{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:18:59Z","timestamp":1773839939721,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s11390-019-1954-4","type":"journal-article","created":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T07:03:49Z","timestamp":1570086229000},"page":"957-971","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Semi-Supervised Learning Based Tag Recommendation for Docker Repositories"],"prefix":"10.1007","volume":"34","author":[{"given":"Wei","family":"Chen","sequence":"first","affiliation":[]},{"given":"Jia-Hong","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Jia-Xin","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Guo-Quan","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Wei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,6]]},"reference":[{"key":"1954_CR1","unstructured":"Merkel D. Docker: Lightweight Linux containers for consistent development and deployment. Linux Journal, 2014, 2014(239): Article No. 2."},{"issue":"2","key":"1954_CR2","doi-asserted-by":"publisher","first-page":"105","DOI":"10.14257\/astl.2014.66.25","volume":"66","author":"KT Seo","year":"2014","unstructured":"Seo K T, Hwang H S, Moon I Y, Kwon O Y, Kim B J. Performance comparison analysis of linux container and virtual machine for building cloud. Advanced Science and Technology Letters, 2014, 66(2): 105-111.","journal-title":"Advanced Science and Technology Letters"},{"key":"1954_CR3","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1007\/978-3-642-45065-5_19","volume-title":"Middleware 2013","author":"Waldemar Hummer","year":"2013","unstructured":"Hummer W, Rosenberg F, Oliveira F, Eilam T. Testing idempotence for infrastructure as code. In Proc. the 14th ACM\/IFIP\/USENIX International Middleware Conference, December 2013, pp.368-388."},{"key":"1954_CR4","doi-asserted-by":"crossref","unstructured":"Xu T Y, Marinov D. Mining container image repositories for software configuration and beyond. In Proc. the 40th International Conference on Software Engineering: New Ideas and Emerging Results, May 2018, pp.49-52.","DOI":"10.1145\/3183399.3183403"},{"key":"1954_CR5","doi-asserted-by":"crossref","unstructured":"Xia X, Lo D, Wang X Y, Zhou B. Tag recommendation in software information sites. In Proc. the 10th IEEE Working Conference on Mining Software Repositories, May 2013, pp.287-296.","DOI":"10.1109\/MSR.2013.6624040"},{"key":"1954_CR6","doi-asserted-by":"crossref","unstructured":"Chen W, Xu P X, Dou WS, Wu G Q, Gao C S, Wei J. A hierarchical categorization approach for configuration management modules. In Proc. the 41st IEEE Annual Computer Software and Applications Conference, July 2017, pp.160-169.","DOI":"10.1109\/COMPSAC.2017.17"},{"key":"1954_CR7","doi-asserted-by":"crossref","unstructured":"Wang S, Lo D, Vasilescu B, Serebrenik A. EnTagRec: An enhanced tag recommendation system for software information sites. In Proc. the 30th IEEE International Conference on Software Maintenance and Evolution, September 2014, pp.291-300.","DOI":"10.1109\/ICSME.2014.51"},{"key":"1954_CR8","doi-asserted-by":"crossref","unstructured":"Hosmer D, Lemeshow J, Sturdivant R. Applied Logistic Regression (3rd edition). John Wiley & Sons, 2013.","DOI":"10.1002\/9781118548387"},{"key":"1954_CR9","doi-asserted-by":"crossref","unstructured":"Yin K, Zhou J H, Chen W, Wu G Q, Zhu J X, Wei J. DTagger: A tag recommendation approach for Docker repositories. In Proc. the 10th Asia-Pacific Symposium on Internetware, September 2018, Article No. 3.","DOI":"10.1145\/3275219.3275220"},{"key":"1954_CR10","doi-asserted-by":"crossref","unstructured":"Zhou P, Liu J, Yang Z J, Zhou G. Scalable tag recommendation for software information sites. In Proc. the 24th International Conference on Software Analysis, Evolution and Reengineering, February 2017, pp.272-282.","DOI":"10.1109\/SANER.2017.7884628"},{"key":"1954_CR11","doi-asserted-by":"crossref","unstructured":"Ramage D, Hall D, Nallapati R, Manning C. Labeled LDA: A supervised topic model for credit attribution in multilabeled corpora. In Proc. the 2009 Conference on Empirical Methods in Natural Language, August 