{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T22:20:31Z","timestamp":1757629231018,"version":"3.44.0"},"reference-count":62,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,3,22]],"date-time":"2025-03-22T00:00:00Z","timestamp":1742601600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,3,22]],"date-time":"2025-03-22T00:00:00Z","timestamp":1742601600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Autom Softw Eng"],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1007\/s10515-025-00505-9","type":"journal-article","created":{"date-parts":[[2025,3,23]],"date-time":"2025-03-23T05:05:38Z","timestamp":1742706338000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Tab: template-aware bug report title generation via two-phase fine-tuned models"],"prefix":"10.1007","volume":"32","author":[{"given":"Xiao","family":"Liu","sequence":"first","affiliation":[]},{"given":"Yinkang","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Weifeng","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Naiqi","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Song","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Meng","family":"Yan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,22]]},"reference":[{"issue":"3","key":"505_CR1","doi-asserted-by":"publisher","first-page":"1107","DOI":"10.1007\/s10664-015-9377-5","volume":"21","author":"SL Abebe","year":"2016","unstructured":"Abebe, S.L., Ali, N., Hassan, A.E.: An empirical study of software release notes. Empir. Softw. Eng. 21(3), 1107\u20131142 (2016)","journal-title":"Empir. Softw. Eng."},{"key":"505_CR2","unstructured":"Anonymous.: (2024). https:\/\/anonymous.4open.science\/r\/TAB-7E70\/"},{"key":"505_CR3","unstructured":"Ba, J.L., Kiros, J.R., Hinton, G.E.: Layer normalization. arXiv preprint arXiv:1607.06450 (2016)"},{"key":"505_CR4","doi-asserted-by":"crossref","unstructured":"Bettenburg, N., Just, S., Schr\u00f6ter, A., Weiss, C., Premraj, R., Zimmermann, T.: What makes a good bug report? In: Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 308\u2013318 (2008)","DOI":"10.1145\/1453101.1453146"},{"key":"505_CR5","doi-asserted-by":"publisher","unstructured":"Bhattacharya, P., Ulanova, L., Neamtiu, I., Koduru, S.C.: An empirical analysis of bug reports and bug fixing in open source android apps. In: 2013 17th European Conference on Software Maintenance and Reengineering, pp. 133\u2013143 (2013). https:\/\/doi.org\/10.1109\/CSMR.2013.23","DOI":"10.1109\/CSMR.2013.23"},{"key":"505_CR6","doi-asserted-by":"crossref","unstructured":"Chaparro, O., Lu, J., Zampetti, F., Moreno, L., Di Penta, M., Marcus, A., Bavota, G., Ng, V.: Detecting missing information in bug descriptions. In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, pp. 396\u2013407 (2017)","DOI":"10.1145\/3106237.3106285"},{"key":"505_CR7","doi-asserted-by":"crossref","unstructured":"Chaparro, O., Bernal-C\u00e1rdenas, C., Lu, J., Moran, K., Marcus, A., Di\u00a0Penta, M., Poshyvanyk, D., Ng, V.: Assessing the quality of the steps to reproduce in bug reports. In: Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 86\u201396 (2019)","DOI":"10.1145\/3338906.3338947"},{"key":"505_CR8","doi-asserted-by":"crossref","unstructured":"Chaparro, O., Plorez, J.M., Singh, U., Marcus, A.: Reformulating queries for duplicate bug report detection. In: In Proceedings of The26th International Conference on Software Analysis,Evolution and Reengineering, pp. 218\u2013229, IEEE (2019)","DOI":"10.1109\/SANER.2019.8667985"},{"key":"505_CR9","doi-asserted-by":"crossref","unstructured":"Chaparro, O., Plorez, J.M., Singh, U., Marcus, A.: Deeptriage:explor-ing the effectiveness of deep learning for bug triaging. In: In Proceedings of the Indiajoint International Conference on Data Science and Management of Data, pp. 171\u2013179, Association for Computing Machinery (2019)","DOI":"10.1145\/3297001.3297023"},{"key":"505_CR10","doi-asserted-by":"crossref","unstructured":"Chen, S., Xie, X., Yin, B., Ji, Y., Chen, L., Xu, B.: Stay professional and efficient: automatically generate titles for your bug reports. In: 2020 35th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 385\u2013397, IEEE (2020)","DOI":"10.1145\/3324884.3416538"},{"key":"505_CR11","doi-asserted-by":"crossref","unstructured":"Davies, S., Roper, M.: What\u2019s in a bug report? In: Proceedings of the 8th ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement, pp. 1\u201310 (2014)","DOI":"10.1145\/2652524.2652541"},{"key":"505_CR12","unstructured":"Devlin, J., Chang, M.-W., Lee, K., Toutanova, K.: Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)"},{"key":"505_CR13","unstructured":"Devlin, M.C., Lee, K., Toutanova, K.: Bert: pre-training of deep bidirectional transformers for language understanding. In: Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, NAACL-HLT 2019, Minneapolis, MN, USA, June 2-7, 2019, Volume 1 (Long and Short Papers), pp. 4171\u20134186, Association for Computational Linguistics (2019)"},{"key":"505_CR14","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1037\/h0031619","volume":"76","author":"JL Fleiss","year":"1971","unstructured":"Fleiss, J.L.: Measuring nominal scale agreement among many raters. Psychol. Bull. 76, 378\u2013382 (1971)","journal-title":"Psychol. Bull."},{"key":"505_CR15","doi-asserted-by":"crossref","unstructured":"Guo, S.L., N. Duan, Y.W., M. Zhou, J.Y.: Unixcoder: Unified cross-modal pre-training for code representation. In: in Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), ACL 2022, Dublin, Ireland, May 22-27, 2022, S. Muresan, P. Nakov, and A. Villavicencio, Eds, pp. 7212\u20137225, Association for Computational Linguistics (2022)","DOI":"10.18653\/v1\/2022.acl-long.499"},{"key":"505_CR16","doi-asserted-by":"crossref","unstructured":"Haiduc, S., Aponte, J., Moreno, L., Marcus, A.: On the use of automated text summarization techniques for summarizing source code. In: Reverse Engineering (WCRE), 2010 17th Working Conference On, pp. 35\u201344, IEEE (2010)","DOI":"10.1109\/WCRE.2010.13"},{"key":"505_CR17","doi-asserted-by":"publisher","first-page":"2179","DOI":"10.1007\/s10664-019-09730-9","volume":"25","author":"X Hu","year":"2019","unstructured":"Hu, X., Li, G., Xia, X., Lo, D., Jin, Z.: Deep code comment generation with hybrid lexical and syntactical information. Empir. Softw. Eng. 25, 2179 (2019)","journal-title":"Empir. Softw. Eng."},{"key":"505_CR18","doi-asserted-by":"crossref","unstructured":"Hu, X., Li, G., Xia, X., Lo, D., Jin, Z.: Deep code comment generation. In: Proceedings of the 26th Conference on Program Comprehension, pp. 200\u2013210 (2018)","DOI":"10.1145\/3196321.3196334"},{"issue":"10","key":"505_CR19","doi-asserted-by":"publisher","first-page":"1098","DOI":"10.1109\/TSE.2018.2876340","volume":"46","author":"Q Huang","year":"2018","unstructured":"Huang, Q., Xia, X., Lo, D., Murphy, G.C.: Automating intention mining. IEEE Trans. Softw. Eng. 46(10), 1098\u20131119 (2018)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"505_CR20","doi-asserted-by":"crossref","unstructured":"Iyer, S., Konstas, I., Cheung, A., Zettlemoyer, L.: Summarizing source code using a neural attention model. In: Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), vol. 1, pp. 2073\u20132083 (2016)","DOI":"10.18653\/v1\/P16-1195"},{"issue":"1","key":"505_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-014-0372-y","volume":"60","author":"H Jiang","year":"2017","unstructured":"Jiang, H., Zhang, J., Ma, H., Nazar, N., Ren, Z.: Mining authorship characteristics in bug repositories. Sci. China Inf. Sci. 60(1), 1\u201316 (2017)","journal-title":"Sci. China Inf. Sci."