{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T11:13:41Z","timestamp":1770462821657,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,21]],"date-time":"2022-05-21T00:00:00Z","timestamp":1653091200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["No.2018YFB1403400"],"award-info":[{"award-number":["No.2018YFB1403400"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No.62072442"],"award-info":[{"award-number":["No.62072442"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,21]]},"DOI":"10.1145\/3510003.3510189","type":"proceedings-article","created":{"date-parts":[[2022,7,5]],"date-time":"2022-07-05T22:42:59Z","timestamp":1657060979000},"page":"2427-2439","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Where is your app frustrating users?"],"prefix":"10.1145","author":[{"given":"Yawen","family":"Wang","sequence":"first","affiliation":[{"name":"University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Junjie","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Hongyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"The University of Newcastle, Callaghan, Australia"}]},{"given":"Xuran","family":"Ming","sequence":"additional","affiliation":[{"name":"University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Lin","family":"Shi","sequence":"additional","affiliation":[{"name":"University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Qing","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Chinese Academy of Sciences, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2022,7,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2014. Viterbi Algorithm. https:\/\/en.wikipedia.org\/wiki\/Viterbi_algorithm."},{"key":"e_1_3_2_1_2_1","volume-title":"Eliciting mixed emotions: a meta-analysis comparing models, types, and measures. Frontiers in psychology 6","author":"Berrios Raul","year":"2015","unstructured":"Raul Berrios, Peter Totterdell, and Stephen Kellett. 2015. Eliciting mixed emotions: a meta-analysis comparing models, types, and measures. Frontiers in psychology 6 (2015), 428."},{"key":"e_1_3_2_1_3_1","volume-title":"Chinese whispers: An efficient graph clustering algorithm and its application to natural language processing problems","author":"Biemann C.","year":"2006","unstructured":"C. Biemann. 2006. Chinese whispers: An efficient graph clustering algorithm and its application to natural language processing problems. Association for Computational Linguistics (2006)."},{"key":"e_1_3_2_1_4_1","volume-title":"NIPS 2001","author":"Blei David M.","year":"2001","unstructured":"David M. Blei, Andrew Y. Ng, and Michael I. Jordan. 2001. Latent Dirichlet Allocation. In Advances in Neural Information Processing Systems 14 [Neural Information Processing Systems: Natural and Synthetic, NIPS 2001, December 3--8, 2001, Vancouver, British Columbia, Canada], Thomas G. Dietterich, Suzanna Becker, and Zoubin Ghahramani (Eds.). MIT Press, 601--608."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-2029"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568263"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078186"},{"key":"e_1_3_2_1_8_1","volume-title":"International Conference on Software Engineering (ICSE).","author":"Cooper Nathan","year":"2021","unstructured":"Nathan Cooper, Carlos Bernal-C\u00e1rdenas, Oscar Chaparro, Kevin Moran, and Denys Poshyvanyk. 2021. It Takes Two to Tango: Combining Visual and Textual Information for Detecting Duplicate Video-Based Bug Reports. In International Conference on Software Engineering (ICSE)."},{"key":"e_1_3_2_1_9_1","volume-title":"S-1","author":"Dai Hong-Jie","year":"2015","unstructured":"Hong-Jie Dai, Po-Ting Lai, Yung-Chun Chang, and Richard Tzong-Han Tsai. 2015. Enhancing of chemical compound and drug name recognition using representative tag scheme and fine-grained tokenization. J. Cheminformatics 7, S-1 (2015), S14."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, NAACL-HLT 2019","volume":"1","author":"Devlin Jacob","year":"2019","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2019. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. In Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, NAACL-HLT 2019, Minneapolis, MN, USA, June 2--7, 2019, Volume 1 (Long and Short Papers), Jill Burstein, Christy Doran, and Thamar Solorio (Eds.). Association for Computational Linguistics, 4171--4186."},{"key":"e_1_3_2_1_11_1","volume-title":"A Hidden Markov Model approach to variation among sites in rate of evolution. Molecular Biology and Evolution 13, 1 (01","author":"Felsenstein J","year":"1996","unstructured":"J Felsenstein and G A Churchill. 1996. A Hidden Markov Model approach to variation among sites in rate of evolution. Molecular Biology and Evolution 13, 1 (01 1996), 93--104."