{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T08:35:11Z","timestamp":1771576511242,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,8,15]],"date-time":"2017-08-15T00:00:00Z","timestamp":1502755200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Intell Inf Syst"],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1007\/s10844-017-0484-1","type":"journal-article","created":{"date-parts":[[2017,8,15]],"date-time":"2017-08-15T10:33:18Z","timestamp":1502793198000},"page":"597-619","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["Profile based recommendation of code reviewers"],"prefix":"10.1007","volume":"50","author":[{"given":"Miko\u0142aj","family":"Fejzer","sequence":"first","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Piotr","family":"Przymus","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Krzysztof","family":"Stencel","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,8,15]]},"reference":[{"issue":"6","key":"484_CR1","doi-asserted-by":"publisher","first-page":"919","DOI":"10.1016\/j.engappai.2011.03.007","volume":"24","author":"A Arteta","year":"2011","unstructured":"Arteta, A., Blas, N.G., & de Mingo L\u00f3pez, L.F. (2011). Solving complex problems with a bioinspired model. Engineering and Applications of AI, 24(6), 919\u2013927. \n                        http:\/\/dx.doi.org\/https:\/\/doi.org\/10.1016\/j.engappai.2011.03.007\n                        \n                    .","journal-title":"Engineering and Applications of AI"},{"key":"484_CR2","unstructured":"Balachandran, V. (2013). Reducing human effort and improving quality in peer code reviews using automatic static analysis and reviewer recommendation. In Notkin, D., Cheng, B.H.C., & Pohl, K. (Eds.) 35th international conference on software engineering, ICSE \u201913, San Francisco, CA, USA, May 18-26, 2013 (pp. 931\u2013940). IEEE \/ ACM. \n                        http:\/\/dl.acm.org\/citation.cfm?id=2486915\n                        \n                    ."},{"issue":"10","key":"484_CR3","doi-asserted-by":"crossref","first-page":"1294","DOI":"10.1109\/TSE.1989.559782","volume":"15","author":"DB Bisant","year":"1989","unstructured":"Bisant, D.B., & Lyle, J.R. (1989). A two-person inspection method to improve programming productivity. IEEE Transactions on Software Engineering, 15(10), 1294\u20131304. \n                        http:\/\/doi.org\/10.1109\/TSE.1989.559782\n                        \n                    .","journal-title":"IEEE Transactions on Software Engineering"},{"key":"484_CR4","unstructured":"Charlin, L., & Zemel, R. (2013). The toronto paper matching system: an automated paper-reviewer assignment system."},{"key":"484_CR5","doi-asserted-by":"publisher","unstructured":"Cheng, K., Xiang, L., Iwaihara, M., Xu, H., & Mohania, M.K. (2005). Time-decaying bloom filters for data streams with skewed distributions. In 15th international workshop on research issues in data engineering (RIDE-SDMA 2005), stream data mining and applications, 3-7 April 2005, Tokyo, Japan (pp. 63\u201369). IEEE Computer Society. \n                        https:\/\/doi.org\/10.1109\/RIDE.2005.15\n                        \n                    .","DOI":"10.1109\/RIDE.2005.15"},{"key":"484_CR6","doi-asserted-by":"publisher","unstructured":"Conry, D., Koren, Y., & Ramakrishnan, N. (2009). Recommender systems for the conference paper assignment problem. In Bergman, L.D., Tuzhilin, A., Burke, R.D., Felfernig, A., & Schmidt-Thieme, L. (Eds.) Proceedings of the 2009 ACM conference on recommender systems, RecSys 2009, New York, NY, USA, October 23-25, 2009 (pp. 357\u2013360). ACM. \n                        https:\/\/doi.org\/10.1145\/1639714.1639787\n                        \n                    .","DOI":"10.1145\/1639714.1639787"},{"key":"484_CR7","doi-asserted-by":"publisher","unstructured":"D\u2019Ambros, M., Lanza, M., & Robbes, R. (2010). An extensive comparison of bug prediction approaches. In Whitehead, J., & Zimmermann, T. (Eds.) Proceedings of the 7th international working conference on mining software repositories, MSR 2010 (Co-located with ICSE), Cape Town, South Africa, May 2-3, 2010, Proceedings (pp. 31\u201341). IEEE Computer Society. \n                        https:\/\/doi.org\/10.1109\/MSR.2010.5463279\n                        \n                    .","DOI":"10.1109\/MSR.2010.5463279"},{"key":"484_CR8","unstructured":"Drake, J., Mashayekhi, V., Riedl, J., & Tsai, W.T. (1991). A distributed collaborative software inspection tool: Design, prototype, and early trial. In Proceedings of the 30th aerospace sciences conference."