{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T10:25:39Z","timestamp":1763202339490,"version":"3.37.3"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,1,27]],"date-time":"2020-01-27T00:00:00Z","timestamp":1580083200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,27]],"date-time":"2020-01-27T00:00:00Z","timestamp":1580083200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["World Wide Web"],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1007\/s11280-019-00770-1","type":"journal-article","created":{"date-parts":[[2020,1,27]],"date-time":"2020-01-27T07:02:37Z","timestamp":1580108557000},"page":"1589-1619","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["iLinker: a novel approach for issue knowledge acquisition in GitHub projects"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3111-1534","authenticated-orcid":false,"given":"Yang","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yiwen","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Huaimin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,27]]},"reference":[{"key":"770_CR1","doi-asserted-by":"crossref","unstructured":"Dabbish, L., Stuart, C., Tsay, J., Herbsleb, J.: Social Coding in Github: Transparency and Collaboration in an Open Software Repository. In: CSCW, pp. 1277\u20131286. ACM (2012)","DOI":"10.1145\/2145204.2145396"},{"issue":"3","key":"770_CR2","doi-asserted-by":"publisher","first-page":"032102","DOI":"10.1007\/s11432-015-1024-6","volume":"60","author":"Y Zhang","year":"2017","unstructured":"Zhang, Y., Wang, H., Yin, G., et al.: Social media in GitHub: the role of @-mention in assisting software development. Sci. China Inf. Sci. 60(3), 032102 (2017)","journal-title":"Sci. China Inf. Sci."},{"key":"770_CR3","doi-asserted-by":"crossref","unstructured":"Gharehyazie, M., Ray, B., Filkov, V.: Some from Here, Some from There: Cross-Project Code Reuse in Github. In: MSR, pp. 291\u2013301. IEEE (2017)","DOI":"10.1109\/MSR.2017.15"},{"key":"770_CR4","doi-asserted-by":"crossref","unstructured":"Sun, C., Lo, D., Khoo, S. -C., Jiang, J.: Towards More Accurate Retrieval of Duplicate Bug Reports. In: ASE, pp. 253\u2013262. IEEE (2011)","DOI":"10.1109\/ASE.2011.6100061"},{"key":"770_CR5","doi-asserted-by":"crossref","unstructured":"Zhou, J., Zhang, H., Lo, D.: Where Should the Bugs Be Fixed? More Accurate Information Retrieval-Based Bug Localization Based on Bug Reports. In: ICSE, pp. 14\u201324. IEEE (2012)","DOI":"10.1109\/ICSE.2012.6227210"},{"key":"770_CR6","doi-asserted-by":"crossref","unstructured":"Rocha, H., Valente, M. T., Marques-Neto, H., Murphy, G. C.: An Empirical Study on Recommendations of Similar Bugs. In: SANER, pp. 46\u201356. IEEE (2016)","DOI":"10.1109\/SANER.2016.87"},{"key":"770_CR7","unstructured":"Le, Q., Mikolov, T.: Distributed Representations of Sentences and Documents. In: ICML, pp. 1188\u20131196 (2014)"},{"key":"770_CR8","unstructured":"Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space. arXiv:1301.3781 (2013)"},{"key":"770_CR9","unstructured":"Mikolov, T., Sutskever, I., Chen, K., Corrado, G. S., Dean, J.: Distributed Representations of Words and Phrases and Their Compositionality. In: NIPS, pp. 3111\u20133119 (2013)"},{"key":"770_CR10","doi-asserted-by":"crossref","unstructured":"Xu, B., Ye, D., Xing, Z., Xia, X., Chen, G., Li, S.: Predicting Semantically Linkable Knowledge in Developer Online Forums via Convolutional Neural Network. In: ASE. ACM, pp. 51\u201362 (2016)","DOI":"10.1145\/2970276.2970357"},{"key":"770_CR11","doi-asserted-by":"crossref","unstructured":"Ye, X., Shen, H., Ma, X., Bunescu, R., Liu, C.: From Word Embeddings to Document Similarities for Improved Information Retrieval in Software Engineering. In: ICSE, pp. 404\u2013415. ACM (2016)","DOI":"10.1145\/2884781.2884862"},{"key":"770_CR12","doi-asserted-by":"crossref","unstructured":"Yang, X., Lo, D., Xia, X., Bao, L., Sun, J.: Combining Word Embedding with Information Retrieval to Recommend Similar Bug Reports. In: ISSRE, pp. 127\u2013137. IEEE (2016)","DOI":"10.1109\/ISSRE.2016.33"},{"key":"770_CR13","unstructured":"Fan, Y., Xia, X., Lo, D., Hassan, A.E.: Chaff from the wheat: Characterizing and determining valid bug