{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T00:49:58Z","timestamp":1772498998870,"version":"3.50.1"},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,10,26]],"date-time":"2017-10-26T00:00:00Z","timestamp":1508976000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61472034"],"award-info":[{"award-number":["61472034"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61272169"],"award-info":[{"award-number":["61272169"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Autom Softw Eng"],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1007\/s10515-017-0229-y","type":"journal-article","created":{"date-parts":[[2017,10,26]],"date-time":"2017-10-26T18:14:35Z","timestamp":1509041675000},"page":"347-381","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Automatic approval prediction for software enhancement requests"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7819-8526","authenticated-orcid":false,"given":"Zeeshan Ahmed","family":"Nizamani","sequence":"first","affiliation":[]},{"given":"Hui","family":"Liu","sequence":"additional","affiliation":[]},{"given":"David Matthew","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zhendong","family":"Niu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,26]]},"reference":[{"issue":"1","key":"229_CR1","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.ipm.2013.08.006","volume":"50","author":"AK Uysal","year":"2014","unstructured":"Uysal, A.K., Gunal, S.: The impact of preprocessing on text classification. Inf. Process. Manag. 50(1), 104\u2013112 (2014)","journal-title":"Inf. Process. Manag."},{"key":"229_CR2","doi-asserted-by":"crossref","unstructured":"Antoniol, G., Ayari, K., Di\u00a0Penta, M., Khomh, F., Gu\u00e9h\u00e9neuc, Y.G.: Is it a bug or an enhancement? A text-based approach to classify change requests. In: Proceedings of the 2008 Conference of the Center for Advanced Studies on Collaborative Research: Meeting of Minds, ACM, p.\u00a023 (2008)","DOI":"10.1145\/1463788.1463819"},{"key":"229_CR3","doi-asserted-by":"crossref","unstructured":"Anvik, J.: Automating bug report assignment. In: Proceedings of the 28th international Conference on Software engineering, ACM, pp. 937\u2013940 (2006)","DOI":"10.1145\/1134285.1134457"},{"key":"229_CR4","doi-asserted-by":"crossref","unstructured":"Anvik, J., Hiew, L., Murphy, G.C.: Who should fix this bug? In: Proceedings of the 28th International Conference on Software Engineering, ACM, pp. 361\u2013370 (2006)","DOI":"10.1145\/1134285.1134336"},{"key":"229_CR5","doi-asserted-by":"crossref","unstructured":"Banerjee, S., Cukic, B., Adjeroh, D.: Automated duplicate bug report classification using subsequence matching. In: 2012 IEEE 14th International Symposium on High-Assurance Systems Engineering (HASE), IEEE, pp. 74\u201381 (2012)","DOI":"10.1109\/HASE.2012.38"},{"issue":"10","key":"229_CR6","doi-asserted-by":"crossref","first-page":"2275","DOI":"10.1016\/j.jss.2012.04.053","volume":"85","author":"P Bhattacharya","year":"2012","unstructured":"Bhattacharya, P., Neamtiu, I., Shelton, C.R.: Automated, highly-accurate, bug assignment using machine learning and tossing graphs. J. Syst. Softw. 85(10), 2275\u20132292 (2012)","journal-title":"J. Syst. Softw."},{"key":"229_CR7","first-page":"2160","volume":"15","author":"J Chen","year":"2011","unstructured":"Chen, J., Huang, H., Tian, S., Qu, Y.: Feature selection for text classification with naive bayes. Expert Syst. Appl. 15, 2160\u20132164 (2011)","journal-title":"Expert Syst. Appl."