},{"key":"484_CR9","doi-asserted-by":"publisher","unstructured":"Dumais, S.T., & Nielsen, J. (1992). Automating the assignment of submitted manuscripts to reviewers. In Belkin, N.J., Ingwersen, P., & Pejtersen, A.M. (Eds.) Proceedings of the 15th annual international ACM SIGIR conference on research and development in information retrieval. Copenhagen, Denmark, June 21-24, 1992 (pp. 233\u2013244). ACM. \n                        https:\/\/doi.org\/10.1145\/133160.133205\n                        \n                    .","DOI":"10.1145\/133160.133205"},{"key":"484_CR10","unstructured":"Fejzer, M., & Przymus, P. (2016). Implementation code repository. \n                        http:\/\/www-users.mat.umk.pl\/~mfejzer\/reviewers_recommendation\n                        \n                    ."},{"key":"484_CR11","doi-asserted-by":"publisher","unstructured":"Gousios, G. (2013). The ghtorent dataset and tool suite. In Zimmermann et al. (Zimmermann et al. 2013) (pp. 233\u2013236). \n                        https:\/\/doi.org\/10.1109\/MSR.2013.6624034\n                        \n                    .","DOI":"10.1109\/MSR.2013.6624034"},{"key":"484_CR12","doi-asserted-by":"publisher","unstructured":"Hamasaki, K., Kula, R.G., Yoshida, N., Cruz, A.E.C., Fujiwara, K., & Iida, H. (2013). Who does what during a code review? Datasets of OSS peer review repositories. In Zimmermann et al. (Zimmermann et al. 2013) (pp. 49\u201352). \n                        https:\/\/doi.org\/10.1109\/MSR.2013.6624003\n                        \n                    .","DOI":"10.1109\/MSR.2013.6624003"},{"key":"484_CR13","doi-asserted-by":"crossref","unstructured":"Hassan, A.E. (2008). The road ahead for mining software repositories. In Frontiers of Software Maintenance, 2008. FoSM 2008 (pp. 48\u201357). IEEE.","DOI":"10.1109\/FOSM.2008.4659248"},{"key":"484_CR14","unstructured":"Jeong, G., Kim, S., Zimmermann, T., & Yi, K. (2009). Improving code review by predicting reviewers and acceptance of patches. In Research on software analysis for error-free computing center tech-memo (ROSAEC MEMO 2009-006) (pp. 1\u201318)."},{"issue":"2","key":"484_CR15","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1002\/smr.344","volume":"19","author":"HH Kagdi","year":"2007","unstructured":"Kagdi, H.H., Collard, M.L., & Maletic, J.I. (2007). A survey and taxonomy of approaches for mining software repositories in the context of software evolution. Journal of Software Maintenance, 19(2), 77\u2013131. \n                        https:\/\/doi.org\/10.1002\/smr.344\n                        \n                    .","journal-title":"Journal of Software Maintenance"},{"issue":"2","key":"484_CR16","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1109\/TSE.2007.70773","volume":"34","author":"S Kim","year":"2008","unstructured":"Kim, S., Whitehead, E.J., Jr, & Zhang, Y. (2008). Classifying software changes: Clean or buggy?. IEEE Transactions on Software Engineering, 34(2), 181\u2013196. \n                        https:\/\/doi.org\/10.1109\/TSE.2007.70773\n                        \n                    .","journal-title":"IEEE Transactions on Software Engineering"},{"key":"484_CR17","unstructured":"Knuth, D.E. (1981). The art of computer programming, volume II: seminumerical algorithms, 2nd Edn. Addison-Wesley."},{"issue":"260","key":"484_CR18","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1080\/01621459.1952.10483441","volume":"47","author":"WH Kruskal","year":"1952","unstructured":"Kruskal, W.H., & Wallis, W.A. (1952). Use of ranks in one-criterion variance analysis. Journal of the American statistical Association, 47(260), 583\u2013621.","journal-title":"Journal of the American statistical Association"},{"key":"484_CR19","doi-asserted-by":"publisher","unstructured":"Lee, J.B., Ihara, A., Monden, A., & Matsumoto, K. (2013). Patch reviewer recommendation in OSS projects. In Muenchaisri, P., & Rothermel, G. (Eds.) 20th Asia-Pacific software engineering conference, APSEC 2013, Ratchathewi, Bangkok, Thailand, December 2-5, 2013 - Volume 2 (pp. 1\u20136). IEEE Computer Society. \n                        https:\/\/doi.org\/10.1109\/APSEC.2013.103\n                        \n                    .","DOI":"10.1109\/APSEC.2013.103"},{"key":"484_CR20","first-page":"278","volume":"2","author":"H Levene","year":"1960","unstructured":"Levene, H. (1960). Robust tests for equality of variances1. Contributions to Probability and Statistics: Essays in Honor of Harold Hotelling, 2, 278\u2013292.","journal-title":"Contributions to Probability and Statistics: Essays