{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T21:23:23Z","timestamp":1747776203391},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,3,2]],"date-time":"2020-03-02T00:00:00Z","timestamp":1583107200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,3,2]],"date-time":"2020-03-02T00:00:00Z","timestamp":1583107200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1007\/s10664-020-09802-1","type":"journal-article","created":{"date-parts":[[2020,3,2]],"date-time":"2020-03-02T16:03:02Z","timestamp":1583164982000},"page":"1905-1950","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Boosting crash-inducing change localization with rank-performance-based feature subset selection"],"prefix":"10.1007","volume":"25","author":[{"given":"Zhaoqiang","family":"Guo","sequence":"first","affiliation":[]},{"given":"Yanhui","family":"Li","sequence":"additional","affiliation":[]},{"given":"Wanwangying","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Yuming","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Hongmin","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Baowen","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,2]]},"reference":[{"key":"9802_CR1","volume-title":"Logistic regression using the SAS system: theory and application","author":"PD Allison","year":"1999","unstructured":"P.D. Allison. Logistic regression using the SAS system: theory and application. 1999"},{"key":"9802_CR2","doi-asserted-by":"crossref","unstructured":"An L, Khomh F (2015) An empirical study of crash-inducing commits in Mozilla Firefox. PROMISE:1\u201310","DOI":"10.1145\/2810146.2810152"},{"issue":"5","key":"9802_CR3","first-page":"1","volume":"17","author":"A Benavoli","year":"2016","unstructured":"Benavoli A, Corani G, Mangili F (2016) Should we really use post-hoc tests based on mean-ranks? J Mach Learn Res 17(5):1\u201310","journal-title":"J Mach Learn Res"},{"key":"9802_CR4","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1111\/j.2517-6161.1995.tb02031.x","volume":"57","author":"Y Benjamini","year":"1995","unstructured":"Benjamini Y, Hochberg Y (1995) Controlling the false discovery rate: a practical and powerful approach to multiple testing. J R Stat Soc Ser B 57:289\u2013300","journal-title":"J R Stat Soc Ser B"},{"key":"9802_CR5","doi-asserted-by":"crossref","unstructured":"Bettenburg N, Premraj R, Zimmermann T (2008) Extracting structural information from bug reports. MSR:27\u201330","DOI":"10.1145\/1370750.1370757"},{"key":"9802_CR6","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"N Chawla","year":"2002","unstructured":"Chawla N, Bowyer K, Hall L, Kegelmeyer P (2002) Smote: synthetic minority over-sampling technique. J Artif Intell Res 16:321\u2013357","journal-title":"J Artif Intell Res"},{"key":"9802_CR7","volume-title":"Applied multiple regression\/correlation analysis for behavioral sciences","author":"J Cohen","year":"2003","unstructured":"Cohen J, Cohen P, West SG (2003) Applied multiple regression\/correlation analysis for behavioral sciences. Lawrence Erlbaum, Hillsdale, NJ"},{"issue":"7","key":"9802_CR8","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1109\/TSE.2016.2616306","volume":"43","author":"DA Costa","year":"2017","unstructured":"Costa DA, Mcintosh S, Shang W (2017) A framework for evaluating the results of the SZZ approach for identifying bug-introducing changes. IEEE Trans Softw Eng 43(7):641\u2013657","journal-title":"IEEE Trans Softw Eng"},{"key":"9802_CR9","doi-asserted-by":"crossref","unstructured":"Dang Y, Wu R, Zhang H (2012) Rebucket: a method for clustering duplicate crash reports based on call stack similarity. ICSE:1084\u20131093","DOI":"10.1109\/ICSE.2012.6227111"},{"issue":"1","key":"9802_CR10","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s11219-011-9132-0","volume":"20","author":"K Gao","year":"2012","unstructured":"Gao K, Khoshgoftaar TM, Seliya N (2012) Predicting high-risk program modules