{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:31:49Z","timestamp":1760596309062,"version":"3.37.3"},"reference-count":66,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2019,3,14]],"date-time":"2019-03-14T00:00:00Z","timestamp":1552521600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100007136","name":"Secretar\u00eda de Estado de Investigaci\u00f3n, Desarrollo e Innovaci\u00f3n","doi-asserted-by":"publisher","award":["TIN2015-64397-R"],"award-info":[{"award-number":["TIN2015-64397-R"]}],"id":[{"id":"10.13039\/501100007136","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Softw Syst Model"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s10270-019-00727-y","type":"journal-article","created":{"date-parts":[[2019,3,14]],"date-time":"2019-03-14T05:30:54Z","timestamp":1552541454000},"page":"3551-3576","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["An approach for bug localization in models using two levels: model and metamodel"],"prefix":"10.1007","volume":"18","author":[{"given":"Lorena","family":"Arcega","sequence":"first","affiliation":[]},{"given":"Jaime","family":"Font","sequence":"additional","affiliation":[]},{"given":"\u00d8ystein","family":"Haugen","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Cetina","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,14]]},"reference":[{"key":"727_CR1","unstructured":"Apache opennlp: Toolkit for the processing of natural language text. \n                    http:\/\/opennlp.apache.org\/\n                    \n                   (2010). Online; Accessed 04 April 2017"},{"key":"727_CR2","doi-asserted-by":"publisher","unstructured":"Alves, E., Gligoric, M., Jagannath, V., d\u2019Amorim, M.: Fault-localization using dynamic slicing and change impact analysis. In: Proceedings of the 2011 26th IEEE\/ACM International Conference on Automated Software Engineering, ASE \u201911, pp. 520\u2013523. IEEE Computer Society, Washington, DC, USA (2011). \n                    https:\/\/doi.org\/10.1109\/ASE.2011.6100114","DOI":"10.1109\/ASE.2011.6100114"},{"key":"727_CR3","unstructured":"Arcega, L., Font, J., Haugen, \u00d8., Cetina, C.: On the influence of models at run-time traces in dynamic feature location. In: Modelling Foundations and Applications - 13th European Conference, ECMFA 2017, Held as Part of STAF 2017, Marburg, Germany, July 19\u201320, 2017, Proceedings (2017)"},{"key":"727_CR4","unstructured":"Arcega, L., Font, J., Haugen, \u00d8., Cetina, C.: On the influence of modification timespan weightings in the location of bugs in models. In: Proceedings of the 26th International Conference on Information Systems Development, ISD 2017, Larnaca, Cyprus, September 6\u20138, 2017 (2017)"},{"issue":"3","key":"727_CR5","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1002\/stvr.1486","volume":"24","author":"A Arcuri","year":"2014","unstructured":"Arcuri, A., Briand, L.: A hitchhiker\u2019s guide to statistical tests for assessing randomized algorithms in software engineering. Softw. Test. Verif. Reliab. 24(3), 219\u2013250 (2014). \n                    https:\/\/doi.org\/10.1002\/stvr.1486","journal-title":"Softw. Test. Verif. Reliab."},{"issue":"3","key":"727_CR6","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1007\/s10664-013-9249-9","volume":"18","author":"A Arcuri","year":"2013","unstructured":"Arcuri, A., Fraser, G.: Parameter tuning or default values? An empirical investigation in search-based software engineering. Empir. Softw. Eng. 18(3), 594\u2013623 (2013). \n                    https:\/\/doi.org\/10.1007\/s10664-013-9249-9","journal-title":"Empir. Softw. Eng."