{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T01:48:04Z","timestamp":1769305684961,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,15]]},"DOI":"10.1145\/3409334.3452068","type":"proceedings-article","created":{"date-parts":[[2021,5,10]],"date-time":"2021-05-10T20:49:49Z","timestamp":1620679789000},"page":"130-137","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Application of back-translation"],"prefix":"10.1145","author":[{"given":"Ishan Mani","family":"Subedi","sequence":"first","affiliation":[{"name":"North Dakota State University"}]},{"given":"Maninder","family":"Singh","sequence":"additional","affiliation":[{"name":"St. Cloud State University"}]},{"given":"Vijayalakshmi","family":"Ramasamy","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Parkside"}]},{"given":"Gursimran Singh","family":"Walia","sequence":"additional","affiliation":[{"name":"Georgia Southern University"}]}],"member":"320","published-online":{"date-parts":[[2021,5,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPIT.2015.7394379"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"A. Adhikari A. Ram R. Tang and J. Lin. 2019. Rethinking Complex Neural Network Architectures for Document Classification. In Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies Volume 1 (Long and Short Papers). 4046--4051.","DOI":"10.18653\/v1\/N19-1408"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 2008 Conference of the Center for Advanced Studies on Collaborative Research: Meeting of Minds. 304--318","author":"Antoniol G.","unstructured":"G. Antoniol, K. Ayari, M. D. Penta, F. Khomh, and Y. Gu\u00e9h\u00e9neuc. 2008. Is It a Bug or an Enhancement? A Text-based Approach to Classify Change Requests. In Proceedings of the 2008 Conference of the Center for Advanced Studies on Collaborative Research: Meeting of Minds. 304--318."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.06.011"},{"key":"e_1_3_2_1_5_1","volume-title":"Python: Analyzing Text with the Natural Language Toolkit. \"O'Reilly Media","author":"Bird S.","year":"2009","unstructured":"S. Bird, E. Klein, and E. Loper. 2009. Natural Language Processing with Python: Analyzing Text with the Natural Language Toolkit. \"O'Reilly Media, Inc.\"."},{"key":"e_1_3_2_1_6_1","volume-title":"2015 IEEE\/ACM 12th Working Conference on Mining Software Repositories. IEEE, 146--156","author":"Bosu A.","unstructured":"A. Bosu, M. Greiler, and C. Bird. 2015. Characteristics of Useful Code Reviews: An Empirical Study at Microsoft. In 2015 IEEE\/ACM 12th Working Conference on Mining Software Repositories. IEEE, 146--156."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"D. Cer Y. Yang S. Kong N. Hua N. Limtiaco R. St. John N. Constant M. Guajardo-C\u00e9spedes S. Yuan C. Tar et al. 2018. Universal Sentence Encoder. arXiv preprint arXiv:1803.11175 (2018).","DOI":"10.18653\/v1\/D18-2029"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2006.31"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the Software and Internet Quality Week 2000 Conference. 1--18","author":"Fabbrini F.","unstructured":"F. Fabbrini, M. Fusani, S. Gnesi, and G. Lami. 2000. Quality Evaluation of Software Requirement Specifications. In Proceedings of the Software and Internet Quality Week 2000 Conference. 1--18."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","unstructured":"A. Ferrari B. Donati and S. Gnesi. 2017. Detecting Domain-specific Ambiguities: An NLP Approach Based on Wikipedia Crawling and Word Embeddings. In 2017 IEEE 25th International Requirements Engineering Conference Workshops (REW). IEEE Computer Society Los Alamitos CA USA 393--399. 10.1109\/REW.2017.20","DOI":"10.1109\/REW.2017.20"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-018-9596-7"},{"key":"e_1_3_2_1_12_1","volume-title":"Ambiguity Detection: Towards a Tool Explaining Ambiguity Sources. In International Working Conference on Requirements Engineering: Foundation for Software Quality","author":"Gleich B.","year":"2010","unstructured":"B. Gleich, O. Creighton, and L. Kof. 2010. Ambiguity Detection: Towards a Tool Explaining Ambiguity Sources. In International Working Conference on Requirements Engineering: Foundation for Software Quality. Springer, 218--232."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194015710060"},{"key":"e_1_3_2_1_14_1","first-page":"2","article-title":"Teaching Software Requirements Inspections to Software Engineering Students through Practical Training and Reflection","volume":"7","author":"Goswami A.","year":"2016","unstructured":"A. Goswami and G. S. Walia. 2016. Teaching Software Requirements Inspections to Software Engineering Students through Practical Training and Reflection. The ASEE Computers in Education (CoED) Journal 7, 4 (2016), 2.","journal-title":"The ASEE Computers in Education (CoED) Journal"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2961111.2962598"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2016.38"},{"key":"e_1_3_2_1_17_1","unstructured":"J. Howard et al. 2018. Fastai. https:\/\/github.com\/fastai\/fastai."