{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T22:44:08Z","timestamp":1769640248696,"version":"3.49.0"},"reference-count":68,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/snpd.2016.7515925","type":"proceedings-article","created":{"date-parts":[[2016,7,26]],"date-time":"2016-07-26T20:38:58Z","timestamp":1469565538000},"page":"357-362","source":"Crossref","is-referenced-by-count":29,"title":["Exploring topic models in software engineering data analysis: A survey"],"prefix":"10.1109","author":[{"given":"Xiaobing","family":"Sun","sequence":"first","affiliation":[]},{"given":"Xiangyue","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yucong","family":"Duan","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jiajun","family":"Hu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2007.20"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2009.5069486"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2013.6624058"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2015.7081810"},{"key":"ref31","article-title":"Explore the evolution of development topics via on-line Ida","author":"hu","year":"2015","journal-title":"Proceedings of the 22nd IEEE International Conference on Software Analysis Evolution and Reengineering SANER&#x2019; 15"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2009.5306310"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143917"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2014.39"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1002\/smr.414"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2005.16"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2012.08.003"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2009.5069496"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9219-7"},{"key":"ref63","first-page":"93","article-title":"An exploratory analysis of mobile development issues using stack overflow","author":"vasquez","year":"2013","journal-title":"Proceedings of the 10th Working Conference on Mining Software Repositories"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-014-9312-1"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/2365324.2365329"},{"key":"ref27","author":"hassan","year":"2008","journal-title":"The road ahead for mining software repositories"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2014.16"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405337"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985466"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2014.43"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.103"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.140"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2013.6624004"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.05.017"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609687"},{"key":"ref21","first-page":"582","article-title":"Analysis of user comments: An approach for software requirements evolution","author":"galvis","year":"2013","journal-title":"Proceedings of the 2013 International Conference on Software Engineering ICSE"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2013.03.015"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR-WCRE.2014.6747182"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3115\/1613715.1613763"},{"key":"ref25","article-title":"Unstructured data and the 80 percent rule","author":"grimes","year":"2008","journal-title":"Carabridge Bridgepoints"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351687"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985950"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1986020"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.05.003"},{"key":"ref57","first-page":"1","article-title":"Top-icxp: Exploring topics in source code using latent dirichlet allocation","author":"savage","year":"2010","journal-title":"26th IEEE International Conference on Software Maintenance"},{"key":"ref56","first-page":"487","article-title":"The author-topic model for authors and documents","author":"rosen-zvi","year":"2004","journal-title":"Proceedings of the 20th conference on Uncertainty in artificial intelligence"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2377656.2377660"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606598"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2010.20"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2012.116"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143859"},{"key":"ref11","first-page":"993","article-title":"Latent dirichlet allocation","volume":"3","author":"blei","year":"2003","journal-title":"Journal of Machine Learning Research"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICIS.2014.6912158"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-013-9255-y"},{"key":"ref13","first-page":"81","article-title":"Relational topic models for document networks","author":"chang","year":"2009","journal-title":"AISTATS volume 5 of JMLR Proceedings"},{"key":"ref14","first-page":"189","article-title":"Explaining software defects using topic models","author":"chen","year":"2012","journal-title":"Proceedings of the 9th IEEE Working Conference on Mining Software Repositories"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2012.6240485"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1273496.1273526"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/smr.567"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9194-4"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2013.6613829"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2009.5069489"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74958-5_5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9231-y"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1449764.1449807"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.60"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2559935"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100062"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2133806.2133826"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45398-4"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081895"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2010.53"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693127"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2012.6240488"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2492402"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TEFSE.2009.5069582"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.04.002"}],"event":{"name":"2016 17th IEEE\/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD)","location":"Shanghai, China","start":{"date-parts":[[2016,5,30]]},"end":{"date-parts":[[2016,6,1]]}},"container-title":["2016 17th IEEE\/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7510515\/7515861\/07515925.pdf?arnumber=7515925","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,23]],"date-time":"2016-09-23T19:40:01Z","timestamp":1474659601000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7515925\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":68,"URL":"https:\/\/doi.org\/10.1109\/snpd.2016.7515925","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}