\u201381. IEEE (2013)","DOI":"10.1109\/WCRE.2013.6671282"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Anvik, J., Hiew, L., Murphy, G.C.: Coping with an open bug repository. In: Proceedings of the 2005 OOPSLA workshop on Eclipse technology eXchange, pp. 35\u201339. ACM, New York (2005)","DOI":"10.1145\/1117696.1117704"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Tian, Y., Lo, D., Sun, C.: DRONE: predicting priority of reported bugs by multi-factor analysis. In: IEEE International Conference on Software Maintenance, pp. 200\u2013209. IEEE (2013)","DOI":"10.1109\/ICSM.2013.31"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Wang, Q., et al.: Local-based active classification of test report to assist crowdsourced testing. In: IEEE\/ACM International Conference on Automated Software Engineering, pp. 190\u2013201. ACM (2016)","DOI":"10.1145\/2970276.2970300"},{"issue":"6","key":"23_CR5","first-page":"1114","volume":"3","author":"B Neeraj","year":"2013","unstructured":"Neeraj, B., Girja, S., Ritu, D.B., Manisha, M.: Decision tree analysis on j48 algorithm for data mining. J. Adv. Res. Comput. 3(6), 1114\u20131119 (2013)","journal-title":"J. Adv. Res. Comput."},{"key":"23_CR6","volume-title":"Data Mining: Concepts and Techniques","author":"J Han","year":"2006","unstructured":"Han, J., Kamber, M.: Data Mining: Concepts and Techniques. Morgan Kaufmann, Burlington (2006)"},{"key":"23_CR7","unstructured":"IBM ILOG CPLEX Optimizer. https:\/\/www.ibm.com\/analytics\/data-science\/prescriptive-analytics\/cplex-optimizer\/. Accessed 26 Apr 2018"},{"key":"23_CR8","first-page":"22","volume":"11","author":"JB Lovins","year":"1968","unstructured":"Lovins, J.B.: Development of a stemming algorithm. Mech. Transl. Comput. Linguist. 11, 22\u201331 (1968)","journal-title":"Mech. Transl. Comput. Linguist."},{"key":"23_CR9","unstructured":"http:\/\/bugzilla.mozilla.org. Accessed 26 Mar 2018"},{"key":"23_CR10","first-page":"115","volume":"29","author":"J Hu","year":"2013","unstructured":"Hu, J., Zhang, G.: K-fold cross-validation based selected ensemble classification algorithm. Bull. Sci. Technol. 29, 115\u2013117 (2013)","journal-title":"Bull. Sci. Technol."},{"key":"23_CR11","unstructured":"Weng, C.G., Poon, J.: A new evaluation measure for imbalanced datasets. In: Australasian Data Mining Conference, pp. 27\u201332. Australian Computer Society, Inc. (2008)"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Menzies, T., Marcus, A.: Automated severity assessment of software defect reports. In: IEEE International Conference on Software Maintenance, pp. 346\u2013355 (2015)","DOI":"10.1109\/ICSM.2008.4658083"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Cohen, W.W.: Fast effective rule induction. In: Twelfth International Conference on Machine Learning, pp. 115\u2013123. Morgan Kaufmann Publishers, Inc. (1995)","DOI":"10.1016\/B978-1-55860-377-6.50023-2"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Lamkanfi, A., Demeyer, S., Giger, E., et al.: Predicting the severity of a reported bug. In: Mining Software Repositories, pp. 1\u201310. IEEE (2010)","DOI":"10.1109\/MSR.2010.5463284"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Lamkanfi, A., Demeyer, S., Soetens, Q.D., et al.: Comparing mining algorithms for predicting the severity of a reported bug. In: European Conference on Software Maintenance and Reengineering, pp. 249\u2013258. IEEE Computer Society (2011)","DOI":"10.1109\/CSMR.2011.31"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Tian, Y., Lo, D., Sun, C.: Information retrieval based nearest neighbor classification for fine-grained bug severity prediction. In: Reverse Engineering, pp. 215\u2013224. IEEE (2012)","DOI":"10.1109\/WCRE.2012.31"},{"issue":"5","key":"23_CR17","doi-asserted-by":"publisher","first-page":"1354","DOI":"10.1007\/s10664-014-9331-y","volume":"20","author":"Y Tian","year":"2015","unstructured":"Tian, Y., Lo, D., Xia, X., et al.: Automated prediction of bug report priority using multi-factor analysis. Empir. Softw. Eng. 20(5), 1354\u20131383 (2015)","journal-title":"Empir. Softw. Eng."