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3264595"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180218"},{"key":"e_1_3_2_1_14_1","volume-title":"Automating App Review Response Generation. In 34th IEEE\/ACM International Conference on Automated Software Engineering, ASE 2019","author":"Gao Cuiyun","year":"2019","unstructured":"Cuiyun Gao, Jichuan Zeng, Xin Xia, David Lo, Michael R. Lyu, and Irwin King. 2019. Automating App Review Response Generation. In 34th IEEE\/ACM International Conference on Automated Software Engineering, ASE 2019, San Diego, CA, USA, November 11--15, 2019. IEEE, 163--175."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.57"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380924"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.9"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-017-0274-x"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2014.6912257"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00096"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/2664446.2664461"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P18-1031"},{"key":"e_1_3_2_1_23_1","volume-title":"Effective Bug Triage Based on Historical Bug-Fix Information. In 2014 IEEE 25th International Symposium on Software Reliability Engineering. 122--132","author":"Hu Hao","year":"2014","unstructured":"Hao Hu, Hongyu Zhang, Jifeng Xuan, and Weigang Sun. 2014. Effective Bug Triage Based on Historical Bug-Fix Information. In 2014 IEEE 25th International Symposium on Software Reliability Engineering. 122--132."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238208"},{"key":"e_1_3_2_1_25_1","volume-title":"Bidirectional LSTM-CRF Models for Sequence Tagging. CoRR abs\/1508.01991","author":"Huang Zhiheng","year":"2015","unstructured":"Zhiheng Huang, Wei Xu, and Kai Yu. 2015. Bidirectional LSTM-CRF Models for Sequence Tagging. CoRR abs\/1508.01991 (2015)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2018.08.030"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2017.71"},{"key":"e_1_3_2_1_28_1","volume-title":"Domain Adaptation for Test Report Classification in Crowdsourced Testing. In ICSE'17","author":"Junjie Wang","year":"2017","unstructured":"Wang Junjie, Cui Qiang, Wang Song, and Wang Qing. 2017. Domain Adaptation for Test Report Classification in Crowdsourced Testing. In ICSE'17. 83--92."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Kyo Kang Sholom Cohen James Hess William Novak and A. Peterson. 1990. Feature-Oriented Domain Analysis (FODA) Feasibility Study. Technical Report CMU\/SEI-90-TR-021. Software Engineering Institute Carnegie Mellon University Pittsburgh PA.","DOI":"10.21236\/ADA235785"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2014.50"},{"key":"e_1_3_2_1_31_1","volume-title":"Adam: A Method for Stochastic Optimization. In 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7--9, 2015, Conference Track Proceedings.","author":"Diederik","unstructured":"Diederik P. Kingma and Jimmy Ba. 2015. Adam: A Method for Stochastic Optimization. In 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7--9, 2015, Conference Track Proceedings."},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence, IJCAI 95","author":"Kohavi Ron","year":"1995","unstructured":"Ron Kohavi. 1995. A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection. In Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence, IJCAI 95, Montr\u00e9al Qu\u00e9bec, Canada, August 20--25 1995, 2 Volumes. 1137--1145."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-018-0293-2"},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the Eighteenth International Conference on Machine Learning (ICML 2001","author":"Lafferty John D.","year":"2001","unstructured":"John D. Lafferty, Andrew McCallum, and Fernando C. N. Pereira. 2001. Conditional Random Fields: Probabilistic Models for Segmenting and Labeling Sequence Data. In Proceedings of the Eighteenth International Conference on Machine Learning (ICML 2001), Williams College, Williamstown, MA, USA, June 28 - July 1, 2001, Carla E. Brodley and Andrea Pohoreckyj Danyluk (Eds.). Morgan Kaufmann, 282--289."},{"key":"e_1_3_2_1_35_1","volume-title":"Comparing partitions. Journal of Classification","year":"1985","unstructured":"Lawrence, HubertPhipps, and Arabie. 1985. Comparing partitions. Journal of Classification (1985)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3117776"},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of the 39th International Conference on Software Engineering, ICSE 2017","author":"Li Yuanchun","year":"2017","unstructured":"Yuanchun Li, Ziyue Yang, Yao Guo, and Xiangqun Chen. 2017. DroidBot: a lightweight UI-guided test input generator for Android. In Proceedings of the 39th International Conference on Software Engineering, ICSE 2017, Buenos Aires, Argentina, May 20--28, 2017 - Companion Volume. 23--26."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00066"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397355"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2015.7320414"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.27"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2630689"},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of the Seventeenth International Conference on Machine Learning (ICML 2000","author":"McCallum Andrew","year":"2000","unstructured":"Andrew McCallum, Dayne Freitag, and Fernando C. N. Pereira. 