{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T20:09:48Z","timestamp":1769026188862,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,23]],"date-time":"2019-08-23T00:00:00Z","timestamp":1566518400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,23]]},"DOI":"10.1145\/3357419.3357424","type":"proceedings-article","created":{"date-parts":[[2019,10,11]],"date-time":"2019-10-11T15:16:45Z","timestamp":1570807005000},"page":"17-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Automated Classification of Software Bug Reports"],"prefix":"10.1145","author":[{"given":"Ahmed Fawzi","family":"Otoom","sequence":"first","affiliation":[{"name":"Department of Software Engineering The Hashemite University, Zarqa, Jordan"}]},{"given":"Sara","family":"Al-jdaeh","sequence":"additional","affiliation":[{"name":"Department of Software Engineering The Hashemite University, Zarqa, Jordan"}]},{"given":"Maen","family":"Hammad","sequence":"additional","affiliation":[{"name":"Department of Software Engineering The Hashemite University, Zarqa, Jordan"}]}],"member":"320","published-online":{"date-parts":[[2019,8,23]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"2008 IEEE International Conference on Software Maintenance (pp. 337--345)","author":"Bettenburg N.","unstructured":"Bettenburg, N., Premraj, R., Zimmermann, T. and Kim, S., 2008, September. Duplicate bug reports considered harmful... really?. In 2008 IEEE International Conference on Software Maintenance (pp. 337--345). IEEE."},{"key":"e_1_3_2_1_2_1","volume-title":"2012 19th Working Conference on Reverse Engineering (pp. 215--224)","author":"Tian Y.","unstructured":"Tian, Y., Lo, D. and Sun, C., 2012, October. Information retrieval based nearest neighbor classification for fine- grained bug severity prediction. In 2012 19th Working Conference on Reverse Engineering (pp. 215--224). IEEE."},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 28th international conference on Software engineering (pp. 361--370)","author":"Anvik J.","unstructured":"Anvik, J., Hiew, L. and Murphy, G.C., 2006, May. Who should fix this bug?. In Proceedings of the 28th international conference on Software engineering (pp. 361--370)."},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the 13th International Conference on Predictive Models and Data Analytics in Software Engineering (pp. 97--106)","author":"Levin S.","unstructured":"Levin, S. and Yehudai, A., 2017, November. Boosting automatic commit classification into maintenance activities by utilizing source code changes. In Proceedings of the 13th International Conference on Predictive Models and Data Analytics in Software Engineering (pp. 97--106). ACM."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11334-017-0294-1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Antoniol G. Ayari K. Di Penta M. Khomh F. and Gu\u00e9h\u00e9neuc Y.G. 2008 October. Is it a bug or an enhancement?: a text-based approach to classify change requests. In CASCON (Vol. 8 pp. 304--318).","DOI":"10.1145\/1463788.1463819"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1770"},{"key":"e_1_3_2_1_8_1","first-page":"13","volume-title":"2013 20th Asia-Pacific Software Engineering Conference (APSEC) (Vol. 2","author":"Pingclasai N.","unstructured":"Pingclasai, N., Hata, H. and Matsumoto, K.I., 2013, December. Classifying bug reports to bugs and other requests using topic modeling. In 2013 20th Asia-Pacific Software Engineering Conference (APSEC) (Vol. 2, pp. 13--18). IEEE"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.05.017"},{"key":"e_1_3_2_1_10_1","volume-title":"2014 6th International Workshop on Empirical Software Engineering in Practice (pp. 7--12)","author":"Limsettho N.","unstructured":"Limsettho, N., Hata, H., Monden, A. and Matsumoto, K., 2014, November. Automatic unsupervised bug report categorization. In 2014 6th International Workshop on Empirical Software Engineering in Practice (pp. 7--12). IEEE."},{"key":"e_1_3_2_1_11_1","volume-title":"2009 6th IEEE International Working Conference on Mining Software Repositories (pp. 163--166)","author":"Tian K.","unstructured":"Tian, K., Revelle, M. and Poshyvanyk, D., 2009, May. Using latent dirichlet allocation for automatic categorization of software. In 2009 6th IEEE International Working Conference on Mining Software Repositories (pp. 163--166). IEEE."},{"key":"e_1_3_2_1_12_1","volume-title":"2016 IEEE\/ACM 38th International Conference on Software Engineering Companion (ICSE-C) (pp. 713--715)","author":"Zibran M.F.","year":"2016","unstructured":"Zibran, M.F., 2016, May. On the effectiveness of labeled latent dirichlet allocation in automatic bug-report categorization. In 2016 IEEE\/ACM 38th International Conference on Software Engineering Companion (ICSE-C) (pp. 713--715). IEEE."},{"key":"e_1_3_2_1_13_1","volume-title":"2009 IEEE 17th International Conference on Program Comprehension (pp. 30--39)","author":"Hindle A.","unstructured":"Hindle, A., German, D.M., Godfrey, M.W. and Holt, R.C., 2009, May. Automatic classication of large changes into maintenance categories. In 2009 IEEE 17th International Conference on Program Comprehension (pp. 30--39). IEEE."},{"key":"e_1_3_2_1_14_1","volume-title":"Data Mining: Practical machine learning tools with Java implementations","author":"Witten I.H.","year":"2000","unstructured":"Witten, I.H. and Frank, E., Data Mining: Practical machine learning tools with Java implementations. 2000."}],"event":{"name":"ICICM 2019: The 9th International Conference on Information Communication and Management","location":"Prague Czech Republic","acronym":"ICICM 2019","sponsor":["Chinese Academy of Sciences"]},"container-title":["Proceedings of the 9th International Conference on Information Communication and Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357419.3357424","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3357419.3357424","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:21Z","timestamp":1750202601000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357419.3357424"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,23]]},"references-count":14,"alternative-id":["10.1145\/3357419.3357424","10.1145\/3357419"],"URL":"https:\/\/doi.org\/10.1145\/3357419.3357424","relation":{},"subject":[],"published":{"date-parts":[[2019,8,23]]},"assertion":[{"value":"2019-08-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}