2009, pp.248-256.","DOI":"10.3115\/1699510.1699543"},{"key":"1954_CR12","first-page":"993","volume":"3","author":"M David","year":"2003","unstructured":"David M, Andrew Y, Michael I. Latent Dirichlet allocation. Journal of Machine Learning Research, 2003, 3: 993-1022.","journal-title":"Journal of Machine Learning Research"},{"issue":"8","key":"1954_CR13","doi-asserted-by":"publisher","first-page":"1819","DOI":"10.1109\/TKDE.2013.39","volume":"26","author":"M Zhang","year":"2014","unstructured":"Zhang M, Zhou Z. A review on multi-label learning algorithms. IEEE Trans. Knowledge and Data Engineering, 2014, 26(8): 1819-1837.","journal-title":"IEEE Trans. Knowledge and Data Engineering"},{"key":"1954_CR14","doi-asserted-by":"crossref","unstructured":"Gousios G, Pinzger M, van Deursen A. An exploratory study of the pull-based software development model. In Proc. the 36th International Conference on Software Engineering, May 2014, pp.345-355.","DOI":"10.1145\/2568225.2568260"},{"key":"1954_CR15","first-page":"281","volume":"13","author":"J Bergstra","year":"2012","unstructured":"Bergstra J, Bengio Y. Random search for hyper-parameter optimization. Journal of Machine Learning Research, 2012, 13: 281-305.","journal-title":"Journal of Machine Learning Research"},{"key":"1954_CR16","unstructured":"McCallum A, Nigam K. A comparison of event models for naive Bayes text classification. In Proc. the 1998 AAAI\/ICML Workshop on Learning for Text Categorization, July 1998, pp.41-48."},{"issue":"5","key":"1954_CR17","doi-asserted-by":"publisher","first-page":"804","DOI":"10.1109\/21.376493","volume":"25","author":"T Denoeux","year":"1995","unstructured":"Denoeux T. A k-nearest neighbor classification rule based on Dempster-Shafer theory. IEEE Transactions on Systems, Man, and Cybernetics, 1995, 25(5): 804-813.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics"},{"issue":"1","key":"1954_CR18","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L. Random forests. Machine Learning, 2001, 45(1): 5-32.","journal-title":"Machine Learning"},{"key":"1954_CR19","doi-asserted-by":"crossref","unstructured":"Shu R, Gu X, Enck W. A study of security vulnerabilities on Docker hub. In Proc. the 7th ACM Conference on Data and Application Security and Privacy, March 2017, pp.269-280.","DOI":"10.1145\/3029806.3029832"},{"key":"1954_CR20","doi-asserted-by":"crossref","unstructured":"Manu A, Patel J, Akhtar S, Agrawal V, Murthy K. Docker container security via heuristics-based multilateral securityconceptual and pragmatic study. In Proc. the 2016 International Conference on Circuit, Power and Computing Technologies, March 2016, Article No. 114.","DOI":"10.1109\/ICCPCT.2016.7530217"},{"key":"1954_CR21","doi-asserted-by":"crossref","unstructured":"Catuogno L, Galdi C. On the evaluation of security properties of containerized systems. In Proc. the 15th International Conference on Ubiquitous Computing and Communications and the 2016 International Symposium on Cyberspace and Security, December 2016, pp.69-76.","DOI":"10.1109\/IUCC-CSS.2016.018"},{"key":"1954_CR22","doi-asserted-by":"crossref","unstructured":"Zerouali A, Mens T, Robles G, Gonz\u00e1lez-Barahona J M. On the relation between outdated Docker containers, severity vulnerabilities and bugs. In Proc. the 26th IEEE International Conference on Software Analysis, Evolution and Reengineering, February 2019, pp.491-501.","DOI":"10.1109\/SANER.2019.8668013"},{"key":"1954_CR23","doi-asserted-by":"crossref","unstructured":"Hassan F, Rodriguez R, Wang X. RUDSEA: Recommending updates of Dockerfiles via software environment analysis. In Proc. the 33rd ACM\/IEEE International Conference on Automated Software Engineering, September 2018, pp.796-801.","DOI":"10.1145\/3238147.3240470"},{"key":"1954_CR24","doi-asserted-by":"crossref","unstructured":"Zhang Y, Yin G, Wang T et al. An insight into the impact of Dockerfile evolutionary trajectories on quality and latency. In Proc. the 42nd IEEE Annual Computer Software and Applications Conference, July 2018, pp.138-143.","DOI":"10.1109\/COMPSAC.2018.00026"},{"key":"1954_CR25","doi-asserted-by":"crossref","unstructured":"Cito