},{"issue":"10","key":"727_CR7","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MC.2012.292","volume":"45","author":"N Bencomo","year":"2012","unstructured":"Bencomo, N., Hallsteinsen, S., de Almeida, E.Santana: A view of the dynamic software product line landscape. Computer 45(10), 36\u201341 (2012). \n                    https:\/\/doi.org\/10.1109\/MC.2012.292","journal-title":"Computer"},{"issue":"4\/5","key":"727_CR8","first-page":"993","volume":"3","author":"DM Blei","year":"2003","unstructured":"Blei, D.M., Ng, A.Y., Jordan, M.I., Lafferty, J.: Latent dirichlet allocation. J. Mach. Learn. Res. 3(4\/5), 993\u20131022 (2003)","journal-title":"J. Mach. Learn. Res."},{"issue":"6","key":"727_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0177678","volume":"12","author":"S Boughorbel","year":"2017","unstructured":"Boughorbel, S., Jarray, F., El-Anbari, M.: Optimal classifier for imbalanced data using Matthews correlation coefficient metric. PLOS ONE 12(6), 1\u201317 (2017). \n                    https:\/\/doi.org\/10.1371\/journal.pone.0177678","journal-title":"PLOS ONE"},{"key":"727_CR10","volume-title":"Practical Nonparametric Statistics","author":"WJ Conover","year":"1999","unstructured":"Conover, W.J.: Practical Nonparametric Statistics, 3rd edn. Wiley, Hoboken (1999)","edition":"3"},{"key":"727_CR11","unstructured":"de Oliveira Barros, M., Dias-Neto, A.C.: 0006\/2011-threats to validity in search-based software engineering empirical studies. RelaTe-DIA 5(1), (2011)"},{"issue":"2","key":"727_CR12","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/4235.996017","volume":"6","author":"K Deb","year":"2002","unstructured":"Deb, K., Pratap, A., Agarwal, S., Meyarivan, T.: A fast and elitist multiobjective genetic algorithm: Nsga-ii. Trans. Evol. Comput. 6(2), 182\u2013197 (2002). \n                    https:\/\/doi.org\/10.1109\/4235.996017","journal-title":"Trans. Evol. Comput."},{"key":"727_CR13","doi-asserted-by":"publisher","unstructured":"Deerwester, S., Dumais, S.T., Furnas, G.W., Landauer, T.K., Harshman, R.: Indexing by latent semantic analysis. J. Am. Soc. Inf. Sci. 41(6), 391\u2013407 (1990). \n                    https:\/\/doi.org\/10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9"},{"key":"727_CR14","doi-asserted-by":"crossref","unstructured":"Dit, B., Revelle, M., Gethers, M., Poshyvanyk, D.: Feature location in source code: a taxonomy and survey. J. Softw. Maint. Evol. Res. Pract. (2011)","DOI":"10.1002\/smr.567"},{"key":"727_CR15","unstructured":"Dyer, D.W.: The watchmaker framework for evolutionary computation (evolutionary\/genetic algorithms for java). \n                    http:\/\/watchmaker.uncommons.org\/\n                    \n                   (2006). Online; Accessed 04 April 2017"},{"key":"727_CR16","unstructured":"Efficient Java Matrix Library. \n                    https:\/\/ejml.org\n                    \n                   (2016). Online; Accessed 04 April 2017"},{"key":"727_CR17","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.cl.2016.08.003","volume":"48","author":"J Font","year":"2017","unstructured":"Font, J., Arcega, L., Haugen, O., Cetina, C.: Leveraging variability modeling to address metamodel revisions in model-based software product lines. Comput. Lang. Syst. Struct. 48, 20\u201338 (2017). \n                    https:\/\/doi.org\/10.1016\/j.cl.2016.08.003","journal-title":"Comput. Lang. Syst. Struct."},{"key":"727_CR18","doi-asserted-by":"crossref","unstructured":"Font, J., Arcega, L., Haugen, \u00d8., Cetina, C.: Feature location in model-based software product lines through a genetic algorithm. In: 15th International Conference on Software Reuse, ICSR 2016, Limassol, Cyprus (2016)","DOI":"10.1007\/978-3-319-35122-3_3"},{"key":"727_CR19","doi-asserted-by":"publisher","unstructured":"Font, J., Arcega, L., Haugen, \u00d8., Cetina, C.: Feature location in models through a genetic algorithm driven by information retrieval techniques. In: Proceedings of the ACM\/IEEE 19th International Conference on Model Driven Engineering Languages and Systems, MODELS \u201916, pp. 272\u2013282. ACM, New York, NY, USA (2016). \n                    https:\/\/doi.org\/10.1145\/2976767.2976789","DOI":"10.1145\/2976767.2976789"},{"issue":"10","key":"727_CR20","doi-asserted-by":"publisher","first-page":"2044","DOI":"10.1016\/j.ins.2009.12.010","volume":"180","author":"S Garca","year":"2010","unstructured":"Garca, S., Fernndez, A., Luengo, J., Herrera, F.: Advanced nonparametric tests for multiple comparisons in the design of experiments in computational intelligence and data mining: experimental analysis of power. Inf. Sci. 180(10), 2044\u20132064 (2010). \n                    https:\/\/doi.org\/10.1016\/j.ins.2009.12.010","journal-title":"Inf. Sci."