{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:15:41Z","timestamp":1759335341737},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,2,22]],"date-time":"2021-02-22T00:00:00Z","timestamp":1613952000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,2,22]],"date-time":"2021-02-22T00:00:00Z","timestamp":1613952000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Vis"],"published-print":{"date-parts":[[2021,8]]},"DOI":"10.1007\/s12650-020-00739-7","type":"journal-article","created":{"date-parts":[[2021,2,22]],"date-time":"2021-02-22T13:04:14Z","timestamp":1613999054000},"page":"827-844","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Visual exploration of software evolution via topic modeling"],"prefix":"10.1007","volume":"24","author":[{"given":"Huan","family":"Liu","sequence":"first","affiliation":[]},{"given":"Yubo","family":"Tao","sequence":"additional","affiliation":[]},{"given":"Yining","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Wenda","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Hai","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,22]]},"reference":[{"key":"739_CR1","unstructured":"Alcocer JPS, Beck F, Bergel A (2019) Performance evolution matrix: visualizing performance variations along software versions. In: 2019 Working conference on software visualization (VISSOFT), pp. 1\u201311. IEEE"},{"issue":"5","key":"739_CR2","first-page":"43","volume":"9","author":"S Banitaan","year":"2015","unstructured":"Banitaan S, Alenezi M (2015) Software evolution via topic modeling: an analytic study. Int J Softw Eng Appl 9(5):43\u201352","journal-title":"Int J Softw Eng Appl"},{"issue":"Jan","key":"739_CR3","first-page":"993","volume":"3","author":"DM Blei","year":"2003","unstructured":"Blei DM, Ng AY, Jordan MI (2003) Latent dirichlet allocation. J Mach Learn Res 3(Jan):993\u20131022","journal-title":"J Mach Learn Res"},{"key":"739_CR4","doi-asserted-by":"crossref","unstructured":"Bolte F, Bruckner S (2020) Vis-a-vis: visual exploration of visualization source code evolution. IEEE Trans Vis Comput Gr","DOI":"10.1109\/TVCG.2019.2963651"},{"key":"739_CR5","doi-asserted-by":"crossref","unstructured":"Burch M, Munz T, Beck F, Weiskopf D (2015) Visualizing work processes in software engineering with developer rivers. In: 2015 IEEE 3rd working conference on software visualization (VISSOFT), pp. 116\u2013124. IEEE","DOI":"10.1109\/VISSOFT.2015.7332421"},{"key":"739_CR6","doi-asserted-by":"crossref","unstructured":"Carre\u00f1o LVG, Winbladh K (2013) Analysis of user comments: an approach for software requirements evolution. In: 2013 35th international conference on software engineering (ICSE), pp. 582\u2013591. IEEE","DOI":"10.1109\/ICSE.2013.6606604"},{"key":"739_CR7","unstructured":"Chen TH, Thomas SW, Nagappan M, Hassan AE (2012) Explaining software defects using topic models. In: 2012 9th IEEE working conference on mining software repositories (MSR), pp. 189\u2013198. IEEE"},{"issue":"4","key":"739_CR8","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/s12650-020-00647-w","volume":"23","author":"N Chotisarn","year":"2020","unstructured":"Chotisarn N, Merino L, Zheng X, Lonapalawong S, Zhang T, Xu M, Chen W (2020) A systematic literature review of modern software visualization. J Vis 23(4):539\u2013558","journal-title":"J Vis"},{"key":"739_CR9","doi-asserted-by":"crossref","unstructured":"Gethers M, Poshyvanyk D (2010) Using relational topic models to capture coupling among classes in object-oriented software systems. In: 2010 IEEE international conference on software maintenance, pp. 1\u201310. IEEE","DOI":"10.1109\/ICSM.2010.5609687"},{"issue":"4","key":"739_CR10","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1177\/1473871611416549","volume":"10","author":"M Gleicher","year":"2011","unstructured":"Gleicher M, Albers D, Walker R, Jusufi I, Hansen CD, Roberts JC (2011) Visual comparison for information visualization. Inf Vis 10(4):289\u2013309","journal-title":"Inf Vis"},{"key":"739_CR11","doi-asserted-by":"crossref","unstructured":"G\u00f6de N, Koschke R (2009) Incremental clone detection. In: 2009 13th European conference on software maintenance and reengineering, pp. 219\u2013228. IEEE","DOI":"10.1109\/CSMR.2009.20"},{"issue":"1","key":"739_CR12","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1109\/2945.981848","volume":"8","author":"S Havre","year":"2002","unstructured":"Havre S, Hetzler E, Whitney P, Nowell L (2002) Themeriver: visualizing thematic changes in large document collections. IEEE Trans Vis Comput Gr 8(1):9\u201320","journal-title":"IEEE Trans Vis Comput Gr"},{"key":"739_CR13","doi-asserted-by":"crossref","unstructured":"Hindle A, Godfrey MW, Holt RC (2009) What\u2019s hot and