{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T03:53:11Z","timestamp":1760586791001,"version":"3.41.0"},"reference-count":81,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,1,19]],"date-time":"2016-01-19T00:00:00Z","timestamp":1453161600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National Basic Research Program of China (the 973 Program)","award":["2015CB352201"],"award-info":[{"award-number":["2015CB352201"]}]},{"name":"National Key Technology R&D Program of the Ministry of Science and Technology of China","award":["2013BAH01B01"],"award-info":[{"award-number":["2013BAH01B01"]}]},{"name":"NTU SUG","award":["M4081029.020"],"award-info":[{"award-number":["M4081029.020"]}]},{"name":"MOE AcRF Tier1","award":["M4011165.020"],"award-info":[{"award-number":["M4011165.020"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2017,2]]},"DOI":"10.1007\/s10664-015-9417-1","type":"journal-article","created":{"date-parts":[[2016,1,19]],"date-time":"2016-01-19T07:51:52Z","timestamp":1453189912000},"page":"134-174","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Extracting and analyzing time-series HCI data from screen-captured task videos"],"prefix":"10.1007","volume":"22","author":[{"given":"Lingfeng","family":"Bao","sequence":"first","affiliation":[]},{"given":"Jing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zhenchang","family":"Xing","sequence":"additional","affiliation":[]},{"given":"Xinyu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Xia","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,19]]},"reference":[{"key":"9417_CR1","doi-asserted-by":"crossref","unstructured":"Ammar N, Abi-Antoun M (2012) Empirical evaluation of diagrams of the run-time structure for coding tasks. In: Proceedings of the WCRE, pp 367\u2013376","DOI":"10.1109\/WCRE.2012.46"},{"key":"9417_CR2","unstructured":"Bandura A (1986) Social foundations of thought and action: a social cognitive theory, vol 1, p 617"},{"key":"9417_CR3","doi-asserted-by":"crossref","unstructured":"Banovic N, Grossman T, Matejka J, Fitzmaurice G (2012) Waken: reverse engineering usage information and interface structure from software videos. In: Proceedings of the UIST, pp 83\u201392","DOI":"10.1145\/2380116.2380129"},{"key":"9417_CR4","doi-asserted-by":"crossref","unstructured":"Bao L, Ye D, Xing Z, Xia X (2015a) ActivitySpace: a remembrance framework to support interapplication information needs. In: Proceedings 30th IEEE\/ACM international conference on automated software engineering","DOI":"10.1109\/ASE.2015.90"},{"key":"9417_CR5","doi-asserted-by":"crossref","unstructured":"Bao L, Li J, Xing Z, Wang X, Zhou B (2015b) Reverse engineering time-series interaction data from screen-captured videos. In: Proceedings of the SANER, pp 399\u2013408","DOI":"10.1109\/SANER.2015.7081850"},{"key":"9417_CR6","doi-asserted-by":"crossref","unstructured":"Bao L, Li J, Xing Z, Wang X, Zhou B (2015c) scvRipper: video scraping tool for modeling developers behavior using interaction data. In: Proceedings of the ICSE, pp 673\u2013676","DOI":"10.1109\/ICSE.2015.220"},{"key":"9417_CR7","doi-asserted-by":"crossref","unstructured":"Bao L, Xing Z, Wang X, Zhou B (2015d) Tracking and analyzing cross-cutting activities in developers\u2019 daily work. In: Proceedings of the 30th IEEE\/ACM international conference on automated software engineering","DOI":"10.1109\/ASE.2015.43"},{"issue":"7039","key":"9417_CR8","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1038\/nature03459","volume":"435","author":"AL Barabasi","year":"2005","unstructured":"Barabasi AL (2005) The origin of bursts and heavy tails in human dynamics. Nature 435(7039):207\u2013211","journal-title":"Nature"},{"key":"9417_CR9","doi-asserted-by":"crossref","unstructured":"Bateman S, Teevan J, White RW (2012) The search dashboard: how reflection and comparison impact search behavior. In: Proceedings of the CHI, 1785","DOI":"10.1145\/2207676.2208311"},{"issue":"3","key":"9417_CR10","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1016\/j.cviu.2007.09.014","volume":"110","author":"H