},{"key":"727_CR21","doi-asserted-by":"publisher","unstructured":"Gong, L., Lo, D., Jiang, L., Zhang, H.: Interactive fault localization leveraging simple user feedback. In: 2012 28th IEEE International Conference on Software Maintenance (ICSM), pp. 67\u201376 (2012). \n                    https:\/\/doi.org\/10.1109\/ICSM.2012.6405255","DOI":"10.1109\/ICSM.2012.6405255"},{"key":"727_CR22","volume-title":"Effect Sizes for Research: A Broad Practical Approach","author":"RJ Grissom","year":"2005","unstructured":"Grissom, R.J., Kim, J.J.: Effect Sizes for Research: A Broad Practical Approach. Earlbaum, Mahwah (2005)"},{"key":"727_CR23","doi-asserted-by":"publisher","unstructured":"Hassan, A.E., Holt, R.C.: The top ten list: dynamic fault prediction. In: 21st IEEE International Conference on Software Maintenance (ICSM\u201905), pp. 263\u2013272 (2005). \n                    https:\/\/doi.org\/10.1109\/ICSM.2005.91","DOI":"10.1109\/ICSM.2005.91"},{"key":"727_CR24","doi-asserted-by":"publisher","unstructured":"Haugen, \u00d8., M\u00f8ller-Pedersen, B., Oldevik, J., Olsen, G.K., Svendsen, A.: Adding standardized variability to domain specific languages. In: Proceedings of the 2008 12th International Software Product Line Conference, SPLC \u201908, pp. 139\u2013148. IEEE Computer Society, Washington, DC, USA (2008). \n                    https:\/\/doi.org\/10.1109\/SPLC.2008.25","DOI":"10.1109\/SPLC.2008.25"},{"key":"727_CR25","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2810892","author":"TV Hoang","year":"2018","unstructured":"Hoang, T.V., Oentaryo, R.J., Le, T.B., Lo, D.: Network-clustered multi-modal bug localization. IEEE Trans. Softw. Eng. (2018). \n                    https:\/\/doi.org\/10.1109\/TSE.2018.2810892","journal-title":"IEEE Trans. Softw. Eng."},{"key":"727_CR26","doi-asserted-by":"publisher","unstructured":"Holthusen, S., Wille, D., Legat, C., Beddig, S., Schaefer, I., Vogel-Heuser, B.: Family model mining for function block diagrams in automation software. In: Proceedings of the 18th International Software Product Line Conference: Volume 2, pp. 36\u201343 (2014). \n                    https:\/\/doi.org\/10.1145\/2647908.2655965","DOI":"10.1145\/2647908.2655965"},{"issue":"1","key":"727_CR27","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1002\/smr.530","volume":"24","author":"H Kagdi","year":"2012","unstructured":"Kagdi, H., Gethers, M., Poshyvanyk, D., Hammad, M.: Assigning change requests to software developers. J. Softw. Evol. Process 24(1), 3\u201333 (2012). \n                    https:\/\/doi.org\/10.1002\/smr.530","journal-title":"J. Softw. Evol. Process"},{"issue":"11","key":"727_CR28","doi-asserted-by":"publisher","first-page":"1597","DOI":"10.1109\/TSE.2013.24","volume":"39","author":"D Kim","year":"2013","unstructured":"Kim, D., Tao, Y., Kim, S., Zeller, A.: Where should we fix this bug? A two-phase recommendation model. IEEE Trans. Softw. Eng. 39(11), 1597\u20131610 (2013)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"1","key":"727_CR29","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1023\/A:1014823126938","volume":"7","author":"S Kusumoto","year":"2002","unstructured":"Kusumoto, S., Nishimatsu, A., Nishie, K., Inoue, K.: Experimental evaluation of program slicing for fault localization. Empir. Softw. Eng. 7(1), 49\u201376 (2002). \n                    https:\/\/doi.org\/10.1023\/A:1014823126938","journal-title":"Empir. Softw. Eng."