J, Schermann G, Wittern J, Leitner P, Zumberi S, Gall H. An empirical analysis of the docker container ecosystem on Github. In Proc. the 14th International Conference on Mining Software Repositories, May 2017, pp.323-333.","DOI":"10.1109\/MSR.2017.67"},{"key":"1954_CR26","doi-asserted-by":"crossref","unstructured":"Schermann G, Zumberi S, Cito J. Structured information on state and evolution of Dockerfiles on Github. In Proc. the 15th International Conference on Mining Software Repositories, May 2018, pp.26-29.","DOI":"10.1145\/3196398.3196456"},{"key":"1954_CR27","doi-asserted-by":"crossref","unstructured":"Cai X, Zhu J, Shen B et al. GRETA: Graph-based tag assignment for Github repositories. In Proc. the 40th IEEE Annual Computer Software and Applications Conference, June 2016, pp.63-72.","DOI":"10.1109\/COMPSAC.2016.124"},{"key":"1954_CR28","unstructured":"Ganesan K. Topic suggestions for millions of repositories. \n                    https:\/\/github.blog\/2017-07-31-topics\/\n                    \n                  , July 2019."},{"key":"1954_CR29","doi-asserted-by":"crossref","unstructured":"Al-Kofahi J M, Tamrawi A, Nguyen T T, Nguyen H A, Nguyen T N. Fuzzy set approach for automatic tagging in evolving software. In Proc. the 26th IEEE International Conference on Software Maintenance, September 2010, Article No. 37.","DOI":"10.1109\/ICSM.2010.5609751"},{"issue":"3","key":"1954_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2716262","volume":"47","author":"Eva Gibaja","year":"2015","unstructured":"Gibaja E, Ventura S. A tutorial on multilabel learning. ACM Computing Surveys, 2015, 47(3): Article No. 52.","journal-title":"ACM Computing Surveys"},{"key":"1954_CR31","doi-asserted-by":"crossref","unstructured":"Vargas-Baldrich S, V\u2019asquez M L, Poshyvanyk D. Automated tagging of software projects using bytecode and dependencies (N). In Proc. the 30th IEEE\/ACM International Conference on Automated Software Engineering, November 2015, pp.289-294.","DOI":"10.1109\/ASE.2015.38"},{"issue":"4","key":"1954_CR32","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1007\/s10515-018-0239-4","volume":"25","author":"J Liu","year":"2018","unstructured":"Liu J, Zhou P, Yang Z, Liu X, Grundy J. FastTagRec: Fast tag recommendation for software information sites. Automated Software Engineering, 2018, 25(4): 675-701.","journal-title":"Automated Software Engineering"},{"issue":"4","key":"1954_CR33","doi-asserted-by":"publisher","first-page":"830","DOI":"10.1002\/asi.23736","volume":"68","author":"F Bel\u00e9m","year":"2017","unstructured":"Bel\u00e9m F, Almeida J, Gon\u00e7alves M. A survey on tag recommendation methods. Journal of the Association for Information Science and Technology, 2017, 68(4): 830-844.","journal-title":"Journal of the Association for Information Science and Technology"},{"issue":"3","key":"1954_CR34","doi-asserted-by":"publisher","first-page":"771","DOI":"10.1016\/j.ipm.2018.12.009","volume":"56","author":"F Bel\u00e9m","year":"2019","unstructured":"Bel\u00e9m F, Heringer A G, Almeida J, Gon\u00e7alves M. Exploiting syntactic and neighbourhood attributes to address cold start in tag recommendation. Information Processing and Management, 2019, 56(3): 771-790.","journal-title":"Information Processing and Management"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-019-1954-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11390-019-1954-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-019-1954-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,4]],"date-time":"2020-09-04T23:44:12Z","timestamp":1599263052000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11390-019-1954-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":34,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["1954"],"URL":"https:\/\/doi.org\/10.1007\/s11390-019-1954-4","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9]]},"assertion":[{"value":"28 February 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 July 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 September 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}