},{"issue":"6","key":"229_CR8","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1016\/j.knosys.2006.03.005","volume":"19","author":"Z Chen","year":"2006","unstructured":"Chen, Z., L\u00fc, K.: A preprocess algorithm of filtering irrelevant information based on the minimum class difference. Knowl.-Based Syst. 19(6), 422\u2013429 (2006)","journal-title":"Knowl.-Based Syst."},{"issue":"10","key":"229_CR9","doi-asserted-by":"crossref","first-page":"9899","DOI":"10.1016\/j.eswa.2012.02.053","volume":"39","author":"S Delany","year":"2012","unstructured":"Delany, S., Buckley, M., Greene, D.: SMS spam filtering: methods and data. Expert Syst. Appl. 39(10), 9899\u20139908 (2012)","journal-title":"Expert Syst. Appl."},{"issue":"2","key":"229_CR10","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1023\/A:1007413511361","volume":"29","author":"P Domingos","year":"1997","unstructured":"Domingos, P., Pazzani, M.: On the optimality of the simple bayesian classifier under zero-one loss. Mach. Learn. 29(2), 103\u2013130 (1997)","journal-title":"Mach. Learn."},{"issue":"1","key":"229_CR11","first-page":"2","volume":"2","author":"J Eberhardt","year":"2015","unstructured":"Eberhardt, J.: Bayesian spam detection. Sch. Horiz. Univ. Minn. Morris Undergrad. J. 2(1), 2 (2015)","journal-title":"Sch. Horiz. Univ. Minn. Morris Undergrad. J."},{"key":"229_CR12","doi-asserted-by":"crossref","unstructured":"Feng, L., Song, L., Sha, C., Gong, X.: Practical duplicate bug reports detection in a large web-based development community. In: Web Technologies and Applications, Springer, pp. 709\u2013720 (2013)","DOI":"10.1007\/978-3-642-37401-2_69"},{"key":"229_CR13","doi-asserted-by":"crossref","unstructured":"Gad, W., Rady, S.: Email filtering based on supervised learning and mutual information feature selection. In: 2015 Tenth International Conference on Computer Engineering & Systems (ICCES), IEEE, pp. 147\u2013152 (2015)","DOI":"10.1109\/ICCES.2015.7393036"},{"key":"229_CR14","doi-asserted-by":"crossref","unstructured":"Gopalan, R., Krishna, A.: Duplicate bug report detection using clustering. In: Software Engineering Conference (ASWEC), 2014 23rd Australian, IEEE, pp. 104\u2013109 (2014)","DOI":"10.1109\/ASWEC.2014.31"},{"key":"229_CR15","volume-title":"Recognizing End-User Transactions in Performance Management","author":"J Hellerstein","year":"2000","unstructured":"Hellerstein, J., Thathachar, J., Rish, I.: Recognizing End-User Transactions in Performance Management, vol. 19. IBM Thomas J, Watson Research Division, New York (2000)"},{"key":"229_CR16","doi-asserted-by":"crossref","unstructured":"Herzig, K., Just, S., Zeller, A.: It\u2019s not a bug, it\u2019s a feature: how misclassification impacts bug prediction. In: Proceedings of the 2013 International Conference on Software Engineering, IEEE Press, pp. 392\u2013401 (2013)","DOI":"10.1109\/ICSE.2013.6606585"},{"issue":"2","key":"229_CR17","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1007\/s10664-015-9387-3","volume":"21","author":"A Hindle","year":"2016","unstructured":"Hindle, A., Alipour, A., Stroulia, E.: A contextual approach towards more accurate duplicate bug report detection and ranking. Empir. Softw. Eng. 21(2), 368\u2013410 (2016)","journal-title":"Empir. Softw. Eng."