{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T03:54:39Z","timestamp":1760586879749,"version":"3.37.3"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,9,16]],"date-time":"2017-09-16T00:00:00Z","timestamp":1505520000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1007\/s10664-017-9547-8","type":"journal-article","created":{"date-parts":[[2017,9,16]],"date-time":"2017-09-16T11:47:11Z","timestamp":1505562431000},"page":"1313-1351","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Inference of development activities from interaction with uninstrumented applications"],"prefix":"10.1007","volume":"23","author":[{"given":"Lingfeng","family":"Bao","sequence":"first","affiliation":[]},{"given":"Zhenchang","family":"Xing","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6302-3256","authenticated-orcid":false,"given":"Xin","family":"Xia","sequence":"additional","affiliation":[]},{"given":"David","family":"Lo","sequence":"additional","affiliation":[]},{"given":"Ahmed E.","family":"Hassan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,16]]},"reference":[{"key":"9547_CR1","doi-asserted-by":"crossref","unstructured":"Anvik J, Hiew L, Murphy GC (2006) Who should fix this bug? In: Proceeding of the 28th international conference on software engineering (ICSE), pp 361\u2013371","DOI":"10.1145\/1134285.1134336"},{"key":"9547_CR2","doi-asserted-by":"crossref","unstructured":"Bao L, Ye D, Xing Z, Xia X (2015a) ActivitySpace: a remembrance framework to support interapplication information needs. In: Proceedings of 30th IEEE\/ACM international conference on automated software engineering (ASE), pp 864\u2013869","DOI":"10.1109\/ASE.2015.90"},{"key":"9547_CR3","doi-asserted-by":"crossref","unstructured":"Bao L, Xing Z, Wang X, Zhou B (2015b) Tracking and analyzing cross-cutting activities in developers\u2019 daily work. In: Proceedings of 30th IEEE\/ACM international conference on automated software engineering (ASE), pp 277\u2013282","DOI":"10.1109\/ASE.2015.43"},{"issue":"1","key":"9547_CR4","first-page":"134","volume":"22","author":"Lingfeng Bao","year":"2016","unstructured":"Bao L, Li J, Xing Z, Wang X, Xia X, Zhou B (2017) Extracting and analyzing time-series HCI data from screen-captured task videos. Empir Softw Eng 22(1):134\u2013174","journal-title":"Empirical Software Engineering"},{"key":"9547_CR5","doi-asserted-by":"crossref","unstructured":"Beller M, Gousios G, Panichella A, Zaidman A (2015) When, how, and why developers (do not) test in their IDEs. In: Proceedings of the 2015 10th joint meeting on foundations of software engineering (FSE), pp 179\u2013190","DOI":"10.1145\/2786805.2786843"},{"issue":"1","key":"9547_CR6","first-page":"39","volume":"22","author":"AL Berger","year":"1996","unstructured":"Berger AL, Pietra VJD, Pietra SAD (1996) A maximum entropy approach to natural language processing. Comput Linguist 22(1):39\u201371","journal-title":"Comput Linguist"},{"key":"9547_CR7","unstructured":"Chang T-H, Yeh T, Miller R (2011) Associating the visual representation of user interfaces with their internal structures and metadata. In: Proceedings of the 24th annual ACM symposium on user interface software and technology (UIST), pp 245\u2013256"},{"issue":"3","key":"9547_CR8","first-page":"159","volume":"31","author":"ID Coman","year":"2009","unstructured":"Coman ID, Sillitti A (2009) Automated segmentation of development sessions into task-related subsections. Int J Comput Appl 31(3):159\u2013166","journal-title":"Int J Comput Appl"},{"issue":"1","key":"9547_CR9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1006\/ijhc.2000.0423","volume":"54","author":"CL Corritore","year":"2001","unstructured":"Corritore CL, Wiedenbeck S (2001) An exploratory study of program comprehension strategies of procedural and object-oriented programmers. Int J Hum Comput Stud 54(1):1\u201323","journal-title":"Int J Hum Comput Stud"},{"key":"9547_CR10","doi-asserted-by":"crossref","unstructured":"Dekel U, Herbsleb JD (2009) Reading the documentation of invoked API functions in program comprehension. In: Proceedings of 17th IEEE international conference on program comprehension (ICPC), pp 168\u2013177","DOI":"10.1109\/ICPC.2009.5090040"},{"key":"9547_CR11","doi-asserted-by":"crossref","unstructured":"Dereszynski EW, Hostetler J, Fern A, Dietterich TG, Hoang T-T, Udarbe M (2011) Learning probabilistic behavior models in real-time strategy games. In: AAAI conference on artificial intelligence and interactive