{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T04:59:28Z","timestamp":1774673968491,"version":"3.50.1"},"reference-count":96,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2021,7,23]],"date-time":"2021-07-23T00:00:00Z","timestamp":1626998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key Basic Research and Development Program of China","award":["2014CB340702"],"award-info":[{"award-number":["2014CB340702"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61772259, 61872177"],"award-info":[{"award-number":["61772259, 61872177"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Softw. Eng. Methodol."],"published-print":{"date-parts":[[2021,10,31]]},"abstract":"<jats:p>\n            <jats:bold>Background.<\/jats:bold>\n            Self-admitted technical debt (SATD) is a special kind of technical debt that is intentionally introduced and remarked by code comments. Those technical debts reduce the quality of software and increase the cost of subsequent software maintenance. Therefore, it is necessary to find out and resolve these debts in time. Recently, many automatic approaches have been proposed to identify SATD.\n            <jats:bold>Problem.<\/jats:bold>\n            Popular IDEs support a number of predefined task annotation tags for indicating SATD in comments, which have been used in many projects. However, such clear prior knowledge is neglected by existing SATD identification approaches when identifying SATD.\n            <jats:bold>Objective.<\/jats:bold>\n            We aim to investigate how far we have really progressed in the field of SATD identification by comparing existing approaches with a simple approach that leverages the predefined task tags to identify SATD.\n            <jats:bold>Method.<\/jats:bold>\n            We first propose a simple heuristic approach that fuzzily Matches task Annotation Tags (\n            <jats:italic>MAT<\/jats:italic>\n            ) in comments to identify SATD. In nature,\n            <jats:italic>MAT<\/jats:italic>\n            is an unsupervised approach, which does not need any data to train a prediction model and has a good understandability. Then, we examine the real progress in SATD identification by comparing\n            <jats:italic>MAT<\/jats:italic>\n            against existing approaches.\n            <jats:bold>Result.<\/jats:bold>\n            The experimental results reveal that: (1)\n            <jats:italic>MAT<\/jats:italic>\n            has a similar or even superior performance for SATD identification compared with existing approaches, regardless of whether non-effort-aware or effort-aware evaluation indicators are considered; (2) the SATDs (or non-SATDs) correctly identified by existing approaches are highly overlapped with those identified by\n            <jats:italic>MAT<\/jats:italic>\n            ; and (3) supervised approaches misclassify many SATDs marked with task tags as non-SATDs, which can be easily corrected by their combinations with\n            <jats:italic>MAT<\/jats:italic>\n            .\n            <jats:bold>Conclusion.<\/jats:bold>\n            It appears that the problem of SATD identification has been (unintentionally) complicated by our community, i.e., the real progress in SATD comments identification is not being achieved as it might have been envisaged. We hence suggest that, when many task tags are used in the comments of a target project, future SATD identification studies should use\n            <jats:italic>MAT<\/jats:italic>\n            as an easy-to-implement baseline to demonstrate the usefulness of any newly proposed approach.\n          <\/jats:p>","DOI":"10.1145\/3447247","type":"journal-article","created":{"date-parts":[[2021,7,23]],"date-time":"2021-07-23T10:58:28Z","timestamp":1627037908000},"page":"1-56","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":39,"title":["How Far Have We Progressed in Identifying Self-admitted Technical Debts? A Comprehensive Empirical Study"],"prefix":"10.1145","volume":"30","author":[{"given":"Zhaoqiang","family":"Guo","sequence":"first","affiliation":[{"name":"Nanjing University"}]},{"given":"Shiran","family":"Liu","sequence":"additional","affiliation":[{"name":"Nanjing University"}]},{"given":"Jinping","family":"Liu","sequence":"additional","affiliation":[{"name":"Jiangsu University"}]},{"given":"Yanhui","family":"Li","sequence":"additional","affiliation":[{"name":"Nanjing University"}]},{"given":"Lin","family":"Chen","sequence":"additional","affiliation":[{"name":"Nanjing University"}]},{"given":"Hongmin","family":"Lu","sequence":"additional","affiliation":[{"name":"Nanjing University"}]},{"given":"Yuming","family":"Zhou","sequence":"additional","affiliation":[{"name":"Nanjing University"}]}],"member":"320","published-online":{"date-parts":[[2021,7,23]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Python Developer's Guide. 2020. Retrieved from https:\/\/www.python.org\/dev\/peps\/pep-0350\/.  Python Developer's Guide. 2020. Retrieved from https:\/\/www.python.org\/dev\/peps\/pep-0350\/."},{"key":"e_1_2_1_2_1","unstructured":"Tips about Eclipse. 