{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T06:30:11Z","timestamp":1772519411074,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T00:00:00Z","timestamp":1594598400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,13]]},"DOI":"10.1145\/3387904.3389280","type":"proceedings-article","created":{"date-parts":[[2020,9,12]],"date-time":"2020-09-12T20:04:38Z","timestamp":1599941078000},"page":"252-262","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["On Combining IR Methods to Improve Bug Localization"],"prefix":"10.1145","author":[{"given":"Saket","family":"Khatiwada","sequence":"first","affiliation":[{"name":"The Division of Computer Science and Engineering, Louisiana State University"}]},{"given":"Miroslav","family":"Tushev","sequence":"additional","affiliation":[{"name":"The Division of Computer Science and Engineering, Louisiana State University"}]},{"given":"Anas","family":"Mahmoud","sequence":"additional","affiliation":[{"name":"The Division of Computer Science and Engineering, Louisiana State University"}]}],"member":"320","published-online":{"date-parts":[[2020,9,12]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"International Conference on Program Comprehension. 103--112","author":"Abadi Aharon","year":"2008","unstructured":"Aharon Abadi , Mordechai Nisenson , and Yahalomit Simionovici . 2008 . A Trace-ability Technique for Specifications . In International Conference on Program Comprehension. 103--112 . Aharon Abadi, Mordechai Nisenson, and Yahalomit Simionovici. 2008. A Trace-ability Technique for Specifications. In International Conference on Program Comprehension. 103--112."},{"key":"e_1_3_2_1_2_1","volume-title":"Measuring the Accuracy of Information Retrieval Based Bug Localization Techniques. In Working Conference on Reverse Engineering. 124--128","author":"Beard Matthew","year":"2011","unstructured":"Matthew Beard , Nicholas Kraft , Letha Etzkorn , and Stacy Lukins . 2011 . Measuring the Accuracy of Information Retrieval Based Bug Localization Techniques. In Working Conference on Reverse Engineering. 124--128 . Matthew Beard, Nicholas Kraft, Letha Etzkorn, and Stacy Lukins. 2011. Measuring the Accuracy of Information Retrieval Based Bug Localization Techniques. In Working Conference on Reverse Engineering. 124--128."},{"key":"e_1_3_2_1_3_1","volume-title":"Information retrieval applications in software maintenance and evolution. Encyclopedia of Software Engineering","author":"Binkley David","year":"2010","unstructured":"David Binkley and Dawn Lawrie . 2010. Information retrieval applications in software maintenance and evolution. Encyclopedia of Software Engineering ( 2010 ), 454--463. David Binkley and Dawn Lawrie. 2010. Information retrieval applications in software maintenance and evolution. Encyclopedia of Software Engineering (2010), 454--463."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.70"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of GSCL. 31--40","author":"Bouma Gerlof","year":"2009","unstructured":"Gerlof Bouma . 2009 . Normalized (pointwise) mutual information in collocation extraction . In Proceedings of GSCL. 31--40 . Gerlof Bouma. 2009. Normalized (pointwise) mutual information in collocation extraction. In Proceedings of GSCL. 31--40."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1214\/09-AOAS309"},{"key":"e_1_3_2_1_7_1","volume-title":"Detecting Missing Information in Bug Descriptions. In Joint Meeting on Foundations of Software Engineering. 96--407","author":"Chaparro Oscar","year":"2017","unstructured":"Oscar Chaparro , Jing Lu , Fiorella Zampetti , Laura Moreno , Massimiliano Di Penta , Andrian Marcus , Gabriele Bavota , and Vincent Ng . 2017 . Detecting Missing Information in Bug Descriptions. In Joint Meeting on Foundations of Software Engineering. 96--407 . Oscar Chaparro, Jing Lu, Fiorella Zampetti, Laura Moreno, Massimiliano Di Penta, Andrian Marcus, Gabriele Bavota, and Vincent Ng. 2017. Detecting Missing Information in Bug Descriptions. In Joint Meeting on Foundations of Software Engineering. 96--407."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/89086.89095"},{"key":"e_1_3_2_1_9_1","volume-title":"Elements of Information Theory","author":"Cover Thomas","unstructured":"Thomas Cover and Joy Thomas . 