{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:47:06Z","timestamp":1750308426966,"version":"3.41.0"},"reference-count":30,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2021,7,14]],"date-time":"2021-07-14T00:00:00Z","timestamp":1626220800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGSOFT Softw. Eng. Notes"],"published-print":{"date-parts":[[2021,7,14]]},"abstract":"<jats:p>This retrospective on our 2011 MSR publication starts with the research milieu that led to the work reported in our paper. We brie y review the competing ideas of a decade ago that could be applied to solving the problem of identifying the les in a software library related to a query. We were especially interested in nding out if the more complex text retrieval methods of that time would be e ective in the software context. A surprising conclusion of our paper was that the reality was exactly the opposite: the more traditional simpler methods outperformed the complex methods. In addition to this surprising result, our paper was also the rst to report what was considered at that time a large-scale quantitative evaluation of the IR-based approaches to automatic bug localization. Over the years, such quantitative evaluations have become the norm. We believe that these contributions were largely responsible for the popularity of this paper in the research literature.<\/jats:p>","DOI":"10.1145\/3468744.3468755","type":"journal-article","created":{"date-parts":[[2021,7,21]],"date-time":"2021-07-21T16:06:11Z","timestamp":1626883571000},"page":"33-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Retrieval from software libraries for bug localization"],"prefix":"10.1145","volume":"46","author":[{"given":"Shivani","family":"Rao","sequence":"first","affiliation":[{"name":"LinkedIn"}]},{"given":"Avinash","family":"Kak","sequence":"additional","affiliation":[{"name":"Purdue University"}]}],"member":"320","published-online":{"date-parts":[[2021,7,21]]},"reference":[{"key":"e_1_2_1_1_1","first-page":"88","article-title":"2018] Amritanshu Agrawal, Wei Fu, and Tim Menzies. 2018. What is Wrong with Topic Modeling? And How to Fix it Using Search-based Software Engineering","volume":"98","author":"Agrawal","year":"2018","unstructured":"[ Agrawal et al. 2018] Amritanshu Agrawal, Wei Fu, and Tim Menzies. 2018. What is Wrong with Topic Modeling? And How to Fix it Using Search-based Software Engineering . Information and Software Technology 98 ( 2018 ), 74{ 88 . [Agrawal et al. 2018] Amritanshu Agrawal, Wei Fu, and Tim Menzies. 2018. What is Wrong with Topic Modeling? And How to Fix it Using Search-based Software Engineering. Information and Software Technology 98 (2018), 74{88.","journal-title":"Information and Software Technology"},{"key":"e_1_2_1_2_1","volume-title":"SCOR: Source Code Retrieval with Semantics and Order. In 2019 IEEE\/ACM 16th International Conference on Mining Software Repositories (MSR). 1{12","author":"Akbar","year":"2019","unstructured":"[ Akbar and Kak 2019 ] S. Akbar and A. Kak. 2019 . SCOR: Source Code Retrieval with Semantics and Order. In 2019 IEEE\/ACM 16th International Conference on Mining Software Repositories (MSR). 1{12 . [Akbar and Kak 2019] S. Akbar and A. Kak. 2019. SCOR: Source Code Retrieval with Semantics and Order. In 2019 IEEE\/ACM 16th International Conference on Mining Software Repositories (MSR). 1{12."},{"key":"e_1_2_1_3_1","first-page":"3","article-title":"2014] Lauren R Biggers, Cecylia Bocovich, Riley Capshaw, Brian P Eddy, Letha H Etzkorn, and Nicholas A Kraft. 2014. Con_guring Latent Dirichlet Allocation Based Feature Location","volume":"19","author":"Biggers","year":"2014","unstructured":"[ Biggers et al. 2014] Lauren R Biggers, Cecylia Bocovich, Riley Capshaw, Brian P Eddy, Letha H Etzkorn, and Nicholas A Kraft. 