2020. Retrieved from http:\/\/www.javaperspective.com\/how-to-use-todo-and-fixme-task-tags-in-eclipse.html.++6.  Tips about Eclipse. 2020. Retrieved from http:\/\/www.javaperspective.com\/how-to-use-todo-and-fixme-task-tags-in-eclipse.html.++6."},{"key":"e_1_2_1_3_1","unstructured":"Tasklist of NetBeans. 2020. Retrieved from https:\/\/ui.netbeans.org\/docs\/hi\/promoB\/tasklist.html.  Tasklist of NetBeans. 2020. Retrieved from https:\/\/ui.netbeans.org\/docs\/hi\/promoB\/tasklist.html."},{"key":"e_1_2_1_4_1","unstructured":"To-Do List plugin of CodeBlocks. 2020. Retrieved from http:\/\/wiki.codeblocks.org\/index.php\/To-Do_List_plugin.  To-Do List plugin of CodeBlocks. 2020. Retrieved from http:\/\/wiki.codeblocks.org\/index.php\/To-Do_List_plugin."},{"key":"e_1_2_1_5_1","unstructured":"Task Tags Preferences of Eclipse. 2020. Retrieved from https:\/\/www.eclipse.org\/pdt\/help\/html\/task_tags.htm.  Task Tags Preferences of Eclipse. 2020. Retrieved from https:\/\/www.eclipse.org\/pdt\/help\/html\/task_tags.htm."},{"key":"e_1_2_1_6_1","unstructured":"TODO comments of IntelliJ IDEA. 2020. Retrieved from https:\/\/www.jetbrains.com\/help\/idea\/using-todo.html.  TODO comments of IntelliJ IDEA. 2020. Retrieved from https:\/\/www.jetbrains.com\/help\/idea\/using-todo.html."},{"key":"e_1_2_1_7_1","unstructured":"Task List of Visual Studio. 2020. Retrieved from https:\/\/docs.microsoft.com\/zh-cn\/visualstudio\/ide\/using-the-task-list?view=vs-2015.  Task List of Visual Studio. 2020. Retrieved from https:\/\/docs.microsoft.com\/zh-cn\/visualstudio\/ide\/using-the-task-list?view=vs-2015."},{"key":"e_1_2_1_8_1","unstructured":"Code Climate. 2020. Retrieved from https:\/\/codeclimate.com\/.  Code Climate. 2020. Retrieved from https:\/\/codeclimate.com\/."},{"key":"e_1_2_1_9_1","unstructured":"Android Studio. 2020. Retrieved from https:\/\/developer.android.com\/.  Android Studio. 2020. Retrieved from https:\/\/developer.android.com\/."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9522-4"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/157710.157715"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183440.3183478"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2831232"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.31"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.72"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2901742"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2654244"},{"key":"e_1_2_1_18_1","volume-title":"Proceedings of the IEEE 7th International Workshop on Managing Technical Debt (MTD\u201915)","author":"Everton","unstructured":"Everton da S. Maldonado and Emad Shihab. 2015. Detecting and quantifying different types of self-admitted technical debt . In Proceedings of the IEEE 7th International Workshop on Managing Technical Debt (MTD\u201915) . IEEE, 9\u201315. Everton da S. Maldonado and Emad Shihab. 2015. Detecting and quantifying different types of self-admitted technical debt. In Proceedings of the IEEE 7th International Workshop on Managing Technical Debt (MTD\u201915). IEEE, 9\u201315."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/2639037.2639042"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2014.12.027"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1076797"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368123"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2460999.2461005"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985362.1985366"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/2666036.2666040"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MTD.2014.9"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2007.21"},{"key":"e_1_2_1_28_1","volume-title":"Proceedings of the IEEE International Conference on Software Maintenance (ICSM\u201908)","author":"Malik Haroon","unstructured":"Haroon Malik , Istehad Chowdhury , Hsiao-Ming Tsou , Zhen Ming Jiang , and Ahmed E. Hassan . 2008. Understanding the rationale for updating a function's comment . In Proceedings of the IEEE International Conference on Software Maintenance (ICSM\u201908) . 167\u2013176. Haroon Malik, Istehad Chowdhury, Hsiao-Ming Tsou, Zhen Ming Jiang, and Ahmed E. Hassan. 2008. Understanding the rationale for updating a function's comment. In Proceedings of the IEEE International Conference on Software Maintenance (ICSM\u201908). 167\u2013176."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882362.1882373"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2011.150"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2012.130"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2507288.2507326"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/361219.361220"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.106"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/1894525.1894535"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/2487085.2487155"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2013.6613836"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2008.03.033"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/1566274.1566335"},{"key":"e_1_2_1_40_1","first-page":"143","article-title":"The effects of comments and identifier names on program comprehensibility: An experimental investigation","volume":"4","author":"Takang Armstrong A.","year":"1996","unstructured":"Armstrong A. Takang , Penny A. Grubb , and Robert D. Macredie . 