1991. Elements of Information Theory . Wiley-Interscience . Thomas Cover and Joy Thomas. 1991. Elements of Information Theory. Wiley-Interscience."},{"key":"e_1_3_2_1_10_1","volume-title":"Encyclopedia of Database Systems","author":"Craswell Nick","unstructured":"Nick Craswell . 2009. Mean reciprocal rank . In Encyclopedia of Database Systems . Springer , 1703--1703. Nick Craswell. 2009. Mean reciprocal rank. In Encyclopedia of Database Systems. Springer, 1703--1703."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9"},{"key":"e_1_3_2_1_12_1","volume-title":"SIGCHI Conference on Human Factors in Computing Systems. 281--285","author":"Dumais S.","unstructured":"S. Dumais , G. Furnas , T. Landauer , S. Deerwester , and R. Harshman . 1988. Using Latent Semantic Analysis to Improve Access to Textual Information . In SIGCHI Conference on Human Factors in Computing Systems. 281--285 . S. Dumais, G. Furnas, T. Landauer, S. Deerwester, and R. Harshman. 1988. Using Latent Semantic Analysis to Improve Access to Textual Information. In SIGCHI Conference on Human Factors in Computing Systems. 281--285."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02289261"},{"key":"e_1_3_2_1_14_1","volume-title":"International Workshop On Frontiers In Handwriting Recognition.","author":"Erp Merijn Van","year":"2000","unstructured":"Merijn Van Erp and Lambert Schomaker . 2000 . Variants of the Borda count method for combining ranked classifier hypotheses . In International Workshop On Frontiers In Handwriting Recognition. Merijn Van Erp and Lambert Schomaker. 2000. Variants of the Borda count method for combining ranked classifier hypotheses. In International Workshop On Frontiers In Handwriting Recognition."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1277741.1277912"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080780"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.3"},{"key":"e_1_3_2_1_18_1","first-page":"867","article-title":"Methods for combining experts' probability assessments","volume":"7","author":"Jacobs Robert","year":"1995","unstructured":"Robert Jacobs . 1995 . Methods for combining experts' probability assessments . Methods 7 , 5 (1995), 867 -- 888 . Robert Jacobs. 1995. Methods for combining experts' probability assessments. Methods 7, 5 (1995), 867--888.","journal-title":"Methods"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2016.7503746"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.08.012"},{"key":"e_1_3_2_1_21_1","volume-title":"Information Retrieval and Spectrum Based Bug Localization: Better Together. In Joint Meeting on Foundations of Software Engineering. 579--590","author":"Le Tien","year":"2015","unstructured":"Tien Le , Richard Oentaryo , and David Lo . 2015 . Information Retrieval and Spectrum Based Bug Localization: Better Together. In Joint Meeting on Foundations of Software Engineering. 579--590 . Tien Le, Richard Oentaryo, and David Lo. 2015. Information Retrieval and Spectrum Based Bug Localization: Better Together. In Joint Meeting on Foundations of Software Engineering. 579--590."},{"key":"e_1_3_2_1_22_1","volume-title":"Predicting Effectiveness of IR-based Bug Localization Techniques. In International Symposium on Software Reliability Engineering. 335--345","author":"Le Tien-Duy","year":"2014","unstructured":"Tien-Duy Le , Ferdian Thung , and David Lo . 2014 . Predicting Effectiveness of IR-based Bug Localization Techniques. In International Symposium on Software Reliability Engineering. 335--345 . Tien-Duy Le, Ferdian Thung, and David Lo. 2014. Predicting Effectiveness of IR-based Bug Localization Techniques. In International Symposium on Software Reliability Engineering. 335--345."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491432"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"S. Lukins N. Kraft and L. Etzkorn. 2008. Source Code Retrieval for Bug Localization Using Latent Dirichlet Allocation. In Reverse Engineering. 155--164.  S. Lukins N. Kraft and L. Etzkorn. 2008. Source Code Retrieval for Bug Localization Using Latent Dirichlet Allocation. In Reverse Engineering. 155--164.","DOI":"10.1109\/WCRE.2008.33"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-013-0199-y"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Christopher Manning Prabhakar Raghavan Hinrich Sch\u00fctze etal 2008. Introduction to information retrieval. Cambridge University Press Cambridge.  