2000. Maximum Entropy Markov Models for Information Extraction and Segmentation. In Proceedings of the Seventeenth International Conference on Machine Learning (ICML 2000), Stanford University, Stanford, CA, USA, June 29 - July 2, 2000, Pat Langley (Ed.). Morgan Kaufmann, 591--598."},{"key":"e_1_3_2_1_44_1","first-page":"2837","article-title":"Information Theoretic Measures for Clusterings Comparison: Variants, Properties, Normalization and Correction for Chance","volume":"11","author":"Nguyen Xuan Vinh","year":"2010","unstructured":"Xuan Vinh Nguyen, Julien Epps, and James Bailey. 2010. Information Theoretic Measures for Clusterings Comparison: Variants, Properties, Normalization and Correction for Chance. J. Mach. Learn. Res. 11 (2010), 2837--2854.","journal-title":"J. Mach. Learn. Res."},{"key":"e_1_3_2_1_45_1","volume-title":"Daniel Alencar da Costa, and Ying Zou","author":"Noei Ehsan","year":"2018","unstructured":"Ehsan Noei, Daniel Alencar da Costa, and Ying Zou. 2018. Winning the app production rally. In Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ESEC\/SIGSOFT FSE 2018, Lake Buena Vista, FL, USA, November 04--09, 2018. 283--294."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE48521.2020.00017"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332475"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332474"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401960"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.5555\/1596374.1596399"},{"key":"e_1_3_2_1_51_1","volume-title":"Introduction to Modern Information Retrieval","author":"Salton Gerard","unstructured":"Gerard Salton and Michael McGill. 1984. Introduction to Modern Information Retrieval. McGraw-Hill Book Company."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950299"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1523\/JNEUROSCI.3359-07.2008"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115715"},{"key":"e_1_3_2_1_55_1","volume-title":"Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N. Gomez, Lukasz Kaiser, and Illia Polosukhin. 2017. Attention is All you Need. In Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, December 4--9, 2017, Long Beach, CA, USA, Isabelle Guyon, Ulrike von Luxburg, Samy Bengio, Hanna M. Wallach, Rob Fergus, S. V. N. Vishwanathan, and Roman Garnett (Eds.). 5998--6008."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884818"},{"key":"e_1_3_2_1_57_1","volume-title":"Mining User Opinions in Mobile App Reviews: A Keyword-Based Approach. In 30th IEEE\/ACM International Conference on Automated Software Engineering, ASE 2015","author":"Vu Phong Minh","year":"2015","unstructured":"Phong Minh Vu, Tam The Nguyen, Hung Viet Pham, and Tung Thanh Nguyen. 2015. Mining User Opinions in Mobile App Reviews: A Keyword-Based Approach. In 30th IEEE\/ACM International Conference on Automated Software Engineering, ASE 2015, Lincoln, NE, USA, November 9--13, 2015. 749--759."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970365"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417931"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2019.03.003"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00088"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2576454"},{"key":"e_1_3_2_1_63_1","volume-title":"CLUENER2020: Fine-grained Name Entity Recognition for Chinese. arXiv preprint arXiv:2001","author":"Xu Liang","year":"2020","unstructured":"Liang Xu, Qianqian Dong, Cong Yu, Yin Tian, Weitang Liu, Lu Li, and Xuanwei Zhang. 2020. CLUENER2020: Fine-grained Name Entity Recognition for Chinese. arXiv preprint arXiv:2001.04351 (2020)."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380383"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-006-0033-x"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/637"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2396761.2396869"}],"event":{"name":"ICSE '22: 44th International Conference on Software Engineering","location":"Pittsburgh Pennsylvania","acronym":"ICSE '22","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 44th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510003.3510189","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3510003.3510189","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:24Z","timestamp":1750191144000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510003.3510189"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,21]]},"references-count":67,"alternative-id":["10.1145\/3510003.3510189","10.1145\/3510003"],"URL":"https:\/\/doi.org\/10.1145\/3510003.3510189","relation":{},"subject":[],"published":{"date-parts":[[2022,5,21]]},"assertion":[{"value":"2022-07-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}