{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T16:55:03Z","timestamp":1774803303292,"version":"3.50.1"},"reference-count":123,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2021,9,6]],"date-time":"2021-09-06T00:00:00Z","timestamp":1630886400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,6]],"date-time":"2021-09-06T00:00:00Z","timestamp":1630886400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.1007\/s10664-021-10021-5","type":"journal-article","created":{"date-parts":[[2021,9,6]],"date-time":"2021-09-06T14:02:48Z","timestamp":1630936968000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":40,"title":["An empirical study of IoT topics in IoT developer discussions on Stack Overflow"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1376-095X","authenticated-orcid":false,"given":"Gias","family":"Uddin","sequence":"first","affiliation":[]},{"given":"Fatima","family":"Sabir","sequence":"additional","affiliation":[]},{"given":"Yann-Ga\u00ebl","family":"Gu\u00e9h\u00e9neuc","sequence":"additional","affiliation":[]},{"given":"Omar","family":"Alam","sequence":"additional","affiliation":[]},{"given":"Foutse","family":"Khomh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,6]]},"reference":[{"key":"10021_CR1","doi-asserted-by":"crossref","unstructured":"Abdellatif A, Costa D, Badran K, Abdalkareem R, Shihab E (2020) Challenges in chatbot development: A study of stack overflow posts. In: 17th international conference on mining software repositories. ACM, Seoul, New York","DOI":"10.1145\/3379597.3387472"},{"key":"10021_CR2","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.infsof.2018.02.005","volume":"98","author":"A Agrawal","year":"2018","unstructured":"Agrawal A, Fu W, Menzies T (2018) What is wrong with topic modeling? and how to fix it using search-based software engineering. Inf Softw Technol 98:74\u201388","journal-title":"Inf Softw Technol"},{"key":"10021_CR3","doi-asserted-by":"crossref","unstructured":"Ahmed S, Bagherzadeh M (2018) What do concurrency developers ask about?: A large-scale study using stack overflow. In: Proceedings of the 12th ACM\/IEEE international symposium on empirical software engineering and measurement, page Article No. 30","DOI":"10.1145\/3239235.3239524"},{"issue":"4","key":"10021_CR4","doi-asserted-by":"publisher","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","volume":"17","author":"A Al-Fuqaha","year":"2015","unstructured":"Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M (2015) Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutor 17(4):2347\u20132376","journal-title":"IEEE Commun Surv Tutor"},{"key":"10021_CR5","doi-asserted-by":"publisher","first-page":"100364","DOI":"10.1016\/j.iot.2021.100364","volume":"14","author":"M Aly","year":"2021","unstructured":"Aly M, Khomh F, Yacout S (2021) What do practitioners discuss about iot and industry 4.0 related technologies? characterization and identification of iot and industry 4.0 categories in stack overflow discussions. Internet Things 14:100364","journal-title":"Internet Things"},{"key":"10021_CR6","unstructured":"McCallum AK (2019) MALLET: A machine learning for language toolkit. http:\/\/mallet.cs.umass.edu\/"},{"key":"10021_CR7","doi-asserted-by":"crossref","unstructured":"Andrzejewski D, Mulhern A, Liblit B, Zhu X (2007) Statistical debugging using latent topic models. In: European conference on machine learning. Springer, pp 6\u201317","DOI":"10.1007\/978-3-540-74958-5_5"},{"key":"10021_CR8","doi-asserted-by":"crossref","unstructured":"Arun R, Suresh V, Madhavan CEV, Murthy MNN (2010) On finding the natural number of topics with latent dirichlet allocation: some observations. In: Proceedings of the 14th Pacific-Asia conference on advances in knowledge discovery and data Mining. pp 391\u2013402","DOI":"10.1007\/978-3-642-13657-3_43"},{"key":"10021_CR9","doi-asserted-by":"crossref","unstructured":"Asaduzzaman M, Mashiyat AS, Roy CK, Schneider KA (2013) Answering questions about unanswered questions of stack overflow. In: Proceedings of the 10th working conference on mining software repositories. pp 87\u2013100","DOI":"10.1109\/MSR.2013.6624015"},{"key":"10021_CR10","doi-asserted-by":"crossref","unstructured":"Asuncion HU, Asuncion AU, Tylor RN (2010) Software traceability with topic modeling. In: Proceedings of 32nd international conference on software engineering. pp 95\u2013104","DOI":"10.1145\/1806799.1806817"},{"issue":"15","key":"10021_CR11","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori L, Iera A, Morabito G (2010) The internet of things: A survey. Comput Netw 54(15):2787\u20132805","journal-title":"Comput Netw"},{"key":"10021_CR12","doi-asserted-by":"crossref","unstructured":"Bagherzadeh M, Khatchadourian R (2019) Going big: A large-scale study on what big data developers ask. In: Proceedings of the 2019 27th ACM joint meeting on european software engineering conference and symposium on the foundations of software engineering, ESEC\/FSE 2019. ACM, New York, pp 