by selecting the right software measurements. Softw Qual J 20(1):3\u201342","journal-title":"Softw Qual J"},{"key":"9802_CR11","doi-asserted-by":"crossref","unstructured":"Ghotra B, McIntosh S, Hassan AE (2017) A large-scale study of the impact of feature selection techniques on defect classification models. MSR:146\u2013157","DOI":"10.1109\/MSR.2017.18"},{"issue":"3","key":"9802_CR12","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1207\/s15327906mbr2603_7","volume":"26","author":"SB Green","year":"1991","unstructured":"Green SB (1991) How many subjects does it take to do a regression analysis? Multivar Behav Res 26(3):499\u2013510","journal-title":"Multivar Behav Res"},{"key":"9802_CR13","first-page":"1157","volume":"3","author":"I Guyon","year":"2003","unstructured":"Guyon I, Elisseeff A (2003) An introduction to variable and feature selection. J Mach Learn Res 3:1157\u20131182","journal-title":"J Mach Learn Res"},{"issue":"6","key":"9802_CR14","doi-asserted-by":"publisher","first-page":"1437","DOI":"10.1109\/TKDE.2003.1245283","volume":"15","author":"M Hall","year":"2003","unstructured":"Hall M, Holmes G (2003) Benchmarking attribute selection techniques for discrete class data mining. IEEE Trans Knowl Data Eng 15(6):1437\u20131447","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"9802_CR15","doi-asserted-by":"crossref","unstructured":"Hoang VD, Oentaryo RJ, Le (2018) TDB Network-clustered multi-modal bug localization. IEEE Transactions on Software Engineering, to appear","DOI":"10.1109\/TSE.2018.2810892"},{"key":"9802_CR16","unstructured":"Holmes G, Donkin A, Witten IH (2002) WEKA: a machine learning workbench. ANZIIS:357\u2013361"},{"key":"9802_CR17","doi-asserted-by":"crossref","unstructured":"Jacek S, Zimmermann T, Zeller A (2005) When do changes induce fixes? MSR:1\u20135","DOI":"10.1145\/1082983.1083147"},{"key":"9802_CR18","doi-asserted-by":"crossref","unstructured":"Kim S, Zimmermann T, Pan K (2006) Automatic identification of bug-introducing changes. ASE:81\u201390","DOI":"10.1109\/ASE.2006.23"},{"key":"9802_CR19","doi-asserted-by":"crossref","unstructured":"Kim S, Zimmermann T, Whitehead EJ (2007) Predicting faults from cached history. ICSE:489\u2013498","DOI":"10.1109\/ICSE.2007.66"},{"issue":"2","key":"9802_CR20","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1109\/TSE.2007.70773","volume":"34","author":"S Kim","year":"2008","unstructured":"Kim S, Whitehead EJ, Zhang Y (2008) Classifying software changes: clean or buggy? IEEE Trans Softw Eng 34(2):181\u2013196","journal-title":"IEEE Trans Softw Eng"},{"issue":"3","key":"9802_CR21","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1109\/TSE.2011.20","volume":"37","author":"D Kim","year":"2011","unstructured":"Kim D, Wang X, Kim S (2011) Which crashes should I fix first?: predicting top crashes at an early stage to prioritize debugging efforts. IEEE Trans Softw Eng 37(3):430\u2013447","journal-title":"IEEE Trans Softw Eng"},{"issue":"7","key":"9802_CR22","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1145\/1965724.1965749","volume":"54","author":"K Kinshumann","year":"2011","unstructured":"Kinshumann K, Glerum K, Greenberg S, Aul G, Orgovan V, Nichols G, Grant D, Loihle G, Hunt G (2011) Debugging in the (very) large: ten years of implementation and experience. Commun ACM 54(7):111\u2013116","journal-title":"Commun ACM"},{"key":"9802_CR23","unstructured":"Kohavi R. R. A study of cross-validation and bootstrap for accuracy estimation and model selection. IJCAI 1995: 1137\u20131143"},{"key":"9802_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-5725-8_3","volume-title":"The wrapper approach","author":"R Kohavi","year":"1998","unstructured":"Kohavi R, John G (1998) The wrapper approach. Feature Extraction, Construction and Selection. Springer US"},{"key":"9802_CR25","unstructured":"Le TDB, Oentaryo RJ, Lo D (2015) Information retrieval and spectrum based bug