},{"key":"505_CR22","doi-asserted-by":"crossref","unstructured":"Karim, M.R., Ihara, A., Yang, X., Iida, H., Matsumoto, K.: Understanding key features of high-impact bug reports. In: 2017 8th International Workshop on Empirical Software Engineering in Practice (IWESEP), pp. 53\u201358, IEEE (2017)","DOI":"10.1109\/IWESEP.2017.17"},{"key":"505_CR23","doi-asserted-by":"publisher","unstructured":"Ko, A.J., Chilana, P.K.: Design, discussion, and dissent in open bug reports. In: Proceedings of the 2011 IConference. iConference \u201911, pp. 106\u2013113. Association for Computing Machinery, New York, NY, USA (2011). https:\/\/doi.org\/10.1145\/1940761.1940776","DOI":"10.1145\/1940761.1940776"},{"key":"505_CR24","doi-asserted-by":"crossref","unstructured":"Ko, A.J., Myers, B.A., Chau, D.H.: A linguistic analysis of how people describe software problems. In: Visual Languages and Human-Centric Computing (VL\/HCC\u201906), pp. 127\u2013134, IEEE (2006)","DOI":"10.1109\/VLHCC.2006.3"},{"key":"505_CR25","doi-asserted-by":"crossref","unstructured":"Lavie, A., Agarwal, A.: Meteor: An automatic metric for mt evaluation with high levels of correlation with human judgments. In: Proceedings of the Second Workshop on Statistical Machine Translation. StatMT \u201907, pp. 228\u2013231. Association for Computational Linguistics, USA (2007)","DOI":"10.3115\/1626355.1626389"},{"issue":"1","key":"505_CR26","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1109\/72.554195","volume":"8","author":"S Lawrence","year":"1997","unstructured":"Lawrence, S., Giles, C.L., Tsoi, A.C., Back, A.D.: Face recognition: a convolutional neural-network approach. IEEE Trans. Neural Netw. 8(1), 98\u2013113 (1997)","journal-title":"IEEE Trans. Neural Netw."},{"key":"505_CR27","doi-asserted-by":"publisher","first-page":"111709","DOI":"10.1016\/j.jss.2023.111709","volume":"202","author":"H Li","year":"2023","unstructured":"Li, H., Yan, M., Sun, W., Liu, X., Wu, Y.: A first look at bug report templates on GitHub. J. Syst. Softw. 202, 111709 (2023)","journal-title":"J. Syst. Softw."},{"key":"505_CR28","unstructured":"Lin, C.Y.: Rouge: A package for automatic evaluation of summaries. In: In Proceedings of the Workshop on Text Summarization Branches Out (WAS 2004) (2004)"},{"issue":"9","key":"505_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3560815","volume":"55","author":"P Liu","year":"2023","unstructured":"Liu, P., Fu, J., Hayashi, H., et al.: Pre-train, prompt, and predict: a systematic survey of prompting methods in natural language processing. ACM Comput. Surv. 55(9), 1\u201335 (2023)","journal-title":"ACM Comput. Surv."},{"key":"505_CR30","doi-asserted-by":"crossref","unstructured":"Liu, Z., Xia, X., Hassan, A.E., Lo, D., Xing, Z., Wang, X.: Neural-machine-translation-based commit message generation: how far are we? In: Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, pp. 373\u2013384 (2018)","DOI":"10.1145\/3238147.3238190"},{"key":"505_CR31","doi-asserted-by":"crossref","unstructured":"Liu, Q., Liu, Z., Zhu, H., Fan, H., Du, B., Qian, Y.: Generating commit messages from diffs using pointer-generator network. In: 2019 IEEE\/ACM 16th International Conference on Mining Software Repositories (MSR), pp. 299\u2013309, IEEE (2019)","DOI":"10.1109\/MSR.2019.00056"},{"issue":"2","key":"505_CR32","doi-asserted-by":"publisher","first-page":"516","DOI":"10.1007\/s10664-014-9311-2","volume":"20","author":"R Lotufo","year":"2015","unstructured":"Lotufo, R., Malik, Z., Czarnecki, K.: Modelling the hurried bug report reading process to summarize bug reports. Empir. Softw. Eng. 20(2), 516\u2013548 (2015)","journal-title":"Empir. Softw. Eng."