in Honor of Harold Hotelling"},{"key":"484_CR21","doi-asserted-by":"crossref","unstructured":"Liu, X., Suel, T., & Memon, N.D. (2014). A robust model for paper reviewer assignment. In Kobsa, A., Zhou , M.X., Ester, M., & Koren, Y. (Eds.) Eighth ACM conference on recommender systems, RecSys \u201914, Foster City, Silicon Valley, CA, USA - October 06 - 10, 2014 (pp. 25\u201332). ACM. \n                        http:\/\/doi.org\/10.1145\/2645710.2645749\n                        \n                    .","DOI":"10.1145\/2645710.2645749"},{"key":"484_CR22","doi-asserted-by":"crossref","unstructured":"McIntosh, S., Kamei, Y., Adams, B., & Hassan, A.E. (2014). The impact of code review coverage and code review participation on software quality: a case study of the qt, vtk, and ITK projects. In Devanbu, P.T., Kim, S., & Pinzger, M. (Eds.) Proceedings of the 11th working conference on mining software repositories, MSR 2014, May 31 - June 1, 2014, Hyderabad, India (pp. 192\u2013201). ACM. \n                        http:\/\/doi.org\/10.1145\/2597073.2597076\n                        \n                    .","DOI":"10.1145\/2597073.2597076"},{"key":"484_CR23","doi-asserted-by":"publisher","unstructured":"Nelson, S.D., & Schumann, J. (2004). What makes a code review trustworthy?. In 37th Hawaii international conference on system sciences (HICSS-37 2004), CD-ROM \/ Abstracts Proceedings, 5-8 January 2004, Big Island, HI, USA. IEEE Computer Society. \n                        https:\/\/doi.org\/10.1109\/HICSS.2004.1265711\n                        \n                    .","DOI":"10.1109\/HICSS.2004.1265711"},{"key":"484_CR24","unstructured":"Petrovsky, A.B. (2012). An axiomatic approach to metrization of multiset space. In Multiple criteria decision making: proceedings of the 10th international conference: expand and enrich the domains of thinking and application (p. 129). Springer."},{"issue":"8","key":"484_CR25","doi-asserted-by":"crossref","first-page":"1397","DOI":"10.1016\/j.infsof.2013.02.009","volume":"55","author":"D Radjenovic","year":"2013","unstructured":"Radjenovic, D., Hericko, M., Torkar, R., & Zivkovic, A. (2013). Software fault prediction metrics: A systematic literature review. Information & Software Technology, 55(8), 1397\u20131418. \n                        http:\/\/doi.org\/10.1016\/j.infsof.2013.02.009\n                        \n                    .","journal-title":"Information & Software Technology"},{"key":"484_CR26","doi-asserted-by":"publisher","unstructured":"Rigby, P.C., & Storey, M.D. (2011). Understanding broadcast based peer review on open source software projects. In Taylor, R.N., Gall, H.C., & Medvidovic, N. (Eds.) Proceedings of the 33rd international conference on software engineering, ICSE 2011, Waikiki, Honolulu, HI, USA, May 21-28, 2011 (pp. 541\u2013550). ACM. \n                        https:\/\/doi.org\/10.1145\/1985793.1985867\n                        \n                    .","DOI":"10.1145\/1985793.1985867"},{"issue":"3","key":"484_CR27","first-page":"73","volume":"37","author":"D Singh","year":"2007","unstructured":"Singh, D., Ibrahim, A., Yohanna, T., & Singh, J. (2007). An overview of the applications of multisets. Novi Sad Journal of Mathematics, 37(3), 73\u201392.","journal-title":"Novi Sad Journal of Mathematics"},{"key":"484_CR28","doi-asserted-by":"publisher","unstructured":"Tang, W., Tang, J., & Tan, C. (2010). Expertise matching via constraint-based optimization. In Huang, J.X., King, I., Raghavan, V.V., & Rueger, S. (Eds.) 2010 IEEE\/WIC\/ACM international conference on web intelligence, WI 2010, Toronto, Canada, August 31 - September 3, 2010, main conference proceedings (pp. 34\u201341). IEEE Computer Society. \n                        https:\/\/doi.org\/10.1109\/WI-IAT.2010.133\n                        \n                    .","DOI":"10.1109\/WI-IAT.2010.133"},{"key":"484_CR29","unstructured":"Terra, R., Brunet, J., Miranda, L.F., Valente, M.T., Serey, D., Castilho, D., & da Silva Bigonha, R. (2013). Measuring the structural similarity between source code entities (S). In The 25th international conference on software engineering and knowledge engineering, Boston, MA, USA, June 27-29, 2013 (pp. 753\u2013758). Knowledge Systems Institute Graduate School."