1996 . The effects of comments and identifier names on program comprehensibility: An experimental investigation . J. Prog. Lang. 4 , 3 (1996), 143 \u2013 167 . Armstrong A. Takang, Penny A. Grubb, and Robert D. Macredie. 1996. The effects of comments and identifier names on program comprehensibility: An experimental investigation. J. Prog. Lang. 4, 3 (1996), 143\u2013167.","journal-title":"J. Prog. Lang."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194016500339"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-014-9344-6"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/505282.505283"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.239"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-65831-5_4"},{"key":"e_1_2_1_46_1","volume-title":"On the replicability and reproducibility of deep learning in software engineering. CoRR abs\/2006.14244","author":"Liu Chao","year":"2020","unstructured":"Chao Liu , Cuiyun Gao , Xin Xia , David Lo , John C. Grundy , and Xiaohu Yang . 2020. On the replicability and reproducibility of deep learning in software engineering. CoRR abs\/2006.14244 ( 2020 ). Chao Liu, Cuiyun Gao, Xin Xia, David Lo, John C. Grundy, and Xiaohu Yang. 2020. On the replicability and reproducibility of deep learning in software engineering. CoRR abs\/2006.14244 (2020)."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1013699998"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2008.4493342"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324916"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.5555\/2999792.2999959"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-1146"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.5555\/2999134.2999257"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950353"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106256"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-018-9661-2"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2017.51"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3239235.3240503"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.15"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1083142.1083152"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.3115\/1075168.1075176"},{"key":"e_1_2_1_61_1","doi-asserted-by":"crossref","first-page":"1081","DOI":"10.1109\/TSE.2018.2821670","article-title":"Bellwethers: A baseline method for transfer learning","volume":"45","author":"Tim Menzies Krishna","year":"2017","unstructured":"Rahul, Krishna and Tim Menzies . 2017 . Bellwethers: A baseline method for transfer learning . IEEE Trans. Softw. Eng. 45 , 11 (2017), 1081 \u2013 1105 . Rahul, Krishna and Tim Menzies. 2017. Bellwethers: A baseline method for transfer learning. IEEE Trans. Softw. Eng. 45, 11 (2017), 1081\u20131105.","journal-title":"IEEE Trans. Softw. Eng."},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2790925"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2738037"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183339"},{"key":"e_1_2_1_65_1","doi-asserted-by":"crossref","unstructured":"Roberto Souto Maior de Barros and Silas Garrido Teixeira de Carvalho Santos. 2018. A large-scale comparison of concept drift detectors. Inf. Sci. 451-452 (2018) 348\u2013370.  Roberto Souto Maior de Barros and Silas Garrido Teixeira de Carvalho Santos. 2018. A large-scale comparison of concept drift detectors. Inf. Sci. 451-452 (2018) 348\u2013370.","DOI":"10.1016\/j.ins.2018.04.014"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2015.2475625"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966039"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293317"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01231-1_29"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W18-3012"},{"key":"e_1_2_1_71_1","volume-title":"The effectiveness of instance normalization: A strong baseline for single image dehazing. CoRR abs\/1805.03305","author":"Xu Zheng","year":"2018","unstructured":"Zheng Xu , Xitong Yang , Xue Li , and Xiaoshuai Sun . 2018. The effectiveness of instance normalization: A strong baseline for single image dehazing. CoRR abs\/1805.03305 ( 2018 ). Zheng Xu, Xitong Yang, Xue Li, and Xiaoshuai Sun. 2018. The effectiveness of instance normalization: A strong baseline for single image dehazing. CoRR abs\/1805.03305 (2018)."},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2015.15"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.10.051"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR-WCRE.2014.6747166"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238190"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556777"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196398.3196424"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1177\/001316446002000104"},{"key":"e_1_2_1_79_1","volume-title":"Statistical Methods Rates Proportions","author":"Fleiss Joseph L.","unstructured":"Joseph L. Fleiss . 