digital entertainment","DOI":"10.1609\/aiide.v7i1.12433"},{"key":"9547_CR12","doi-asserted-by":"crossref","unstructured":"Dewan P, Agarwal P, Shroff G, Hegde R (2009) Distributed side-by-side programming. In: Proceedings of the 2009 ICSE workshop on cooperative and human aspects on software engineering, pp 48\u201355","DOI":"10.1109\/CHASE.2009.5071410"},{"key":"9547_CR13","doi-asserted-by":"crossref","unstructured":"Duala-Ekoko E, Robillard MP (2012) Asking and answering questions about unfamiliar APIs: an exploratory study. In: Proceedings of 34th international conference on software engineering (ICSE), pp 266\u2013276","DOI":"10.1109\/ICSE.2012.6227187"},{"key":"9547_CR14","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511790492","volume-title":"Biological sequence analysis: probabilistic models of proteins and nucleic acids","author":"R Durbin","year":"1998","unstructured":"Durbin R, Eddy SR, Krogh A, Mitchison G (1998) Biological sequence analysis: probabilistic models of proteins and nucleic acids. Cambridge University Press, Cambridge"},{"key":"9547_CR15","unstructured":"Fisher C (1991) Protocol analyst\u2019s workbench: design and evaluation of computer-aided protocol analysis, PhD thesis, Carnegie-Mellon University, Pittsburgh"},{"issue":"5","key":"9547_CR16","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1037\/h0031619","volume":"76","author":"JL Fleiss","year":"1971","unstructured":"Fleiss JL (1971) Measuring nominal scale agreement among many raters. Psychol Bull 76(5):378","journal-title":"Psychol Bull"},{"key":"9547_CR17","doi-asserted-by":"crossref","unstructured":"Fritz T, Shepherd DC, Kevic K, Snipes W, Br\u00e4unlich C (2014) Developers\u2019 code context models for change tasks. In: Proceedings of the 22nd ACM SIGSOFT international symposium on foundations of software engineering (FSE), pp 7\u201318","DOI":"10.1145\/2635868.2635905"},{"key":"9547_CR18","doi-asserted-by":"crossref","unstructured":"Gong W, Lim E-P, Achananuparp P, Zhu F, Lo D, Chua FCT (2012) In-game action list segmentation and labeling in real-time strategy games. In: Proceedings of IEEE conference on computational intelligence and games (CIG), pp 147\u2013154","DOI":"10.1109\/CIG.2012.6374150"},{"key":"9547_CR19","doi-asserted-by":"crossref","unstructured":"Hundhausen CD, Brown JL, Farley S, Skarpas D (2006) A methodology for analyzing the temporal evolution of novice programs based on semantic components. In: Proceedings of the ACM international computing education research workshop, pp 59\u201371","DOI":"10.1145\/1151588.1151599"},{"key":"9547_CR20","doi-asserted-by":"crossref","unstructured":"Hurst A, Hudson SE, Mankoff J (2010) Automatically identifying targets users interact with during real world tasks. In: Proceedings of the 15th international conference on intelligent user interfaces (IUI), pp 11\u201320","DOI":"10.1145\/1719970.1719973"},{"issue":"1","key":"9547_CR21","first-page":"41","volume":"16","author":"AJ Ko","year":"2005","unstructured":"Ko AJ, Myers BA (2005) A framework and methodology for studying the causes of software errors in programming systems. J Vis Lang Comput 16(1):41\u201384","journal-title":"J Vis Lang Comput"},{"issue":"12","key":"9547_CR22","doi-asserted-by":"crossref","first-page":"971","DOI":"10.1109\/TSE.2006.116","volume":"32","author":"AJ Ko","year":"2006","unstructured":"Ko AJ, Myers B, Coblenz MJ, Aung HH et al (2006) An exploratory study of how developers seek, relate, and collect relevant information during software maintenance tasks. IEEE Trans Softw Eng 32(12):971\u2013987","journal-title":"IEEE Trans Softw Eng"},{"issue":"4","key":"9547_CR23","first-page":"1","volume":"30","author":"A. G\u00fcnes Koru","year":"2005","unstructured":"Koru AG, Ozok A, Norcio AF (2005) The effect of human memory organization on code reviews under different single and pair code reviewing scenarios. In: ACM SIGSOFT software engineering notes, vol 30, pp 1\u20133","journal-title":"ACM SIGSOFT Software Engineering Notes"},{"key":"9547_CR24","unstructured":"Lafferty J, McCallum A, Pereira F et al (2001) Conditional random fields: probabilistic models for segmenting and labeling sequence data. In: Proceedings of the eighteenth international conference on machine learning (ICML), vol 1, pp 282\u2013289"},{"key":"9547_CR25","volume-title":"Fundamentals of speech recognition","author":"R Lawrence","year":"2008","unstructured":"Lawrence R (2008) Fundamentals of speech recognition. Pearson