{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T00:11:36Z","timestamp":1769731896896,"version":"3.49.0"},"reference-count":80,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2019,1,11]],"date-time":"2019-01-11T00:00:00Z","timestamp":1547164800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,1,11]],"date-time":"2019-01-11T00:00:00Z","timestamp":1547164800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1526118"],"award-info":[{"award-number":["1526118"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1007\/s10664-018-9672-z","type":"journal-article","created":{"date-parts":[[2019,1,11]],"date-time":"2019-01-11T02:26:38Z","timestamp":1547173598000},"page":"2947-3007","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":46,"title":["Using bug descriptions to reformulate queries during text-retrieval-based bug localization"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2838-685X","authenticated-orcid":false,"given":"Oscar","family":"Chaparro","sequence":"first","affiliation":[]},{"given":"Juan Manuel","family":"Florez","sequence":"additional","affiliation":[]},{"given":"Andrian","family":"Marcus","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,11]]},"reference":[{"key":"9672_CR1","doi-asserted-by":"crossref","unstructured":"Ali N, Sabane A, Gueheneuc Y-G, Antoniol G (2012) Improving bug location using binary class relationships. In: Proceedings of the international working conference on source code analysis and manipulation (SCAM\u201912), pp 174\u2013183","DOI":"10.1109\/SCAM.2012.26"},{"issue":"4-5","key":"9672_CR2","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1007\/s10664-010-9144-6","volume":"17","author":"SK Bajracharya","year":"2012","unstructured":"Bajracharya SK, Lopes CV (2012) Analyzing and mining a code search engine usage log. Empir Softw Eng 17(4-5):424\u2013466","journal-title":"Empir Softw Eng"},{"key":"9672_CR3","unstructured":"Bassett BR, Kraft NA (2013) Structural information based term weighting in text retrieval for feature location. In: Proceedings of the international conference on program comprehension (ICPC\u201913), pp 133\u2013141"},{"issue":"1","key":"9672_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2071389.2071390","volume":"44","author":"C Carpineto","year":"2012","unstructured":"Carpineto C, Romano G (2012) A survey of automatic query expansion in information retrieval. Comput Surv 44(1):1","journal-title":"Comput Surv"},{"key":"9672_CR5","doi-asserted-by":"crossref","unstructured":"Chaparro O, Marcus A (2016) On the reduction of verbose queries in text retrieval based software maintenance. In: Proceedings of the international conference on software engineering (ICSE\u201916), pp 716\u2013718","DOI":"10.1145\/2889160.2892647"},{"key":"9672_CR6","doi-asserted-by":"crossref","unstructured":"Chaparro O, Florez JM, Marcus A (2017a) Using observed behavior to reformulate queries during text retrieval-based bug localization. In: Proceedings of the 33rd international conference on software maintenance and evolution (ICSME\u201917), pp 376\u2013387","DOI":"10.1109\/ICSME.2017.100"},{"key":"9672_CR7","doi-asserted-by":"crossref","unstructured":"Chaparro O, Lu J, Zampetti F, Moreno L, Di Penta M, Marcus A, Bavota G, Ng V (2017b) Detecting missing information in bug descriptions. In: Proceedings of the joint meeting on foundations of software engineering (ESEC\/FSE\u201917), pp 396\u2013407","DOI":"10.1145\/3106237.3106285"},{"key":"9672_CR8","unstructured":"Chaparro O, Florez JM, Marcus A (2018) Replication package. \nhttps:\/\/tinyurl.com\/y7bzqnwc"},{"issue":"2","key":"9672_CR9","doi-asserted-by":"publisher","first-page":"724","DOI":"10.1007\/s10664-015-9373-9","volume":"21","author":"K Damevski","year":"2016","unstructured":"Damevski K, Shepherd D, Pollock L (2016) A field study of how developers locate features in source code. Empir Softw Eng 