1981. The measurement of interrater agreement . In Statistical Methods Rates Proportions . John Wiley , New York . Joseph L. Fleiss. 1981. The measurement of interrater agreement. In Statistical Methods Rates Proportions. John Wiley, NewYork."},{"key":"e_1_2_1_80_1","unstructured":"Retrieved from https:\/\/github.com\/Naplues\/MAT.  Retrieved from https:\/\/github.com\/Naplues\/MAT."},{"key":"e_1_2_1_81_1","doi-asserted-by":"crossref","unstructured":"Giancarlo Sierra Emad Shihab and Yasutaka Kamei. 2019. A survey of self-admitted technical debt. J. Syst. Softw. 152 (2019) 70\u201382.  Giancarlo Sierra Emad Shihab and Yasutaka Kamei. 2019. A survey of self-admitted technical debt. J. Syst. Softw. 152 (2019) 70\u201382.","DOI":"10.1016\/j.jss.2019.02.056"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWESEP.2018.00010"},{"key":"e_1_2_1_83_1","volume-title":"A longitudinal study of identifying and paying down architectural debt. CoRR abs\/1811.12904","author":"Nayebi Maleknaz","year":"2018","unstructured":"Maleknaz Nayebi , Yuanfang Cai , Rick Kazman , Guenther Ruhe , Qiong Feng , Chris Carlson , and Francis Chew . 2018. A longitudinal study of identifying and paying down architectural debt. CoRR abs\/1811.12904 ( 2018 ). Maleknaz Nayebi, Yuanfang Cai, Rick Kazman, Guenther Ruhe, Qiong Feng, Chris Carlson, and Francis Chew. 2018. A longitudinal study of identifying and paying down architectural debt. CoRR abs\/1811.12904 (2018)."},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.5555\/1964882"},{"key":"e_1_2_1_85_1","first-page":"5","article-title":"Statistical methods in cancer research: The analysis of case-control studies. IARC Sci","volume":"1","author":"Breslow N. E.","year":"1980","unstructured":"N. E. Breslow and N. E. Day . 1980 . Statistical methods in cancer research: The analysis of case-control studies. IARC Sci . Public. 1 , 32 (1980), 5 \u2013 338 . N. E. Breslow and N. E. Day. 1980. Statistical methods in cancer research: The analysis of case-control studies. IARC Sci. Public. 1, 32 (1980), 5\u2013338.","journal-title":"Public."},{"key":"e_1_2_1_86_1","volume-title":"Artificial intelligence faces reproducibility crisis. Comput. Sci. 359, 6377","author":"Hutson Matthew","year":"2018","unstructured":"Matthew Hutson . 2018. Artificial intelligence faces reproducibility crisis. Comput. Sci. 359, 6377 ( 2018 ), 725\u2013726. Matthew Hutson. 2018. Artificial intelligence faces reproducibility crisis. Comput. Sci. 359, 6377 (2018), 725\u2013726."},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1001\/jama.2019.20866"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9516-2"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950334"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806811"},{"key":"e_1_2_1_91_1","volume-title":"Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP\u201913)","author":"Graves Alex","unstructured":"Alex Graves , M. Abdel-rahman, and Geoffrey E. Hinton . 2013. Speech recognition with deep recurrent neural networks . In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP\u201913) . 6645\u20136649. Alex Graves, M. Abdel-rahman, and Geoffrey E. Hinton. 2013. Speech recognition with deep recurrent neural networks. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP\u201913). 6645\u20136649."},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970357"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.5555\/3016387.3016405"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1181"},{"key":"e_1_2_1_95_1","volume-title":"Huy Tu, and Tim Menzies.","author":"Yu Zhe","year":"2020","unstructured":"Zhe Yu , Fahmid Morshed Fahid , Huy Tu, and Tim Menzies. 2020 . Identifying self-admitted technical debts with Jitterbug : A two-step approach. IEEE Trans. Softw. Eng . (2020). Zhe Yu, Fahmid Morshed Fahid, Huy Tu, and Tim Menzies. 2020. Identifying self-admitted technical debts with Jitterbug: A two-step approach. IEEE Trans. Softw. Eng. (2020)."},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2015.49"}],"container-title":["ACM Transactions on Software Engineering and Methodology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447247","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3447247","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:27Z","timestamp":1750195707000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447247"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,23]]},"references-count":96,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,10,31]]}},"alternative-id":["10.1145\/3447247"],"URL":"https:\/\/doi.org\/10.1145\/3447247","relation":{},"ISSN":["1049-331X","1557-7392"],"issn-type":[{"value":"1049-331X","type":"print"},{"value":"1557-7392","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,23]]},"assertion":[{"value":"2020-06-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-07-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}