Education, India"},{"key":"9547_CR26","doi-asserted-by":"crossref","unstructured":"Lawrance J, Bellamy R, Burnett M, Rector K (2008) Using information scent to model the dynamic foraging behavior of programmers in maintenance tasks. In: Proceedings of the SIGCHI conference on human factors in computing systems (CHI), pp 1323\u20131332","DOI":"10.1145\/1357054.1357261"},{"issue":"2","key":"9547_CR27","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1109\/TSE.2010.111","volume":"39","author":"J Lawrance","year":"2013","unstructured":"Lawrance J, Bogart C, Burnett M, Bellamy R, Rector K, Fleming SD (2013) How programmers debug, revisited: an information foraging theory perspective. IEEE Trans Softw Eng 39(2):197\u2013215","journal-title":"IEEE Trans Softw Eng"},{"key":"9547_CR28","unstructured":"Le T-DB, Lo D (2013) Will fault localization work for these failures? An automated approach to predict effectiveness of fault localization tools. In: Proceedings of IEEE international conference on software maintenance (ICSM), pp 310\u2013319"},{"key":"9547_CR29","doi-asserted-by":"crossref","unstructured":"Li H, Xing Z, Peng X, Zhao W (2013) What help do developers seek, when and how? In: Proceedings of 20th working conference on reverse engineering (WCRE), pp 142\u2013151","DOI":"10.1109\/WCRE.2013.6671289"},{"key":"9547_CR30","doi-asserted-by":"crossref","unstructured":"Maiga A, Ali N, Bhattacharya N, Saban\u00e9 A, Gu\u00e9h\u00e9neuc Y-G, Antoniol G, A\u00efmeur E (2012) Support vector machines for anti-pattern detection. In: Proceedings of the 27th IEEE\/ACM international conference on automated software engineering (ASE), pp 278\u2013281","DOI":"10.1145\/2351676.2351723"},{"key":"9547_CR31","unstructured":"McCallum A, Freitag D, Pereira FC (2000) Maximum entropy Markov models for information extraction and segmentation. In: Proceedings of the seventeenth international conference on machine learning, vol 17, pp 591\u2013598"},{"key":"9547_CR32","doi-asserted-by":"crossref","unstructured":"Minelli R, Mocci A, Lanza M (2015) I know what you did last summer: an investigation of how developers spend their time. In: Proceedings of IEEE international conference on program comprehension (ICPC), pp 25\u201335","DOI":"10.1109\/ICPC.2015.12"},{"key":"9547_CR33","doi-asserted-by":"crossref","unstructured":"Nguyen AT, Nguyen TT, Nguyen HA, Nguyen TN (2012) Multi-layered approach for recovering links between bug reports and fixes. In: Proceedings of the 20th ACM SIGSOFT international symposium on foundations of software engineering (FSE), pp 63\u201373","DOI":"10.1145\/2393596.2393671"},{"key":"9547_CR34","doi-asserted-by":"crossref","unstructured":"Pinto D, McCallum A, Wei X, Croft WB (2003) Table extraction using conditional random fields. In: Proceedings of the 26th annual international ACM SIGIR conference on research and development in information retrieval, pp 235\u2013242","DOI":"10.1145\/860435.860479"},{"key":"9547_CR35","doi-asserted-by":"crossref","unstructured":"Piorkowski D, Fleming SD, Scaffidi C, John L, Bogart C, John BE, Burnett M, Bellamy R (2011) Modeling programmer navigation: a head-to-head empirical evaluation of predictive models. In: Proceedings of IEEE symposium on visual languages and human-centric computing (VL\/HCC), pp 109\u2013116","DOI":"10.1109\/VLHCC.2011.6070387"},{"issue":"2","key":"9547_CR36","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1109\/5.18626","volume":"77","author":"LR Rabiner","year":"1989","unstructured":"Rabiner LR (1989) A tutorial on hidden markov models and selected applications in speech recognition. Proc IEEE 77(2):257\u2013286","journal-title":"Proc IEEE"},{"issue":"12","key":"9547_CR37","doi-asserted-by":"crossref","first-page":"889","DOI":"10.1109\/TSE.2004.101","volume":"30","author":"MP Robillard","year":"2004","unstructured":"Robillard MP, Coelho W, Murphy GC (2004) How effective developers investigate source code: an exploratory study. IEEE Trans Softw Eng 30(12):889\u2013903","journal-title":"IEEE Trans Softw Eng"},{"key":"9547_CR38","volume-title":"Observing behavior: theory and applications in mental retardation","author":"GP Sackett","year":"1978","unstructured":"Sackett GP (1978) Observing behavior: theory and applications in mental retardation. University Park Press, Baltimore"},{"key":"9547_CR39","doi-asserted-by":"crossref","unstructured":"Safer I, Murphy GC (2007) Comparing episodic and semantic interfaces for task boundary identification. In: Proceedings of