},{"key":"e_1_3_2_1_18_1","unstructured":"J. Howard and S. Gugger. 2020. Deep Learning for Coders with Fastai and PyTorch. O'Reilly Media."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"J. Howard and S. Ruder. 2018. Universal Language Model Fine-tuning for Text Classification. arXiv preprint arXiv:1801.06146 (2018).","DOI":"10.18653\/v1\/P18-1031"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the First Workshop on Inspection in Software Engineering (WISE'01)","author":"Kamsties E.","unstructured":"E. Kamsties, D.M. Berry, and B. Paech. 2001. Detecting Ambiguities in Requirements Documents using Inspections. In Proceedings of the First Workshop on Inspection in Software Engineering (WISE'01)."},{"key":"e_1_3_2_1_21_1","unstructured":"Google LLC. 2020. Understanding the BLEU Score. https:\/\/cloud.google.com\/translate\/automl\/docs\/evaluate."},{"key":"e_1_3_2_1_22_1","unstructured":"S. Merity N. S. Keskar and R. Socher. 2017. Regularizing and Optimizing LSTM Language Models. arXiv preprint arXiv:1708.02182 (2017)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.3115\/1073083.1073135"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.655647"},{"key":"e_1_3_2_1_26_1","unstructured":"S. Ruder. 2017. Transfer Learning - Machine Learning's Next Frontier. http:\/\/ruder.io\/transfer-learning\/."},{"key":"e_1_3_2_1_27_1","unstructured":"M. Sahami S. Dumais D. Heckerman and E. Horvitz. 1998. A Bayesian Approach to Filtering Junk E-mail. In Learning for Text Categorization: Papers from the 1998 Workshop Vol. 62. Madison Wisconsin 98--105."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-1009"},{"key":"e_1_3_2_1_29_1","volume-title":"Low Resource Text Classification with Ulmfit and Backtranslation. arXiv preprint arXiv:1903.09244","author":"Shleifer S.","year":"2019","unstructured":"S. Shleifer. 2019. Low Resource Text Classification with Ulmfit and Backtranslation. arXiv preprint arXiv:1903.09244 (2019)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2018.00062"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3172871.3172880"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2018.00-38"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MLDS.2017.16"},{"key":"e_1_3_2_1_34_1","volume-title":"Batch Size, Momentum, And Weight Decay. arXiv preprint arXiv:1803.09820","author":"Smith L. N.","year":"2018","unstructured":"L. N. Smith. 2018. A Disciplined Approach to Neural Network Hyper-parameters: Part 1-Learning Rate, Batch Size, Momentum, And Weight Decay. arXiv preprint arXiv:1803.09820 (2018)."},{"key":"e_1_3_2_1_35_1","volume-title":"The Economic Impacts of Inadequate Infrastructure for Software Testing","author":"Tassey G.","unstructured":"G. Tassey. 2002. The Economic Impacts of Inadequate Infrastructure for Software Testing. National Institute of Standards and Technology."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"S. F. Tjong and D. M. Berry. 2013. The Design of SREE --- A Prototype Potential Ambiguity Finder for Requirements Specifications and Lessons Learned. In Requirements Engineering: Foundation for Software Quality. Springer Berlin Heidelberg Berlin Heidelberg 80--95.","DOI":"10.1007\/978-3-642-37422-7_6"},{"key":"e_1_3_2_1_37_1","unstructured":"B. V. Burgh and S. Verberne. 2019. The Merits of Universal Language Model Fine-tuning for Small Datasets-A Case with Dutch Book Reviews. arXiv preprint arXiv:1910.00896 (2019)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","unstructured":"J. Wei and K. Zou. 2019. EDA: Easy Data Augmentation Techniques for Boosting Performance on Text Classification Tasks. In Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP). Association for Computational Linguistics Hong Kong China 6382--6388. 10.18653\/v1\/D19-1670","DOI":"10.18653\/v1\/D19-1670"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-011-0119-y"}],"event":{"name":"ACM SE '21: 2021 ACM Southeast Conference","location":"Virtual Event USA","acronym":"ACM SE '21","sponsor":["ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 2021 ACM Southeast Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3409334.3452068","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3409334.3452068","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:33Z","timestamp":1750197693000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3409334.3452068"}},"subtitle":["a transfer learning approach to identify ambiguous software requirements"],"short-title":[],"issued":{"date-parts":[[2021,4,15]]},"references-count":39,"alternative-id":["10.1145\/3409334.3452068","10.1145\/3409334"],"URL":"https:\/\/doi.org\/10.1145\/3409334.3452068","relation":{},"subject":[],"published":{"date-parts":[[2021,4,15]]},"assertion":[{"value":"2021-05-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}