{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T18:23:43Z","timestamp":1778351023382,"version":"3.51.4"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/icsm.2015.7332472","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T22:44:11Z","timestamp":1448318651000},"page":"261-270","source":"Crossref","is-referenced-by-count":77,"title":["Who should review this change?: Putting text and file location analyses together for more accurate recommendations"],"prefix":"10.1109","author":[{"given":"Xin","family":"Xia","sequence":"first","affiliation":[]},{"given":"David","family":"Lo","sequence":"additional","affiliation":[]},{"given":"Xinyu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiaohu","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2597008.2597788"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2011.72"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/256428.167070"},{"key":"ref30","author":"tutorial","year":"0","journal-title":"Word Vector Tool"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227210"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1706"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2013.6671282"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2013.6671287"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1147\/sj.382.0258"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568260"},{"key":"ref13","author":"han","year":"2006","journal-title":"Data Mining Southeast Asia Edition Concepts and Techniques"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2597008.2597147"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2013.6624016"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/smr.530"},{"key":"ref17","first-page":"41","volume":"752","author":"mccallum","year":"1998","journal-title":"AAAI-98 Workshop on Learning for Text Categorization"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597076"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1109\/ICSE.2002.1007994","article-title":"Expertise Browser: A Quantitative Approach to Identifying Expertise","author":"audris mockus","year":"2002","journal-title":"Proceedings of the 24th International Conference on Software Engineering ICSE 2002"},{"key":"ref28","first-page":"141","article-title":"Who should review my code?","author":"thongtanunam","year":"2015","journal-title":"Proceedings of the 22nd IEEE International Conference on Software Analysis Evolution and Reengineering"},{"key":"ref4","year":"0","journal-title":"Qt code review system"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025163"},{"key":"ref3","year":"0","journal-title":"Openstack code review system"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134336"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2012.48"},{"key":"ref5","first-page":"13","author":"ackerman","year":"1984","journal-title":"Proceedings of the symposium on Software validation inspection-testing-verification-alternatives"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606617"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.243"},{"key":"ref2","article-title":"Libreoffice code review system","year":"0","journal-title":"httpsr\/\/gerrit iibreoffice org\/"},{"key":"ref9","article-title":"Modern information retrieval","volume":"463","author":"baeza-yates","year":"1999"},{"key":"ref1","year":"0","journal-title":"Android code review system"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2015.7081827"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368162"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985451"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2013.6623997"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985867"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2011.53"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2008.7"}],"event":{"name":"2015 IEEE International Conference on Software Maintenance and Evolution (ICSME)","location":"Bremen, Germany","start":{"date-parts":[[2015,9,29]]},"end":{"date-parts":[[2015,10,1]]}},"container-title":["2015 IEEE International Conference on Software Maintenance and Evolution (ICSME)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7321954\/7332440\/07332472.pdf?arnumber=7332472","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T00:14:05Z","timestamp":1498263245000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7332472\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/icsm.2015.7332472","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}