},{"key":"727_CR30","doi-asserted-by":"publisher","unstructured":"Lam, A.N., Nguyen, A.T., Nguyen, H.A., Nguyen, T.N.: Bug localization with combination of deep learning and information retrieval. In: 2017 IEEE\/ACM 25th International Conference on Program Comprehension (ICPC), pp. 218\u2013229 (2017). \n                    https:\/\/doi.org\/10.1109\/ICPC.2017.24","DOI":"10.1109\/ICPC.2017.24"},{"issue":"2\u20133","key":"727_CR31","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1080\/01638539809545028","volume":"25","author":"TK Landauer","year":"1998","unstructured":"Landauer, T.K., Foltz, P.W., Laham, D.: An introduction to latent semantic analysis. Discourse Process. 25(2\u20133), 259\u2013284 (1998). \n                    https:\/\/doi.org\/10.1080\/01638539809545028","journal-title":"Discourse Process."},{"key":"727_CR32","doi-asserted-by":"publisher","unstructured":"Le, T.D.B., Oentaryo, R.J., Lo, D.: Information retrieval and spectrum based bug localization: Better together. In: Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, ESEC\/FSE 2015, pp. 579\u2013590. ACM, New York, NY, USA (2015). \n                    https:\/\/doi.org\/10.1145\/2786805.2786880","DOI":"10.1145\/2786805.2786880"},{"key":"727_CR33","unstructured":"Lehman, M.M., Ramil, J., Kahen, G.: A paradigm for the behavioural modelling of software processes using system dynamics. Tech. rep., Imperial College of Science, Technology and Medicine, Department of Computing (2001)"},{"issue":"3","key":"727_CR34","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1145\/567793.567796","volume":"11","author":"D Liang","year":"2002","unstructured":"Liang, D., Harrold, M.J.: Equivalence analysis and its application in improving the efficiency of program slicing. ACM Trans. Softw. Eng. Methodol. 11(3), 347\u2013383 (2002). \n                    https:\/\/doi.org\/10.1145\/567793.567796","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"727_CR35","doi-asserted-by":"publisher","unstructured":"Liu, D., Marcus, A., Poshyvanyk, D., Rajlich, V.: Feature location via information retrieval based filtering of a single scenario execution trace. In: Proceedings of the Twenty-Second IEEE\/ACM International Conference on Automated Software Engineering, ASE \u201907, pp. 234\u2013243. ACM, New York, NY, USA (2007). \n                    https:\/\/doi.org\/10.1145\/1321631.1321667","DOI":"10.1145\/1321631.1321667"},{"key":"727_CR36","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1016\/j.jss.2014.10.037","volume":"103","author":"RE Lopez-Herrejon","year":"2015","unstructured":"Lopez-Herrejon, R.E., Linsbauer, L., Galindo, J.A., Parejo, J.A., Benavides, D., Segura, S., Egyed, A.: An assessment of search-based techniques for reverse engineering feature models. J. Syst. Softw. 103, 353\u2013369 (2015). \n                    https:\/\/doi.org\/10.1016\/j.jss.2014.10.037","journal-title":"J. Syst. Softw."},{"key":"727_CR37","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1016\/j.jss.2014.10.037","volume":"103","author":"RE Lopez-Herrejon","year":"2015","unstructured":"Lopez-Herrejon, R.E., Linsbauer, L., Galindo, J.A., Parejo, J.A., Benavides, D., Segura, S., Egyed, A.: An assessment of search-based techniques for reverse engineering feature models. J. Syst. Softw. 103, 353\u2013369 (2015). \n                    https:\/\/doi.org\/10.1016\/j.jss.2014.10.037","journal-title":"J. Syst. Softw."},{"issue":"9","key":"727_CR38","doi-asserted-by":"publisher","first-page":"972","DOI":"10.1016\/j.infsof.2010.04.002","volume":"52","author":"SK Lukins","year":"2010","unstructured":"Lukins, S.K., Kraft, N.A., Etzkorn, L.H.: Bug localization using latent dirichlet allocation. Inf. Softw. Technol. 52(9), 972\u2013990 (2010). \n                    https:\/\/doi.org\/10.1016\/j.infsof.2010.04.002","journal-title":"Inf. Softw. Technol."