Bay","year":"2008","unstructured":"Bay H, Ess A, Tuytelaars T, Van Gool L (2008) Speeded-up robust features (surf). Comp Vision Image Underst 110(3):346\u2013359","journal-title":"Comp Vision Image Underst"},{"key":"9417_CR11","doi-asserted-by":"crossref","unstructured":"Bordes A, Gabrilovich E (2014) Constructing and mining web-scale knowledge graphs: KDD 2014 tutorial. In: Proceedings of the KDD, p 1967","DOI":"10.1145\/2623330.2630803"},{"key":"9417_CR12","doi-asserted-by":"crossref","unstructured":"Brade K, Guzdial M, Steckel M, Soloway E (1992) Whorf: A visualization tool for software maintenance. In: Proceedings 1992 IEEE workshop on visual languages, pp 148\u2013154","DOI":"10.1109\/WVL.1992.275771"},{"key":"9417_CR13","doi-asserted-by":"crossref","unstructured":"Brandt J, Guo PJ, Lewenstein J, Dontcheva M, Klemmer SR, Francisco S (2009) Two studies of opportunistic programming: interleaving web foraging, learning, and writing code. In: Proceedings of the CHI, pp 1589\u20131598","DOI":"10.1145\/1518701.1518944"},{"key":"9417_CR14","doi-asserted-by":"crossref","unstructured":"Brandt J, Dontcheva M, Weskamp M, Klemmer SR, Francisco S (2010) Example-centric programming: integrating web search into the development environment. In: Proceedings of the CHI, pp 513\u2013522","DOI":"10.1145\/1753326.1753402"},{"key":"9417_CR15","doi-asserted-by":"crossref","unstructured":"Brown JS, Collins A, Duguid P (1989) Situated cognition and the culture of learning","DOI":"10.21236\/ADA204690"},{"key":"9417_CR16","doi-asserted-by":"crossref","unstructured":"Canny J (1986) A computational approach to edge detection. IEEE Trans Pattern Anal Mach Intell:679\u2013698","DOI":"10.1109\/TPAMI.1986.4767851"},{"key":"9417_CR17","doi-asserted-by":"crossref","unstructured":"Chang T-H, Yeh T, Miller R (2011) Associating the visual representation of user interfaces with their internal structures and metadata. In: Proceedings of the UIST, pp 245\u2013256","DOI":"10.1145\/2047196.2047228"},{"key":"9417_CR18","doi-asserted-by":"crossref","unstructured":"Chang T-H, Yeh T, Miller RC (2010) GUI testing using computer vision. In: Proceeding of the CHI, pp 1535\u20131544","DOI":"10.1145\/1753326.1753555"},{"issue":"2","key":"9417_CR19","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/S0304-4076(96)01818-0","volume":"77","author":"A Colin Cameron","year":"1997","unstructured":"Colin Cameron A, Windmeijer FA (1997) An r-squared measure of goodness of fit for some common nonlinear regression models. J Econ 77(2):329\u2013342","journal-title":"J Econ"},{"key":"9417_CR20","doi-asserted-by":"crossref","unstructured":"Corritore CL, Wiedenbeck S (2000) Direction and scope of comprehension-related activities by procedural and object-oriented programmers: An empirical study. In: Proceedings of the IWPC. IEEE, pp 139\u2013 148","DOI":"10.1109\/WPC.2000.852488"},{"issue":"1","key":"9417_CR21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1006\/ijhc.2000.0423","volume":"54","author":"CL Corritore","year":"2001","unstructured":"Corritore CL, Wiedenbeck S (2001) An exploratory study of program comprehension strategies of procedural and object-oriented programmers. Int J Hum-Comput St 54(1):1\u201323","journal-title":"Int J Hum-Comput St"},{"key":"9417_CR22","doi-asserted-by":"crossref","unstructured":"Dekel U, Herbsleb JD (2009) Reading the documentation of invoked API functions in program comprehension, pp 168\u2013177","DOI":"10.1109\/ICPC.2009.5090040"},{"key":"9417_CR23","doi-asserted-by":"crossref","unstructured":"Dewan P, Agarwal P, Shroff G, Hegde R (2009) Distributed side-by-side programming. In: Proceedings of the 2009 ICSE workshop on cooperative and human aspects on software engineering, pp 48\u201355","DOI":"10.1109\/CHASE.2009.5071410"},{"key":"9417_CR24","doi-asserted-by":"crossref","unstructured":"Dixon M, Fogarty J (2010) Prefab: implementing advanced behaviors using pixel-based reverse engineering of interface structure. In: Proceedings