{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T11:02:33Z","timestamp":1762254153995},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,4,28]],"date-time":"2022-04-28T00:00:00Z","timestamp":1651104000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,4,28]],"date-time":"2022-04-28T00:00:00Z","timestamp":1651104000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1007\/s10664-022-10159-w","type":"journal-article","created":{"date-parts":[[2022,4,28]],"date-time":"2022-04-28T08:03:14Z","timestamp":1651132994000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["SoftNER: Mining knowledge graphs from cloud incidents"],"prefix":"10.1007","volume":"27","author":[{"given":"Manish","family":"Shetty","sequence":"first","affiliation":[]},{"given":"Chetan","family":"Bansal","sequence":"additional","affiliation":[]},{"given":"Sumit","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Nikitha","family":"Rao","sequence":"additional","affiliation":[]},{"given":"Nachiappan","family":"Nagappan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,28]]},"reference":[{"key":"10159_CR1","unstructured":"Aguilar G, Maharjan S, L\u00f3pez-Monroy AP, Solorio T (2019) A multi-task approach for named entity recognition in social media data. arXiv preprint arXiv:1906.04135"},{"key":"10159_CR2","doi-asserted-by":"crossref","unstructured":"Anvik J, Hiew L, Murphy GC (2006) Who should fix this bug?. In: Proceedings of the 28th ICSE, pp 361\u2013370","DOI":"10.1145\/1134285.1134336"},{"key":"10159_CR3","doi-asserted-by":"crossref","unstructured":"Ardimento P, Dinapoli A (2017) Knowledge extraction from on-line open source bug tracking systems to predict bug-fixing time. In: Proceedings of the 7th international conference on web intelligence, mining and semantics, pp 1\u20139","DOI":"10.1145\/3102254.3102275"},{"key":"10159_CR4","unstructured":"Bahdanau D, Cho K, Bengio Y (2014) Neural machine translation by jointly learning to align and translate. arXiv preprint arXiv:1409.0473"},{"key":"10159_CR5","doi-asserted-by":"crossref","unstructured":"Bansal C, Renganathan S, Asudani A, Midy O, Janakiraman M (2020) Decaf: Diagnosing and triaging performance issues in large-scale cloud services. In: 2020 IEEE\/ACM 42nd international conference on software engineering: software engineering in practice (ICSE-SEIP)","DOI":"10.1145\/3377813.3381353"},{"key":"10159_CR6","doi-asserted-by":"crossref","unstructured":"Bettenburg N, Premraj R, Zimmermann T, Kim S (2008) Extracting structural information from bug reports. In: Proceedings of the 2008 international working conference on Mining software repositories","DOI":"10.1145\/1370750.1370757"},{"key":"10159_CR7","doi-asserted-by":"crossref","unstructured":"Bhargava P, Spasojevic N, Ellinger S, Rao A, Menon A, Fuhrmann S, Hu G (2019) Learning to map wikidata entities to predefined topics. In: Companion proceedings of the 2019 World Wide Web conference, pp 1194\u20131202","DOI":"10.1145\/3308560.3316749"},{"key":"10159_CR8","doi-asserted-by":"crossref","unstructured":"Bortis G, Van Der Hoek A (2013) Porchlight: A tag-based approach to bug triaging. In: 2013 35th international conference on software engineering (ICSE). IEEE, pp 342\u2013351","DOI":"10.1109\/ICSE.2013.6606580"},{"key":"10159_CR9","unstructured":"Bouma G (2009) Normalized (pointwise) mutual information in collocation extraction. Proceedings of GSCL, pp 31\u201340"},{"issue":"1","key":"10159_CR10","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1023\/A:1007379606734","volume":"28","author":"R Caruana","year":"1997","unstructured":"Caruana R (1997) Multitask learning. Mach Learn 28(1):41\u201375","journal-title":"Mach