localization: better together. FSE:579\u2013590"},{"key":"9802_CR26","doi-asserted-by":"crossref","unstructured":"Lewis C, Lin Z, Sadowski C et al (2013) Does bug prediction support human developers? Findings from a google case study. ICSE:372\u2013381","DOI":"10.1109\/ICSE.2013.6606583"},{"key":"9802_CR27","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.neucom.2017.02.105","volume":"288","author":"D Lin","year":"2018","unstructured":"Lin D, Lin F, Lv Y, Cai F, Cao D (2018) Chinese character CAPTCHA recognition and performance estimation via deep neural network. Neurocomputing 288:11\u201319","journal-title":"Neurocomputing"},{"key":"9802_CR28","doi-asserted-by":"crossref","unstructured":"Lukins SK, Kraft NA, Etzkorn LH (2008) Source code retrieval for bug localization using latent dirichlet allocation. WCRE:155\u2013164","DOI":"10.1109\/WCRE.2008.33"},{"key":"9802_CR29","doi-asserted-by":"crossref","unstructured":"Manning CD, Raghavan P, Sch\u00fctze H (2008) Introduction to information retrieval. Cambridge University Press","DOI":"10.1017\/CBO9780511809071"},{"key":"9802_CR30","doi-asserted-by":"crossref","unstructured":"Moreno L, Bandara W, Haiduc S (2013) On the relationship between the vocabulary of bug reports and source code. ICSM:452\u2013455","DOI":"10.1109\/ICSM.2013.70"},{"key":"9802_CR31","unstructured":"Moser R, Pedrycz W, Succi G (2009) A comparative analysis of the efficiency of change metrics and static code attributes for defect prediction. ICSE:181\u2013190"},{"key":"9802_CR32","doi-asserted-by":"crossref","unstructured":"Muthukumaran K, Rallapalli A, Murthy NLB (2015) Impact of feature selection techniques on bug prediction models. ISEC:120\u2013129","DOI":"10.1145\/2723742.2723754"},{"key":"9802_CR33","doi-asserted-by":"crossref","unstructured":"Nguyen AT, Nguyen TT, Al-Kofahi J (2011) A topic-based approach for narrowing the search space of buggy files from a bug report. ASE:263\u2013272","DOI":"10.1109\/ASE.2011.6100062"},{"key":"9802_CR34","doi-asserted-by":"crossref","unstructured":"Rahman S, Ganguly KK, Sakib K (2016) An improved bug localization using structured information retrieval and version history. ICCIT","DOI":"10.1109\/ICCITechn.2015.7488066"},{"key":"9802_CR35","doi-asserted-by":"crossref","unstructured":"Rao S, Kak A (2011) Retrieval from software libraries for bug localization: a comparative study of generic and composite text models. MSR:43\u201352","DOI":"10.1145\/1985441.1985451"},{"key":"9802_CR36","doi-asserted-by":"crossref","unstructured":"Rathore SS, Gupta A (2014) A comparative study of feature-ranking and feature-subset selection techniques for improved fault prediction. ISEC","DOI":"10.1145\/2590748.2590755"},{"key":"9802_CR37","doi-asserted-by":"crossref","unstructured":"Rodr\u00edguez D, Ruiz R, Cuadrado-Gallego J, AguilarRuiz J (2007) Detecting fault modules applying feature selection to classifiers. IEEE Int Conf Inf Reuse Integr:667\u2013672","DOI":"10.1109\/IRI.2007.4296696"},{"issue":"395","key":"9802_CR38","doi-asserted-by":"publisher","first-page":"826","DOI":"10.1080\/01621459.1986.10478341","volume":"81","author":"J Shaffer","year":"1986","unstructured":"Shaffer J (1986) Modified sequentially rejective multiple test procedures. J Am Stat Assoc 81(395):826\u2013831","journal-title":"J Am Stat Assoc"},{"key":"9802_CR39","doi-asserted-by":"crossref","unstructured":"Song Q, Guo Y, Shepperd M (2018) A comprehensive investigation of the role of imbalanced learning for software defect prediction. IEEE Trans Softw Eng","DOI":"10.1109\/TSE.2018.2836442"},{"issue":"7","key":"9802_CR40","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1109\/TSE.2018.2794977","volume":"45","author":"C Tantithamthavorn","year":"2019","unstructured":"Tantithamthavorn C, Mclntosh S, Hassan AE, Matsumoto K (2019) The impact of automated parameter optimization on defect prediction models. IEEE Trans Softw Eng 45(7):683\u2013711","journal-title":"IEEE