},{"key":"505_CR33","doi-asserted-by":"crossref","unstructured":"Mani, S., Catherine, R., Sinha, V.S., Dubey, A.: Ausum: approach for unsupervised bug report summarization. In: Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering, pp. 1\u201311 (2012)","DOI":"10.1145\/2393596.2393607"},{"issue":"2","key":"505_CR34","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1109\/TSE.2015.2465386","volume":"42","author":"PW McBurney","year":"2016","unstructured":"McBurney, P.W., McMillan, C.: Automatic source code summarization of context for java methods. IEEE Trans. Softw. Eng. 42(2), 103\u2013119 (2016)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"505_CR35","doi-asserted-by":"crossref","unstructured":"McBurney, P.W., McMillan, C.: Automatic documentation generation via source code summarization of method context. In: Proceedings of the 22nd International Conference on Program Comprehension, pp. 279\u2013290, ACM (2014)","DOI":"10.1145\/2597008.2597149"},{"key":"505_CR36","doi-asserted-by":"crossref","unstructured":"Mills, C., Pantiuchina, J., Parra, E., Bavota, G., Haiduc, S.: Are bug reports enough for text retrieval-based bug localiza-tion? In: In Proceedings of the International Conference on Software Maintenance and Evolution, pp. 381\u2013392, IEEE (2018)","DOI":"10.1109\/ICSME.2018.00046"},{"issue":"2","key":"505_CR37","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/TSE.2016.2591536","volume":"43","author":"L Moreno","year":"2016","unstructured":"Moreno, L., Bavota, G., Di Penta, M., Oliveto, R., Marcus, A., Canfora, G.: Arena: an approach for the automated generation of release notes. IEEE Trans. Softw. Eng. 43(2), 106\u2013127 (2016)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"505_CR38","doi-asserted-by":"crossref","unstructured":"Moreno, L., Aponte, J., Sridhara, G., Marcus, A., Pollock, L., Vijay-Shanker, K.: Automatic generation of natural language summaries for java classes. In: Program Comprehension (ICPC), 2013 IEEE 21st International Conference On, pp. 23\u201332, IEEE (2013)","DOI":"10.1109\/ICPC.2013.6613830"},{"key":"505_CR39","doi-asserted-by":"crossref","unstructured":"Moreno, L., Bavota, G., Di\u00a0Penta, M., Oliveto, R., Marcus, A., Canfora, G.: Automatic generation of release notes. In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 484\u2013495, ACM (2014)","DOI":"10.1145\/2635868.2635870"},{"key":"505_CR40","unstructured":"Nijkamp, E., Pang, B., Hayashi, L. H. Tu, Wang, H., Zhou, Y., Savarese, S., Xiong, C.: Codegen: An open large language model for code with multi-turn program synthesis. arXiv preprint arXiv:2203.13474 (2022)"},{"key":"505_CR41","doi-asserted-by":"crossref","unstructured":"Popovi\u0107, M.: chrf: character n-gram f-score for automatic MT evaluation. In: Proceedings of the Tenth Workshop on Statistical Machine Translation, pp. 392\u2013395 (2015)","DOI":"10.18653\/v1\/W15-3049"},{"key":"505_CR42","unstructured":"Raffel, C., Shazeer, N., Roberts, A., Lee, K., Narang, S., Matena, M., Zhou, Y., Li, W., Liu, P.J.: Exploring the Limits of Transfer Learning with a Unified Text-to-Text Transformer (2023). https:\/\/arxiv.org\/abs\/1910.10683"},{"issue":"4","key":"505_CR43","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1109\/TSE.2013.2297712","volume":"40","author":"S Rastkar","year":"2014","unstructured":"Rastkar, S., Murphy, G.C., Murray, G.: Automatic summarization of bug reports. IEEE Trans. Softw. Eng. 40(4), 366\u2013380 (2014)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"505_CR44","doi-asserted-by":"crossref","unstructured":"Rastkar, S., Murphy, G.C., Murray, G.: Summarizing software artifacts: a case study of bug reports. In: 2010 ACM\/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 505\u2013514, IEEE (2010)","DOI":"10.1145\/1806799.1806872"},{"key":"505_CR45","doi-asserted-by":"crossref","unstructured":"Roy, D., Fakhoury, S., Arnaoudova, V.: Reassessing automatic evaluation metrics for code summarization tasks. In: Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 1105\u20131116 (2021)","DOI":"10.1145\/3468264.3468588"},{"key":"505_CR46","doi-asserted-by":"publisher","first-page":"110406","DOI":"10.1016\/j.jss.2019.110406","volume":"158","author":"H Ruan","year":"2019","unstructured":"Ruan, H., Chen, B., Peng, X., Zhao, W.: Deeplink: re-covering issue-commit links based on deep learning. J. Syst. Softw. 158, 110406 (2019)","journal-title":"J. Syst. Softw."},{"key":"505_CR47","doi-asserted-by":"publisher","unstructured":"Sahoo, S.K., Criswell, J., Adve, V.: An empirical study of reported bugs in server software with implications for automated bug diagnosis. In: 2010 ACM\/IEEE 32nd International Conference on Software Engineering, vol. 1, pp. 485\u2013494 (2010). https:\/\/doi.org\/10.1145\/1806799.1806870","DOI":"10.1145\/1806799.1806870"},{"key":"505_CR48","doi-asserted-by":"crossref","unstructured":"Sennrich, R., Haddow, B., Birch, A.: Neural machine translation of rare words with subword units. arXiv preprint arXiv:1508.07909 (2015)","DOI":"10.18653\/v1\/P16-1162"},{"key":"505_CR49","unstructured":"Sharma, S., El\u00a0Asri, L., Schulz, H., Zumer, J.: Relevance of unsupervised metrics in task-oriented dialogue for evaluating natural language generation. CoRR abs\/1706.09799 (2017)"},{"key":"505_CR50","doi-asserted-by":"crossref","unstructured":"Sridhara, G., Hill, E., Muppaneni, D., Pollock, L., Vijay-Shanker, K.: Towards automatically generating summary comments for java methods. In: Proceedings of the IEEE\/ACM International Conference on Automated Software Engineering, pp. 43\u201352, ACM (2010)","DOI":"10.1145\/1858996.1859006"},{"key":"505_CR51","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.infsof.2016.11.010","volume":"84","author":"Y Sun","year":"2017","unstructured":"Sun, Y., Wang, Q., Yang, Y.: Frlink: improving the recovery of miss-ing issue-commit links by revisiting file relevance. Inf. Sofiw. Technol. 84, 33\u201347 (2017)","journal-title":"Inf. Sofiw. Technol."},{"key":"505_CR52","doi-asserted-by":"crossref","unstructured":"Sureka, A., Indukuri, K.V.: Linguistic analysis of bugreport titles with respect to the dimension of bug importance. In: In Proceedings of the 3rd Annual Bangalore Conference, pp. 1\u20136, Association for Computing Machinery (2010)","DOI":"10.1145\/1754288.1754297"},{"key":"505_CR53","doi-asserted-by":"crossref","unstructured":"Tabassum, J., Maddela, M., Xu, W., Ritter, A.: Code and named entity recognition in stackoverflow. arXiv preprint arXiv:2005.01634 (2020)","DOI":"10.18653\/v1\/2020.acl-main.443"},{"key":"505_CR54","doi-asserted-by":"crossref","unstructured":"Tian, Y., Sun, C., Lo, D.: Improved duplicate bug re-port identification. In: In Proceedings of the 16th European