Learn"},{"key":"10159_CR11","doi-asserted-by":"crossref","unstructured":"Chen J, He X, Lin Q, Xu Y, Zhang H, Hao D, Gao F, Xu Z, Dang Y, Zhang D (2019a) An empirical investigation of incident triage for online service systems. In: 2019 IEEE\/ACM 41st international conference on software engineering: software engineering in practice (ICSE-SEIP), pp 111\u2013120","DOI":"10.1109\/ICSE-SEIP.2019.00020"},{"key":"10159_CR12","doi-asserted-by":"crossref","unstructured":"Chen J, He X, Lin Q, Zhang H, Hao D, Gao F, Xu Z, Dang Y, Zhang D (2019b) Continuous incident triage for large-scale online service systems. In: 2019 34th IEEE\/ACM international conference on automated software engineering (ASE), pp 364\u2013375","DOI":"10.1109\/ASE.2019.00042"},{"key":"10159_CR13","doi-asserted-by":"crossref","unstructured":"Chen P, Sun Z, Bing L, Yang W (2017) Recurrent attention network on memory for aspect sentiment analysis. In: Proceedings of the 2017 conference on empirical methods in natural language processing, pp 452\u2013461","DOI":"10.18653\/v1\/D17-1047"},{"key":"10159_CR14","doi-asserted-by":"crossref","unstructured":"Chen Y, Yang X, Lin Q, Zhang H, Gao F, Xu Z, Dang Y, Zhang D, Dong H, Xu Y et al (2019) Outage prediction and diagnosis for cloud service systems. In: The World Wide Web conference, pp 2659\u20132665","DOI":"10.1145\/3308558.3313501"},{"key":"10159_CR15","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1162\/tacl_a_00104","volume":"4","author":"JPC Chiu","year":"2016","unstructured":"Chiu JPC, Nichols E (2016) Named entity recognition with bidirectional lstm-cnns. Transactions of the Association for Computational Linguistics 4:357\u2013370","journal-title":"Transactions of the Association for Computational Linguistics"},{"issue":"1","key":"10159_CR16","first-page":"22","volume":"16","author":"KW Church","year":"1990","unstructured":"Church KW, Hanks P (1990) Word association norms, mutual information, and lexicography. Computational Linguistics 16(1):22\u201329. [Online] Available: https:\/\/www.aclweb.org\/anthology\/J90-1003","journal-title":"Computational Linguistics"},{"issue":"Aug","key":"10159_CR17","first-page":"2493","volume":"12","author":"R Collobert","year":"2011","unstructured":"Collobert R, Weston J, Bottou L, Karlen M, Kavukcuoglu K, Kuksa P (2011) Natural language processing (almost) from scratch. J Mach Learn Res 12(Aug):2493\u20132537","journal-title":"J Mach Learn Res"},{"key":"10159_CR18","doi-asserted-by":"crossref","unstructured":"Dang Y, Lin Q, Huang P (2019) Aiops: real-world challenges and research innovations. In: 2019 IEEE\/ACM 41st international conference on software engineering: Companion proceedings (ICSE-Companion). IEEE, pp 4\u20135","DOI":"10.1109\/ICSE-Companion.2019.00023"},{"key":"10159_CR19","unstructured":"Devlin J, Chang M-W, Lee K, Toutanova K (2018) Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805"},{"key":"10159_CR20","unstructured":"Ester M, Kriegel H-P, Sander J, Xu X, et al. (1996) A density-based algorithm for discovering clusters in large spatial databases with noise. In: Kdd, vol 96, pp 226\u2013231"},{"issue":"11","key":"10159_CR21","doi-asserted-by":"publisher","first-page":"793","DOI":"10.1119\/1.1937609","volume":"29","author":"RM Fano","year":"1961","unstructured":"Fano R M (1961) Transmission of information: A statistical theory of communications. Am J Phys 29(11):793\u2013794","journal-title":"Am J Phys"},{"key":"10159_CR22","unstructured":"Finin T, Murnane W, Karandikar A, Keller N, Martineau J, Dredze M (2010) Annotating named entities in twitter data with crowdsourcing. In: Proceedings of the NAACL HLT 2010 workshop on creating speech and language data with