of the CHI, pp 1525\u20131534","DOI":"10.1145\/1753326.1753554"},{"key":"9417_CR25","doi-asserted-by":"crossref","unstructured":"Duala-Ekoko E, Robillard MP (2012) Asking and answering questions about unfamiliar APIs: an exploratory study. In: Proceedings of the ICSE, pp 266\u2013276","DOI":"10.1109\/ICSE.2012.6227187"},{"key":"9417_CR26","unstructured":"Ester M, Kriegel H-P, Sander J, Xu X (1996) A density-based algorithm for discovering clusters in large spatial databases with noise. In: Proceedings of the KDD, vol 96, pp 226\u2013231"},{"key":"9417_CR27","unstructured":"Forsyth DA, Ponce J (2002) Computer vision: a modern approach. Prentice Hall Professional Technical Reference"},{"key":"9417_CR28","doi-asserted-by":"crossref","unstructured":"Fritz T, Shepherd DC, Kevic K, Snipes W, Br\u00e4unlich C (2014) Developers\u2019 code context models for change tasks. In: Proceedings of the FSE, pp 7\u201318","DOI":"10.1145\/2635868.2635905"},{"key":"9417_CR29","volume-title":"Digital image processing","author":"RC Gonzalez","year":"2002","unstructured":"Gonzalez RC, Woods RE (2002) Digital image processing. Prentice hall Upper Saddle River, NJ"},{"key":"9417_CR30","doi-asserted-by":"crossref","unstructured":"Greiler M, van Deursen A, Storey M (2012) Test confessions: a study of testing practices for plug-in systems, pp 244\u2013254","DOI":"10.1109\/ICSE.2012.6227189"},{"key":"9417_CR31","doi-asserted-by":"crossref","unstructured":"Guha R, Guha R, McCool R, McCool R, Miller E, Miller E (2003) Semantic search. In: Proceedings of the WWW, pp 700\u2013709","DOI":"10.1145\/775152.775250"},{"key":"9417_CR32","unstructured":"Hartmann B, Macdougall D, Brandt J, Klemmer SR (2010) What would other programmers do? Suggesting solutions to error messages. In: Proceedings of the CHI, pp 1019\u20131028"},{"issue":"4","key":"9417_CR33","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1145\/371578.371593","volume":"32","author":"DM Hilbert","year":"2000","unstructured":"Hilbert DM, Redmiles DF (2000) Extracting usability information from user interface events. ACM Comput Surv 32(4):384\u2013421","journal-title":"ACM Comput Surv"},{"key":"9417_CR34","doi-asserted-by":"crossref","unstructured":"Hundhausen CD, Brown JL, Farley S, Skarpas D (2006) A methodology for analyzing the temporal evolution of novice programs based on semantic components. In: Proceedings of the ACM international computing education research workshop, pp 59\u201371","DOI":"10.1145\/1151588.1151599"},{"key":"9417_CR35","doi-asserted-by":"crossref","unstructured":"Hurst A, Hudson SE, Mankoff J (2010) Automatically identifying targets users interact with during real world tasks. In: Proceedings of the IUI. ACM, pp 11\u201320","DOI":"10.1145\/1719970.1719973"},{"key":"9417_CR36","doi-asserted-by":"crossref","unstructured":"Kim JH, Gunn DV, Schuh E, Phillips B, Pagulayan RJ, Wixon D (2008) Tracking real-time user experience (TRUE): a comprehensive instrumentation solution for complex systems. In: Proceedings of the CHI, pp 443\u2013452","DOI":"10.1145\/1357054.1357126"},{"key":"9417_CR37","unstructured":"Kimble C, Hildreth PM, Bourdon I (2008) Communities of practice: creating learning environments for educators, vol 1. Information Age Publisher"},{"key":"9417_CR38","doi-asserted-by":"crossref","unstructured":"Ko AJ, Myers BA (2004) Designing the whyline: a debugging interface for asking questions about program behavior. In: Proceedings of the CHI, pp 151\u2013158","DOI":"10.1145\/985692.985712"},{"issue":"1","key":"9417_CR39","first-page":"41","volume":"16","author":"AJ Ko","year":"2005","unstructured":"Ko AJ, Myers BA (2005) A framework and methodology for studying the causes of software errors in programming systems. J Visual Lang Comput 16(1):41\u201384","journal-title":"J Visual Lang Comput"},{"key":"9417_CR40","doi-asserted-by":"crossref","unstructured":"Ko AJ, Aung HH, Myers BA (2005a) Design requirements for more flexible structured editors from a study of programmers\u2019 text editing. In: CHI\u201905 