2014. Con_guring Latent Dirichlet Allocation Based Feature Location . Empirical Software Engineering 19 , 3 ( 2014 ), 465{500. [Biggers et al. 2014] Lauren R Biggers, Cecylia Bocovich, Riley Capshaw, Brian P Eddy, Letha H Etzkorn, and Nicholas A Kraft. 2014. Con_guring Latent Dirichlet Allocation Based Feature Location. Empirical Software Engineering 19, 3 (2014), 465{500.","journal-title":"Empirical Software Engineering"},{"key":"e_1_2_1_4_1","volume-title":"Stephen Thomas, and Ahmed E. Hassan.","author":"Chen","year":"2015","unstructured":"[ Chen et al. 2015] Tse-Hsun Chen , Stephen Thomas, and Ahmed E. Hassan. 2015 . A Survey on the use of Topic Models when Mining Software Repositories . 21 (2015). [Chen et al. 2015] Tse-Hsun Chen, Stephen Thomas, and Ahmed E. Hassan. 2015. A Survey on the use of Topic Models when Mining Software Repositories. 21 (2015)."},{"key":"e_1_2_1_5_1","volume-title":"2013 10th Working Conference on Mining Software Repositories (MSR). 343{352","author":"Hemmati","year":"2013","unstructured":"[ Hemmati et al. 2013 ] H. Hemmati, S. Nadi, O. Baysal, O. Kononenko, W. Wang, R. Holmes, and M. W. Godfrey. 2013. The MSR Cookbook: Mining a Aecade of Research . In 2013 10th Working Conference on Mining Software Repositories (MSR). 343{352 . [Hemmati et al. 2013] H. Hemmati, S. Nadi, O. Baysal, O. Kononenko, W. Wang, R. Holmes, and M. W. Godfrey. 2013. The MSR Cookbook: Mining a Aecade of Research. In 2013 10th Working Conference on Mining Software Repositories (MSR). 343{352."},{"key":"e_1_2_1_6_1","volume-title":"On the Use of Stemming for Concern Location and Bug Localization in Java. In 2012 IEEE 12th International Working Conference on Source Code Analysis and Manipulation. 184{193","author":"Hill","year":"2012","unstructured":"[ Hill et al. 2012 ] E. Hill, S. Rao, and A. Kak. 2012 . On the Use of Stemming for Concern Location and Bug Localization in Java. In 2012 IEEE 12th International Working Conference on Source Code Analysis and Manipulation. 184{193 . [Hill et al. 2012] E. Hill, S. Rao, and A. Kak. 2012. On the Use of Stemming for Concern Location and Bug Localization in Java. In 2012 IEEE 12th International Working Conference on Source Code Analysis and Manipulation. 184{193."},{"key":"e_1_2_1_7_1","first-page":"11","article-title":"2013] D. Kim, Y. Tao, S. Kim, and A. Zeller. 2013. Where Should We Fix This Bug?","volume":"39","author":"Kim","year":"2013","unstructured":"[ Kim et al. 2013] D. Kim, Y. Tao, S. Kim, and A. Zeller. 2013. Where Should We Fix This Bug? A Two-Phase Recommendation Model. IEEE Transactions on Software Engineering 39 , 11 ( 2013 ), 1597{1610. [Kim et al. 2013] D. Kim, Y. Tao, S. Kim, and A. Zeller. 2013. Where Should We Fix This Bug? A Two-Phase Recommendation Model. IEEE Transactions on Software Engineering 39, 11 (2013), 1597{1610.","journal-title":"A Two-Phase Recommendation Model. IEEE Transactions on Software Engineering"},{"key":"e_1_2_1_8_1","volume-title":"Bug Localization with Combination of Deep Learning and Information Retrieval. In 2017 IEEE\/ACM 25th International Conference on Program Comprehension (ICPC). 218{229","author":"Lam","year":"2017","unstructured":"[ Lam et al. 2017 ] A. N. Lam, A. T. Nguyen, H. A. Nguyen, and T. N. Nguyen. 2017 . Bug Localization with Combination of Deep Learning and Information Retrieval. In 2017 IEEE\/ACM 25th International Conference on Program Comprehension (ICPC). 218{229 . [Lam et al. 2017] A. N. Lam, A. T. Nguyen, H. A. Nguyen, and T. N. Nguyen. 