21(2):724\u2013747","journal-title":"Empir Softw Eng"},{"key":"9672_CR10","doi-asserted-by":"crossref","unstructured":"Dao T, Zhang L, Na M (2017) How does execution information help with information-retrieval based bug localization? In: Proceedings of the international conference on program comprehension (ICPC\u201917), pp 241\u2013250","DOI":"10.1109\/ICPC.2017.29"},{"key":"9672_CR11","doi-asserted-by":"crossref","unstructured":"Davies S, Roper M, Wood M (2012) Using bug report similarity to enhance bug localisation. In: Proceedings of the working conference on reverse engineering (WCRE\u201912), pp 125\u2013134","DOI":"10.1109\/WCRE.2012.22"},{"key":"9672_CR12","doi-asserted-by":"crossref","unstructured":"Davies S, Roper M (2014) What\u2019s in a bug report? In: Proceedings of the international, symposium on empirical software engineering and measurement (ESEM\u201914), pp 26:1\u201326:10","DOI":"10.1145\/2652524.2652541"},{"key":"9672_CR13","doi-asserted-by":"crossref","unstructured":"De Lucia A, Marcus A, Oliveto R, Poshyvanyk D (2012) Information retrieval methods for automated traceability recovery. In: Cleland-Huang J, Gotel O, Zisman A (eds) Software and systems traceability. Springer, pp 71\u201398","DOI":"10.1007\/978-1-4471-2239-5_4"},{"key":"9672_CR14","doi-asserted-by":"crossref","unstructured":"Dietrich T, Cleland-Huang J, Shin Y (2013) Learning effective query transformations for enhanced requirements trace retrieval. In: Proceedings of the international conference on automated software engineering (ASE\u201913), pp 586\u2013591","DOI":"10.1109\/ASE.2013.6693117"},{"key":"9672_CR15","doi-asserted-by":"crossref","unstructured":"Dilshener T, Wermelinger M, Yu Y (2016) Locating bugs without looking back. In: Proceedings of the international conference on mining software repositories (MSR\u201916), pp 286\u2013290","DOI":"10.1145\/2901739.2901775"},{"issue":"1","key":"9672_CR16","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1002\/smr.567","volume":"25","author":"B Dit","year":"2012","unstructured":"Dit B, Revelle M, Gethers M, Poshyvanyk D (2012) Feature location in source code A taxonomy and survey. J Softw Evol Process 25(1):53\u201395","journal-title":"J Softw Evol Process"},{"issue":"1","key":"9672_CR17","doi-asserted-by":"publisher","first-page":"e1892","DOI":"10.1002\/smr.1892","volume":"30","author":"BP Eddy","year":"2018","unstructured":"Eddy BP, Kraft NA, Gray J (2018) Impact of structural weighting on a latent dirichlet allocation\u2013based feature location technique. J Softw Evol Process 30(1):e1892","journal-title":"J Softw Evol Process"},{"key":"9672_CR18","doi-asserted-by":"crossref","unstructured":"Gay G, Haiduc S, Marcus A, Menzies T (2009) On the use of relevance feedback in ir-based concept location. In: Proceedings of the international conference on software maintenance (ICSM\u201909), pp 351\u2013360","DOI":"10.1109\/ICSM.2009.5306315"},{"key":"9672_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jvlc.2016.07.002","volume":"39","author":"X Ge","year":"2017","unstructured":"Ge X, Shepherd DC, Damevski K, Murphy-Hill E (2017) Design and evaluation of a multi-recommendation system for local code search. J Vis Lang Comput 39:1\u20139","journal-title":"J Vis Lang Comput"},{"key":"9672_CR20","doi-asserted-by":"crossref","unstructured":"Gibiec M, Czauderna A, Cleland-Huang J (2010) Towards mining replacement queries for hard-to-retrieve traces. In: Proceedings of the international conference on automated software engineering (ASE\u201910), pp 245\u2013254","DOI":"10.1145\/1858996.1859046"},{"issue":"3","key":"9672_CR21","doi-asserted-by":"publisher","first-page":"1103","DOI":"10.1007\/s10664-016-9479-8","volume":"22","author":"J Guo","year":"2017","unstructured":"Guo J, Gibiec M, Cleland-Huang J (2017) Tackling the term-mismatch problem in automated trace retrieval. Empir Softw Eng 