432\u2013442","DOI":"10.1145\/3338906.3338939"},{"key":"10021_CR13","doi-asserted-by":"crossref","unstructured":"Bagherzadeh M, Khatchadourian R (2019) Going big: a large-scale study on what big data developers ask. In: Proceedings of the 2019 27th ACM joint meeting on european software engineering conference and symposium on the foundations of software engineering. pp 432\u2013442","DOI":"10.1145\/3338906.3338939"},{"key":"10021_CR14","doi-asserted-by":"crossref","unstructured":"Bandeira A, Medeiros CA, Paixao M, Maia PH (2019) We need to talk about microservices: an analysis from the discussions on stackoverflow. In: 2019 IEEE\/ACM 16th international conference on mining software repositories (MSR). pp 255\u2013259. IEEE","DOI":"10.1109\/MSR.2019.00051"},{"key":"10021_CR15","doi-asserted-by":"crossref","unstructured":"Barua A, Thomas SW, Hassan AE (2012) What are developers talking about? an analysis of topics and trends in stack overflow. Empir Softw Eng :1\u201331","DOI":"10.1007\/s10664-012-9231-y"},{"issue":"1","key":"10021_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2559935","volume":"23","author":"G Bavota","year":"2014","unstructured":"Bavota G, Gethers M, Oliveto R, Poshyvanyk D, Lucia AD (2014) Improving software modularization via automated analysis of latent topics and dependencies. ACM Trans Softw Eng Methodol (TOSEM) 23(1):1\u201333","journal-title":"ACM Trans Softw Eng Methodol (TOSEM)"},{"issue":"7","key":"10021_CR17","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1109\/TSE.2013.60","volume":"40","author":"G Bavota","year":"2014","unstructured":"Bavota G, Oliveto R, Gethers M, Poshyvanyk D, Lucia AD (2014) Methodbook: Recommending move method refactorings via relational topic models. IEEE Trans Softw Eng 40(7):671\u2013694","journal-title":"IEEE Trans Softw Eng"},{"issue":"3","key":"10021_CR18","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/s10664-012-9224-x","volume":"19","author":"LR Biggers","year":"2014","unstructured":"Biggers LR, Bocovich C, Capshaw R, Eddy BP, Etzkorn LH, Kraft NA (2014) Configuring latent dirichlet allocation based feature location. J Empir Softw Eng 19(3):465\u2013500","journal-title":"J Empir Softw Eng"},{"issue":"4","key":"10021_CR19","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1145\/2133806.2133826","volume":"55","author":"DM Blei","year":"2012","unstructured":"Blei DM (2012) Probabilistic topic models. Commun ACM 55 (4):77\u201384","journal-title":"Commun ACM"},{"issue":"1","key":"10021_CR20","first-page":"17","volume":"1","author":"DM Blei","year":"2007","unstructured":"Blei DM, Lafferty JD (2007) A correlated topic model of science. Ann Appl Sci 1(1):17\u201335","journal-title":"Ann Appl Sci"},{"issue":"4-5","key":"10021_CR21","first-page":"993","volume":"3","author":"DM Blei","year":"2003","unstructured":"Blei DM, Ng AY, Jordan MI (2003) Latent dirichlet allocation. J Mach Learn Res 3(4-5):993\u20131022","journal-title":"J Mach Learn Res"},{"key":"10021_CR22","doi-asserted-by":"crossref","unstructured":"Booth T, Stumpf S, Bird J, Jones S (2016) Crossed wires: Investigating the problems of end-user developers in a physical computing task. In: Proceedings of the 2016 CHI conference on human factors in computing systems. pp 3485\u20133497","DOI":"10.1145\/2858036.2858533"},{"key":"10021_CR23","unstructured":"Bridge C (2011) Unstructured data and the 80 percent rule. Tersedia di: http:\/\/www.clarabridge.com\/default. aspx"},{"issue":"2","key":"10021_CR24","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/s11761-018-0232-6","volume":"12","author":"A Bukhari","year":"2018","unstructured":"Bukhari A, Liu X (2018) A web service search engine for large-scale web service discovery based on the probabilistic topic modeling and clustering. SOCA 12(2):169\u2013182","journal-title":"SOCA"},{"issue":"10","key":"10021_CR25","doi-asserted-by":"publisher","first-page":"101848","DOI":"10.1016\/j.telpol.2019.101848","volume":"43","author":"BK Chae","year":"2019","unstructured":"Chae BK (2019) The evolution of the internet of things (iot): A computational text analysis. Telecomm Policy 43(10):101848","journal-title":"Telecomm Policy"},{"key":"10021_CR26","doi-asserted-by":"crossref","unstructured":"Chaqfeh MA, Mohamed N (2012) Challenges in middleware solutions for the internet of things. In: International conference on collaboration technologies and systems (CTS). pp 21\u201326","DOI":"10.1109\/CTS.2012.6261022"},{"key":"10021_CR27","unstructured":"Chase J (2013) The evolution of internet of things. Technical report, Texas Instruments"},{"key":"10021_CR28","unstructured":"Chen T-H, Thomas SW, Nagappan M, Hassan AE (2012) Explaining software defects using topic models. In: 9th working conference on mining software repositories. pp 189\u2013198"},{"issue":"5","key":"10021_CR29","doi-asserted-by":"publisher","first-page":"1843","DOI":"10.1007\/s10664-015-9402-8","volume":"21","author":"T-HP Chen","year":"2016","unstructured":"Chen T-HP, Thomas SW, Hassan AE (2016) A survey on the use of topic