2017. Bug Localization with Combination of Deep Learning and Information Retrieval. In 2017 IEEE\/ACM 25th International Conference on Program Comprehension (ICPC). 218{229."},{"key":"e_1_2_1_9_1","volume-title":"Proceedings of the 25th International Symposium on Software Testing and Analysis","author":"Le","year":"2016","unstructured":"[ Le et al. 2016 ] Tien-Duy B. Le, David Lo, Claire Le Goues, and Lars Grunske. 2016. A Learning-to-Rank Based Fault Localization Approach Using Likely Invariants . In Proceedings of the 25th International Symposium on Software Testing and Analysis ( Saarbrucken, Germany) (ISSTA 2016). Association for Computing Machinery, New York, NY, USA, 177{188. [Le et al. 2016] Tien-Duy B. Le, David Lo, Claire Le Goues, and Lars Grunske. 2016. A Learning-to-Rank Based Fault Localization Approach Using Likely Invariants. In Proceedings of the 25th International Symposium on Software Testing and Analysis (Saarbrucken, Germany) (ISSTA 2016). Association for Computing Machinery, New York, NY, USA, 177{188."},{"key":"e_1_2_1_10_1","volume-title":"Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering","author":"Le","year":"2015","unstructured":"[ Le et al. 2015 ] Tien-Duy B. Le, Richard J. Oentaryo, and David Lo. 2015. Information Retrieval and Spectrum Based Bug Localization: Better Together . In Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering ( Bergamo, Italy) (ESEC\/FSE 2015). Association for Computing Machinery, New York, NY, USA, 579{590. [Le et al. 2015] Tien-Duy B. Le, Richard J. Oentaryo, and David Lo. 2015. Information Retrieval and Spectrum Based Bug Localization: Better Together. In Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering (Bergamo, Italy) (ESEC\/FSE 2015). Association for Computing Machinery, New York, NY, USA, 579{590."},{"key":"e_1_2_1_11_1","volume-title":"2013 20th Working Conference on Reverse Engineering (WCRE). 62{71","author":"Rao","year":"2013","unstructured":"[ Rao et al. 2013 ] S. Rao, H. Medeiros, and A. Kak. 2013. An Incremental Update Framework for E_cient Retrieval from Software Libraries for Bug Localization . In 2013 20th Working Conference on Reverse Engineering (WCRE). 62{71 . [Rao et al. 2013] S. Rao, H. Medeiros, and A. Kak. 2013. An Incremental Update Framework for E_cient Retrieval from Software Libraries for Bug Localization. In 2013 20th Working Conference on Reverse Engineering (WCRE). 62{71."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2693208.2693222"},{"key":"e_1_2_1_13_1","volume-title":"Improving Bug Localization Using Structured Information Retrieval. In 2013 28th IEEE\/ACM International Conference on Automated Software Engineering (ASE). 345{355","author":"Saha","year":"2013","unstructured":"[ Saha et al. 2013 ] R. K. Saha, M. Lease, S. Khurshid, and D. E. Perry. 2013 . Improving Bug Localization Using Structured Information Retrieval. In 2013 28th IEEE\/ACM International Conference on Automated Software Engineering (ASE). 345{355 . [Saha et al. 2013] R. K. Saha, M. Lease, S. Khurshid, and D. E. Perry. 2013. Improving Bug Localization Using Structured Information Retrieval. In 2013 28th IEEE\/ACM International Conference on Automated Software Engineering (ASE). 345{355."},{"key":"e_1_2_1_14_1","volume-title":"An Information Retrieval Approach for Regression Test Prioritization Based on Program Changes. In 2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering","volume":"1","author":"Saha","year":"2015","unstructured":"[ Saha et al. 2015 ] R. K. Saha, L. Zhang, S. Khurshid, and D. E. Perry. 2015 . An Information Retrieval Approach for Regression Test Prioritization Based on Program Changes. In 2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering , Vol. 1 . 