Trans Softw Eng"},{"key":"9802_CR41","doi-asserted-by":"crossref","unstructured":"Uneno Y, Mizuno O, Choi EH (2016) Using a distributed representation of words in localizing relevant files for bug reports. QRS:183\u2013190","DOI":"10.1109\/QRS.2016.30"},{"key":"9802_CR42","doi-asserted-by":"crossref","unstructured":"Venkatesh GA (1991) The semantic approach to program slicing. PLDI:107\u2013119","DOI":"10.1145\/113445.113455"},{"key":"9802_CR43","doi-asserted-by":"crossref","unstructured":"Wang S, Yao X (2009) Diversity analysis on imbalanced data sets by using ensemble models. CIDM:324\u2013331","DOI":"10.1109\/CIDM.2009.4938667"},{"key":"9802_CR44","doi-asserted-by":"crossref","unstructured":"Wang S, Lo D, Lawall J (2014) Compositional vector space models for improved bug localization. ICSME:171\u2013180","DOI":"10.1109\/ICSME.2014.39"},{"key":"9802_CR45","doi-asserted-by":"crossref","unstructured":"Wen M, Wu R, Cheung SC (2016) Locus: locating bugs from software changes. ASE:262\u2013273","DOI":"10.1145\/2970276.2970359"},{"issue":"6","key":"9802_CR46","doi-asserted-by":"publisher","first-page":"80","DOI":"10.2307\/3001968","volume":"1","author":"F Wilcoxon","year":"1945","unstructured":"Wilcoxon F (1945) Individual comparisons by ranking methods. Biom Bull 1(6):80\u201383","journal-title":"Biom Bull"},{"key":"9802_CR47","doi-asserted-by":"crossref","unstructured":"Williams C, Spacco J (2008) SZZ revisited: verifying when changes induce fixes. DEFECTS:32\u201336","DOI":"10.1145\/1390817.1390826"},{"issue":"2","key":"9802_CR48","doi-asserted-by":"publisher","first-page":"43","DOI":"10.20982\/tqmp.03.2.p043","volume":"3","author":"CR Wilson","year":"2007","unstructured":"Wilson CR, Voorhis V, Morgan BL (2007) Understanding power and rules of thumb for determining sample size. Tutor Quant Methods Psychol 3(2):43\u201350","journal-title":"Tutor Quant Methods Psychol"},{"key":"9802_CR49","doi-asserted-by":"crossref","unstructured":"Wu R, Zhang H, Cheung SC (2014) Crashlocator: locating crashing faults based on crash stacks. ISSTA:204\u2013214","DOI":"10.1145\/2610384.2610386"},{"issue":"5","key":"9802_CR50","doi-asserted-by":"publisher","first-page":"2866","DOI":"10.1007\/s10664-017-9567-4","volume":"23","author":"R Wu","year":"2018","unstructured":"Wu R, Wen M, Cheung SC (2018) Changelocator: locate crash-inducing changes based on crash reports. Empir Softw Eng 23(5):2866\u20132900","journal-title":"Empir Softw Eng"},{"key":"9802_CR51","doi-asserted-by":"crossref","unstructured":"Xu Z, Liu J, Yang Z, An G, Jia X (2016) The impact of feature selection on defect prediction performance: An empirical comparison. ISSRE:309\u2013320","DOI":"10.1109\/ISSRE.2016.13"},{"key":"9802_CR52","unstructured":"Youm KC, Ahn J, Kim J (2016) Bug localization based on code change histories and bug reports. APSEC:190\u2013197"},{"key":"9802_CR53","doi-asserted-by":"crossref","unstructured":"Zhang L, Kim M, Khurshid S (2011) Localizing failure-inducing program edits based on spectrum information. ICSM:23\u201332","DOI":"10.1109\/ICSM.2011.6080769"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-020-09802-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-020-09802-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-020-09802-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T12:39:57Z","timestamp":1722515997000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-020-09802-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,2]]},"references-count":53,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,5]]}},"alternative-id":["9802"],"URL":"https:\/\/doi.org\/10.1007\/s10664-020-09802-1","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"type":"print","value":"1382-3256"},{"type":"electronic","value":"1573-7616"}],"subject":[],"published":{"date-parts":[[2020,3,2]]},"assertion":[{"value":"2 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}