extended abstracts on human factors in computing systems. ACM, pp 1557\u20131560","DOI":"10.1145\/1056808.1056965"},{"key":"9417_CR41","doi-asserted-by":"crossref","unstructured":"Ko AJ, Aung HH, Myers BA (2005b) Eliciting design requirements for maintenance-oriented IDEs: a detailed study of corrective and perfective maintenance tasks. In: Proceedings of the ICSE, pp 126\u2013135","DOI":"10.1145\/1062455.1062492"},{"issue":"12","key":"9417_CR42","doi-asserted-by":"crossref","first-page":"971","DOI":"10.1109\/TSE.2006.116","volume":"32","author":"AJ Ko","year":"2006","unstructured":"Ko AJ, Myers BA, Coblenz MJ, Aung HH (2006) An exploratory study of how developers seek, relate, and collect relevant information during software maintenance tasks. IEEE Trans Softw Eng 32(12):971\u2013987","journal-title":"IEEE Trans Softw Eng"},{"key":"9417_CR43","first-page":"1","volume":"30","author":"AG Koru","year":"2005","unstructured":"Koru AG, Ozok A, Norcio AF (2005) The effect of human memory organization on code reviews under different single and pair code reviewing scenarios. ACM SIGSOFT Software Engineering Notes 30:1\u20133","journal-title":"ACM SIGSOFT Software Engineering Notes"},{"key":"9417_CR44","unstructured":"Kushman N, Katabi D (2010) Enabling configuration-independent automation by non-expert users. In: Proceedings of the ninth USENIX symposium on operating systems design and implementation, pp 223\u2013236"},{"key":"9417_CR45","doi-asserted-by":"crossref","unstructured":"Lawrance J, Bellamy R, Burnett M, Rector K (2008) Using information scent to model the dynamic foraging behavior of programmers in maintenance tasks. In: Proceedings of the CHI. ACM, pp 1323\u20131332","DOI":"10.1145\/1357054.1357261"},{"issue":"2","key":"9417_CR46","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1109\/TSE.2010.111","volume":"39","author":"J Lawrance","year":"2013","unstructured":"Lawrance J, Bogart C, Burnett M, Bellamy R, Rector K, Fleming SD (2013) How programmers debug, revisited: an information foraging theory perspective. IEEE Trans Softw Eng 39(2):197\u2013215","journal-title":"IEEE Trans Softw Eng"},{"key":"9417_CR47","doi-asserted-by":"crossref","unstructured":"Lawrence J, Clarke S, Burnett M, Rothermel G (2005) How well do professional developers test with code coverage visualizations? An empirical study. In: Proceedings of the VL\/HCC, pp 53\u201360","DOI":"10.1109\/VLHCC.2005.44"},{"key":"9417_CR48","unstructured":"Leary MR (1991) Introduction to behavioral research methods. Wadsworth Publishing Company"},{"key":"9417_CR49","doi-asserted-by":"crossref","unstructured":"Li H, Xing Z, Peng X, Zhao W (2013) What help do developers seek, when and how?. In: Proceedings of the WCRE, pp 142\u2013151","DOI":"10.1109\/WCRE.2013.6671289"},{"key":"9417_CR50","doi-asserted-by":"crossref","unstructured":"Lowe DG (1999) Object recognition from local scale-invariant features. In: Proceedings of the ICCV, vol 2, pp 1150\u20131157","DOI":"10.1109\/ICCV.1999.790410"},{"key":"9417_CR51","doi-asserted-by":"crossref","unstructured":"Matejka J, Li W (2009) CommunityCommands: command recommendations for software applications. In: Proceedings of the UIST, pp 193\u2013202","DOI":"10.1145\/1622176.1622214"},{"key":"9417_CR52","doi-asserted-by":"crossref","unstructured":"Matejka J, Grossman T, Fitzmaurice G (2011) Ambient help. In: Proceeding of the CHI, pp 2751\u20132760","DOI":"10.1145\/1978942.1979349"},{"key":"9417_CR53","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1007\/978-3-319-11200-8_20","volume-title":"Open learning and teaching in educational communities","author":"M Mavrikis","year":"2014","unstructured":"Mavrikis M, Grawemeyer B, Hansen A, Gutierrez-Santos S (2014) Exploring the potential of speech recognition to support problem solving and reflection. In: Open learning and teaching in educational communities. Springer, Berlin, pp 263\u2013276"},{"key":"9417_CR54","unstructured":"Muja M, Lowe DG (2009) Fast approximate nearest neighbors with automatic algorithm