models when mining software repositories. Empir Softw Eng 21(5):1843\u20131919","journal-title":"Empir Softw Eng"},{"key":"10021_CR30","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/s10664-008-9095-3","volume":"14","author":"B Cleary","year":"2009","unstructured":"Cleary B, Exton C, Buckley J, English M (2009) An empirical analysis of information retrieval based concept location techniques in software comprehension. Empir Softw Eng 14:93\u2013130","journal-title":"Empir Softw Eng"},{"key":"10021_CR31","doi-asserted-by":"crossref","unstructured":"Dagenais B, Ossher H, Bellamy RKE, Robillard MP, de Vries JP (2010) Moving into a new software project landscape. In: 32nd ACM\/IEEE international conference on software engineering. pp 275\u2013284","DOI":"10.1145\/1806799.1806842"},{"issue":"6","key":"10021_CR32","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9","volume":"41","author":"S Deerwester","year":"1990","unstructured":"Deerwester S, Dumais ST, Furnas GW, Landauer TK, Harshman R (1990) Indexing by latent semantic analysis. J Amer Soc Inf Sci 41(6):391\u2013407","journal-title":"J Amer Soc Inf Sci"},{"issue":"1","key":"10021_CR33","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1002\/smr.567","volume":"25","author":"B Dit","year":"2013","unstructured":"Dit B, Revelle M, Gethers M, Poshyvanyk D (2013) Feature location in source code: a taxonomy and survey. J Softw Evol Process 25(1):53\u201395","journal-title":"J Softw Evol Process"},{"issue":"2","key":"10021_CR34","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/s10664-011-9194-4","volume":"18","author":"B Dit","year":"2013","unstructured":"Dit B, Revelle M, Poshyvanyk D (2013) Integrating information retrieval, execution and link analysis algorithms to improve feature location in software. Empir Softw Eng 18(2):277\u2013309","journal-title":"Empir Softw Eng"},{"key":"10021_CR35","doi-asserted-by":"crossref","unstructured":"Fahland D, Lo D, Maoz S (2013) Mining branching-time scenarios. In: Proc. IEEE\/ACM international conference on automated software engineering. pp 443\u2013453","DOI":"10.1109\/ASE.2013.6693102"},{"issue":"4","key":"10021_CR36","doi-asserted-by":"publisher","first-page":"2483","DOI":"10.1109\/JIOT.2017.2767291","volume":"5","author":"M Frustaci","year":"2017","unstructured":"Frustaci M, Pace P, Aloi G, Fortino G (2017) Evaluating critical security issues of the iot world: Present and future challenges. IEEE Internet Things J 5(4):2483\u20132495","journal-title":"IEEE Internet Things J"},{"key":"10021_CR37","doi-asserted-by":"crossref","unstructured":"Girdhar Y, Giguere P, Dudek G (2013) Autonomous adaptive underwater exploration using online topic modeling. In: Experimental robotics. Springer, pp 789\u2013802","DOI":"10.1007\/978-3-319-00065-7_53"},{"issue":"7","key":"10021_CR38","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","volume":"29","author":"J Gubbi","year":"2013","unstructured":"Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (iot): A vision, architectural elements, and future directions. Future Gener Comput Syst 29(7):1645\u20131660","journal-title":"Future Gener Comput Syst"},{"key":"10021_CR39","doi-asserted-by":"crossref","unstructured":"Han J, Shihab E, Wan Z, Deng S, Xia X (2020) What do programmers discuss about deep learning frameworks. Empir Softw Eng","DOI":"10.1007\/s10664-020-09819-6"},{"key":"10021_CR40","doi-asserted-by":"crossref","unstructured":"Hong L, Davison BD (2010) Empirical study of topic modeling in twitter. In: Proceedings of the first workshop on social media analytics. pp 80\u201388","DOI":"10.1145\/1964858.1964870"},{"key":"10021_CR41","doi-asserted-by":"crossref","unstructured":"Hu J, Sun X, Lo D, Li B (2015) Modeling the evolution of development topics using dynamic topic models. In: IEEE 22nd international conference on software analysis, evolution, and reengineering. pp 3\u201312","DOI":"10.1109\/SANER.2015.7081810"},{"key":"10021_CR42","unstructured":"Hudson W (2013) Card sorting. In: Soegaard M, Dam RF (eds) The encyclopedia of human-computer interaction. The interaction design foundation. 2nd edn."},{"key":"10021_CR43","doi-asserted-by":"crossref","unstructured":"Kamilaris A, Botteghi N (2020) The penetration of internet of things in robotics: Towards a web of robotic things. arXiv:2001.05514","DOI":"10.3233\/AIS-200582"},{"issue":"6","key":"10021_CR44","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1177\/0894439319840716","volume":"38","author":"K Kang","year":"2020","unstructured":"Kang K, Choo J, Kim Y (2020) Whose opinion matters? analyzing relationships between bitcoin prices and user groups in online community. Soc Sci Comput Rev 38(6):686\u2013702","journal-title":"Soc Sci Comput Rev"},{"issue":"1","key":"10021_CR45","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1093\/biomet\/30.1-2.81","volume":"30","author":"MG Kendall","year":"1938","unstructured":"Kendall MG (1938) A new measure of rank correlation. Biometrika 