},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"Sharma, M., Bedi, P., Chaturvedi, K.K., et al.: Predicting the priority of a reported bug using machine learning techniques and cross project validation. In: International Conference on Intelligent Systems Design and Applications, pp. 539\u2013545. IEEE (2013)","DOI":"10.1109\/ISDA.2012.6416595"},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"Khomh, F., Chan, B., Zou, Y., et al.: An entropy evaluation approach for triaging field crashes: a case study of Mozilla Firefox. In: Working Conference on Reverse Engineering, pp. 261\u2013270. IEEE Computer Society (2011)","DOI":"10.1109\/WCRE.2011.39"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Antoniol, G., Ayari, K., Penta, M.D., Khomh, F.: Is it a bug or an enhancement? A text-based approach to classify change requests. In: Proceedings of the Conference of the Center for Advanced Studies on Collaborative Research, CASCON 2008, pp. 304\u2013318. ACM (2008)","DOI":"10.1145\/1463788.1463819"},{"key":"23_CR21","doi-asserted-by":"crossref","unstructured":"Runeson, P., Alexandersson, M., Nyholm, O.: Detection of duplicate defect reports using natural language processing. In: International Conference on Software Engineering, pp. 499\u2013510. IEEE (2007)","DOI":"10.1109\/ICSE.2007.32"},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"Sun, C., Lo, D., et al.: A discriminative model approach for accurate duplicate bug report retrieval. In: International Conference on Software Engineering, pp. 45\u201354. IEEE (2010)","DOI":"10.1145\/1806799.1806811"},{"key":"23_CR23","doi-asserted-by":"crossref","unstructured":"Sun, C., Lo, D., Khoo, S.C., et al.: Towards more accurate retrieval of duplicate bug reports. In: IEEE\/ACM International Conference on Automated Software Engineering, pp. 253\u2013262. IEEE (2011)","DOI":"10.1109\/ASE.2011.6100061"},{"key":"23_CR24","doi-asserted-by":"crossref","unstructured":"Tian, Y., Sun, C., Lo, D.: Improved duplicate bug report identification, vol. 94, no. 3, pp. 385\u2013390 (2012)","DOI":"10.1109\/CSMR.2012.48"},{"key":"23_CR25","doi-asserted-by":"crossref","unstructured":"Zhou, J., Zhang, H., Lo, D.: Where should the bugs be fixed? More accurate information retrieval-based bug localization based on bug reports. In: International Conference on Software Engineering, pp. 14\u201324. IEEE (2012)","DOI":"10.1109\/ICSE.2012.6227210"},{"key":"23_CR26","doi-asserted-by":"crossref","unstructured":"Gegick, M., Rotella, P., Xie, T.: Identifying security bug reports via text mining: an industrial case study. In: IEEE Working Conference on Mining Software Repositories, pp. 11\u201320. IEEE (2010)","DOI":"10.1109\/MSR.2010.5463340"},{"key":"23_CR27","doi-asserted-by":"crossref","unstructured":"Huang, L.G., Ng, V., Persing, I., et al.: AutoODC: automated generation of orthogonal defect classifications. In: IEEE\/ACM International Conference on Automated Software Engineering, pp. 3\u201346. IEEE (2011)","DOI":"10.1007\/s10515-014-0155-1"},{"key":"23_CR28","doi-asserted-by":"crossref","unstructured":"Thung, F., Lo, D., Jiang, L.: Automatic defect categorization. In: Working Conference on Reverse Engineering, pp. 205\u2013214. IEEE (2012)","DOI":"10.1109\/WCRE.2012.30"},{"key":"23_CR29","doi-asserted-by":"crossref","unstructured":"Kim, S., Whitehead, E.J.: How long did it take to fix bugs? In: International Workshop on Mining Software Repositories, MSR 2006, pp. 173\u2013174. DBLP, Shanghai (2006)","DOI":"10.1145\/1137983.1138027"},{"key":"23_CR30","doi-asserted-by":"crossref","unstructured":"Weiss, C., Premraj, R., Zimmermann, T., et al.: How long will it take to fix this bug? In: Proceedings of International Workshop on Mining Software Repositories, p. 1 (2007)","DOI":"10.1109\/MSR.2007.13"},{"key":"23_CR31","doi-asserted-by":"crossref","unstructured":"Jeong, G., Kim, S., Zimmermann, T.: Improving bug triage with bug toss-ing graphs. In: The Joint Meeting of the European Software Engineering Conference and the ACM Sigsoft Symposium on the Foundations of Software Engineering, pp. 111\u2013120. ACM (2009)","DOI":"10.1145\/1595696.1595715"},{"key":"23_CR32","doi-asserted-by":"crossref","unstructured":"Tamrawi, A., Nguyen, T.T., Al-Kofahi, J., et al.: Fuzzy set-based automatic bug triaging (NIER track). In: International Conference on Software Engineering, pp. 884\u2013887. IEEE (2011)","DOI":"10.1145\/1985793.1985934"}],"container-title":["Communications in Computer and Information Science","Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-2922-7_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T19:23:50Z","timestamp":1775244230000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-13-2922-7_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9789811329210","9789811329227"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-2922-7_23","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"11 October 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Big Data","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"CCF Conference on Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bigdat2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.cvris.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}