22(3):1103\u20131142","journal-title":"Empir Softw Eng"},{"key":"9672_CR22","doi-asserted-by":"crossref","unstructured":"Haiduc S, Bavota G, Marcus A, Oliveto R, De Lucia A, Menzies Tim (2013) Automatic query reformulations for text retrieval in software engineering. In: Proceedings of the international conference on software engineering (ICSE\u201913), pp 842\u2013851","DOI":"10.1109\/ICSE.2013.6606630"},{"key":"9672_CR23","unstructured":"Hatcher E, Gospodnetic O (2004) Lucene in action. Manning Publications"},{"key":"9672_CR24","doi-asserted-by":"crossref","unstructured":"Hill E, Roldan-Vega M, Fails JA, Mallet G (2014) Nl-based query refinement and contextualized code search results: A user study. In: Proceedings of the conference on software maintenance, reengineering, and reverse engineering (CSMR-WCRE\u201914), pp 34\u201343","DOI":"10.1109\/CSMR-WCRE.2014.6747190"},{"key":"9672_CR25","doi-asserted-by":"crossref","unstructured":"Hoang TV, Oentaryo RJ, Le TB, Lo D (2018) Network-clustered multi-modal bug localization. IEEE Transactions on Software Engineering. (to appear)","DOI":"10.1109\/TSE.2018.2810892"},{"key":"9672_CR26","volume-title":"Nonparametric statistical methods, vol 751","author":"M Hollander","year":"2013","unstructured":"Hollander M, Wolfe DA, Chicken E (2013) Nonparametric statistical methods, vol 751. Wiley, New York"},{"key":"9672_CR27","doi-asserted-by":"crossref","unstructured":"Just R, Jalali D, Ernst MD (2014) Defects4j: a database of existing faults to enable controlled testing studies for java programs. In: Proceedings of the international symposium on software testing and analysis (ISSTA\u201914). ACM, pp 437\u2013440","DOI":"10.1145\/2610384.2628055"},{"key":"9672_CR28","doi-asserted-by":"crossref","unstructured":"Kevic K, Fritz T (2014) Automatic search term identification for change tasks. In: Proceedings of the international conference on software engineering (ICSE\u201914), pp 468\u2013471","DOI":"10.1145\/2591062.2591117"},{"key":"9672_CR29","doi-asserted-by":"crossref","unstructured":"Lemos OAL, de Paula AC, Sajnani H, Lopes CV (2015) Can the use of types and query expansion help improve large-scale code search? In: Proceedings of the international working conference on source code analysis and manipulation (SCAM\u201915), pp 41\u201350","DOI":"10.1109\/SCAM.2015.7335400"},{"key":"9672_CR30","unstructured":"Le T-DB, Thung F, Lo D (2014) Predicting effectiveness of ir-based bug localization techniques. In: Proceedings of the 25th international symposium on software reliability engineering (ISSRE\u201914), pp 335\u2013345"},{"key":"9672_CR31","unstructured":"Le T-DB, Oentaryo RJ, Oentaryo RJ, Lo D (2015) Information retrieval and spectrum based bug localization: better together. In: Proceedings of the joint meeting on foundations of software engineering (ESEC\/FSE\u201915), pp 579\u2013590"},{"key":"9672_CR32","doi-asserted-by":"crossref","unstructured":"Lee J, Kim D, Tegawend\u00e9 F, Jung Bissyand\u00e9 W, Le Traon Y (2018) Bench4bl: reproducibility study on the performance of ir-based bug localization. In: Proceedings of the 27th international symposium on software testing and analysis (ISSTA\u201918) ISSTA 2018, pp 61\u201372","DOI":"10.1145\/3213846.3213856"},{"key":"9672_CR33","doi-asserted-by":"crossref","unstructured":"Li Z, Wang T, Zhang Y, Zhan Y, Yin G (2016) Query reformulation by leveraging crowd wisdom for scenario-based software search. In: Proceedings of the Asia-Pacific symposium on internetware (Internetware\u201916), pp 36\u201344","DOI":"10.1145\/2993717.2993723"},{"key":"9672_CR34","unstructured":"Lu XA, Keefer RB (1995) Query expansion\/reduction and its impact on retrieval effectiveness. NIST Special Publication, pp 231\u2013231"},{"key":"9672_CR35","unstructured":"Lucene Apache (2017) \nhttps:\/\/lucene.apache.org\/"},{"key":"9672_CR36","doi-asserted-by":"crossref","unstructured":"Lv