30(1):81\u201393","journal-title":"Biometrika"},{"key":"10021_CR46","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1016\/j.future.2017.11.022","volume":"82","author":"MA Khan","year":"2018","unstructured":"Khan MA, Salah K (2018) Iot security: Review, blockchain solutions, and open challenges. Futur Gener Comput Syst 82:395\u2013411","journal-title":"Futur Gener Comput Syst"},{"key":"10021_CR47","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1080\/01621459.1957.10501395","volume":"52","author":"WH Kruskal","year":"1957","unstructured":"Kruskal WH (1957) Historical notes on the wilcoxon unpaired two-sample test. J Am Stat Assoc 52:356\u2013360","journal-title":"J Am Stat Assoc"},{"issue":"10","key":"10021_CR48","doi-asserted-by":"publisher","first-page":"1056","DOI":"10.1016\/j.telpol.2017.09.007","volume":"41","author":"S-E Lee","year":"2017","unstructured":"Lee S-E, Choi M, Kim S (2017) How and what to study about iot: Research trends and future directions from the perspective of social science. Telecommun Policy 41(10):1056\u20131067","journal-title":"Telecommun Policy"},{"key":"10021_CR49","doi-asserted-by":"publisher","first-page":"2655","DOI":"10.1007\/s10664-018-9595-8","volume":"23","author":"H Li","year":"2018","unstructured":"Li H, Chen T-HP, Shang W, Hassan AE (2018) Studying software logging using topic models. Empir Softw Eng 23:2655\u20132694","journal-title":"Empir Softw Eng"},{"issue":"6","key":"10021_CR50","doi-asserted-by":"publisher","first-page":"4515","DOI":"10.1109\/JIOT.2018.2834151","volume":"5","author":"Y Liao","year":"2018","unstructured":"Liao Y, de Freitas Rocha Loures E, Deschamps F (2018) Industrial internet of things: A systematic literature review and insights. IEEE Internet Things J 5(6):4515\u20134525","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"10021_CR51","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/s10618-008-0118-x","volume":"18","author":"E Linstead","year":"2009","unstructured":"Linstead E, Bajracharya S, Ngo T, Rigor P, Lopes C, Baldi P (2009) Sourcerer: Mining and searching internet-scale software repos. Data Min Knowl Disc 18(2):300\u2013326","journal-title":"Data Min Knowl Disc"},{"key":"10021_CR52","doi-asserted-by":"crossref","unstructured":"Linton M, Teo EGS, Bommes E, Chen C, H\u00e4rdle WK (2017) Dynamic topic modelling for cryptocurrency community forums. In: Applied quantitative finance, Springer. pp 355\u2013372","DOI":"10.1007\/978-3-662-54486-0_18"},{"key":"10021_CR53","unstructured":"Liu B (2016) Sentiment analysis and subjectivity. In: Indurkhya N, Damerau FJ (eds) Handbook of natural language processing. 2nd edn. CRC Press, Taylor and Francis Group"},{"issue":"1","key":"10021_CR54","doi-asserted-by":"publisher","first-page":"1608","DOI":"10.1186\/s40064-016-3252-8","volume":"5","author":"L Liu","year":"2016","unstructured":"Liu L, Tang L, Dong W, Yao S, Zhou W (2016) An overview of topic modeling and its current applications in bioinformatics. SpringerPlus 5 (1):1608","journal-title":"SpringerPlus"},{"key":"10021_CR55","doi-asserted-by":"crossref","unstructured":"Liu X, Sun X, Li B, Zhu J (2014) Pfn: A novel program feature network for program comprehension. In: 2014 IEEE\/ACIS 13th international conference on computer and information science (ICIS). IEEE, pp 349\u2013354","DOI":"10.1109\/ICIS.2014.6912158"},{"issue":"1","key":"10021_CR56","first-page":"5247","volume":"5","author":"M Marjani","year":"2017","unstructured":"Marjani M, Nasaruddin F, Gani A, Karim A, Hashem IAT, Siddiqa A, Yaqoob I (2017) Big iot data analytics: Architecture, opportunities, and open research challenges. IEEE Access 5(1):5247\u20135261","journal-title":"IEEE Access"},{"issue":"8","key":"10021_CR57","doi-asserted-by":"publisher","first-page":"1187","DOI":"10.3390\/en10081187","volume":"10","author":"E Mathews","year":"2017","unstructured":"Mathews E, Guclu SS, Liu Q, Ozcelebi T, Lukkien J (2017) The internet of lights: An open reference architecture and implementation for intelligent solid state lighting systems. Energies 10(8):1187","journal-title":"Energies"},{"issue":"3","key":"10021_CR58","doi-asserted-by":"publisher","first-page":"276","DOI":"10.11613\/BM.2012.031","volume":"22","author":"ML McHugh","year":"2012","unstructured":"McHugh ML (2012) Interrater reliability: the kappa statistic. Biochem Med 22(3):276\u2013282","journal-title":"Biochem Med"},{"key":"10021_CR59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45398-4","volume-title":"Evolving software systems, vol 190","author":"T Mens","year":"2014","unstructured":"Mens T, Serebrenik A, Cleve A (2014) Evolving software systems, vol 190. Springer, Berlin"},{"key":"10021_CR60","doi-asserted-by":"crossref","unstructured":"Mentsiev AU, Mentsiev AU, Amirova EF (2020) Iot and mechanization in agriculture: problems, solutions, and prospects. In: IOP conference series: earth and environmental science, vol 548, p 032035","DOI":"10.1088\/1755-1315\/548\/3\/032035"},{"key":"10021_CR61","doi-asserted-by":"crossref","unstructured":"Minoli D, Sohraby