{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T23:25:18Z","timestamp":1769556318525,"version":"3.49.0"},"reference-count":69,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2017,9,1]],"date-time":"2017-09-01T00:00:00Z","timestamp":1504224000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/tr.2017.2699938","type":"journal-article","created":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T21:08:44Z","timestamp":1497560924000},"page":"806-824","source":"Crossref","is-referenced-by-count":12,"title":["An Empirical Study on the Effect of Testing on Code Quality Using Topic Models: A Case Study on Software Development Systems"],"prefix":"10.1109","volume":"66","author":[{"given":"Tse-Hsun","family":"Chen","sequence":"first","affiliation":[]},{"given":"Stephen W.","family":"Thomas","sequence":"additional","affiliation":[]},{"given":"Hadi","family":"Hemmati","sequence":"additional","affiliation":[]},{"given":"Meiyappan","family":"Nagappan","sequence":"additional","affiliation":[]},{"given":"Ahmed E.","family":"Hassan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","author":"jolliffe","year":"2002","journal-title":"Principal Component Analysis"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.256941"},{"key":"ref33","first-page":"467","article-title":"Class-based n-gram models of natural language","volume":"18","author":"brown","year":"1992","journal-title":"Comput Linguist"},{"key":"ref32","article-title":"MALLET: A machine learning for language toolkit","author":"mccallum","year":"2002"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.04.002"},{"key":"ref30","first-page":"1973","article-title":"Rethinking LDA: Why priors matter","author":"wallach","year":"2009","journal-title":"Proc Neural Inf Process Syst"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2008.10.005"},{"key":"ref36","first-page":"284","article-title":"Use of relative code churn measures to predict system defect density","author":"nagappan","year":"2005","journal-title":"Proc 27th Int l Conf Software Eng"},{"key":"ref35","first-page":"1","article-title":"Machine learning from imbalanced data sets 101 (extended abstract)","author":"provost","year":"2000","journal-title":"Proc AAAI Workshop Learning Imbalanced Data Sets"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/PROMISE.2007.10"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2009.5069496"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.60"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2559935"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985988"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806817"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080780"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609687"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9402-8"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9219-7"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405278"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/32.859533"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070510"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.05.015"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/32.6165"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1189748.1189751"},{"key":"ref20","article-title":"Mine: Maximal information-based\n nonparametric exploration","author":"reshef","year":"2012"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367513"},{"key":"ref21","author":"stewart","year":"2009","journal-title":"Calculus Concepts and Contexts (Stewart's Calculus Series)"},{"key":"ref24","article-title":"Mining software repositories with topic models","author":"thomas","year":"2012"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2008.47"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985467"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/312624.312649"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/1414004.1414063"},{"key":"ref51","article-title":"Eclipse bug report 71888","year":"2016"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9095-3"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/32.988497"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.27"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080778"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405328"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007617005950"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227135"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606598"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985950"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1342211.1342234"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025119"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2008.47"},{"key":"ref13","first-page":"189","article-title":"Explaining software defects using topic\n models","author":"chen","year":"2012","journal-title":"Proceedings of the 9th IEEE Working Conference on Mining Software Repositories"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/2.312032"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1126\/science.1205438"},{"key":"ref16","author":"chen","year":"2015","journal-title":"An Empirical Study on the Effect of Testing on Code Quality Using Topic Models A Case Study on Software Development Systems"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2010.13"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2006.10.017"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2012.6224295"},{"key":"ref4","author":"myers","year":"2004","journal-title":"The Art of Software Testing"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/356651.356652"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/52.714817"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2007.18"},{"key":"ref8","first-page":"993","article-title":"Latent\n Dirichlet allocation","volume":"3","author":"blei","year":"2003","journal-title":"J Mach Learn Res"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1449764.1449807"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.112"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2009.5306318"},{"key":"ref46","author":"oram","year":"2010","journal-title":"Making Software What Really Works and Why We Believe It (O&#x2019;Reilly Series)"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.4236\/jsea.2009.23020"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1998.730896"},{"key":"ref47","first-page":"284","article-title":"Use of relative code churn measures to predict system defect density","author":"nagappan","year":"2005","journal-title":"Proc 27th Int l Conf Software Eng"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609530"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2010.18"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/METRIC.1997.637174"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2010.5463279"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/8022996\/07949108.pdf?arnumber=7949108","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:04:26Z","timestamp":1642003466000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7949108\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":69,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tr.2017.2699938","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,9]]}}}