F, Zhang H, Lou J-G, Wang S, Zhang D, Zhao J (2015) Codehow: effective code search based on api understanding and extended boolean model. In: Proceedings of the international conference on automated software engineering (ASE\u201915), pp 260\u2013270","DOI":"10.1109\/ASE.2015.42"},{"key":"9672_CR37","doi-asserted-by":"crossref","unstructured":"Manning CD, Surdeanu M, Bauer J, Finkel JR, Bethard S, McClosky D (2014) The stanford corenlp natural language processing toolkit. In: Proceedings of the annual meeting of the association for computational linguistics (ACL\u201914), pp 55\u201360","DOI":"10.3115\/v1\/P14-5010"},{"key":"9672_CR38","doi-asserted-by":"crossref","unstructured":"Marcus A, Sergeyev A, Rajlich V, Maletic JI (2004) An information retrieval approach to concept location in source code. In: Proceedings of the working conference on reverse engineering (WCRE\u201904), pp 214\u2013223","DOI":"10.1109\/WCRE.2004.10"},{"key":"9672_CR39","doi-asserted-by":"crossref","unstructured":"Marcus A, Haiduc S (2013) Text retrieval approaches for concept location in source code. In: Software Engineering: International Summer Schools, ISSSE 2009-2011, Salerno, Italy. Revised Tutorial Lectures, volume 7171 of Lecture Notes in Computer Science. Springer, pp 126\u2013158","DOI":"10.1007\/978-3-642-36054-1_5"},{"issue":"1","key":"9672_CR40","first-page":"3:1","volume":"26","author":"C Mills","year":"2017","unstructured":"Mills C, Bavota G, Haiduc S, Oliveto R, Marcus A, De Lucia A (2017) Predicting query quality for applications of text retrieval to software engineering tasks. Trans Softw Eng Methodol 26(1):3:1\u20133:45","journal-title":"Trans Softw Eng Methodol"},{"key":"9672_CR41","doi-asserted-by":"crossref","unstructured":"Mills C, Pantiuchina J, Parra E, Bavota G, Haiduc S (2018) Are bug reports enough for text retrieval-based bug localization? In: Proceedings of the 34th IEEE international conference on software maintenance and evolution (ICSME\u201918), pp 410\u2013421","DOI":"10.1109\/ICSME.2018.00046"},{"key":"9672_CR42","doi-asserted-by":"crossref","unstructured":"Moreno L, Treadway JJ, Marcus A, Shen W (2014) On the use of stack traces to improve text retrieval-based bug localization. In: Proceedings of the conference on software maintenance and evolution (ICSME\u201914), pp 151\u2013160","DOI":"10.1109\/ICSME.2014.37"},{"key":"9672_CR43","doi-asserted-by":"crossref","unstructured":"Nguyen AT, Nguyen TT, Al-Kofahi J, Nguyen HV, Nguyen TN (2011) A topic-based approach for narrowing the search space of buggy files from a bug report. In: Proceedings of the international conference on automated software engineering (ASE\u201911), pp 263\u2013272","DOI":"10.1109\/ASE.2011.6100062"},{"key":"9672_CR44","doi-asserted-by":"crossref","unstructured":"Nichols BD (2010) Augmented bug localization using past bug information. In: Proceedings of the annual southeast regional conference (ACMSE\u201910), pp 1\u20136","DOI":"10.1145\/1900008.1900090"},{"issue":"5","key":"9672_CR45","doi-asserted-by":"publisher","first-page":"771","DOI":"10.1109\/TSC.2016.2560165","volume":"9","author":"L Nie","year":"2016","unstructured":"Nie L, He J, Ren Z, Sun Z, Li X (2016) Query expansion based on crowd knowledge for code search. IEEE Trans Serv Comput 9(5):771\u2013783","journal-title":"IEEE Trans Serv Comput"},{"key":"9672_CR46","doi-asserted-by":"crossref","unstructured":"Ponzanelli L, Mocci A, Lanza M (2015) Stormed: stack overflow ready made data. In: Proceedings of 12th working conference on mining software repositories (MSR\u201915), pp 474\u2013477","DOI":"10.1109\/MSR.2015.67"},{"issue":"3","key":"9672_CR47","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1108\/eb046814","volume":"14","author":"MF Porter","year":"1980","unstructured":"Porter MF (1980) An algorithm for suffix stripping. Program 