K, Occhiogrosso B (2017) Iot security (IoTSec) mechanisms for e-health and ambient assisted living applications. In: IEEE\/ACM international conference on connected health: applications, systems and engineering technologies, pp 13\u201318","DOI":"10.1109\/CHASE.2017.53"},{"key":"10021_CR62","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.iot.2018.08.009","volume":"1","author":"D Mocrii","year":"2018","unstructured":"Mocrii D, Chen Y, Musilek P. (2018) Iot-based smart homes: A review of system architecture, software, communications, privacy and security. Internet Things 1:81\u201398","journal-title":"Internet Things"},{"key":"10021_CR63","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1016\/j.jss.2018.09.069","volume":"146","author":"H Nabli","year":"2018","unstructured":"Nabli H, Djemaa RB, Amor IAB (2018) Efficient cloud service discovery approach based on lda topic modeling. J Syst Softw 146:233\u2013248","journal-title":"J Syst Softw"},{"key":"10021_CR64","doi-asserted-by":"crossref","unstructured":"Nguyen TT, Nguyen TN, Phuong TM (2011) Topic-based defect prediction (nier track). In: Proceedings of the 33rd international conference on software engineering. pp 932\u2013935","DOI":"10.1145\/1985793.1985950"},{"key":"10021_CR65","doi-asserted-by":"crossref","unstructured":"Nie K, Zhang L (2012) Software feature location based on topic models. In: 2012 19th asia-pacific software engineering conference, vol 1. IEEE, pp 547\u2013552","DOI":"10.1109\/APSEC.2012.116"},{"key":"10021_CR66","unstructured":"NLTK (2016) Sentiment analysis. http:\/\/www.nltk.org\/howto\/sentiment.html"},{"key":"10021_CR67","unstructured":"Overflow S (2020) Stack Overflow Questions. https:\/\/stackoverflow.com\/questions\/. Last accessed on 14 November 2020"},{"key":"10021_CR68","doi-asserted-by":"crossref","unstructured":"Panichella A, Dit B, Oliveto R, Penta MD, Poshyvanyk D, Lucia AD (2013) How to effectively use topic models for software engineering tasks? an approach based on genetic algorithms. In: International conference on software engineering. pp 522\u2013531","DOI":"10.1109\/ICSE.2013.6606598"},{"key":"10021_CR69","doi-asserted-by":"crossref","unstructured":"Panichella A, Dit B, Oliveto R, Penta MD, Poshyvanyk D, Lucia AD (2016) Parameterizing and assembling ir-based solutions for se tasks using genetic algorithms. In: 23rd IEEE international conference on software analysis, evolution, and reengineering","DOI":"10.1109\/SANER.2016.97"},{"issue":"6","key":"10021_CR70","first-page":"13","volume":"11","author":"AR Pathak","year":"2019","unstructured":"Pathak AR, Pandey M, Rautaray S (2019) Adaptive model for dynamic and temporal topic modeling from big data using deep learning architecture. Int J Intell Syst Appl 11(6):13","journal-title":"Int J Intell Syst Appl"},{"issue":"5","key":"10021_CR71","doi-asserted-by":"publisher","first-page":"2190","DOI":"10.1007\/s10664-015-9397-1","volume":"21","author":"L Ponzanelli","year":"2016","unstructured":"Ponzanelli L, Bavota G, Di Penta M, Oliveto R, Lanza M (2016) Prompter: Turning the IDE into a self-confident programming assistant. Empir Softw Eng 21(5):2190\u20132231","journal-title":"Empir Softw Eng"},{"key":"10021_CR72","doi-asserted-by":"crossref","unstructured":"Ponzanelli L, Mocci A, Bacchelli A, Lanza M (2014) Improving low quality stack overflow post detection. In: Poceedings of the 30th international conference on software maintenance and evolution. pp 541\u2013544","DOI":"10.1109\/ICSME.2014.90"},{"key":"10021_CR73","unstructured":"Porter MF (1997) Morgan Kaufmann Publishers Inc. In: Jones KS, Willett PK (eds) Readings in information retrieval. 1st edn."},{"issue":"4","key":"10021_CR74","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2377656.2377660","volume":"21","author":"D Poshyvanyk","year":"2013","unstructured":"Poshyvanyk D, Gethers M, Marcus A (2013) Concept location using formal concept analysis and information retrieval. ACM Trans Softw Eng Methodol (TOSEM) 21(4):1\u201334","journal-title":"ACM Trans Softw Eng Methodol (TOSEM)"},{"issue":"6","key":"10021_CR75","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1109\/TSE.2007.1016","volume":"33","author":"D Poshyvanyk","year":"2007","unstructured":"Poshyvanyk D, Gu\u00e9h\u00e9neuc Y-G, Marcus A, Antoniol G, Rajlich VT (2007) Feature location using probabilistic ranking of methods based on execution scenarios and information retrieval. IEEE Trans Softw Eng 33(6):420\u2013432","journal-title":"IEEE Trans Softw Eng"},{"key":"10021_CR76","unstructured":"Pretz K (2013) The next evolution of the internet. IEEE Mag Inst 50(5)"},{"key":"10021_CR77","doi-asserted-by":"publisher","first-page":"1057","DOI":"10.1016\/j.procs.2018.04.148","volume":"130","author":"LF Rahman","year":"2018","unstructured":"Rahman LF, Ozcelebi T, Lukkien J (2018) Understanding iot systems: a life cycle approach. Procedia Comput Sci 130:1057\u20131062","journal-title":"Procedia Comput Sci"},{"key":"10021_CR78","doi-asserted-by":"crossref","unstructured":"Rao