what\u2019s not: Windowed developer topic analysis. In: 2009 IEEE international conference on software maintenance, pp. 339\u2013348. IEEE","DOI":"10.1109\/ICSM.2009.5306310"},{"key":"739_CR14","doi-asserted-by":"crossref","unstructured":"Hu J, Sun X, Li B (2015) Explore the evolution of development topics via on-line LDA. In: 2015 IEEE 22nd international conference on software analysis, evolution, and reengineering (SANER), pp. 555\u2013559. IEEE","DOI":"10.1109\/SANER.2015.7081876"},{"key":"739_CR15","doi-asserted-by":"crossref","unstructured":"Hu J, Sun X, Lo D, Li B (2015) Modeling the evolution of development topics using dynamic topic models. In: 2015 IEEE 22nd international conference on software analysis, evolution, and reengineering (SANER), pp. 3\u201312. IEEE","DOI":"10.1109\/SANER.2015.7081810"},{"key":"739_CR16","doi-asserted-by":"crossref","unstructured":"Ishio T, Maeda N, Shibuya K, Inoue K (2018) Cloned buggy code detection in practice using normalized compression distance. In: 2018 IEEE international conference on software maintenance and evolution (ICSME), pp. 591\u2013594. IEEE","DOI":"10.1109\/ICSME.2018.00022"},{"issue":"11","key":"739_CR17","doi-asserted-by":"publisher","first-page":"15169","DOI":"10.1007\/s11042-018-6894-4","volume":"78","author":"H Jelodar","year":"2019","unstructured":"Jelodar H, Wang Y, Yuan C, Feng X, Jiang X, Li Y, Zhao L (2019) Latent dirichlet allocation (LDA) and topic modeling: models, applications, a survey. Multimed Tools Appl 78(11):15169\u201315211","journal-title":"Multimed Tools Appl"},{"key":"739_CR18","unstructured":"Juri\u010di\u0107 V (2011) Detecting source code similarity using low-level languages. In: Proceedings of the ITI 2011, 33rd international conference on information technology interfaces, pp. 597\u2013602. IEEE"},{"issue":"7","key":"739_CR19","doi-asserted-by":"publisher","first-page":"654","DOI":"10.1109\/TSE.2002.1019480","volume":"28","author":"T Kamiya","year":"2002","unstructured":"Kamiya T, Kusumoto S, Inoue K (2002) Ccfinder: a multilinguistic token-based code clone detection system for large scale source code. IEEE Trans Softw Eng 28(7):654\u2013670","journal-title":"IEEE Trans Softw Eng"},{"key":"739_CR20","doi-asserted-by":"crossref","unstructured":"Kawamitsu N, Ishio T, Kanda T, Kula RG, De\u00a0Roover C, Inoue K (2014) Identifying source code reuse across repositories using LCS-based source code similarity. In: 2014 IEEE 14th international working conference on source code analysis and manipulation, pp. 305\u2013314. IEEE","DOI":"10.1109\/SCAM.2014.17"},{"key":"739_CR21","doi-asserted-by":"crossref","unstructured":"Linstead E, Lopes C, Baldi P (2008) An application of latent dirichlet allocation to analyzing software evolution. In: 2008 seventh international conference on machine learning and applications, pp. 813\u2013818. IEEE","DOI":"10.1109\/ICMLA.2008.47"},{"key":"739_CR22","doi-asserted-by":"crossref","unstructured":"Linstead E, Rigor P, Bajracharya S, Lopes C, Baldi P (2007) Mining concepts from code with probabilistic topic models. In: Proceedings of the twenty-second IEEE\/ACM international conference on automated software engineering, pp. 461\u2013464","DOI":"10.1145\/1321631.1321709"},{"issue":"12","key":"739_CR23","doi-asserted-by":"publisher","first-page":"1373","DOI":"10.1007\/s00371-013-0892-3","volume":"30","author":"S Liu","year":"2014","unstructured":"Liu S, Cui W, Wu Y, Liu M (2014) A survey on information visualization: recent advances and challenges. Vis Comput 30(12):1373\u20131393","journal-title":"Vis Comput"},{"issue":"9","key":"739_CR24","doi-asserted-by":"publisher","first-page":"972","DOI":"10.1016\/j.infsof.2010.04.002","volume":"52","author":"SK Lukins","year":"2010","unstructured":"Lukins SK, Kraft NA, Etzkorn LH (2010) Bug localization using latent dirichlet allocation. Inf Softw Technol 52(9):972\u2013990","journal-title":"Inf Softw Technol"},{"key":"739_CR25","doi-asserted-by":"crossref","unstructured":"Nam D, Lee YK, Medvidovic N (2018) Eva: a tool for visualizing software architectural evolution. In: Proceedings of the 40th international conference on software engineering: companion proceeedings, pp. 53\u201356","DOI":"10.1145\/3183440.3183490"},{"issue":"11","key":"739_CR26","doi-asserted-by":"publisher","first-page":"1860","DOI":"10.1016\/j.infsof.2013.05.008","volume":"55","author":"RL Novais","year":"2013","unstructured":"Novais RL, Torres A, Mendes TS, Mendon\u00e7a M, Zazworka N (2013) Software evolution visualization: a systematic mapping study. Inf Softw Technol 55(11):1860\u20131883","journal-title":"Inf Softw Technol"},{"key":"739_CR27","doi-asserted-by":"crossref","unstructured":"Ogawa M, Ma KL (2010) Software evolution storylines. In: Proceedings of the 5th international symposium on Software visualization, pp. 35\u201342","DOI":"10.1145\/1879211.1879219"},{"key":"739_CR28","doi-asserted-by":"crossref","unstructured":"Popescu DA, Nicolae D (2014) Determining the similarity of two web applications using the edit distance. In: International workshop soft computing applications, pp. 681\u2013690. Springer","DOI":"10.1007\/978-3-319-18296-4_53"},{"issue":"4","key":"739_CR29","doi-asserted-by":"publisher","first-page":"2464","DOI":"10.1007\/s10664-017-9564-7","volume":"23","author":"C Ragkhitwetsagul","year":"2018","unstructured":"Ragkhitwetsagul C, Krinke J, Clark D (2018) A comparison of code similarity analysers. Empir Softw Eng 23(4):2464\u20132519","journal-title":"Empir Softw Eng"},{"key":"739_CR30","doi-asserted-by":"crossref","unstructured":"Schneider T, Tymchuk Y, Salgado R, Bergel A (2016) Cuboidmatrix: exploring dynamic structural connections in software components using space-time cube. In: 2016 IEEE working conference on software visualization (VISSOFT), pp. 116\u2013125. IEEE","DOI":"10.1109\/VISSOFT.2016.17"},{"key":"739_CR31","doi-asserted-by":"crossref","unstructured":"Sun X, Liu X, Li B, Duan Y, Yang H, Hu J (2016) Exploring topic models in software engineering data analysis: a survey. In: 2016 17th IEEE\/ACIS international conference on software engineering, artificial intelligence, networking and parallel\/distributed computing (SNPD), pp. 357\u2013362. IEEE","DOI":"10.1109\/SNPD.2016.7515925"},{"issue":"3","key":"739_CR32","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1111\/j.1467-8659.2008.01214.x","volume":"27","author":"A Telea","year":"2008","unstructured":"Telea A, Auber D (2008) Code flows: visualizing structural evolution of source code. Comput Gr Forum 27(3):831\u2013838","journal-title":"Comput Gr Forum"},{"key":"739_CR33","doi-asserted-by":"crossref","unstructured":"Thomas SW, Adams B, Hassan AE, Blostein D (2010) Validating the use of topic models for software evolution. In: 2010 10th IEEE working conference on source code analysis and manipulation, pp. 55\u201364. IEEE","DOI":"10.1109\/SCAM.2010.13"},{"key":"739_CR34","doi-asserted-by":"crossref","unstructured":"Thomas SW, Adams B, Hassan AE, Blostein D (2011) Modeling the evolution of topics in source code histories. In: Proceedings of the 8th working conference on mining software repositories, pp. 173\u2013182","DOI":"10.1145\/1985441.1985467"},{"key":"739_CR35","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1016\/j.scico.2012.08.003","volume":"80","author":"SW Thomas","year":"2014","unstructured":"Thomas SW, Adams B, Hassan AE, Blostein D (2014) Studying software evolution using topic models. Sci Comput Program 80:457\u2013479","journal-title":"Sci Comput Program"},{"key":"739_CR36","doi-asserted-by":"crossref","unstructured":"Vinc\u00far J, N\u00e1vrat P, Polasek I (2017) Vr city: software analysis in virtual reality environment. In: 2017 IEEE international conference on software quality, reliability and security companion (QRS-C), pp. 509\u2013516. IEEE","DOI":"10.1109\/QRS-C.2017.88"},{"key":"739_CR37","doi-asserted-by":"crossref","unstructured":"Wittenhagen M, Cherek C, Borchers J (2016) Chronicler: interactive exploration of source code history. In: Proceedings of the 2016 CHI conference on human factors in computing systems, pp. 3522\u20133532","DOI":"10.1145\/2858036.2858442"},{"key":"739_CR38","doi-asserted-by":"crossref","unstructured":"Yoon Y, Myers BA, Koo S (2013) Visualization of fine-grained code change history. In: 2013 IEEE symposium on visual languages and human centric computing, pp. 119\u2013126. IEEE","DOI":"10.1109\/VLHCC.2013.6645254"}],"container-title":["Journal of Visualization"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12650-020-00739-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12650-020-00739-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12650-020-00739-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,13]],"date-time":"2021-07-13T02:24:02Z","timestamp":1626143042000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12650-020-00739-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,22]]},"references-count":38,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,8]]}},"alternative-id":["739"],"URL":"https:\/\/doi.org\/10.1007\/s12650-020-00739-7","relation":{},"ISSN":["1343-8875","1875-8975"],"issn-type":[{"value":"1343-8875","type":"print"},{"value":"1875-8975","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,22]]},"assertion":[{"value":"3 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 November 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 February 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}