Christopher Manning Prabhakar Raghavan Hinrich Sch\u00fctze et al. 2008. Introduction to information retrieval. Cambridge University Press Cambridge.","DOI":"10.1017\/CBO9780511809071"},{"key":"e_1_3_2_1_27_1","unstructured":"A.Marcus V. Rajlich J. Buchta M. Petrenko and A. Petrenko. 2005. Static techniques for concept location in object-oriented code. In Program Comprehension. 33--42.  A.Marcus V. Rajlich J. Buchta M. Petrenko and A. Petrenko. 2005. Static techniques for concept location in object-oriented code. In Program Comprehension. 33--42."},{"key":"e_1_3_2_1_28_1","volume-title":"Corpus-based and Knowledge-based Measures of Text Semantic Similarity. In National Conference on Artificial Intelligence. 775--780","author":"Mihalcea Rada","year":"2006","unstructured":"Rada Mihalcea , Courtney Corley , and Carlo Strapparava . 2006 . Corpus-based and Knowledge-based Measures of Text Semantic Similarity. In National Conference on Artificial Intelligence. 775--780 . Rada Mihalcea, Courtney Corley, and Carlo Strapparava. 2006. Corpus-based and Knowledge-based Measures of Text Semantic Similarity. In National Conference on Artificial Intelligence. 775--780."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.37"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Anh Nguyen Tung Nguyen Jafar Al-Kofahi Hung Nguyen and Tien Nguyen. 2011. A topic-based approach for narrowing the search space of buggy files from a bug report. In Automated Software Engineering. 263--272.  Anh Nguyen Tung Nguyen Jafar Al-Kofahi Hung Nguyen and Tien Nguyen. 2011. A topic-based approach for narrowing the search space of buggy files from a bug report. In Automated Software Engineering. 263--272.","DOI":"10.1109\/ASE.2011.6100062"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2010.20"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.49"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001445"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/0010-0285(87)90007-7"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/290941.291008"},{"key":"e_1_3_2_1_36_1","volume-title":"An algorithm for suffix stripping","author":"Porter F.","unstructured":"F. Porter . 1997. An algorithm for suffix stripping . Morgan Kaufmann Publishers Inc ., 313--316. F. Porter. 1997. An algorithm for suffix stripping. Morgan Kaufmann Publishers Inc., 313--316."},{"key":"e_1_3_2_1_37_1","first-page":"420","article-title":"Feature Location Using Probabilistic Ranking of Methods Based on Execution Scenarios and Information Retrieval. Software Engineering","volume":"33","author":"Poshyvanyk Denys","year":"2007","unstructured":"Denys Poshyvanyk , Yann-Ga\u00ebl Gu\u00e8h\u00e8neuc , Andrian Marcus , and Giuliano Antoniol . 2007 . Feature Location Using Probabilistic Ranking of Methods Based on Execution Scenarios and Information Retrieval. Software Engineering , IEEE Transactions 33 , 6 (2007), 420 -- 432 . Denys Poshyvanyk, Yann-Ga\u00ebl Gu\u00e8h\u00e8neuc, Andrian Marcus, and Giuliano Antoniol. 2007. Feature Location Using Probabilistic Ranking of Methods Based on Execution Scenarios and Information Retrieval. Software Engineering, IEEE Transactions 33, 6 (2007), 420--432.","journal-title":"IEEE Transactions"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985451"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Ripon Saha Matthew Lease Sarfraz Khurshid and Dewayne Perry. 2013. Improving bug localization using structured information retrieval. In Automated Software Engineering. 345--355.  Ripon Saha Matthew Lease Sarfraz Khurshid and Dewayne Perry. 2013. Improving bug localization using structured information retrieval. In Automated Software Engineering. 345--355.","DOI":"10.1109\/ASE.2013.6693093"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/361219.361220"},{"key":"e_1_3_2_1_42_1","volume-title":"Hidden Technical Debt in Machine Learning Systems. In International Conference on Neural Information Processing Systems. 2503--2511","author":"Sculley D.","year":"2015","unstructured":"D. Sculley , Gary Holt , Daniel Golovin , Eugene Davydov , Todd Phillips , Dietmar Ebner , Vinay Chaudhary , Michael Young , Jean-Francois Crespo , and Dan Dennison . 