S, Kak AC (2011) Retrieval from software libraries for bug localization: a comparative study of generic and composite text models. In: 8th working conference on mining software repositories, pp 43\u201352","DOI":"10.1145\/1985441.1985451"},{"key":"10021_CR79","unstructured":"\u0158eh\u016f\u0159ek R, Sojka P (2010) Software framework for topic modelling with large corpora. In: Proceedings of the LREC 2010 workshop on new challenges for NLP frameworks. pp 45\u201350"},{"key":"10021_CR80","doi-asserted-by":"crossref","unstructured":"Ren X, Xing Z, Xia X, Li G, Sun J (2019) Discovering, explaining and summarizing controversial discussions in community q&a sites. In: 34th IEEE\/ACM international conference on automated software engineering. pp 151\u2013162","DOI":"10.1109\/ASE.2019.00024"},{"key":"10021_CR81","doi-asserted-by":"crossref","unstructured":"R\u00f6der M, Both A, Hinneburg A (2015) Exploring the space of topic coherence measures. In: Proceedings of the eighth ACM international conference on web search and data mining. pp 399\u2013408","DOI":"10.1145\/2684822.2685324"},{"key":"10021_CR82","doi-asserted-by":"crossref","unstructured":"Rosen C, Shihab E (2015) What are mobile developers asking about? a large scale study using stack overflow. Empir Softw Eng 33","DOI":"10.1007\/s10664-015-9379-3"},{"issue":"3","key":"10021_CR83","doi-asserted-by":"publisher","first-page":"1192","DOI":"10.1007\/s10664-015-9379-3","volume":"21","author":"C Rosen","year":"2016","unstructured":"Rosen C, Shihab E (2016) What are mobile developers asking about? a large scale study using stack overflow. J Empir Softw Eng 21(3):1192\u20131223","journal-title":"J Empir Softw Eng"},{"issue":"3","key":"10021_CR84","doi-asserted-by":"publisher","first-page":"1192","DOI":"10.1007\/s10664-015-9379-3","volume":"21","author":"C Rosen","year":"2016","unstructured":"Rosen C, Shihab E (2016) What are mobile developers asking about? a large scale study using stack overflow. Empir Softw Eng 21(3):1192\u20131223","journal-title":"Empir Softw Eng"},{"issue":"4","key":"10021_CR85","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1002\/(SICI)1097-4571(199006)41:4<288::AID-ASI8>3.0.CO;2-H","volume":"41","author":"G Salton","year":"1990","unstructured":"Salton G, Buckley C (1990) Improving retrieval performance by relevance feedback. J Am Soc Inf Sci 41(4):288\u2013297","journal-title":"J Am Soc Inf Sci"},{"key":"10021_CR86","doi-asserted-by":"crossref","unstructured":"Savage T, Dit B, Gethers M, Poshyvanyk D (2010) Topic xp: Exploring topics in source code using latent dirichlet allocation. In: 2010 IEEE international conference on software maintenance. IEEE, pp 1\u20136","DOI":"10.1109\/ICSM.2010.5609654"},{"key":"10021_CR87","doi-asserted-by":"crossref","unstructured":"Sethi P, Sarangi SR (2017) Internet of things architectures, protocols, and applications. J Electric Comput Eng :2017","DOI":"10.1155\/2017\/9324035"},{"key":"10021_CR88","doi-asserted-by":"crossref","unstructured":"Shahid MN (2020) A cross-disciplinary review of blockchain research trends and methodologies: topic modeling approach. In: Proceedings of the 53rd Hawaii international conference on system sciences","DOI":"10.24251\/HICSS.2020.495"},{"issue":"1","key":"10021_CR89","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/978-3-030-04203-5_3","volume":"154","author":"N Sharma","year":"2019","unstructured":"Sharma N, Shamkuwar M, Singh I (2019) The history, present and future with iot. Internet Things Big Data Anal Smart Gener 154(1):27\u201351","journal-title":"Internet Things Big Data Anal Smart Gener"},{"key":"10021_CR90","doi-asserted-by":"publisher","first-page":"102364","DOI":"10.1016\/j.scs.2020.102364","volume":"63","author":"S Singh","year":"2020","unstructured":"Singh S, Sharma PK, Yoon B, Shojafar M, Cho GH, Ra I-H (2020) Convergence of blockchain and artificial intelligence in iot network for the sustainable smart city. Sustain Cities Soc 63:102364","journal-title":"Sustain Cities Soc"},{"key":"10021_CR91","unstructured":"Stack Exchange Inc. (2019) Stack exchange data dump. https:\/\/archive.org\/details\/stackexchange"},{"key":"10021_CR92","unstructured":"Stack Overflow (2010) Statistics: What is the average response time on Stack Overflow? https:\/\/meta.stackexchange.com\/questions\/61301"},{"key":"10021_CR93","unstructured":"Stack Overflow (2021) Tags. https:\/\/stackoverflow.com\/tags"},{"key":"10021_CR94","unstructured":"Steyver M, Griffiths T (2007) Probabilistic topic models. In: Handbook of latent semantic analysis, vol 427, pp 424\u2013440"},{"key":"10021_CR95","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1016\/j.infsof.2015.05.003","volume":"66","author":"X Sun","year":"2015","unstructured":"Sun X, Li B, Leung H, Li B, Li Y (2015) Msr4sm: Using topic models to effectively mining software repositories for software maintenance tasks. Inf Softw Technol 66:671\u2013694","journal-title":"Inf Softw Technol"},{"key":"10021_CR96","doi-asserted-by":"crossref","unstructured":"Sun