{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T06:00:18Z","timestamp":1760853618149,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/msr.2012.6224280","type":"proceedings-article","created":{"date-parts":[[2012,7,9]],"date-time":"2012-07-09T19:35:00Z","timestamp":1341862500000},"page":"189-198","source":"Crossref","is-referenced-by-count":18,"title":["Explaining software defects using topic models"],"prefix":"10.1109","author":[{"family":"Tse-Hsun Chen","sequence":"first","affiliation":[]},{"given":"S. W.","family":"Thomas","sequence":"additional","affiliation":[]},{"given":"M.","family":"Nagappan","sequence":"additional","affiliation":[]},{"given":"A. E.","family":"Hassan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"467","article-title":"Class-based n-gram models of natural language","volume":"18","author":"brown","year":"1992","journal-title":"Computational Linguistics"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.1016"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.04.002"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9159-7"},{"journal-title":"Mallet A machine learning for language toolkit","year":"2002","author":"mccallum","key":"18"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985467"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609687"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9095-3"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806817"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/312624.312649"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985467"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985451"},{"key":"11","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1016\/j.infsof.2006.10.017","article-title":"Semantic clustering: Identifying topics in source code","volume":"49","author":"kuhn","year":"2007","journal-title":"Information and Software Technology"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2009.5069496"},{"key":"12","article-title":"Rethinking LDA: Why priors matter","author":"wallach","year":"0","journal-title":"Proceedings of NIPS-09 Vancouver BC 2009"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(85)90005-6"},{"journal-title":"Models for Probability and Statistical Inference Theory and Applications","year":"2008","author":"stapleton","key":"20"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025119"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2010.5463279"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/METRIC.1997.637174"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062514"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1998.730896"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.2307\/271063"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1177\/0049124104268644"},{"journal-title":"Principal Component Analysis","year":"2002","author":"jolliffe","key":"29"},{"key":"3","article-title":"A systematic review of fault prediction performance in software engineering","volume":"pp","author":"hall","year":"2011","journal-title":"IEEE Transactions on Software Engineering"},{"journal-title":"Metrics and Models in Software Quality Engineering","year":"2002","author":"kan","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2010.13"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/280324.280335"},{"journal-title":"Statistical Methods in Hydrology","year":"1977","author":"haan","key":"30"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2008.47"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1342211.1342234"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2010.22"},{"key":"5","first-page":"932","article-title":"Topic-based defect prediction","author":"nguyen","year":"0","journal-title":"Proceedings of the 33rd International Conference on Software Engineering 2011"},{"journal-title":"FACTOR ANALYSIS an Applied Approach","year":"1993","author":"cureton","key":"31"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2009.5306318"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1449764.1449807"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1162\/jmlr.2003.3.4-5.993"}],"event":{"name":"2012 9th IEEE Working Conference on Mining Software Repositories (MSR 2012)","start":{"date-parts":[[2012,6,2]]},"location":"Zurich","end":{"date-parts":[[2012,6,3]]}},"container-title":["2012 9th IEEE Working Conference on Mining Software Repositories (MSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6220358\/6224266\/06224280.pdf?arnumber=6224280","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T21:07:23Z","timestamp":1497992843000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6224280\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/msr.2012.6224280","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}