reports. IEEE Transactions on Software Engineering (2018)"},{"key":"770_CR14","doi-asserted-by":"crossref","unstructured":"Li, L., Ren, Z., Li, X., Zou, W., Jiang, H.: How are Issue Units Linked? Empirical Study on the Linking Behavior in GitHub. In: APSEC, pp. 386\u2013395. IEEE (2018)","DOI":"10.1109\/APSEC.2018.00053"},{"key":"770_CR15","doi-asserted-by":"crossref","unstructured":"Zampetti, F., Ponzanelli, L., Bavota, G., Mocci, A., Penta, M. D., Lanza, M.: How Developers Document Pull Requests with External References. In: ICPC, pp. 23-33. IEEE (2017)","DOI":"10.1109\/ICPC.2017.30"},{"key":"770_CR16","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Yu, Y., Wang, H., Vasilescu, B., Filkov, V.: Within-Ecosystem Issue Linking: a Large-Scale Study of Rails. In: Software Mining, pp. 12\u201319. ACM (2018)","DOI":"10.1145\/3242887.3242891"},{"issue":"9","key":"770_CR17","doi-asserted-by":"publisher","first-page":"199105","DOI":"10.1007\/s11432-018-9822-1","volume":"62","author":"Y Zhang","year":"2019","unstructured":"Zhang, Y., Wu, Y., Wang, T., et al.: A novel approach for recommending semantically linkable issues in GitHub projects. Sci. China Inf. Sci. 62(9), 199105 (2019)","journal-title":"Sci. China Inf. Sci."},{"key":"770_CR18","doi-asserted-by":"crossref","unstructured":"Boisselle, V., Adams, B.: The Impact of Cross-Distribution Bug Duplicates, Empirical Study on Debian and Ubuntu. In: SCAM, pp. 131\u2013140. IEEE (2015)","DOI":"10.1109\/SCAM.2015.7335409"},{"issue":"Jan","key":"770_CR19","first-page":"993","volume":"3","author":"DM Blei","year":"2003","unstructured":"Blei, D. M., Ng, A. Y., Jordan, M. I.: Latent dirichlet allocation. J. Mach. Learn. Res. 3(Jan), 993\u20131022 (2003)","journal-title":"J. Mach. Learn. Res."},{"key":"770_CR20","unstructured":"Dai, A. M., Olah, C., Le, Q. V.: Document embedding with paragraph vectors. arXiv:1507.07998 (2015)"},{"issue":"2","key":"770_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jdm.2008040101","volume":"19","author":"Kevin Crowston","year":"2008","unstructured":"Crowston, K., Scozzi, B.: Bug fixing practices within free\/libre open source software development teams (2008)","journal-title":"Journal of Database Management"},{"key":"770_CR22","doi-asserted-by":"crossref","unstructured":"Jeong, G., Kim, S., Zimmermann, T.: Improving Bug Triage with Bug Tossing Graphs. In: ESEC\/FSE, pp. 111\u2013120. ACM (2009)","DOI":"10.1145\/1595696.1595715"},{"issue":"3","key":"770_CR23","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1109\/TSE.2016.2576454","volume":"43","author":"X Xia","year":"2017","unstructured":"Xia, X., Lo, D., Ding, Y., Al-Kofahi, J. M., Nguyen, T. N., Wang, X.: Improving automated bug triaging with specialized topic model. IEEE Trans. Softw. Eng. 43(3), 272\u2013297 (2017)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"770_CR24","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.infsof.2016.01.005","volume":"73","author":"M Yan","year":"2016","unstructured":"Yan, M., Zhang, X., Yang, D., Xu, L., Kymer, J. D.: A component recommender for bug reports using Discriminative Probability Latent Semantic Analysis. Inf. Softw. Technol. 73, 37\u201351 (2016)","journal-title":"Inf. Softw. Technol."},{"key":"770_CR25","doi-asserted-by":"crossref","unstructured":"Anvik, J., Hiew, L., Murphy, G. C.: Who Should Fix This Bug?. In: ICSE, pp. 361\u2013370. ACM (2006)","DOI":"10.1145\/1134285.1134336"},{"key":"770_CR26","doi-asserted-by":"crossref","unstructured":"Guo, P. J., Zimmermann, T., Nagappan, N., Murphy, B.: Characterizing and Predicting Which Bugs Get Fixed: an Empirical Study of Microsoft Windows. In: ICSE, pp. 495\u2013504. IEEE (2010)","DOI":"10.1145\/1806799.1806871"},{"key":"770_CR27","doi-asserted-by":"crossref","unstructured":"Bachmann, A., Bird, C., Rahman, F., Devanbu, P., Bernstein, A.: The Missing Links: Bugs and Bug-Fix Commits. In: FSE, pp. 97\u2013106. ACM (2010)","DOI":"10.1145\/1882291.1882308"},{"key":"770_CR28","doi-asserted-by":"crossref","unstructured":"Ye, X., Bunescu, R., Liu, C.: Learning to Rank Relevant Files for Bug Reports Using Domain Knowledge. In: FSE, pp. 689\u2013699. ACM (2014)","DOI":"10.1145\/2635868.2635874"},{"key":"770_CR29","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Yin, G., Wang, T., Yu, Y., knowledge, H. Wang.: Evaluating Bug Severity Using Crowd-Based an Exploratory Study. In: Internetware, pp. 70\u201373. ACM (2015)","DOI":"10.1145\/2875913.2875918"},{"key":"770_CR30","doi-asserted-by":"crossref","unstructured":"Wang, X., Zhang, L., Xie, T., Anvik, J., Sun, J.: An Approach to Detecting Duplicate Bug Reports Using Natural Language and Execution Information. In: ICSE, pp. 461\u2013470. IEEE (2008)","DOI":"10.1145\/1368088.1368151"},{"issue":"1","key":"770_CR31","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1007\/s10664-016-9430-z","volume":"22","author":"D Ye","year":"2017","unstructured":"Ye, D., Xing, Z., Kapre, N.: The structure and dynamics of knowledge network in domain-specific q&a sites: a case study of stack overflow. Empir. Softw. Eng. 22(1), 375\u2013406 (2017)","journal-title":"Empir. Softw. Eng."},{"issue":"1","key":"770_CR32","doi-asserted-by":"publisher","first-page":"159","DOI":"10.2307\/2529310","volume":"33","author":"JR Landis","year":"1977","unstructured":"Landis, J. R., Koch, G. G.: The measurement of observer agreement for categorical data. Biometrics 33(1), 159\u2013174 (1977)","journal-title":"Biometrics"},{"key":"770_CR33","doi-asserted-by":"crossref","unstructured":"Paice, C.: A Word Stemmer Based on the Lancaster Stemming Algorithm. In: ACM SIGIR, pp. 56\u201361 (1990)","DOI":"10.1145\/101306.101310"},{"key":"770_CR34","unstructured":"Kohavi, R.: A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection. In: IJCAI, pp. 1137\u20131145 (1995)"},{"issue":"2","key":"770_CR35","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1007\/s10664-015-9387-3","volume":"21","author":"A Hindle","year":"2016","unstructured":"Hindle, A., Alipour, A., Stroulia, E.: A contextual approach towards more accurate duplicate bug report detection and ranking. Empir. Softw. Eng. 21(2), 368\u2013410 (2016)","journal-title":"Empir. Softw. Eng."},{"key":"770_CR36","doi-asserted-by":"crossref","unstructured":"Thung, F., Kochhar, P. S., Lo, D.: Dupfinder: Integrated Tool Support for Duplicate Bug Report Detection. In: ASE, pp. 871-874. ACM (2014)","DOI":"10.1145\/2642937.2648627"},{"key":"770_CR37","doi-asserted-by":"crossref","unstructured":"Tian, Y., Sun, C., Lo, D.: Improved Duplicate Bug Report Identification. In: CSMR, pp. 385-390. IEEE (2012)","DOI":"10.1109\/CSMR.2012.48"},{"issue":"5","key":"770_CR38","doi-asserted-by":"publisher","first-page":"981","DOI":"10.1007\/s11390-015-1576-4","volume":"30","author":"Y Zhang","year":"2015","unstructured":"Zhang, Y., Lo, D., Xia, X., Sun, J.-L.: Multi-factor duplicate question detection in stack overflow. J. Comput. Sci. Technol. 30(5), 981\u2013997 (2015)","journal-title":"J. Comput. Sci. Technol."},{"key":"770_CR39","doi-asserted-by":"crossref","unstructured":"Zhang, W. E., Sheng, Q. Z., Tang, Z., Ruan, W.: Related Or Duplicate: Distinguishing Similar CQA Questions via Convolutional Neural Networks. In: SIGIR, pp. 1153-1156. ACM (2018)","DOI":"10.1145\/3209978.3210110"}],"container-title":["World Wide Web"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-019-00770-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11280-019-00770-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-019-00770-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,26]],"date-time":"2021-01-26T00:34:41Z","timestamp":1611621281000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11280-019-00770-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,27]]},"references-count":39,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,5]]}},"alternative-id":["770"],"URL":"https:\/\/doi.org\/10.1007\/s11280-019-00770-1","relation":{},"ISSN":["1386-145X","1573-1413"],"issn-type":[{"type":"print","value":"1386-145X"},{"type":"electronic","value":"1573-1413"}],"subject":[],"published":{"date-parts":[[2020,1,27]]},"assertion":[{"value":"17 January 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 November 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 December 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 January 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}