},{"key":"229_CR18","doi-asserted-by":"crossref","unstructured":"Hu, H., Zhang, H., Xuan, J., Sun, W.: Effective bug triage based on historical bug-fix information. In: 2014 IEEE 25th International Symposium on Software Reliability Engineering (ISSRE), IEEE, pp. 122\u2013132 (2014)","DOI":"10.1109\/ISSRE.2014.17"},{"key":"229_CR19","doi-asserted-by":"crossref","unstructured":"Jeong, G., Kim, S., Zimmermann, T.: Improving bug triage with bug tossing graphs. In: Proceedings of the the 7th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on The Foundations of Software Engineering, ACM, pp. 111\u2013120 (2009)","DOI":"10.1145\/1595696.1595715"},{"key":"229_CR20","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1080\/0952813X.2012.721010","volume":"25","author":"L Jiang","year":"2013","unstructured":"Jiang, L., Cai, Z., Zhang, H., Wang, D.: Naive bayes text classifiers: a locally weighted learning approach. J. Exp. Theor. Artif. Intell. 25, 273\u2013286 (2013)","journal-title":"J. Exp. Theor. Artif. Intell."},{"key":"229_CR21","doi-asserted-by":"crossref","unstructured":"Jin, Z., Li, Q., Zeng, D., Wang, L.: Filtering spam in Weibo using ensemble imbalanced classification and knowledge expansion. In: 2015 IEEE International Conference on Intelligence and Security Informatics (ISI), IEEE, pp. 132\u2013134 (2015)","DOI":"10.1109\/ISI.2015.7165952"},{"key":"229_CR22","doi-asserted-by":"crossref","unstructured":"Lamkanfi, A., Demeyer, S., Giger, E., Goethals, B.: Predicting the severity of a reported bug. In: 2010 7th IEEE Working Conference on Mining Software Repositories (MSR), IEEE, pp. 1\u201310 (2010)","DOI":"10.1109\/MSR.2010.5463284"},{"key":"229_CR23","doi-asserted-by":"crossref","unstructured":"Lamkanfi, A., Demeyer, S., Soetens, Q., Verdonck, T.: Comparing mining algorithms for predicting the severity of a reported bug. In: 2011 15th European Conference on Software Maintenance and Reengineering (CSMR), IEEE, vol. 322, pp. 249\u2013258 (2011)","DOI":"10.1109\/CSMR.2011.31"},{"key":"229_CR24","doi-asserted-by":"crossref","unstructured":"Lazar, A., Ritchey, S., Sharif, B.: Improving the accuracy of duplicate bug report detection using textual similarity measures. In: Proceedings of the 11th Working Conference on Mining Software Repositories, ACM, pp. 308\u2013311 (2014)","DOI":"10.1145\/2597073.2597088"},{"key":"229_CR25","unstructured":"Le, Q., Mikolov, T.: Distributed representations of sentences and documents. In: international Conference on Machine Learning, 2014, ICML, vol.\u00a014, pp. 1188\u20131196 (2014)"},{"key":"229_CR26","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1016\/j.jss.2016.02.022","volume":"121","author":"M Lin","year":"2016","unstructured":"Lin, M., Yang, C., Lee, C., Chen, C.: Enhancements for duplication detection in bug reports with manifold correlation features. J. Syst. Softw. 121, 223\u2013233 (2016)","journal-title":"J. Syst. Softw."},{"key":"229_CR27","doi-asserted-by":"crossref","unstructured":"Liu, Y., Liu, Z., Chua, T., Sun, M.: Topical word embeddings. In: The 29th AAAI Conference on Artificial Intelligence (AAAI\u201915), AAAI, pp. 2418\u20132424 (2015)","DOI":"10.1609\/aaai.v29i1.9522"},{"key":"229_CR28","unstructured":"Murphy, G., Cubranic, D.: Automatic bug triage using text categorization. In: Proceedings of the Sixteenth International Conference on Software Engineering & Knowledge Engineering, Citeseer (2004)"},{"key":"229_CR29","doi-asserted-by":"crossref","unstructured":"Menzies, T., Marcus, A.: Automated severity assessment of software defect reports. In: IEEE International Conference on Software Maintenance, ICSM, pp. 346\u2013355 (2008)","DOI":"10.1109\/ICSM.2008.4658083"},{"key":"229_CR30","doi-asserted-by":"crossref","unstructured":"Naguib, H., Narayan, N., Br\u00fcgge, B., Helal, D.: Bug report assignee recommendation using activity profiles. In: 2013 10th IEEE Working Conference on Mining Software Repositories (MSR), IEEE, pp. 22\u201330 (2013)","DOI":"10.1109\/MSR.2013.6623999"},{"key":"229_CR31","doi-asserted-by":"crossref","unstructured":"Pingclasai, N., Hata, H., Matsumoto, K.: Classifying bug reports to bugs and other requests using topic modeling. In: Software Engineering Conference (APSEC), 2013 20th Asia-Pacific, IEEE, vol.