268{279. [Saha et al. 2015] R. K. Saha, L. Zhang, S. Khurshid, and D. E. Perry. 2015. An Information Retrieval Approach for Regression Test Prioritization Based on Program Changes. In 2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering, Vol. 1. 268{279."},{"key":"e_1_2_1_15_1","first-page":"1","article-title":"2017] Bunyamin Sisman, Shayan A. Akbar, and Avinash C. Kak. 2017","volume":"29","author":"Sisman","year":"2017","unstructured":"[ Sisman et al. 2017] Bunyamin Sisman, Shayan A. Akbar, and Avinash C. Kak. 2017 . Exploiting Spatial Code Proximity and Order for Improved Source Code Retrieval for Bug Localization. Journal of Software: Evolution and Process 29 , 1 ( 2017 ), e1805. e1805 JSME-16-0104.R1. [Sisman et al. 2017] Bunyamin Sisman, Shayan A. Akbar, and Avinash C. Kak. 2017. Exploiting Spatial Code Proximity and Order for Improved Source Code Retrieval for Bug Localization. Journal of Software: Evolution and Process 29, 1 (2017), e1805. e1805 JSME-16-0104.R1.","journal-title":"Journal of Software: Evolution and Process"},{"key":"e_1_2_1_16_1","volume-title":"Incorporating Version Histories in Information Retrieval Based Bug Localization. In 2012 9th IEEE Working Conference on Mining Software Repositories (MSR). 50{59","author":"Sisman","year":"2012","unstructured":"[ Sisman and Kak 2012 ] B. Sisman and A. C. Kak. 2012 . Incorporating Version Histories in Information Retrieval Based Bug Localization. In 2012 9th IEEE Working Conference on Mining Software Repositories (MSR). 50{59 . [Sisman and Kak 2012] B. Sisman and A. C. Kak. 2012. Incorporating Version Histories in Information Retrieval Based Bug Localization. In 2012 9th IEEE Working Conference on Mining Software Repositories (MSR). 50{59."},{"key":"e_1_2_1_17_1","volume-title":"Assisting Code Search with Automatic Query Reformulation for Bug Localization. In 2013 10th Working Conference on Mining Software Repositories (MSR). 309{318","author":"Sisman","year":"2013","unstructured":"[ Sisman and Kak 2013 ] B. Sisman and A. C. Kak. 2013 . Assisting Code Search with Automatic Query Reformulation for Bug Localization. In 2013 10th Working Conference on Mining Software Repositories (MSR). 309{318 . [Sisman and Kak 2013] B. Sisman and A. C. Kak. 2013. Assisting Code Search with Automatic Query Reformulation for Bug Localization. In 2013 10th Working Conference on Mining Software Repositories (MSR). 309{318."},{"key":"e_1_2_1_18_1","volume-title":"2013 28th IEEE\/ACM International Conference on Automated Software Engineering (ASE). 290{300","author":"Thung","year":"2013","unstructured":"[ Thung et al. 2013 ] F. Thung, S. Wang, D. Lo, and J. Lawall. 2013. Automatic Recommendation of API Methods from Feature Requests . In 2013 28th IEEE\/ACM International Conference on Automated Software Engineering (ASE). 290{300 . [Thung et al. 2013] F. Thung, S. Wang, D. Lo, and J. Lawall. 2013. Automatic Recommendation of API Methods from Feature Requests. In 2013 28th IEEE\/ACM International Conference on Automated Software Engineering (ASE). 290{300."},{"key":"e_1_2_1_19_1","volume-title":"Chris Parnin, and Alessandro Orso.","author":"Wang","year":"2015","unstructured":"[ Wang et al. 2015] Qianqian Wang , Chris Parnin, and Alessandro Orso. 2015 . Evaluating the Usefulness of IR-Based Fault Localization Techniques (ISSTA 2015). Association for Computing Machinery , New York, NY, USA, 1{11. [Wang et al. 2015] Qianqian Wang, Chris Parnin, and Alessandro Orso. 2015. Evaluating the Usefulness of IR-Based Fault Localization Techniques (ISSTA 2015). Association for Computing Machinery, New York, NY, USA, 1{11."