14(3):130\u2013137","journal-title":"Program"},{"key":"9672_CR48","unstructured":"Rahman MM, Roy CK (2016) Quickar: automatic query reformulation for concept location using crowdsourced knowledge. In: Proceedings of the international conference on automated software engineering (ASE\u201916), pp 220\u2013225"},{"key":"9672_CR49","doi-asserted-by":"crossref","unstructured":"Rahman MM, Roy CK (2017a) Strict: information retrieval based search term identification for concept location. In: Proceeding of the conference on software analysis, evolution, and reengineering (SANER\u201917), pp 79\u201390","DOI":"10.1109\/SANER.2017.7884611"},{"key":"9672_CR50","doi-asserted-by":"crossref","unstructured":"Rahman MM, Roy CK (2017b) Improved query reformulation for concept location using coderank and document structures. In: Proceedings of the international conference on automated software engineering (ASE\u201917). IEEE Press, pp 428\u2013439","DOI":"10.7287\/peerj.preprints.3186"},{"key":"9672_CR51","doi-asserted-by":"crossref","unstructured":"Rahman Md M, Barson J, Paul S, Kayani J, Lois FA, Quezada SF, Parnin C, Stolee KT, Ray B (2018a) Evaluating how developers use general-purpose web-search for code retrieval. In: Proceedings of the 15th international conference on mining software repositories (MSR\u201918), pp 465\u2013475","DOI":"10.1145\/3196398.3196425"},{"key":"9672_CR52","doi-asserted-by":"crossref","unstructured":"Rahman MM, Roy CK (2018b) Improving ir-based bug localization with context-aware query reformulation. In: Proceedings of the 26th joint meeting on foundations of software engineering (ESEC\/FSE\u201918). (to appear)","DOI":"10.1145\/3236024.3236065"},{"key":"9672_CR53","doi-asserted-by":"crossref","unstructured":"Rao S, Kak A (2011) Retrieval from software libraries for bug localization: a comparative study of generic and composite text models. In: Proceedings of the working conference on mining software repositories (MSR\u201911), pp 43\u201352","DOI":"10.1145\/1985441.1985451"},{"key":"9672_CR54","doi-asserted-by":"crossref","unstructured":"Rath M, Lo D, M\u00e4der P (2018) Analyzing requirements and traceability information to improve bug localization. In: Proceedings of the working conference on mining software repositories (MSR\u201918). ACM","DOI":"10.1145\/3196398.3196415"},{"key":"9672_CR55","doi-asserted-by":"crossref","unstructured":"Roldan-Vega M, Mallet G, Hill E, Fails JA (2013) Conquer: a tool for nl-based query refinement and contextualizing code search results. In: Proceedings of the international conference on software maintenance (ICSM\u201913), pp 512\u2013515","DOI":"10.1109\/ICSM.2013.84"},{"key":"9672_CR56","doi-asserted-by":"crossref","unstructured":"Saha RK, Lease M, Khurshid S, Perry DE (2013) Improving bug localization using structured information retrieval. In: Proceedings of the international conference on automated software engineering (ASE\u201913), pp 345\u2013355","DOI":"10.1109\/ASE.2013.6693093"},{"issue":"11","key":"9672_CR57","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1145\/361219.361220","volume":"18","author":"G Salton","year":"1975","unstructured":"Salton G, Wong A, Yang CS (1975) A vector space model for automatic indexing. Commun ACM 18(11):613\u2013620","journal-title":"Commun ACM"},{"issue":"4","key":"9672_CR58","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1109\/32.799955","volume":"25","author":"CB Seaman","year":"1999","unstructured":"Seaman CB (1999) Qualitative methods in empirical studies of software engineering. IEEE Trans Softw Eng 25(4):557\u2013572","journal-title":"IEEE Trans Softw Eng"},{"key":"9672_CR59","doi-asserted-by":"crossref","unstructured":"Shepherd D, Fry ZP, Hill E, Pollock L, Vijay-Shanker K (2007) Using natural language program analysis to locate and understand action-oriented concerns. In: Proceedings of the international conference on aspect-oriented