Conference on SofiwareMaintenance and Reengineering, pp. 385\u2013390, IEEE (2012)","DOI":"10.1109\/CSMR.2012.48"},{"key":"505_CR55","doi-asserted-by":"crossref","unstructured":"Wan, Y., Zhao, Z., Yang, M., Xu, G., Ying, H., Wu, J., Yu, P.S.: Improving automatic source code summarization via deep reinforcement learning. In: Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, pp. 397\u2013407 (2018)","DOI":"10.1145\/3238147.3238206"},{"key":"505_CR56","doi-asserted-by":"crossref","unstructured":"Wang, M.W., Y. Liu, Y.W., Shenyang, R.W.: Understanding and facilitating the co-evolution of production and test code. In: 2021 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 272\u2013283, IEEE (2021)","DOI":"10.1109\/SANER50967.2021.00033"},{"key":"505_CR57","doi-asserted-by":"publisher","unstructured":"Wang, J., Zhang, H.: Predicting defect numbers based on defect state transition models. In: Proceedings of the 2012 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, pp. 191\u2013200 (2012). https:\/\/doi.org\/10.1145\/2372251.2372287","DOI":"10.1145\/2372251.2372287"},{"key":"505_CR58","doi-asserted-by":"publisher","unstructured":"Wei, B.: Retrieve and refine: Exemplar-based neural comment generation. In: 2019 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 1250\u20131252 (2019). https:\/\/doi.org\/10.1109\/ASE.2019.00152","DOI":"10.1109\/ASE.2019.00152"},{"key":"505_CR59","doi-asserted-by":"crossref","unstructured":"Wong, E., Yang, J., Tan, L.: Autocomment: Mining question and answer sites for automatic comment generation. In: Automated Software Engineering (ASE), 2013 IEEE\/ACM 28th International Conference On, pp. 562\u2013567, IEEE (2013)","DOI":"10.1109\/ASE.2013.6693113"},{"key":"505_CR60","doi-asserted-by":"publisher","unstructured":"Xuan, J., Jiang, H., Ren, Z., Zou, W.: Developer prioritization in bug repositories. In: 2012 34th International Conference on Software Engineering (ICSE), pp. 25\u201335 (2012). https:\/\/doi.org\/10.1109\/ICSE.2012.6227209","DOI":"10.1109\/ICSE.2012.6227209"},{"issue":"1","key":"505_CR61","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/MS.2017.377142400","volume":"36","author":"T Zhang","year":"2017","unstructured":"Zhang, T., Chen, J., Luo, X., Li, T.: Bug reports for desktop software and mobile apps in GitHub: What\u2019s the difference? IEEE Softw. 36(1), 63\u201371 (2017)","journal-title":"IEEE Softw."},{"key":"505_CR62","doi-asserted-by":"crossref","unstructured":"Zhang, J., Wang, X., Zhang, H., Sun, H., Liu, X.: Retrieval-based neural source code summarization. In: Proceedings of the 42nd International Conference on Software Engineering (2020)","DOI":"10.1145\/3377811.3380383"}],"container-title":["Automated Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-025-00505-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10515-025-00505-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-025-00505-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T13:57:40Z","timestamp":1757512660000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10515-025-00505-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,22]]},"references-count":62,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["505"],"URL":"https:\/\/doi.org\/10.1007\/s10515-025-00505-9","relation":{},"ISSN":["0928-8910","1573-7535"],"issn-type":[{"type":"print","value":"0928-8910"},{"type":"electronic","value":"1573-7535"}],"subject":[],"published":{"date-parts":[[2025,3,22]]},"assertion":[{"value":"10 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 March 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"32"}}