},{"key":"e_1_2_1_20_1","volume-title":"Proceedings of the 22nd International Conference on Program Comprehension","author":"Wang","year":"2014","unstructured":"[ Wang and Lo 2014 ] Shaowei Wang and David Lo. 2014. Version History, Similar Report, and Structure: Putting Them Together for Improved Bug Localization . In Proceedings of the 22nd International Conference on Program Comprehension ( Hyderabad, India) (ICPC 2014). Association for Computing Machinery, New York, NY, USA, 53{63. [Wang and Lo 2014] Shaowei Wang and David Lo. 2014. Version History, Similar Report, and Structure: Putting Them Together for Improved Bug Localization. In Proceedings of the 22nd International Conference on Program Comprehension (Hyderabad, India) (ICPC 2014). Association for Computing Machinery, New York, NY, USA, 53{63."},{"key":"e_1_2_1_21_1","volume-title":"2011 18th Working Conference on Reverse Engineering. 92{96","author":"Wang","year":"2011","unstructured":"[ Wang et al. 2011 ] S. Wang, D. Lo, Z. Xing, and L. Jiang. 2011. Concern Localization using Information Retrieval: An Empirical Study on Linux Kernel . In 2011 18th Working Conference on Reverse Engineering. 92{96 . [Wang et al. 2011] S. Wang, D. Lo, Z. Xing, and L. Jiang. 2011. Concern Localization using Information Retrieval: An Empirical Study on Linux Kernel. In 2011 18th Working Conference on Reverse Engineering. 92{96."},{"key":"e_1_2_1_22_1","volume-title":"2016 31st IEEE\/ACM International Conference on Automated Software Engineering (ASE). 262{273","author":"Wen","year":"2016","unstructured":"[ Wen et al. 2016 ] M. Wen, R. Wu, and S. Cheung. 2016. Locus: Locating Bugs from Software Changes . In 2016 31st IEEE\/ACM International Conference on Automated Software Engineering (ASE). 262{273 . [Wen et al. 2016] M. Wen, R. Wu, and S. Cheung. 2016. Locus: Locating Bugs from Software Changes. In 2016 31st IEEE\/ACM International Conference on Automated Software Engineering (ASE). 262{273."},{"key":"e_1_2_1_23_1","volume-title":"Boosting Bug-Report-Oriented Fault Localization with Segmentation and Stack-Trace Analysis. In 2014 IEEE International Conference on Software Maintenance and Evolution. 181{190","author":"Wong","year":"2014","unstructured":"[ Wong et al. 2014 ] C. Wong, Y. Xiong, H. Zhang, D. Hao, L. Zhang, and H. Mei. 2014 . Boosting Bug-Report-Oriented Fault Localization with Segmentation and Stack-Trace Analysis. In 2014 IEEE International Conference on Software Maintenance and Evolution. 181{190 . [Wong et al. 2014] C. Wong, Y. Xiong, H. Zhang, D. Hao, L. Zhang, and H. Mei. 2014. Boosting Bug-Report-Oriented Fault Localization with Segmentation and Stack-Trace Analysis. In 2014 IEEE International Conference on Software Maintenance and Evolution. 181{190."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2521368"},{"key":"e_1_2_1_25_1","volume-title":"Towards Semi-automatic Bug Triage and Severity Prediction Based on Topic Model and Multi-feature of Bug Reports. In 2014 IEEE 38th Annual Computer Software and Applications Conference. 97{106","author":"Yang","year":"2014","unstructured":"[ Yang et al. 2014 ] G. Yang, T. Zhang, and B. Lee. 2014 . Towards Semi-automatic Bug Triage and Severity Prediction Based on Topic Model and Multi-feature of Bug Reports. In 2014 IEEE 38th Annual Computer Software and Applications Conference. 97{106 . [Yang et al. 2014] G. Yang, T. Zhang, and B. Lee. 2014. Towards Semi-automatic Bug Triage and Severity Prediction Based on Topic Model and Multi-feature of Bug Reports. In 2014 IEEE 38th Annual Computer Software and Applications Conference. 97{106."