{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T22:40:49Z","timestamp":1769726449102,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,16]],"date-time":"2014-11-16T00:00:00Z","timestamp":1416096000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100007567","name":"City University of Hong Kong","doi-asserted-by":"publisher","award":["7200354, 7003032"],"award-info":[{"award-number":["7200354, 7003032"]}],"id":[{"id":"10.13039\/100007567","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,16]]},"DOI":"10.1145\/2666581.2666594","type":"proceedings-article","created":{"date-parts":[[2014,11,7]],"date-time":"2014-11-07T17:10:54Z","timestamp":1415380254000},"page":"106-114","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["An empirical study of BM25 and BM25F based feature location techniques"],"prefix":"10.1145","author":[{"given":"Zhendong","family":"Shi","sequence":"first","affiliation":[{"name":"Xi'an Jiaotong University, China \/ City University of Hong Kong, China"}]},{"given":"Jacky","family":"Keung","sequence":"additional","affiliation":[{"name":"City University of Hong Kong, China"}]},{"given":"Qinbao","family":"Song","sequence":"additional","affiliation":[{"name":"Xi'an Jiaotong University, China"}]}],"member":"320","published-online":{"date-parts":[[2014,11,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2011.18"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2012.26"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2013.6613841"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9224-x"},{"key":"e_1_3_2_1_5_1","first-page":"4","article-title":"Latent Dirichlet Allocation","volume":"3","author":"Blei D.M.","year":"2003","journal-title":"Journal of Machine Learning Research."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2005.22"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2011.47"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.567"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9194-4"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0307752101"},{"key":"e_1_3_2_1_12_1","unstructured":"JELINEK F. 1980. Interpolated estimation of Markov source parameters from sparse data. Pattern Recognition in Practice. (1980). JELINEK F. 1980. Interpolated estimation of Markov source parameters from sparse data. Pattern Recognition in Practice. (1980)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.24"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321667"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.04.002"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2008.33"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Manning C.D. Raghavan P. and Sch\u00fctze H. 2008. Introduction to information retrieval. Cambridge university press Cambridge. Manning C.D. Raghavan P. and Sch\u00fctze H. 2008. Introduction to information retrieval. Cambridge university press Cambridge.","DOI":"10.1017\/CBO9780511809071"},{"key":"e_1_3_2_1_18_1","volume-title":"Reverse Engineering, 2004. Proceedings. 11th Working Conference on","author":"Marcus A.","year":"2004"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.70"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Porter M.F. 1980. An algorithm for suffix stripping. Program: electronic library and information systems. 14 3 (1980) 130\u2013137. Porter M.F. 1980. An algorithm for suffix stripping. Program: electronic library and information systems. 14 3 (1980) 130\u2013137.","DOI":"10.1108\/eb046814"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.1016"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2007.13"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985451"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Rubin J. and Chechik M. 2013. A Survey of Feature Location Techniques. Domain Engineering. I. Reinhartz-Berger A. Sturm T. Clark S. Cohen and J. Bettin eds. Springer Berlin Heidelberg. 29\u201358. Rubin J. and Chechik M. 2013. A Survey of Feature Location Techniques. Domain Engineering. I. Reinhartz-Berger A. Sturm T. Clark S. Cohen and J. Bettin eds. Springer Berlin Heidelberg. 29\u201358.","DOI":"10.1007\/978-3-642-36654-3_2"},{"key":"e_1_3_2_1_25_1","volume-title":"Overview of the Third Text REtrieval Conference (TREC\u20133)","author":"Robertson S.","year":"1995"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693093"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2011.13"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5120\/4587-6771"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/2664446.2664454"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Tantithamthavorn C. Ihara A. Hata H. and Matsumoto K. 2014. Impact Analysis of Granularity Levels on Feature Location Technique. Requirements Engineering. D. Zowghi and Z. Jin eds. Springer Berlin Heidelberg. 135\u2013149. Tantithamthavorn C. Ihara A. Hata H. and Matsumoto K. 2014. Impact Analysis of Granularity Levels on Feature Location Technique. Requirements Engineering. D. Zowghi and Z. Jin eds. Springer Berlin Heidelberg. 135\u2013149.","DOI":"10.1007\/978-3-662-43610-3_11"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.27"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Voorhees E.M. 1999. The TREC-8 Question Answering Track Report. Natural Language Engineering. E. Voorhees and De. Harman eds. NIST. 77\u201382. Voorhees E.M. 1999. The TREC-8 Question Answering Track Report. Natural Language Engineering. E. Voorhees and De. Harman eds. NIST. 77\u201382.","DOI":"10.6028\/NIST.SP.500-246.qa-overview"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597008.2597148"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2011.72"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAAI.2012.20"},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of TREC 2004","author":"Zaragoza H.","year":"2004"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337226"}],"event":{"name":"SIGSOFT\/FSE'14: 22nd ACM SIGSOFT Symposium on the Foundations of Software Engineering","location":"Hong Kong China","acronym":"SIGSOFT\/FSE'14","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the International Workshop on Innovative Software Development Methodologies and Practices"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2666581.2666594","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2666581.2666594","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:14Z","timestamp":1750227134000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2666581.2666594"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,16]]},"references-count":37,"alternative-id":["10.1145\/2666581.2666594","10.1145\/2666581"],"URL":"https:\/\/doi.org\/10.1145\/2666581.2666594","relation":{},"subject":[],"published":{"date-parts":[[2014,11,16]]},"assertion":[{"value":"2014-11-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}