},{"key":"484_CR30","doi-asserted-by":"publisher","unstructured":"Thongtanunam, P., Tantithamthavorn, C., Kula, R.G., Yoshida, N., Iida, H., & Matsumoto, K. (2015). Who should review my code? A file location-based code-reviewer recommendation approach for modern code review. In Gu\u00e9h\u00e9neuc, Y., Adams, B., & Serebrenik, A. (Eds.) 22nd IEEE international conference on software analysis, evolution, and reengineering, SANER 2015, Montreal, QC, Canada, March 2-6, 2015 (pp. 141\u2013150). IEEE. \n                        https:\/\/doi.org\/10.1109\/SANER.2015.7081824\n                        \n                    .","DOI":"10.1109\/SANER.2015.7081824"},{"key":"484_CR31","doi-asserted-by":"publisher","unstructured":"van der Veen, E., Gousios, G., & Zaidman, A. (2015). Automatically prioritizing pull requests. In 12th IEEE\/ACM working conference on mining software repositories, MSR 2015, Florence, Italy, May 16-17, 2015 (pp. 357\u2013361). IEEE. \n                        https:\/\/doi.org\/10.1109\/MSR.2015.40\n                        \n                    .","DOI":"10.1109\/MSR.2015.40"},{"key":"484_CR32","unstructured":"Voorhees, E.M. (1999). The TREC-8 question answering track report. In Voorhees, E.M., & Harman, D.K. (Eds.) Proceedings of the eighth text retrieval conference, TREC 1999, Gaithersburg, Maryland, USA, November 17-19, 1999, vol. special publication 500-246. National institute of standards and technology (NIST). \n                        http:\/\/trec.nist.gov\/pubs\/trec8\/papers\/qa_report.pdf\n                        \n                    ."},{"key":"484_CR33","doi-asserted-by":"publisher","unstructured":"Wang, F., Chen, B., & Miao, Z. (2008). A survey on reviewer assignment problem. In Nguyen, N.T., Borzemski, L., Grzech, A., & Ali, M. (Eds.) Proceedings of the new frontiers in applied artificial intelligence, 21st international conference on industrial, engineering and other applications of applied intelligent systems, IEA\/AIE 2008, Wroclaw, Poland, June 18-20, 2008, lecture notes in computer science (Vol. 5027, pp. 718\u2013727). Springer. \n                        https:\/\/doi.org\/10.1007\/978-3-540-69052-8_75\n                        \n                    .","DOI":"10.1007\/978-3-540-69052-8_75"},{"key":"484_CR34","unstructured":"Xie, H., & Lui, J.C.S. (2012). Mathematical modeling of competitive group recommendation systems with application to peer review systems. arXiv:\n                        1204.1832\n                        \n                    ."},{"key":"484_CR35","unstructured":"Yarowsky, D., & Florian, R. (1999). Taking the load off the conference chairs: towards a digital paper-routing assistant."},{"key":"484_CR36","doi-asserted-by":"publisher","unstructured":"Yu, Y., Wang, H., Yin, G., & Ling, C.X. (2014). Reviewer recommender of pull-requests in github. In 30th IEEE international conference on software maintenance and evolution, Victoria, BC, Canada, September 29 - October 3, 2014 (pp. 609\u2013612). IEEE Computer Society. \n                        https:\/\/doi.org\/10.1109\/ICSME.2014.107\n                        \n                    .","DOI":"10.1109\/ICSME.2014.107"},{"key":"484_CR37","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1016\/j.infsof.2016.01.004","volume":"74","author":"Y Yu","year":"2016","unstructured":"Yu, Y., Wang, H., Yin, G., & Wang, T. (2016). Reviewer recommendation for pull-requests in github: What can we learn from code review and bug assignment? Information & Software Technology, 74, 204\u2013218. \n                        https:\/\/doi.org\/10.1016\/j.infsof.2016.01.004\n                        \n                    .","journal-title":"Information & Software Technology"},{"key":"484_CR38","unstructured":"Zimmermann, T., Penta, M.D., & Kim, S. (Eds.) (2013). Proceedings of the 10th working conference on mining software repositories, MSR \u201913, San Francisco, CA, USA, May 18-19, 2013. IEEE Computer Society. \n                        http:\/\/ieeexplore.ieee.org\/xpl\/mostRecentIssue.jsp?punumber=6597024\n                        \n                    ."}],"container-title":["Journal of Intelligent Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10844-017-0484-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-017-0484-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-017-0484-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,5]],"date-time":"2018-05-05T04:40:59Z","timestamp":1525495259000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10844-017-0484-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,15]]},"references-count":38,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["484"],"URL":"https:\/\/doi.org\/10.1007\/s10844-017-0484-1","relation":{},"ISSN":["0925-9902","1573-7675"],"issn-type":[{"value":"0925-9902","type":"print"},{"value":"1573-7675","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,8,15]]}}}