\u00a02, pp. 13\u201318 (2013)","DOI":"10.1109\/APSEC.2013.105"},{"key":"229_CR32","doi-asserted-by":"crossref","unstructured":"Rajlich, V.: Software evolution and maintenance. In: Proceedings of the on Future of Software Engineering, ACM, pp. 133\u2013144 (2014)","DOI":"10.1145\/2593882.2593893"},{"key":"229_CR33","unstructured":"Rish, I.: An empirical study of the naive bayes classifier. In: IJCAI 2001 workshop on empirical methods in artificial intelligence, IBM New York, vol.\u00a03, pp. 41\u201346 (2001)"},{"key":"229_CR34","unstructured":"Rish, I., Hellerstein, J., Jayram, T.: An analysis of data characteristics that affect naive bayes performance. IBM TJ Watson Research Center 30 (2001)"},{"key":"229_CR35","doi-asserted-by":"crossref","unstructured":"Roy, N.K.S., Rossi, B.: Towards an improvement of bug severity classification. In: 2014 40th EUROMICRO Conference on Software Engineering and Advanced Applications (SEAA), IEEE, pp. 269\u2013276 (2014a)","DOI":"10.1109\/SEAA.2014.51"},{"key":"229_CR36","doi-asserted-by":"crossref","unstructured":"Roy, N.S., Rossi, B.: Towards an improvement of bug severity classification. In: 2014 40th EUROMICRO Conference on Software Engineering and Advanced Applications (SEAA), IEEE, pp. 269\u2013276 (2014b)","DOI":"10.1109\/SEAA.2014.51"},{"issue":"1","key":"229_CR37","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1016\/j.eswa.2011.07.034","volume":"39","author":"I Santos","year":"2012","unstructured":"Santos, I., Laorden, C., Sanz, B., Bringas, P.: Enhanced topic-based vector space model for semantics-aware spam filtering. Expert Syst. Appl. 39(1), 437\u2013444 (2012)","journal-title":"Expert Syst. Appl."},{"key":"229_CR38","unstructured":"Saric, F., Glavas, G., Karan, M., Snajder, J., Basic, B.: Takelab: Systems for measuring semantic text similarity. In: Proceedings of the First Joint Conference on Lexical and Computational Semantics-Volume 1: Proceedings of the Main Conference and the Shared Task, and Volume 2: Proceedings of the Sixth International Workshop on Semantic Evaluation, Association for Computational Linguistics, pp. 441\u2013448 (2012)"},{"key":"229_CR39","volume-title":"Advances in Kernel Methods: Support Vector Learning","author":"B Sch\u00f6lkopf","year":"1999","unstructured":"Sch\u00f6lkopf, B., Burges, C.: Advances in Kernel Methods: Support Vector Learning. MIT Press, Cambridge (1999)"},{"key":"229_CR40","doi-asserted-by":"crossref","unstructured":"Sohrawardi, S.J., Azam, I., Hosain, S.: A comparative study of text classification algorithms on user submitted bug reports. In: 2014 Ninth International Conference on Digital Information Management (ICDIM), IEEE, pp. 242\u2013247 (2014)","DOI":"10.1109\/ICDIM.2014.6991434"},{"key":"229_CR41","unstructured":"Su, J., Shirab, J., Matwin, S.: Large scale text classification using semi-supervised multinomial naive bayes. In: Proceedings of the 28th International Conference on Machine Learning (ICML-11), pp. 97\u2013104 (2011)"},{"key":"229_CR42","doi-asserted-by":"crossref","unstructured":"Sun, C., Lo, D., Khoo, S., Jiang, J.: Towards more accurate retrieval of duplicate bug reports. In: Proceedings of the 2011 26th IEEE\/ACM International Conference on Automated Software Engineering, IEEE Computer Society, pp. 253\u2013262 (2011)","DOI":"10.1109\/ASE.2011.6100061"},{"issue":"8","key":"229_CR43","doi-asserted-by":"crossref","first-page":"10,264","DOI":"10.1016\/j.eswa.2011.02.114","volume":"38","author":"S Tan","year":"2011","unstructured":"Tan, S., Wang, Y., Wu, G.: Adapting centroid classifier for document categorization. Expert Syst. Appl. 38(8), 10,264\u201310,273 (2011)","journal-title":"Expert Syst. Appl."