amazons mechanical turk, pp 80\u201388"},{"issue":"5-6","key":"10159_CR23","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1016\/j.neunet.2005.06.042","volume":"18","author":"A Graves","year":"2005","unstructured":"Graves A, Schmidhuber J (2005) Framewise phoneme classification with bidirectional lstm and other neural network architectures. Neural Networks 18(5-6):602\u2013610","journal-title":"Neural Networks"},{"key":"10159_CR24","doi-asserted-by":"crossref","unstructured":"Greenberg N, Bansal T, Verga P, McCallum A (2018) Marginal likelihood training of bilstm-crf for biomedical named entity recognition from disjoint label sets. In: Proceedings of the 2018 conference on empirical methods in natural language processing, pp 2824\u20132829","DOI":"10.18653\/v1\/D18-1306"},{"key":"10159_CR25","doi-asserted-by":"crossref","unstructured":"Hashimoto K, Stenetorp P, Miwa M, Tsuruoka Y (2015) Task-oriented learning of word embeddings for semantic relation classification. arXiv preprint arXiv:1503.00095","DOI":"10.18653\/v1\/K15-1027"},{"key":"10159_CR26","unstructured":"Hendrickx I, Kim SN, Kozareva Z, Nakov P, S\u00e9aghdha DO, Pad\u00f3 S, Pennacchiotti M, Romano L, Szpakowicz S (2019) Semeval-2010 task 8: Multi-way classification of semantic relations between pairs of nominals. arXiv preprint arXiv:1911.10422"},{"issue":"8","key":"10159_CR27","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735\u20131780","journal-title":"Neural Comput"},{"key":"10159_CR28","unstructured":"Huang Z, Xu W, Yu K (2015) Bidirectional lstm-crf models for sequence tagging. arXiv preprint arXiv:1508.01991"},{"key":"10159_CR29","doi-asserted-by":"crossref","unstructured":"Kim H, Sun Y, Hockenmaier J, Han J (2012) Etm: Entity topic models for mining documents associated with entities. In: 2012 IEEE 12th international conference on data mining. IEEE, pp 349\u2013358","DOI":"10.1109\/ICDM.2012.107"},{"key":"10159_CR30","unstructured":"Kingma DP, Ba J (2015) Adam: A method for stochastic optimization. In: Bengio Y, LeCun Y (eds) 3rd international conference on learning representations, ICLR 2015, San Diego, CA, USA, May 7-9, 2015, Conference Track Proceedings. [Online]. Available: arXiv:1412.6980"},{"key":"10159_CR31","doi-asserted-by":"crossref","unstructured":"Kulkarni C, Xu W, Ritter A, Machiraju R (2018) An annotated corpus for machine reading of instructions in wet lab protocols. arXiv preprint arXiv:1805.00195","DOI":"10.18653\/v1\/N18-2016"},{"key":"10159_CR32","doi-asserted-by":"crossref","unstructured":"Kumar R, Bansal C, Maddila C, Sharma N, Martelock S, Bhargava R (2019) Building sankie: An ai platform for devops. In: Proceedings of the 1st international workshop on bots in software engineering, ser. BotSE\u201919. IEEE Press, p 4853","DOI":"10.1109\/BotSE.2019.00020"},{"key":"10159_CR33","unstructured":"Lafferty J, McCallum A, Pereira FC (2001) Conditional random fields: Probabilistic models for segmenting and labeling sequence data"},{"key":"10159_CR34","doi-asserted-by":"crossref","unstructured":"Lample G, Ballesteros M, Subramanian S, Kawakami K, Dyer C (2016) Neural architectures for named entity recognition. arXiv preprint arXiv:1603.01360","DOI":"10.18653\/v1\/N16-1030"},{"key":"10159_CR35","doi-asserted-by":"crossref","unstructured":"Li Q, Li T, Chang B (2016) Discourse parsing with attention-based hierarchical neural networks. In: Proceedings of the 2016 conference on empirical methods in natural language processing, pp 362\u2013371","DOI":"10.18653\/v1\/D16-1035"},{"key":"10159_CR36","unstructured":"Limsopatham N, Collier N (2016) Bidirectional lstm for named entity recognition in twitter