configuration. In: VISAPP (1), pp 331\u2013340"},{"key":"9417_CR55","doi-asserted-by":"crossref","unstructured":"Murphy-Hill ER, Zimmermann T, Nagappan N (2014) Cowboys, ankle sprains, and keepers of quality: how is video game development different from software development?. In: Proceeding of the ICSE, pp 1\u201311","DOI":"10.1145\/2568225.2568226"},{"key":"9417_CR56","doi-asserted-by":"crossref","unstructured":"Nie Z, Zhang Y (2005) Object-level ranking: bringing order to web objects. In: Proceeding of the WWW, pp 567\u2013574","DOI":"10.1145\/1060745.1060828"},{"key":"9417_CR57","doi-asserted-by":"crossref","unstructured":"Nie Z, Ma Y, Shi S, Wen J-r, Ma W-y (2007) Web Object Retrieval. In: Proceeding of the WWW, pp 81\u201390","DOI":"10.1145\/1242572.1242584"},{"issue":"3","key":"9417_CR58","doi-asserted-by":"crossref","first-page":"1065","DOI":"10.1214\/aoms\/1177704472","volume":"33","author":"E Parzen","year":"1962","unstructured":"Parzen E (1962) On estimation of a probability density function and mode. Ann Math Stat 33(3):1065\u20131076","journal-title":"Ann Math Stat"},{"key":"9417_CR59","doi-asserted-by":"crossref","unstructured":"Piorkowski D, Fleming SD, Scaffidi C, John L, Bogart C, John BE, Burnett M, Bellamy R (2011) Modeling programmer navigation: a head-to-head empirical evaluation of predictive models. In: Proceeding of the VL\/HCC, pp 109\u2013116","DOI":"10.1109\/VLHCC.2011.6070387"},{"key":"9417_CR60","doi-asserted-by":"crossref","unstructured":"Ponzanelli L, Bacchelli A, Lanza M (2013) Seahawk: Stack overflow in the IDE. In: Proceeding of the ICSE, pp 1295\u20131298","DOI":"10.1109\/ICSE.2013.6606701"},{"issue":"1","key":"9417_CR61","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/MASSP.1986.1165342","volume":"3","author":"L Rabiner","year":"1986","unstructured":"Rabiner L, Juang BH (1986) An introduction to hidden Markov models. IEEE ASSP Mag 3(1):4\u201316","journal-title":"IEEE ASSP Mag"},{"key":"9417_CR62","unstructured":"Rhodes B (1996) Remembrance agent: a continuously running automated information retrieval system. In: The proceedings of the first international conference on the practical application of intelligent agents and multi agent technology, pp 122\u2013125"},{"issue":"12","key":"9417_CR63","doi-asserted-by":"crossref","first-page":"889","DOI":"10.1109\/TSE.2004.101","volume":"30","author":"MP Robillard","year":"2004","unstructured":"Robillard MP, Coelho W, Murphy GC (2004) How effective developers investigate source code: an exploratory study. IEEE Trans Softw Eng 30(12):889\u2013903","journal-title":"IEEE Trans Softw Eng"},{"key":"9417_CR64","doi-asserted-by":"crossref","first-page":"430","DOI":"10.1007\/11744023_34","volume-title":"Computer Vision\u2013ECCV 2006","author":"E Rosten","year":"2006","unstructured":"Rosten E, Drummond T (2006) Machine learning for high-speed corner detection. In: Computer Vision\u2013ECCV 2006. Springer, Berlin, pp 430\u2013443"},{"key":"9417_CR65","doi-asserted-by":"crossref","unstructured":"Sarma A, Maccherone L, Wagstrom P, Herbsleb J (2009) Tesseract: interactive visual exploration of socio-technical relationships in software development. In: Proceeding of the ICSE, pp 23\u201333","DOI":"10.1109\/ICSE.2009.5070505"},{"key":"9417_CR66","doi-asserted-by":"crossref","unstructured":"Sawadsky N, Murphy GC (2011) Fishtail: from task context to source code examples. In: Proceeding of the 1st workshop on Developing tools as plug-ins - TOPI, p 48","DOI":"10.1145\/1984708.1984722"},{"issue":"8","key":"9417_CR67","doi-asserted-by":"crossref","first-page":"888","DOI":"10.1109\/34.868688","volume":"22","author":"J Shi","year":"2000","unstructured":"Shi J, Malik J (2000) Normalized cuts and image segmentation. IEEE Trans Pattern Anal Mach Intell 22(8):888\u2013905","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"9417_CR68","doi-asserted-by":"crossref","unstructured":"Sillito J, De Voider K, Fisher B, Murphy G (2005) Managing software change tasks: an exploratory study. In: International