X, Li B, Li Y, Chen Y (2015) What information in software historical repositories do we need to support software maintenance tasks? an approach based on topic model. Comput Inf Sci :22\u201337","DOI":"10.1007\/978-3-319-10509-3_3"},{"key":"10021_CR97","doi-asserted-by":"crossref","unstructured":"Sun X, Liu X, Li B, Duan Y, Yang H, Hu J (2016) Exploring topic models in software engineering data analysis A survey. In: 17th IEEE\/ACIS international conference on software engineering, artificial intelligence, networking and parallel\/distributed computing. pp 357\u2013362","DOI":"10.1109\/SNPD.2016.7515925"},{"key":"10021_CR98","doi-asserted-by":"crossref","unstructured":"Terragni V, Liu Y, Cheung S-C (2016) Csnippex: automated synthesis of compilable code snippets from q&a sites. In: Poceedings of the 25th international symposium on software testing and analysis. pp 118\u2013129","DOI":"10.1145\/2931037.2931058"},{"key":"10021_CR99","doi-asserted-by":"crossref","unstructured":"Thomas SW, Adams B, Hassan AE, Blostein D (2011) Modeling the evolution of topics in source code histories. In: 8th working conference on mining software repositories. pp 173\u2013182","DOI":"10.1145\/1985441.1985467"},{"issue":"B","key":"10021_CR100","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1016\/j.scico.2012.08.003","volume":"80","author":"SW Thomas","year":"2014","unstructured":"Thomas SW, Adams B, Hassan AE, Blostein D (2014) Studying software evolution using topic models. Sci Comput Program 80(B):457\u2013479","journal-title":"Sci Comput Program"},{"key":"10021_CR101","doi-asserted-by":"crossref","unstructured":"Tian K, Revelle M, Poshyvanyk D (2009) Using latent dirichlet allocation for automatic categorization of software. In: 6th international working conference on mining software repositories. pp 163\u2013166","DOI":"10.1109\/MSR.2009.5069496"},{"key":"10021_CR102","unstructured":"Uddin G, Baysal O, Guerrouj L, Khomh F (2018) Understanding how and why developers seek and analyze API-related opinions. IEEE Trans Softw Eng 37. Under review"},{"key":"10021_CR103","doi-asserted-by":"crossref","unstructured":"Uddin G, Khomh F (2017) Automatic summarization of API reviews. In: Proceedings of 32nd IEEE\/ACM international conference on automated software engineering. p 12","DOI":"10.1109\/ASE.2017.8115629"},{"issue":"4","key":"10021_CR104","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MS.2014.80","volume":"32","author":"G Uddin","year":"2015","unstructured":"Uddin G, Robillard MP (2015) How api documentation fails. IEEE Softw 32(4):76\u201383","journal-title":"IEEE Softw"},{"key":"10021_CR105","doi-asserted-by":"publisher","first-page":"101582","DOI":"10.1016\/j.is.2020.101582","volume":"94","author":"I Vayansky","year":"2020","unstructured":"Vayansky I, Kumar SA (2020) A review of topic modeling methods. Inf Syst 94:101582","journal-title":"Inf Syst"},{"issue":"3","key":"10021_CR106","doi-asserted-by":"publisher","first-page":"1457","DOI":"10.1109\/COMST.2017.2694469","volume":"19","author":"S Verma","year":"2017","unstructured":"Verma S, Kawamoto Y, Fadlullah ZM, Nishiyama H, Kato N (2017) A survey on network methodologies for real-time analytics of massive iot data and open research issues. IEEE Commun Surv Tutor 19(3):1457\u20131477","journal-title":"IEEE Commun Surv Tutor"},{"issue":"1","key":"10021_CR107","first-page":"24","volume":"1","author":"Z Wan","year":"2019","unstructured":"Wan Z, Xia X, Hassan AE (2019) What do programmers discuss about blockchain? a case study on the use of balanced lda and the reference architecture of a domain to capture online discussions about blockchain platforms across stack exchange communities. IEEE Trans Softw Eng 1(1):24","journal-title":"IEEE Trans Softw Eng"},{"key":"10021_CR108","unstructured":"Wan Z, Xia X, Hassan AE (2019) What is discussed about blockchain? a case study on the use of balanced lda and the reference architecture of a domain to capture online discussions about blockchain platforms across the stack exchange communities. IEEE Trans Softw Eng"},{"key":"10021_CR109","doi-asserted-by":"publisher","first-page":"10193","DOI":"10.1109\/ACCESS.2017.2712744","volume":"5","author":"J Wang","year":"2017","unstructured":"Wang J, Gao P, Ma Y, He K, Hung PC (2017) A web service discovery approach based on common topic groups extraction. IEEE Access 5:10193\u201310208","journal-title":"IEEE Access"},{"key":"10021_CR110","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.comnet.2015.12.017","volume":"101","author":"S Wang","year":"2016","unstructured":"Wang S, Wan J, Zhang D, Li D, Zhang C (2016) Towards smart factory for industry 4.0: a self-organized multi-agent system with big data based feedback and coordination. Comput Netw 101:158\u2013168","journal-title":"Comput Netw"},{"issue":"1","key":"10021_CR111","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/MS.2016.20","volume":"33","author":"M Weyrich","year":"2016","unstructured":"Weyrich M, Ebert C (2016) Reference architectures for