messages"},{"key":"10159_CR37","doi-asserted-by":"crossref","unstructured":"Luo C, Lou J-G, Lin Q, Fu Q, Ding R, Zhang D, Wang Z (2014) Correlating events with time series for incident diagnosis. In: Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining, pp 1583\u20131592","DOI":"10.1145\/2623330.2623374"},{"key":"10159_CR38","doi-asserted-by":"crossref","unstructured":"McDonald R, Pereira F, Kulick S, Winters S, Jin Y, White P (2005) Simple algorithms for complex relation extraction with applications to biomedical ie. In: Proceedings of the 43rd annual meeting of the association for computational linguistics (ACL\u201905), pp 491\u2013498","DOI":"10.3115\/1219840.1219901"},{"key":"10159_CR39","unstructured":"Mehta S, Bhagwan R, Kumar R, Bansal C, Maddila C, Ashok B, Asthana S, Bird C, Kumar A (2020) Rex: Preventing bugs and misconfiguration in large services using correlated change analysis. In: 17th {USENIX} symposium on networked systems design and implementation ({NSDI} 20), pp 435\u2013448"},{"key":"10159_CR40","doi-asserted-by":"crossref","unstructured":"Mikolov T, Karafi\u00e1t M, Burget L, \u010cernocky\u0300 J, Khudanpur S (2010) Recurrent neural network based language model. In: Eleventh annual conference of the international speech communication association","DOI":"10.21437\/Interspeech.2010-343"},{"issue":"1","key":"10159_CR41","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1075\/li.30.1.03nad","volume":"30","author":"D Nadeau","year":"2007","unstructured":"Nadeau D, Sekine S (2007) A survey of named entity recognition and classification. Lingvisticae Investigationes 30(1):3\u201326","journal-title":"Lingvisticae Investigationes"},{"key":"10159_CR42","doi-asserted-by":"crossref","unstructured":"Nair V, Raul A, Khanduja S, Bahirwani V, Shao Q, Sellamanickam S, Keerthi S, Herbert S, Dhulipalla S (2015) Learning a hierarchical monitoring system for detecting and diagnosing service issues. In: Proceedings of the 21th ACM SIGKDD international conference on knowledge discovery and data mining, pp 2029\u20132038","DOI":"10.1145\/2783258.2788624"},{"key":"10159_CR43","doi-asserted-by":"crossref","unstructured":"Newman D, Chemudugunta C, Smyth P (2006) Statistical entity-topic models. In: Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, pp 680\u2013686","DOI":"10.1145\/1150402.1150487"},{"key":"10159_CR44","unstructured":"Pantel P, Lin T, Gamon M (2012) Mining entity types from query logs via user intent modeling. In: Proceedings of the 50th annual meeting of the association for computational linguistics: long papers-Volume 1, Association for Computational Linguistics, pp 563\u2013571"},{"key":"10159_CR45","unstructured":"Pawar S, Palshikar G K, Bhattacharyya P (2017) Relation extraction: A survey. arXiv preprint arXiv:1712.05191"},{"key":"10159_CR46","doi-asserted-by":"crossref","unstructured":"Pennington J, Socher R, Manning CD (2014) Glove: Global vectors for word representation. In: Proceedings of the 2014 conference on empirical methods in natural language processing (EMNLP)","DOI":"10.3115\/v1\/D14-1162"},{"key":"10159_CR47","doi-asserted-by":"crossref","unstructured":"Rao N, Bansal C, Guan J (2020) Code search intent classification using weak supervision. arXiv preprint arXiv:2011.11950","DOI":"10.1109\/MSR52588.2021.00077"},{"key":"10159_CR48","doi-asserted-by":"crossref","unstructured":"Ratner A, Bach S H, Ehrenberg H, Fries J, Wu S, R\u00e9 C (2017) Snorkel: Rapid training data creation with weak supervision. In: Proceedings of the VLDB Endowment. International Conference on Very Large Data Bases, vol 11, no 3. NIH Public Access, pp 269. NIH Public Access","DOI":"10.14778\/3157794.3157797"},{"key":"10159_CR49","unstructured":"Ritter