{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T06:30:12Z","timestamp":1772519412129,"version":"3.50.1"},"reference-count":28,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2015,2,6]],"date-time":"2015-02-06T00:00:00Z","timestamp":1423180800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGSOFT Softw. Eng. Notes"],"published-print":{"date-parts":[[2015,2,6]]},"abstract":"<jats:p>The problem of bug localization is to identify the source files related to a bug in a software repository. Information Retrieval (IR) based approaches create an index of the source files and learn a model which is then queried with a bug for the relevant files. In spite of the advances in these tools, the current approaches do not take into consideration the dynamic nature of software repositories. With the traditional IR based approaches to bug localization, the model parameters must be recalculated for each change to a repository. In contrast, this paper presents an incremental framework to update the model parameters of the Latent Semantic Analysis (LSA) model as the data evolves. We compare two state-of-the-art incremental SVD update techniques for LSA with respect to the retrieval accuracy and the time performance. The dataset we used in our validation experiments was created from mining 10 years of version history of AspectJ and JodaTime software libraries.<\/jats:p>","DOI":"10.1145\/2693208.2693222","type":"journal-article","created":{"date-parts":[[2015,2,10]],"date-time":"2015-02-10T13:19:47Z","timestamp":1423574387000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Comparing Incremental Latent Semantic Analysis Algorithms for Efficient Retrieval from Software Libraries for Bug Localization"],"prefix":"10.1145","volume":"40","author":[{"given":"Shivani","family":"Rao","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Henry","family":"Medeiros","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Avinash","family":"Kak","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2015,2,6]]},"reference":[{"key":"e_1_2_1_1_1","first-page":"351","volume-title":"IEEE International Conference on","author":"Gay G.","year":"2009"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985451"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2008.33"},{"key":"e_1_2_1_4_1","volume-title":"2012 9th IEEE Working Conference on","author":"Sisman B.","year":"2012"},{"key":"e_1_2_1_5_1","first-page":"14","volume-title":"2012 34th International Conference on","author":"Zhou J.","year":"2012"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2012.26"},{"key":"e_1_2_1_7_1","volume-title":"35th International Conference on","author":"Haiduc S.","year":"2013"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100144"},{"key":"e_1_2_1_9_1","doi-asserted-by":"crossref","unstructured":"B. Sisman and A. C. Kak \"Assisting Code Search with Automatic Query Reformulation for Bug Localization \" in Proceedings of the 10th Working Conference on Mining Software Repositories 2013 pp. 309--318. B. Sisman and A. C. Kak \"Assisting Code Search with Automatic Query Reformulation for Bug Localization \" in Proceedings of the 10th Working Conference on Mining Software Repositories 2013 pp. 309--318.","DOI":"10.1109\/MSR.2013.6624044"},{"key":"e_1_2_1_10_1","doi-asserted-by":"crossref","unstructured":"S. Rao H. Medeiros and A. Kak \"An Incremental Update Framework for Efficient Retrieval from Software Libraries for Bug Localization \" in Working Conference on Reverse Engineering 2013. S. Rao H. Medeiros and A. Kak \"An Incremental Update Framework for Efficient Retrieval from Software Libraries for Bug Localization \" in Working Conference on Reverse Engineering 2013.","DOI":"10.1109\/WCRE.2013.6671281"},{"key":"e_1_2_1_11_1","volume-title":"USA: Cambridge University Press","author":"Manning C. D.","year":"2008"},{"key":"e_1_2_1_12_1","first-page":"103","volume-title":"ICSE '01","author":"Maletic J. I.","year":"2001"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2005.16"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2006.10.017"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2007.13"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2006.17"},{"key":"e_1_2_1_17_1","doi-asserted-by":"crossref","unstructured":"A. Marcus A. Sergeyev V. Rajlich and J. I. Maletic \"An Information Retrieval Approach to Concept Location in Source code \" in In Proceedings of the 11th Working Conference on Reverse Engineering 2004 pp. 214--223. A. Marcus A. Sergeyev V. Rajlich and J. I. Maletic \"An Information Retrieval Approach to Concept Location in Source code \" in In Proceedings of the 11th Working Conference on Reverse Engineering 2004 pp. 214--223.","DOI":"10.1109\/WCRE.2004.10"},{"key":"e_1_2_1_18_1","doi-asserted-by":"crossref","unstructured":"A. Marcus and J. I. Maletic \"Recovering Documentation-to-Source-Code Traceability Links using Latent Semantic Indexing \" in Proceedings of the 25th International Conference on Software Engineering (ICSE '03) 2003 pp. 125--135. A. Marcus and J. I. Maletic \"Recovering Documentation-to-Source-Code Traceability Links using Latent Semantic Indexing \" in Proceedings of the 25th International Conference on Software Engineering (ICSE '03) 2003 pp. 125--135.","DOI":"10.1109\/ICSE.2003.1201194"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368216"},{"key":"e_1_2_1_20_1","first-page":"107","volume-title":"Proceedings. 16th Annual International Conference on","author":"Marcus A.","year":"2001"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.16"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.laa.2005.07.021"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1137\/090771806"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1137\/S1064827597329266"},{"key":"e_1_2_1_26_1","first-page":"289","volume-title":"European Conference on Information Retrieval","author":"Rehurek R.","year":"2011"},{"key":"e_1_2_1_27_1","unstructured":"\"Stochastic svd \" http:\/\/code.google.com\/p\/redsvd\/. \"Stochastic svd \" http:\/\/code.google.com\/p\/redsvd\/."},{"key":"e_1_2_1_28_1","unstructured":"G. H. Golub and C. F. V. Loan Matrix Computations 3rd ed. The Johns Hopkins University Press Oct 1996. G. H. Golub and C. F. V. Loan Matrix Computations 3rd ed. The Johns Hopkins University Press Oct 1996."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2009.61"}],"container-title":["ACM SIGSOFT Software Engineering Notes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2693208.2693222","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2693208.2693222","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:10:14Z","timestamp":1750234214000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2693208.2693222"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2,6]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,2,6]]}},"alternative-id":["10.1145\/2693208.2693222"],"URL":"https:\/\/doi.org\/10.1145\/2693208.2693222","relation":{},"ISSN":["0163-5948"],"issn-type":[{"value":"0163-5948","type":"print"}],"subject":[],"published":{"date-parts":[[2015,2,6]]},"assertion":[{"value":"2015-02-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}