the internet of things. IEEE Softw 33(1):112\u2013116","journal-title":"IEEE Softw"},{"issue":"2","key":"10021_CR112","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s10796-014-9489-2","volume":"17","author":"A Whitmore","year":"2015","unstructured":"Whitmore A, Agarwal A, Da Xu L (2015) The internet of things\u2014a survey of topics and trends. Inf Syst Front 17(2):261\u2013274","journal-title":"Inf Syst Front"},{"key":"10021_CR113","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-4625-2","volume-title":"Experimentation in software engineering: an introduction","author":"C Wohlin","year":"2000","unstructured":"Wohlin C, Runeson P, H\u00f6st M., Ohlsson MC, Regnell B, Wessl\u00e9n A (2000) Experimentation in software engineering: an introduction. Kluwer Academic Publishers, Norwell"},{"key":"10021_CR114","doi-asserted-by":"crossref","unstructured":"Xie X, Zhang W, Yang Y, Wang Q (2012) Dretom: Developer recommendation based on topic models for bug resolution. In: Proceedings of the 8th international conference on predictive models in software engineering. pp 19\u201328","DOI":"10.1145\/2365324.2365329"},{"key":"10021_CR115","doi-asserted-by":"crossref","unstructured":"Xu B, Xing Z, Xia X, Lo D (2017) Answerbot: automated generation of answer summary to developers\u2019 technical questions. In: Proc. 32nd IEEE\/ACM international conference on automated software engineering. pp 706\u2013716","DOI":"10.1109\/ASE.2017.8115681"},{"key":"10021_CR116","doi-asserted-by":"crossref","unstructured":"Yang D, Hussain A, Lopes CV (2016) From query to usable code: an analysis of stack overflow code snippets. In: Poceedings of the 13th international conference on mining software repositories. pp 391\u2013402","DOI":"10.1145\/2901739.2901767"},{"key":"10021_CR117","doi-asserted-by":"crossref","unstructured":"Yang G, Zhang T, Lee B (2014) Towards semi-automatic bug triage and severity prediction based on topic model and multi-feature of bug reports. In: 2014 IEEE 38th annual computer software and applications conference. IEEE, pp 97\u2013106","DOI":"10.1109\/COMPSAC.2014.16"},{"issue":"5","key":"10021_CR118","doi-asserted-by":"publisher","first-page":"910","DOI":"10.1007\/s11390-016-1672-0","volume":"31","author":"X-L Yang","year":"2016","unstructured":"Yang X-L, Lo D, Xia X, Wan Z-Y, Sun J-L (2016) What security questions do developers ask? a large-scale study of stack overflow posts. J Comput Sci Technol 31(5):910\u2013924","journal-title":"J Comput Sci Technol"},{"issue":"5","key":"10021_CR119","doi-asserted-by":"publisher","first-page":"910","DOI":"10.1007\/s11390-016-1672-0","volume":"31","author":"X-L Yang","year":"2016","unstructured":"Yang X-L, Lo D, Xia X, Wan Z-Y, Sun J-L (2016) What security questions do developers ask? a large-scale study of stack overflow posts. J Comput Sci Technol 31(5):910\u2013924","journal-title":"J Comput Sci Technol"},{"key":"10021_CR120","unstructured":"Yang Z, Yue Y, Yang Y, Peng Y, Wang X, Liu W (2011) Study and application on the architecture and key technologies for IoT. In: International conference on multimedia technology. pp 747\u2013751"},{"key":"10021_CR121","doi-asserted-by":"crossref","unstructured":"Zhang T, Upadhyaya G, Reinhardt A, Rajan H, Kim M (2018) Are code examples on an online q&a forum reliable?: a study of api misuse on stack overflow. In: Proceedings of the 40th international conference on software engineering. pp 886\u2013896","DOI":"10.1145\/3180155.3180260"},{"key":"10021_CR122","doi-asserted-by":"crossref","unstructured":"Zhang Z-K, Cho MCY, Wang C-W, Hsu C-W, Chen C-K, Shieh S (2014) Iot security: Ongoing challenges and research opportunities. In: IEEE 7th international conference on service-oriented computing and applications. pp 230\u2013234","DOI":"10.1109\/SOCA.2014.58"},{"issue":"6","key":"10021_CR123","doi-asserted-by":"publisher","first-page":"1056","DOI":"10.1109\/TPAMI.2015.2476802","volume":"38","author":"Y Zheng","year":"2015","unstructured":"Zheng Y, Zhang Y-J, Larochelle H (2015) A deep and autoregressive approach for topic modeling of multimodal data. IEEE Trans Pattern Analy Mach Intell 38(6):1056\u20131069","journal-title":"IEEE Trans Pattern Analy Mach Intell"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-021-10021-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-021-10021-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-021-10021-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,28]],"date-time":"2021-10-28T05:11:23Z","timestamp":1635397883000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-021-10021-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,6]]},"references-count":123,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,11]]}},"alternative-id":["10021"],"URL":"https:\/\/doi.org\/10.1007\/s10664-021-10021-5","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,6]]},"assertion":[{"value":"20 July 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 September 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"121"}}