2015 . Hidden Technical Debt in Machine Learning Systems. In International Conference on Neural Information Processing Systems. 2503--2511 . D. Sculley, Gary Holt, Daniel Golovin, Eugene Davydov, Todd Phillips, Dietmar Ebner, Vinay Chaudhary, Michael Young, Jean-Francois Crespo, and Dan Dennison. 2015. Hidden Technical Debt in Machine Learning Systems. In International Conference on Neural Information Processing Systems. 2503--2511."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010283"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.11.001"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.27"},{"key":"e_1_3_2_1_46_1","volume-title":"Mining the Web for Synonyms: PMI-IR Versus LSA on TOEFL. In European Conference on Machine Learning. 491--502","author":"Turney Peter","year":"2001","unstructured":"Peter Turney . 2001 . Mining the Web for Synonyms: PMI-IR Versus LSA on TOEFL. In European Conference on Machine Learning. 491--502 . Peter Turney. 2001. Mining the Web for Synonyms: PMI-IR Versus LSA on TOEFL. In European Conference on Machine Learning. 491--502."},{"key":"e_1_3_2_1_47_1","volume-title":"Linguistic Change in Open Source Software. In International Conference on Software Maintenance and Evolution. 296--300","author":"Tushev Miroslav","year":"2019","unstructured":"Miroslav Tushev , Saket Khatiwada , and Anas Mahmoud . 2019 . Linguistic Change in Open Source Software. In International Conference on Software Maintenance and Evolution. 296--300 . Miroslav Tushev, Saket Khatiwada, and Anas Mahmoud. 2019. Linguistic Change in Open Source Software. In International Conference on Software Maintenance and Evolution. 296--300."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2018.00039"},{"key":"e_1_3_2_1_49_1","volume-title":"Compositional Vector Space Models for Improved Bug Localization. In International Conference on Software Maintenance and Evolution. 171--180","author":"Wang Shaowei","year":"2014","unstructured":"Shaowei Wang and David Lo . 2014 . Compositional Vector Space Models for Improved Bug Localization. In International Conference on Software Maintenance and Evolution. 171--180 . Shaowei Wang and David Lo. 2014. Compositional Vector Space Models for Improved Bug Localization. In International Conference on Software Maintenance and Evolution. 171--180."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1287\/deca.1030.0008"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"C. Wohlin P. Runeson M. H\u00f6st M. Ohlsson B. Regnell and A. Wessl\u00e9n. 2012. Experimentation in Software Engineering. Springer.  C. Wohlin P. Runeson M. H\u00f6st M. Ohlsson B. Regnell and A. Wessl\u00e9n. 2012. Experimentation in Software Engineering. Springer.","DOI":"10.1007\/978-3-642-29044-2"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635874"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2009.5306304"},{"key":"e_1_3_2_1_54_1","volume-title":"International Conference on Software Engineering. 14--24","author":"Zhou Jian","unstructured":"Jian Zhou , Hongyu Zhang , and D. Lo . 2012. Where should the bugs be fixed? More accurate information retrieval-based bug localization based on bug reports . In International Conference on Software Engineering. 14--24 . Jian Zhou, Hongyu Zhang, and D. Lo. 2012. Where should the bugs be fixed? More accurate information retrieval-based bug localization based on bug reports. In International Conference on Software Engineering. 14--24."}],"event":{"name":"ICPC '20: 28th International Conference on Program Comprehension","location":"Seoul Republic of Korea","acronym":"ICPC '20","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 28th International Conference on Program Comprehension"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387904.3389280","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3387904.3389280","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:42Z","timestamp":1750200102000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387904.3389280"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,13]]},"references-count":53,"alternative-id":["10.1145\/3387904.3389280","10.1145\/3387904"],"URL":"https:\/\/doi.org\/10.1145\/3387904.3389280","relation":{},"subject":[],"published":{"date-parts":[[2020,7,13]]},"assertion":[{"value":"2020-09-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}