},{"key":"229_CR44","doi-asserted-by":"crossref","unstructured":"Thung, F., Kochhar, P.S., Lo, D.: Dupfinder: integrated tool support for duplicate bug report detection. In: Proceedings of the 29th ACM\/IEEE International Conference on Automated Software Engineering, ACM, pp. 871\u2013874 (2014)","DOI":"10.1145\/2642937.2648627"},{"key":"229_CR45","doi-asserted-by":"crossref","unstructured":"Tian, Y., Sun, C., Lo, D.: Improved duplicate bug report identification. In: 2012 16th European Conference on Software Maintenance and Reengineering (CSMR), IEEE, pp. 385\u2013390 (2012)","DOI":"10.1109\/CSMR.2012.48"},{"key":"229_CR46","doi-asserted-by":"crossref","unstructured":"Valdivia\u00a0Garcia, H., Shihab, E.: Characterizing and predicting blocking bugs in open source projects. In: Proceedings of the 11th Working Conference on Mining Software Repositories, ACM, pp. 72\u201381 (2014)","DOI":"10.1145\/2597073.2597099"},{"issue":"1","key":"229_CR47","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/s10115-014-0746-y","volume":"44","author":"S Wang","year":"2014","unstructured":"Wang, S., Jiang, L., Li, C.: Adapting naive bayes tree for text classification. Knowl. Inf. Syst. 44(1), 77\u201389 (2014)","journal-title":"Knowl. Inf. Syst."},{"key":"229_CR48","doi-asserted-by":"crossref","unstructured":"Wang, X., Zhang, L., Xie, T., Anvik, J., Sun, J.: An approach to detecting duplicate bug reports using natural language and execution information. In: Proceedings of the 30th International Conference on Software Engineering, ACM, p. 461470 (2008)","DOI":"10.1145\/1368088.1368151"},{"key":"229_CR49","doi-asserted-by":"crossref","first-page":"2160","DOI":"10.1016\/j.proeng.2011.08.404","volume":"15","author":"Z Wei","year":"2011","unstructured":"Wei, Z., Feng, G.: An improvement to naive bayes for text classification. Proc. Eng. 15, 2160\u20132164 (2011)","journal-title":"Proc. Eng."},{"issue":"1","key":"229_CR50","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10115-007-0114-2","volume":"14","author":"X Wu","year":"2008","unstructured":"Wu, X., Kumar, V., Quinlan, J.R., Ghosh, J., Yang, Q., Motoda, H., McLachlan, G.J., Ng, A., Liu, B., Philip, S.Y., et al.: Top 10 algorithms in data mining. Knowl. Inf. Syst. 14(1), 1\u201337 (2008)","journal-title":"Knowl. Inf. Syst."},{"key":"229_CR51","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1016\/j.infsof.2014.12.006","volume":"61","author":"X Xia","year":"2015","unstructured":"Xia, X., Lo, D., Shihab, E., Wang, X., Yang, X.: Elblocker: Predicting blocking bugs with ensemble imbalance learning. Inf. Softw. Technol. 61, 93\u2013106 (2015)","journal-title":"Inf. Softw. Technol."