Symposium on Empirical Software Engineering, IEEE, p 10","DOI":"10.1109\/ISESE.2005.1541811"},{"key":"9417_CR69","doi-asserted-by":"crossref","unstructured":"Silverman BW (1986) Density estimation for statistics and data analysis, vol 26. CRC press","DOI":"10.1007\/978-1-4899-3324-9"},{"key":"9417_CR70","unstructured":"Sinha SN, Frahm J-M, Pollefeys M, Genc Y (2006) GPU-based video feature tracking and matching. In: EDGE, workshop on edge computing using new commodity architectures, vol 278, p 4321"},{"key":"9417_CR71","doi-asserted-by":"crossref","unstructured":"Vakilian M, Chen N, Negara S, Rajkumar BA, Bailey BP, Johnson RE (2012) Use, disuse, and misuse of automated refactorings. In: Proceeding of the ICSE, pp 233\u2013243","DOI":"10.1109\/ICSE.2012.6227190"},{"key":"9417_CR72","doi-asserted-by":"crossref","unstructured":"von Mayrhauser A, Vans AM (1997) Program understanding behavior during debugging of large scale software. In: Empirical Studies of Programmers, 7th Workshop, ACM. ACM, pp 157\u2013179","DOI":"10.1145\/266399.266414"},{"key":"9417_CR73","doi-asserted-by":"crossref","unstructured":"Wang J, Peng X, Xing Z, Zhao W (2011) An exploratory study of feature location process: Distinct phases, recurring patterns, and elementary actions. In: Proceeding of the ICSM, pp 213\u2013222","DOI":"10.1109\/ICSM.2011.6080788"},{"key":"9417_CR74","doi-asserted-by":"crossref","unstructured":"Wang J, Peng X, Xing Z, Zhao W (2013) Improving feature location practice with multi-faceted interactive exploration. In: Proceeding of the ICSE, pp 762\u2013771","DOI":"10.1109\/ICSE.2013.6606622"},{"key":"9417_CR75","unstructured":"Weisstein EW (2011) Least squares fitting\u2013exponential. MathWorld-A Wolfram Web Resource. http:\/\/mathworld.wolfram.com\/LeastSquaresFittingExponential.html"},{"key":"9417_CR76","doi-asserted-by":"crossref","unstructured":"Whittaker JA, Poore JH (1993) Markov analysis of software specifications","DOI":"10.1145\/151299.151326"},{"issue":"1","key":"9417_CR77","first-page":"29","volume":"147","author":"D-C Wu","year":"2000","unstructured":"Wu D-C, Tsai W-H (2000) Spatial-domain image hiding using image differencing. Proc ICCVISP 147(1):29\u201337","journal-title":"Proc ICCVISP"},{"key":"9417_CR78","doi-asserted-by":"crossref","unstructured":"Yang J, McAuley J, Leskovec J, LePendu P, Shah N (2014) Finding progression stages in time-evolving event sequences. In: Proceeding of the WWW, pp 783\u2013794","DOI":"10.1145\/2566486.2568044"},{"key":"9417_CR79","doi-asserted-by":"crossref","unstructured":"Yeh T, Chang T-H, Miller RC (2009) Sikuli: using GUI screenshots for search and automation. In: Proceeding of the UIST, pp 183\u2013192","DOI":"10.1145\/1622176.1622213"},{"key":"9417_CR80","doi-asserted-by":"crossref","unstructured":"Zhang Q, Chen Y, Zhang Y, Xu Y (2008) SIFT implementation and optimization for multi-core systems. In: Proceeding of the IPDPS, pp 1\u20138","DOI":"10.1109\/IPDPS.2008.4536131"},{"key":"9417_CR81","doi-asserted-by":"crossref","unstructured":"Zhu J, Nie Z, Liu X, Zhang B, Wen J-R (2009) StatSnowball: a statistical approach to extracting entity relationships. In: Proceeding of the WWW, p 101","DOI":"10.1145\/1526709.1526724"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-015-9417-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-015-9417-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-015-9417-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-015-9417-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T04:53:59Z","timestamp":1748753639000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-015-9417-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,19]]},"references-count":81,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,2]]}},"alternative-id":["9417"],"URL":"https:\/\/doi.org\/10.1007\/s10664-015-9417-1","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"type":"print","value":"1382-3256"},{"type":"electronic","value":"1573-7616"}],"subject":[],"published":{"date-parts":[[2016,1,19]]}}}