software development (AOSD\u201907), pp 212\u2013224","DOI":"10.1145\/1218563.1218587"},{"key":"9672_CR60","doi-asserted-by":"publisher","first-page":"636","DOI":"10.1016\/j.asoc.2017.10.048","volume":"62","author":"Z Shi","year":"2018","unstructured":"Shi Z, Keung J, Bennin KE, Zhang X (2018) Comparing learning to rank techniques in hybrid bug localization. Appl Soft Comput 62:636\u2013648","journal-title":"Appl Soft Comput"},{"issue":"1","key":"9672_CR61","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1145\/2063239.2063243","volume":"21","author":"SE Sim","year":"2011","unstructured":"Sim SE, Umarji M, Ratanotayanon S, Lopes CV (2011) How well do search engines support code retrieval on the web? ACM Trans Softw Eng Methodol 21(1):4","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"9672_CR62","doi-asserted-by":"crossref","unstructured":"Sisman B, Kak AC (2012) Incorporating version histories in information retrieval based bug localization. In: Proceedings of the working conference on mining software repositories (MSR\u201912), pp 50\u201359","DOI":"10.1109\/MSR.2012.6224299"},{"key":"9672_CR63","doi-asserted-by":"crossref","unstructured":"Sisman B, Kak AC (2013) Assisting code search with automatic query reformulation for bug localization. In: Proceedings of the working conference on mining software repositories (MSR\u201913), pp 309\u2013318","DOI":"10.1109\/MSR.2013.6624044"},{"issue":"1","key":"9672_CR64","doi-asserted-by":"publisher","first-page":"e1805","DOI":"10.1002\/smr.1805","volume":"29","author":"B Sisman","year":"2016","unstructured":"Sisman B, Akbar SA, Kak AC (2016) Exploiting spatial code proximity and order for improved source code retrieval for bug localization. J Softw Evol Process 29 (1):e1805","journal-title":"J Softw Evol Process"},{"key":"9672_CR65","doi-asserted-by":"crossref","unstructured":"Starke J, Luce C, Sillito J (2009) Searching and skimming: an exploratory study. In: Proceedings of the international conference on software maintenance (ICSM\u201909), pp 157\u2013166","DOI":"10.1109\/ICSM.2009.5306335"},{"key":"9672_CR66","doi-asserted-by":"crossref","unstructured":"Takahashi A, Sae-Lim N, Hayashi S, Motoshi S (2018) Preliminary study on using code smells to improve bug localization. In: Proceedings of the international conference on program comprehension (ICPC\u201918). ACM, p 4","DOI":"10.1145\/3196321.3196361"},{"key":"9672_CR67","doi-asserted-by":"crossref","unstructured":"Wang S, Lo D (2014) Version history, similar report, and structure: putting them together for improved bug localization. In: Proceedings of the 22nd international conference on program comprehension (ICPC\u201914), pp 53\u201363","DOI":"10.1145\/2597008.2597148"},{"key":"9672_CR68","doi-asserted-by":"crossref","unstructured":"Wang S, Lo D, Lawall J (2014a) Compositional vector space models for improved bug localization. In: Proceedings of the conference on software maintenance and evolution (ICSME\u201914), pp 171\u2013180","DOI":"10.1109\/ICSME.2014.39"},{"key":"9672_CR69","doi-asserted-by":"crossref","unstructured":"Wang S, Lo D, Jiang L (2014b) Active code search: incorporating user feedback to improve code search relevance. In: Proceedings of the 29th ACM\/IEEE international conference on automated software engineering (ASE\u201914), pp 677\u2013682","DOI":"10.1145\/2642937.2642947"},{"issue":"10","key":"9672_CR70","doi-asserted-by":"publisher","first-page":"921","DOI":"10.1002\/smr.1801","volume":"28","author":"S Wang","year":"2016","unstructured":"Wang S, Lo D (2016) Amalgam+: composing rich information sources for accurate bug localization. J Softw Evol Process 28(10):921\u2013942","journal-title":"J Softw Evol Process"},{"key":"9672_CR71","doi-asserted-by":"crossref","unstructured":"Wen M, Wu R, Cheung S (2016) Locus: locating bugs from software changes. In: Proceedings of the 31st international conference