},{"key":"727_CR39","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.jss.2013.08.031","volume":"89","author":"X Mao","year":"2014","unstructured":"Mao, X., Lei, Y., Dai, Z., Qi, Y., Wang, C.: Slice-based statistical fault localization. J. Syst. Softw. 89, 51\u201362 (2014). \n                    https:\/\/doi.org\/10.1016\/j.jss.2013.08.031","journal-title":"J. Syst. Softw."},{"key":"727_CR40","doi-asserted-by":"publisher","unstructured":"Marcus, A., Sergeyev, A., Rajlich, V., Maletic, J.: An information retrieval approach to concept location in source code. In: Proceedings of the 11th Working Conference on Reverse Engineering, pp. 214\u2013223 (2004). \n                    https:\/\/doi.org\/10.1109\/WCRE.2004.10","DOI":"10.1109\/WCRE.2004.10"},{"key":"727_CR41","doi-asserted-by":"publisher","unstructured":"Martinez, J., Ziadi, T., Bissyand\u00e9, T.F., Klein, J., l.\u00a0Traon, Y.: Automating the extraction of model-based software product lines from model variants (t). In: 2015 30th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 396\u2013406 (2015). \n                    https:\/\/doi.org\/10.1109\/ASE.2015.44","DOI":"10.1109\/ASE.2015.44"},{"key":"727_CR42","doi-asserted-by":"publisher","unstructured":"Martinez, J., Ziadi, T., Bissyand\u00e9, T.F., Klein, J., Traon, Y.L.: Bottom-up adoption of software product lines: a generic and extensible approach. In: Proceedings of the 19th International Conference on Software Product Line (SPLC), pp. 101\u2013110 (2015). \n                    https:\/\/doi.org\/10.1145\/2791060.2791086","DOI":"10.1145\/2791060.2791086"},{"key":"727_CR43","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1007\/978-3-319-22183-0_29","volume-title":"Transformed Vargha-Delaney Effect Size","author":"G Neumann","year":"2015","unstructured":"Neumann, G., Harman, M., Poulding, S.: Transformed Vargha-Delaney Effect Size, pp. 318\u2013324. Springer, Cham (2015). \n                    https:\/\/doi.org\/10.1007\/978-3-319-22183-0_29"},{"key":"727_CR44","doi-asserted-by":"publisher","unstructured":"Panichella, A., Dit, B., Oliveto, R., Penta, M.D., Poshyvanyk, D., Lucia, A.D.: Parameterizing and assembling ir-based solutions for se tasks using genetic algorithms. In: 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER), vol.\u00a01, pp. 314\u2013325 (2016). \n                    https:\/\/doi.org\/10.1109\/SANER.2016.97","DOI":"10.1109\/SANER.2016.97"},{"issue":"6","key":"727_CR45","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1109\/TSE.2007.1016","volume":"33","author":"D Poshyvanyk","year":"2007","unstructured":"Poshyvanyk, D., Gueheneuc, Y.G., Marcus, A., Antoniol, G., Rajlich, V.: Feature location using probabilistic ranking of methods based on execution scenarios and information retrieval. IEEE Trans. Softw. Eng. 33(6), 420\u2013432 (2007). \n                    https:\/\/doi.org\/10.1109\/TSE.2007.1016","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"1","key":"727_CR46","first-page":"37","volume":"2","author":"DMW Powers","year":"2011","unstructured":"Powers, D.M.W.: Evaluation: from precision, recall and f-measure to roc., informedness, markedness & correlation. J. Mach. Learn. Technol. 2(1), 37\u201363 (2011)","journal-title":"J. Mach. Learn. Technol."},{"key":"727_CR47","doi-asserted-by":"publisher","unstructured":"Rahman, M.M., Chakraborty, S., Ray, B.: Which similarity metric to use for software documents? A study on information retrieval based software engineering tasks. In: Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, ICSE \u201918, pp. 335\u2013336. ACM, New York, NY, USA (2018). \n                    https:\/\/doi.org\/10.1145\/3183440.3194997","DOI":"10.1145\/3183440.3194997"},{"key":"727_CR48","doi-asserted-by":"publisher","unstructured":"Rao, S., Kak, A.: Retrieval from software libraries for bug localization: a comparative study of generic and composite text models. In: Proceedings of the 8th Working Conference on Mining Software Repositories, MSR \u201911, pp. 43\u201352. ACM, New York, NY, USA (2011). \n                    