},{"key":"229_CR52","unstructured":"Xuan, J., Jiang, H., Ren, Z., Yan, J., Luo, Z.: Automatic bug triage using semi-supervised text classification (2017). arXiv preprint arXiv:1704.04769"},{"key":"229_CR53","doi-asserted-by":"crossref","unstructured":"Xuan, H., Ming, L.: Enhancing the Unified Features to Locate Buggy Files by Exploiting the Sequential Nature of Source Code. In: Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, IJCAI-17, pp. 1909\u20131915 (2017)","DOI":"10.24963\/ijcai.2017\/265"},{"issue":"4","key":"229_CR54","doi-asserted-by":"crossref","first-page":"741","DOI":"10.1016\/j.ipm.2011.12.005","volume":"48","author":"J Yang","year":"2012","unstructured":"Yang, J., Liu, Y., Zhu, X., Liu, Z., Zhang, X.: A new feature selection based on comprehensive measurement both in inter-category and intra-category for text categorization. Inf. Process. Manag. 48(4), 741\u2013754 (2012)","journal-title":"Inf. Process. Manag."},{"issue":"5","key":"229_CR55","doi-asserted-by":"crossref","first-page":"708","DOI":"10.1108\/02635570910957669","volume":"109","author":"W Zaghloul","year":"2009","unstructured":"Zaghloul, W., Lee, S.M., Trimi, S.: Text classification: neural networks vs support vector machines. Ind. Manag. Data Syst. 109(5), 708\u2013717 (2009)","journal-title":"Ind. Manag. Data Syst."},{"issue":"2","key":"229_CR56","first-page":"3","volume":"1","author":"H Zhang","year":"2004","unstructured":"Zhang, H.: The optimality of naive bayes. AA 1(2), 3 (2004)","journal-title":"AA"},{"key":"229_CR57","unstructured":"Zhang, H., Li, D.: Na\u00efve bayes text classifier. In: IEEE International Conference on Granular Computing, 2007. GRC 2007, IEEE, pp. 708\u2013708 (2007)"},{"key":"229_CR58","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1016\/j.knosys.2014.11.028","volume":"75","author":"W Zhang","year":"2015","unstructured":"Zhang, W., Tang, X., Yoshida, T.: TESC: An approach to TExt classification using semi-supervised clustering. Knowl.-Based Syst. 75, 152\u2013160 (2015)","journal-title":"Knowl.-Based Syst."},{"key":"229_CR59","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/j.knosys.2014.03.015","volume":"64","author":"Y Zhang","year":"2014","unstructured":"Zhang, Y., Wang, S., Phillips, P., Ji, G.: Binary PSO with mutation operator for feature selection using decision tree applied to spam detection. Knowl.-Based Syst. 64, 22\u201331 (2014)","journal-title":"Knowl.-Based Syst."},{"key":"229_CR60","doi-asserted-by":"crossref","unstructured":"Zhou, J., Zhang, H., Lo, D.: Where should the bugs be fixed?-more accurate information retrieval-based bug localization based on bug reports. In: Proceedings of the 34th International Conference on Software Engineering, IEEE Press, pp. 14\u201324 (2012)","DOI":"10.1109\/ICSE.2012.6227210"},{"issue":"5","key":"229_CR61","doi-asserted-by":"crossref","first-page":"618","DOI":"10.1109\/TSE.2010.63","volume":"36","author":"T Zimmermann","year":"2010","unstructured":"Zimmermann, T., Premraj, R., Bettenburg, N., Just, S., Schroter, A., Weiss, C.: What makes a good bug report? IEEE Trans. Softw. Eng. 36(5), 618\u2013643 (2010)","journal-title":"IEEE Trans. Softw. Eng."}],"container-title":["Automated Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10515-017-0229-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-017-0229-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-017-0229-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T19:16:51Z","timestamp":1750965411000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10515-017-0229-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,26]]},"references-count":61,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["229"],"URL":"https:\/\/doi.org\/10.1007\/s10515-017-0229-y","relation":{},"ISSN":["0928-8910","1573-7535"],"issn-type":[{"value":"0928-8910","type":"print"},{"value":"1573-7535","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,10,26]]}}}