A, Clark S, Etzioni O, et al. (2011) Named entity recognition in tweets: An experimental study. In: Proceedings of the 2011 conference on empirical methods in natural language processing, pp 1524\u20131534"},{"key":"10159_CR50","doi-asserted-by":"crossref","unstructured":"Shetty M, Bansal C, Kumar S, Rao N, Nagappan N, Zimmermann T (2021) Neural knowledge extraction from cloud service incidents. In: 2021 IEEE\/ACM 43rd international conference on software engineering: software engineering in practice (ICSE-SEIP), pp 218\u2013227","DOI":"10.1109\/ICSE-SEIP52600.2021.00031"},{"key":"10159_CR51","unstructured":"Thanopoulos A, Fakotakis N, Kokkinakis G (2002) Comparative evaluation of collocation extraction metrics. In: LREC, vol 2. Citeseer, pp 620\u2013625"},{"key":"10159_CR52","doi-asserted-by":"crossref","unstructured":"Tian Y, Wijedasa D, Lo D, Le Goues C (2016) Learning to rank for bug report assignee recommendation. In: 2016 IEEE 24th international conference on program comprehension (ICPC). IEEE, pp 1\u201310","DOI":"10.1109\/ICPC.2016.7503715"},{"key":"10159_CR53","unstructured":"Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez A N, Kaiser L, Polosukhin I (2017) Attention is all you need. In: Advances in neural information processing systems, pp 5998\u20136008"},{"key":"10159_CR54","doi-asserted-by":"crossref","unstructured":"Wang S, Zhang W, Wang Q (2014) Fixercache: Unsupervised caching active developers for diverse bug triage. In: Proceedings of the 8th ACM\/IEEE international symposium on empirical software engineering and measurement, pp 1\u201310","DOI":"10.1145\/2652524.2652536"},{"key":"10159_CR55","doi-asserted-by":"crossref","unstructured":"Xu Y, Ding F, Wang B (2008) Entity-based query reformulation using wikipedia. In: Proceedings of the 17th ACM conference on Information and knowledge management, pp 1441\u20131442","DOI":"10.1145\/1458082.1458322"},{"key":"10159_CR56","doi-asserted-by":"crossref","unstructured":"Ye D, Xing Z, Foo C Y, Ang Z Q, Li J, Kapre N (2016) Software-specific named entity recognition in software engineering social content. In: 2016 IEEE 23rd international conference on software analysis, evolution, and reengineering (SANER), vol 1. IEEE, pp 90\u2013101","DOI":"10.1109\/SANER.2016.10"},{"issue":"Feb","key":"10159_CR57","first-page":"1083","volume":"3","author":"D Zelenko","year":"2003","unstructured":"Zelenko D, Aone C, Richardella A (2003) Kernel methods for relation extraction. J Mach Learn Res 3(Feb):1083\u20131106","journal-title":"J Mach Learn Res"},{"issue":"3","key":"10159_CR58","first-page":"150","volume":"28","author":"Y Zhou","year":"2016","unstructured":"Zhou Y, Tong Y, Gu R, Gall H (2016) Combining text mining and data mining for bug report classification. Journal of Software: Evolution and Process 28(3):150\u2013176","journal-title":"Journal of Software: Evolution and Process"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-022-10159-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-022-10159-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-022-10159-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,9]],"date-time":"2022-06-09T21:04:33Z","timestamp":1654808673000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-022-10159-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,28]]},"references-count":58,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["10159"],"URL":"https:\/\/doi.org\/10.1007\/s10664-022-10159-w","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,28]]},"assertion":[{"value":"17 March 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 April 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"93"}}