https:\/\/doi.org\/10.1145\/1985441.1985451","DOI":"10.1145\/1985441.1985451"},{"key":"727_CR49","doi-asserted-by":"publisher","unstructured":"Revelle, M., Dit, B., Poshyvanyk, D.: Using data fusion and web mining to support feature location in software. In: IEEE 18th International Conference on Program Comprehension (ICPC), pp. 14\u201323 (2010). \n                    https:\/\/doi.org\/10.1109\/ICPC.2010.10","DOI":"10.1109\/ICPC.2010.10"},{"key":"727_CR50","doi-asserted-by":"publisher","unstructured":"Saha, R.K., Lease, M., Khurshid, S., Perry, D.E.: Improving bug localization using structured information retrieval. In: 2013 28th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 345\u2013355 (2013). \n                    https:\/\/doi.org\/10.1109\/ASE.2013.6693093","DOI":"10.1109\/ASE.2013.6693093"},{"key":"727_CR51","volume-title":"Introduction to Modern Information Retrieval","author":"G Salton","year":"1986","unstructured":"Salton, G., McGill, M.J.: Introduction to Modern Information Retrieval. McGraw-Hill Inc, New York (1986)"},{"issue":"11","key":"727_CR52","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1145\/361219.361220","volume":"18","author":"G Salton","year":"1975","unstructured":"Salton, G., Wong, A., Yang, C.S.: A vector space model for automatic indexing. Commun. ACM 18(11), 613\u2013620 (1975). \n                    https:\/\/doi.org\/10.1145\/361219.361220","journal-title":"Commun. ACM"},{"key":"727_CR53","doi-asserted-by":"publisher","unstructured":"Sayyad, A.S., Ingram, J., Menzies, T., Ammar, H.: Scalable product line configuration: A straw to break the camel\u2019s back. In: 2013 28th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 465\u2013474 (2013). \n                    https:\/\/doi.org\/10.1109\/ASE.2013.6693104","DOI":"10.1109\/ASE.2013.6693104"},{"key":"727_CR54","doi-asserted-by":"publisher","unstructured":"Sisman, B., Kak, A.C.: Incorporating version histories in information retrieval based bug localization. In: 2012 9th IEEE Working Conference on Mining Software Repositories (MSR), pp. 50\u201359 (2012). \n                    https:\/\/doi.org\/10.1109\/MSR.2012.6224299","DOI":"10.1109\/MSR.2012.6224299"},{"key":"727_CR55","unstructured":"Svendsen, A., Zhang, X., Lind-Tviberg, R., Fleurey, F., Haugen, \u00d8., M\u00f8ller-Pedersen, B., Olsen, G.K.: Developing a software product line for train control: a case study of cvl. In: Proceedings of the 14th International Conference on Software Product Lines: Going Beyond, SPLC\u201910, pp. 106\u2013120. Springer-Verlag, Berlin, Heidelberg (2010). \n                    http:\/\/dl.acm.org\/citation.cfm?id=1885639.1885650"},{"key":"727_CR56","unstructured":"The English (porter2) Stemming Algorithm. \n                    http:\/\/snowball.tartarus.org\/algorithms\/english\/stemmer.html\n                    \n                   (2002). Online; Accessed 04 April 2017"},{"key":"727_CR57","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/978-3-642-45398-4_5","volume-title":"Mining Unstructured Software Repositories","author":"SW Thomas","year":"2014","unstructured":"Thomas, S.W., Hassan, A.E., Blostein, D.: Mining Unstructured Software Repositories, pp. 139\u2013162. Springer, Berlin, Heidelberg (2014). \n                    https:\/\/doi.org\/10.1007\/978-3-642-45398-4_5"},{"issue":"2","key":"727_CR58","doi-asserted-by":"publisher","first-page":"101","DOI":"10.3102\/10769986025002101","volume":"25","author":"A Vargha","year":"2000","unstructured":"Vargha, A., Delaney, H.D.: A critique and improvement of the cl common language effect size statistics of mcgraw and wong. J. Educ. Behav. Stat. 25(2), 101\u2013132 (2000). \n                    https:\/\/doi.org\/10.3102\/10769986025002101","journal-title":"J. Educ. Behav. Stat."