on automated software engineering (ASE\u201916), pp 262\u2013273","DOI":"10.1145\/2970276.2970359"},{"key":"9672_CR72","unstructured":"Wong C-P, Xiong Y, Zhang H, Hao D, Lu Z, Mei H (2014) Boosting bug-report-oriented fault localization with segmentation and stack-trace analysis. In: Proceedings of the conference on software maintenance and evolution (ICSME\u201914), pp 181\u2013190"},{"key":"9672_CR73","doi-asserted-by":"crossref","unstructured":"Xiao Y, Keung J, Bennin KE, Mi Q (2018) Improving bug localization with word embedding and enhanced convolutional neural networks. Information and Software Technology","DOI":"10.1109\/APSEC.2017.40"},{"issue":"4","key":"9672_CR74","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1109\/TSE.2015.2479232","volume":"42","author":"X Ye","year":"2016","unstructured":"Ye X, Bunescu R, Liu C (2016a) Mapping bug reports to relevant files: a ranking model, a fine-grained benchmark, and feature evaluation. IEEE Trans Softw Eng 42(4):379\u2013402","journal-title":"IEEE Trans Softw Eng"},{"key":"9672_CR75","doi-asserted-by":"crossref","unstructured":"Ye X, Shen H, Ma X, Bunescu R, Liu C (2016b) From word embeddings to document similarities for improved information retrieval in software engineering. In: Proceedings of the international conference on software engineering (ICSE\u201916), pp 404\u2013415","DOI":"10.1145\/2884781.2884862"},{"key":"9672_CR76","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.infsof.2016.11.002","volume":"82","author":"KC Youm","year":"2017","unstructured":"Youm KC, Ahn J, Lee E (2017) Improved bug localization based on code change histories and bug reports. Inf Softw Technol 82:177\u2013192","journal-title":"Inf Softw Technol"},{"key":"9672_CR77","doi-asserted-by":"crossref","unstructured":"Zhang Y, Lo D, Xia X, Le TDB, Scanniello G, Sun J (2016) Inferring links between concerns and methods with multi-abstraction vector space model. In: Proceedings of the international conference on software maintenance and evolution (ICSME\u201916), pp 110\u2013121","DOI":"10.1109\/ICSME.2016.51"},{"key":"9672_CR78","doi-asserted-by":"crossref","unstructured":"Zhou J, Zhang H, Lo D (2012) Where should the bugs be fixed? More accurate information retrieval-based bug localization based on bug reports. In: Proceedings of the international conference on software engineering (ICSE\u201912), pp 14\u201324","DOI":"10.1109\/ICSE.2012.6227210"},{"issue":"6","key":"9672_CR79","doi-asserted-by":"publisher","first-page":"925","DOI":"10.1142\/S0218194017500346","volume":"27","author":"Z Yu","year":"2017","unstructured":"Yu Z, Tong Y, Chen T, Han J (2017) Augmenting bug localization with part-of-speech and invocation. Int J Softw Eng Knowl Eng 27(6):925\u2013949","journal-title":"Int J Softw Eng Knowl Eng"},{"issue":"5","key":"9672_CR80","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1109\/TSE.2010.63","volume":"36","author":"T Zimmermann","year":"2010","unstructured":"Zimmermann T, Premraj R, Bettenburg N, Just S, Schr\u00f6ter A, Weiss C (2010) What makes a good bug report? IEEE Trans Softw Eng 36(5):618\u2013643","journal-title":"IEEE Trans Softw Eng"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-018-9672-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-018-9672-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-018-9672-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,17]],"date-time":"2020-05-17T15:12:25Z","timestamp":1589728345000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-018-9672-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,11]]},"references-count":80,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,10]]}},"alternative-id":["9672"],"URL":"https:\/\/doi.org\/10.1007\/s10664-018-9672-z","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,11]]},"assertion":[{"value":"11 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}