conference of the centre for advanced studies on collaborative research, pp 229\u2013243","DOI":"10.1145\/1321211.1321235"},{"issue":"3\u20134","key":"9547_CR40","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1207\/s15327051hci0903&4_2","volume":"9","author":"PM Sanderson","year":"1994","unstructured":"Sanderson PM, Fisher C (1994) Exploratory sequential data analysis: foundations. Hum Comput Interact 9(3\u20134):251\u2013317","journal-title":"Hum Comput Interact"},{"key":"9547_CR41","doi-asserted-by":"crossref","unstructured":"Sillito J, De Voider K, Fisher B, Murphy G (2005) Managing software change tasks: an exploratory study. In: International symposium on empirical software engineering, p 10","DOI":"10.1109\/ISESE.2005.1541811"},{"key":"9547_CR42","unstructured":"Siochi AC, Hix D (1991) A study of computer-supported user interface evaluation using maximal repeating pattern analysis. In: Proceedings of the SIGCHI conference on human factors in computing systems (CHI), pp 301\u2013305"},{"key":"9547_CR43","doi-asserted-by":"crossref","unstructured":"Sun C, Lo D, Wang X, Jiang J, Khoo S-C (2010) A discriminative model approach for accurate duplicate bug report retrieval. In: Proceedings of the 32nd ACM\/IEEE international conference on software engineering (ICSE), pp 45\u201354","DOI":"10.1145\/1806799.1806811"},{"key":"9547_CR44","doi-asserted-by":"crossref","unstructured":"Thung F, Lo D, Jiang L (2012) Automatic defect categorization. In: Proceedings of 19th working conference on reverse engineering (WCRE), pp 205\u2013214","DOI":"10.1109\/WCRE.2012.30"},{"key":"9547_CR45","doi-asserted-by":"crossref","unstructured":"Tian Y, Sun C, Lo D (2012) Improved duplicate bug report identification. In: Proceedings of 16th European conference on software maintenance and reengineering (CSMR), pp 385\u2013390","DOI":"10.1109\/CSMR.2012.48"},{"key":"9547_CR46","doi-asserted-by":"crossref","unstructured":"Vakilian M, Chen N, Negara S, Rajkumar BA, Bailey BP, Johnson RE (2012) Use, disuse, and misuse of automated refactorings. In: Proceedings of 34th international conference on software engineering (ICSE), pp 233\u2013243","DOI":"10.1109\/ICSE.2012.6227190"},{"key":"9547_CR47","doi-asserted-by":"crossref","unstructured":"von Mayrhauser A, Vans AM (1997) Program understanding behavior during debugging of large scale software. In: Proceedings of the seventh workshop on empirical studies of programmers, pp 157\u2013179","DOI":"10.1145\/266399.266414"},{"key":"9547_CR48","doi-asserted-by":"crossref","unstructured":"Wang J, Peng X, Xing Z, Zhao W (2011) An exploratory study of feature location process: distinct phases, recurring patterns, and elementary actions. In: Proceedings of 27th IEEE international conference on software maintenance (ICSM), pp 213\u2013222","DOI":"10.1109\/ICSM.2011.6080788"},{"issue":"6","key":"9547_CR49","doi-asserted-by":"crossref","first-page":"80","DOI":"10.2307\/3001968","volume":"1","author":"F Wilcoxon","year":"1945","unstructured":"Wilcoxon F (1945) Individual comparisons by ranking methods. Biom Bull 1 (6):80\u201383","journal-title":"Biom Bull"},{"key":"9547_CR50","doi-asserted-by":"crossref","unstructured":"Wu R, Zhang H, Kim S, Cheung S-C (2011) Relink: recovering links between bugs and changes. In: Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on foundations of software engineering (ESEC\/FSE)","DOI":"10.1145\/2025113.2025120"},{"key":"9547_CR51","unstructured":"Xia X, Lo D, Wang X, Yang X, Li S, Sun J (2013) A comparative study of supervised learning algorithms for re-opened bug prediction. In: Proceedings of 17th European conference on software maintenance and reengineering (CSMR)"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-017-9547-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-017-9547-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-017-9547-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T23:38:13Z","timestamp":1693006693000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-017-9547-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,16]]},"references-count":51,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["9547"],"URL":"https:\/\/doi.org\/10.1007\/s10664-017-9547-8","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"type":"print","value":"1382-3256"},{"type":"electronic","value":"1573-7616"}],"subject":[],"published":{"date-parts":[[2017,9,16]]},"assertion":[{"value":"16 September 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}