},{"issue":"10","key":"727_CR59","doi-asserted-by":"publisher","first-page":"921","DOI":"10.1002\/smr.1801","volume":"28","author":"S Wang","year":"2016","unstructured":"Wang, S., Lo, D.: Amalgam+: composing rich information sources for accurate bug localization. J. Softw. Evol. Process 28(10), 921\u2013942 (2016). \n                    https:\/\/doi.org\/10.1002\/smr.1801","journal-title":"J. Softw. Evol. Process"},{"key":"727_CR60","doi-asserted-by":"publisher","unstructured":"Wille, D., Holthusen, S., Schulze, S., Schaefer, I.: Interface variability in family model mining. In: Proceedings of the 17th International Software Product Line Conference: Co-located Workshops, pp. 44\u201351 (2013). \n                    https:\/\/doi.org\/10.1145\/2499777.2500708","DOI":"10.1145\/2499777.2500708"},{"issue":"8","key":"727_CR61","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1109\/TSE.2016.2521368","volume":"42","author":"WE Wong","year":"2016","unstructured":"Wong, W.E., Gao, R., Li, Y., Abreu, R., Wotawa, F.: A survey on software fault localization. IEEE Trans. Softw. Eng. 42(8), 707\u2013740 (2016)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"8","key":"727_CR62","doi-asserted-by":"publisher","first-page":"991","DOI":"10.1016\/j.infsof.2014.03.007","volume":"56","author":"S Zamani","year":"2014","unstructured":"Zamani, S., Lee, S.P., Shokripour, R., Anvik, J.: A noun-based approach to feature location using time-aware term-weighting. Inf. Softw. Technol. 56(8), 991\u20131011 (2014). \n                    https:\/\/doi.org\/10.1016\/j.infsof.2014.03.007","journal-title":"Inf. Softw. Technol."},{"key":"727_CR63","doi-asserted-by":"publisher","unstructured":"Zhang, X., Haugen, \u00d8., Moller-Pedersen, B.: Model comparison to synthesize a model-driven software product line. In: Proceedings of the 2011 15th International Software Product Line Conference (SPLC), pp. 90\u201399 (2011). \n                    https:\/\/doi.org\/10.1109\/SPLC.2011.24","DOI":"10.1109\/SPLC.2011.24"},{"key":"727_CR64","doi-asserted-by":"publisher","unstructured":"Zhang, X., Haugen, \u00d8., M\u00f8ller-Pedersen, B.: Augmenting product lines. In: Software Engineering Conference (APSEC), 2012 19th Asia-Pacific, vol.\u00a01, pp. 766\u2013771 (2012). \n                    https:\/\/doi.org\/10.1109\/APSEC.2012.76","DOI":"10.1109\/APSEC.2012.76"},{"key":"727_CR65","unstructured":"Zhou, J., Zhang, H., Lo, D.: Where should the bugs be fixed? - more accurate information retrieval-based bug localization based on bug reports. In: Proceedings of the 34th International Conference on Software Engineering, ICSE \u201912, pp. 14\u201324. IEEE Press, Piscataway, NJ, USA (2012). \n                    http:\/\/dl.acm.org\/citation.cfm?id=2337223.2337226"},{"key":"727_CR66","unstructured":"Zimmermann, T., Weisgerber, P., Diehl, S., Zeller, A.: Mining version histories to guide software changes. In: Proceedings of the 26th International Conference on Software Engineering, ICSE \u201904, pp. 563\u2013572. IEEE Computer Society, Washington, DC, USA (2004). \n                    http:\/\/dl.acm.org\/citation.cfm?id=998675.999460"}],"container-title":["Software and Systems Modeling"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10270-019-00727-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10270-019-00727-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10270-019-00727-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,13]],"date-time":"2020-03-13T00:26:01Z","timestamp":1584059161000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10270-019-00727-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,14]]},"references-count":66,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["727"],"URL":"https:\/\/doi.org\/10.1007\/s10270-019-00727-y","relation":{},"ISSN":["1619-1366","1619-1374"],"issn-type":[{"type":"print","value":"1619-1366"},{"type":"electronic","value":"1619-1374"}],"subject":[],"published":{"date-parts":[[2019,3,14]]},"assertion":[{"value":"16 March 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 January 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}