},{"key":"e_1_2_1_26_1","volume-title":"Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering","volume":"46","author":"Ye","year":"2014","unstructured":"[ Ye et al. 2014 ] Xin Ye, Razvan Bunescu, and Chang Liu. 2014. Learning to Rank Relevant Files for Bug Reports Using Domain Knowledge . In Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering ( Hong Kong, China) (FSE 2014). Association for Computing Machinery, New York, NY, USA, 689{699. ACM SIGSOFT Software Engineering Newsletter Page 35 July 2021 Volume 46 Number 3 [Ye et al. 2014] Xin Ye, Razvan Bunescu, and Chang Liu. 2014. Learning to Rank Relevant Files for Bug Reports Using Domain Knowledge. In Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering (Hong Kong, China) (FSE 2014). Association for Computing Machinery, New York, NY, USA, 689{699. ACM SIGSOFT Software Engineering Newsletter Page 35 July 2021 Volume 46 Number 3"},{"key":"e_1_2_1_27_1","volume-title":"Hui Shen, Xiao Ma, Razvan Bunescu, and Chang Liu.","author":"Ye","year":"2016","unstructured":"[ Ye et al. 2016] Xin Ye , Hui Shen, Xiao Ma, Razvan Bunescu, and Chang Liu. 2016 . From Word Embeddings to Document Similarities for Improved Information Retrieval in Software Engineering (ICSE '16). Association for Computing Machinery , New York, NY, USA, 404{415. [Ye et al. 2016] Xin Ye, Hui Shen, Xiao Ma, Razvan Bunescu, and Chang Liu. 2016. From Word Embeddings to Document Similarities for Improved Information Retrieval in Software Engineering (ICSE '16). Association for Computing Machinery, New York, NY, USA, 404{415."},{"key":"e_1_2_1_28_1","first-page":"2","article-title":"2015] Jie Zhang, Xiaoyin Wang, Dan Hao, Bing Xie, Lu Zhang, and Hong Mei. 2015","volume":"58","author":"Zhang","year":"2015","unstructured":"[ Zhang et al. 2015] Jie Zhang, Xiaoyin Wang, Dan Hao, Bing Xie, Lu Zhang, and Hong Mei. 2015 . A Survey on Bug-Report Analysis. Science China Information Sciences 58 , 2 ( 2015 ), 1{24. [Zhang et al. 2015] Jie Zhang, Xiaoyin Wang, Dan Hao, Bing Xie, Lu Zhang, and Hong Mei. 2015. A Survey on Bug-Report Analysis. Science China Information Sciences 58, 2 (2015), 1{24.","journal-title":"A Survey on Bug-Report Analysis. Science China Information Sciences"},{"key":"e_1_2_1_29_1","first-page":"184","article-title":"2016] Tao Zhang, Jiachi Chen, Geunseok Yang, Byungjeong Lee, and Xiapu Luo. 2016","volume":"117","author":"Zhang","year":"2016","unstructured":"[ Zhang et al. 2016] Tao Zhang, Jiachi Chen, Geunseok Yang, Byungjeong Lee, and Xiapu Luo. 2016 . Towards More Accurate Severity Prediction and Fixer Recommendation of Software Bugs. Journal of Systems and Software 117 ( 2016 ), 166{ 184 . [Zhang et al. 2016] Tao Zhang, Jiachi Chen, Geunseok Yang, Byungjeong Lee, and Xiapu Luo. 2016. Towards More Accurate Severity Prediction and Fixer Recommendation of Software Bugs. Journal of Systems and Software 117 (2016), 166{184.","journal-title":"Journal of Systems and Software"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227210"}],"container-title":["ACM SIGSOFT Software Engineering Notes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3468744.3468755","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3468744.3468755","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:36Z","timestamp":1750268976000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3468744.3468755"}},"subtitle":["A comparative study of generic and composite text models - A Retrospective"],"short-title":[],"issued":{"date-parts":[[2021,7,14]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,7,14]]}},"alternative-id":["10.1145\/3468744.3468755"],"URL":"https:\/\/doi.org\/10.1145\/3468744.3468755","relation":{},"ISSN":["0163-5948"],"issn-type":[{"type":"print","value":"0163-5948"}],"subject":[],"published":{"date-parts":[[2021,7,14]]},"assertion":[{"value":"2021-07-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}