{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:41:43Z","timestamp":1750308103644,"version":"3.41.0"},"reference-count":18,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2005,5,17]],"date-time":"2005-05-17T00:00:00Z","timestamp":1116288000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGSOFT Softw. Eng. Notes"],"published-print":{"date-parts":[[2005,7]]},"abstract":"<jats:p>We propose a framework for describing, comparing and understanding tools for the mining of software repositories. The fundamental premise of this framework is that mining should be done by considering the specific needs of the users and the tasks to be supported by the mined information. First, different types of users have distinct needs, and these needs should be taken into account by tool designers. Second, the data sources available, and mined, will determine if those needs can be satisfied. Our framework is based upon three main principles: the type of user, the objective of the user, and the mined information. This framework has the following purposes: to help tool designers in the understanding and comparison of different tools, to assist users in the assessment of a potential tool; and to identify new research areas. We use this framework to describe several mining tools and to suggest future research directions.<\/jats:p>","DOI":"10.1145\/1082983.1083160","type":"journal-article","created":{"date-parts":[[2005,11,7]],"date-time":"2005-11-07T19:28:32Z","timestamp":1131391712000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A framework for describing and understanding mining tools in software development"],"prefix":"10.1145","volume":"30","author":[{"given":"Daniel M.","family":"German","sequence":"first","affiliation":[{"name":"University of Victoria, Victoria BC, Canada"}]},{"given":"Davor","family":"Cubrani\u0107","sequence":"additional","affiliation":[{"name":"University of Victoria, Victoria BC, Canada"}]},{"given":"Margaret-Anne D.","family":"Storey","sequence":"additional","affiliation":[{"name":"University of Victoria, Victoria BC, Canada"}]}],"member":"320","published-online":{"date-parts":[[2005,5,17]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/297805.297861"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/647067.715339"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031607.1031622"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/942800.943568"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1049\/ic:20040469"},{"key":"e_1_2_1_6_1","first-page":"336","volume-title":"Proc. of the 16th Internation Conference on Software Engineering and Knowledge Engineering (SEKE 2004","author":"German D. M.","year":"2004","unstructured":"D. M. German , A. Hindle , and N. Jordan . Visualizing the evolution of software using softChange . In Proc. of the 16th Internation Conference on Software Engineering and Knowledge Engineering (SEKE 2004 ), pages 336 -- 341 , 2004 .]] D. M. German, A. Hindle, and N. Jordan. Visualizing the evolution of software using softChange. In Proc. of the 16th Internation Conference on Software Engineering and Knowledge Engineering (SEKE 2004), pages 336--341, 2004.]]"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/820738.820797"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031607.1031621"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1052898.1052912"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/774833.774840"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194004001543"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/776816.776969"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1049\/ic:20040486"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2005.25"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1056018.1056045"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/851042.857038"},{"key":"e_1_2_1_17_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1007\/3-540-49247-X_19","volume-title":"Communities through time: Using history for social navigation","author":"Wexelblat A.","year":"1998","unstructured":"A. Wexelblat . Communities through time: Using history for social navigation . In T. Ishida, editor, Lecture Notes in Computer Science , volume 1519 , pages 281 -- 298 . Springer Verlag , 1998 .]] A. Wexelblat. Communities through time: Using history for social navigation. In T. Ishida, editor, Lecture Notes in Computer Science, volume 1519, pages 281--298. Springer Verlag, 1998.]]"},{"key":"e_1_2_1_18_1","first-page":"90","volume-title":"Proc. 11th Working Conference on Reverse Engineering","author":"Wu X.","year":"2004","unstructured":"X. Wu , A. Murray , M.-A. Storey , and R. Lintern . A reverse engineering approach to support software maintenance: Version control knowledge extraction . In Proc. 11th Working Conference on Reverse Engineering , pages 90 -- 99 , 2004 .]] X. Wu, A. Murray, M.-A. Storey, and R. Lintern. A reverse engineering approach to support software maintenance: Version control knowledge extraction. In Proc. 11th Working Conference on Reverse Engineering, pages 90--99, 2004.]]"}],"container-title":["ACM SIGSOFT Software Engineering Notes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1082983.1083160","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1082983.1083160","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:08:05Z","timestamp":1750262885000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1082983.1083160"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,5,17]]},"references-count":18,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2005,7]]}},"alternative-id":["10.1145\/1082983.1083160"],"URL":"https:\/\/doi.org\/10.1145\/1082983.1083160","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1083142.1083160","asserted-by":"subject"}]},"ISSN":["0163-5948"],"issn-type":[{"type":"print","value":"0163-5948"}],"subject":[],"published":{"date-parts":[[2005,5,17]]},"assertion":[{"value":"2005-05-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}