{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T21:20:32Z","timestamp":1758662432215,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,2,20]]},"DOI":"10.1145\/3731806.3731807","type":"proceedings-article","created":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T10:17:39Z","timestamp":1758622659000},"page":"33-39","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Prioritizing Bugs using Stack Overflow Posts"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7777-1370","authenticated-orcid":false,"given":"Raed Shatnawi","family":"Shatnawi","sequence":"first","affiliation":[{"name":"Department of Software Engineering, Jordan University of Science and Technology, Irbid, Irbid, Jordan"}]}],"member":"320","published-online":{"date-parts":[[2025,9,23]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330213"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","unstructured":"Nathaniel Ayewah William Pugh David Hovemeyer J.\u00a0David Morgenthaler and John Penix. 2008. Using Static Analysis to Find Bugs. IEEE Software 25 5 (2008) 22\u201329. 10.1109\/MS.2008.130","DOI":"10.1109\/MS.2008.130"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49665-7_14"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00038"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","unstructured":"Anton Barua Stephen\u00a0W. Thomas and Ahmed\u00a0E. Hassan. 2014. What are developers talking about? An analysis of topics and trends in Stack Overflow. Empirical Softw. Engg. 19 3 (June 2014) 619\u2013654. 10.1007\/s10664-012-9231-y","DOI":"10.1007\/s10664-012-9231-y"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.5555\/1717171"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","unstructured":"Ahmad Diyanati Behrooz\u00a0Shahi Sheykhahmadloo Seyed\u00a0Mostafa Fakhrahmad Mohammad\u00a0Hadi Sadredini and Mohammad\u00a0Hassan Diyanati. 2020. A proposed approach to determining expertise level of StackOverflow programmers based on mining of user comments. Journal of Computer Languages 61 (2020) 101000. 10.1016\/j.cola.2020.101000","DOI":"10.1016\/j.cola.2020.101000"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.81"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","unstructured":"David Hovemeyer and William Pugh. 2004. Finding bugs is easy. SIGPLAN Not. 39 12 (Dec. 2004) 92\u2013106. 10.1145\/1052883.1052895","DOI":"10.1145\/1052883.1052895"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","unstructured":"Serkan Kirbas Bora Caglayan Tracy Hall Steve Counsell David Bowes Alper Sen and Ayse Bener. 2017. The relationship between evolutionary coupling and defects in large industrial software. J. Softw. Evol. Process 29 4 (April 2017) n\/a. 10.1002\/smr.1842","DOI":"10.1002\/smr.1842"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330202"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2019.00040"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","unstructured":"Wasiur Rhmann Babita Pandey Gufran Ansari and D.K. Pandey. 2020. Software fault prediction based on change metrics using hybrid algorithms: An empirical study. Journal of King Saud University - Computer and Information Sciences 32 4 (2020) 419\u2013424. 10.1016\/j.jksuci.2019.03.006Emerging Software Systems.","DOI":"10.1016\/j.jksuci.2019.03.006"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-2099-5_24"},{"key":"e_1_3_3_1_16_2","volume-title":"Text Retrieval Conference","author":"Robertson Stephen\u00a0E.","year":"1994","unstructured":"Stephen\u00a0E. Robertson, Steve Walker, Susan Jones, Micheline Hancock-Beaulieu, and Mike Gatford. 1994. Okapi at TREC-3. In Text Retrieval Conference."},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","unstructured":"Riccardo Rubei Claudio\u00a0Di Sipio Phuong\u00a0Thanh Nguyen Juri\u00a0Di Rocco and Davide\u00a0Di Ruscio. 2020. PostFinder: Mining Stack Overflow posts to support software developers. Information and Software Technology 127 (2020). 10.1016\/j.infsof.2020.106367","DOI":"10.1016\/j.infsof.2020.106367"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2004.1"},{"key":"e_1_3_3_1_19_2","volume-title":"ISSRE Supplementary Conference Proceedings","author":"Shatnawi Raed","year":"2006","unstructured":"Raed Shatnawi. 2006. An Investigation of CK Metrics Thresholds. In ISSRE Supplementary Conference Proceedings."},{"key":"e_1_3_3_1_20_2","unstructured":"Steven\u00a0D. Simmons. 2020. Conceptions of Refactoring: An Investigation of Stack Overflow Posts. https:\/\/scholarworks.rit.edu\/theses\/10440."},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/3210459.3210466"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"crossref","unstructured":"Youshuai Tan Sijie Xuand\u00a0Zhaowei Wang Tao Zhang Zhou Xu and Xiapu Luo. 2020. Bug severity prediction using question-and-answer pairs from Stack Overflow. Journal of Systems and Software 165 (2020) 110567.","DOI":"10.1016\/j.jss.2020.110567"},{"key":"e_1_3_3_1_23_2","unstructured":"Henry Tang and Sarah Nadi. 2020. Can We Use Stack Overflow as a Source of Explainable Bug-fix Data? ArXiv abs\/2004.08378 (2020)."},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/2851613.2851789"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"crossref","unstructured":"Emillie Thiselton and Christoph Treude. 2019. Enhancing Python Compiler Error Messages via Stack. 2019 ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM) (2019) 1\u201312.","DOI":"10.1109\/ESEM.2019.8870155"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"crossref","unstructured":"Bowen Wang Kangjie Lu Qiushi Wu and Aditya Pakki. 2021. Unleashing Coveraged-Based Fuzzing Through Comprehensive Efficient and Faithful Exploitable-Bug Exposing. IEEE Transactions on Dependable and Secure Computing 19 (2021) 2998\u20133010.","DOI":"10.1109\/TDSC.2021.3079857"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"crossref","unstructured":"Alexander\u00a0William Wong Amir Salimi Shaiful\u00a0Alam Chowdhury and Abram Hindle. 2019. Syntax and Stack Overflow: A Methodology for Extracting a Corpus of Syntax Errors and Fixes. 2019 IEEE International Conference on Software Maintenance and Evolution (ICSME) (2019) 318\u2013322.","DOI":"10.1109\/ICSME.2019.00048"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAAI.2012.20"},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3196398.3196408"},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"crossref","unstructured":"Qiao Yu Shujuan Jiang Junyan Qian Lili Bo Li Jiang and Gongjie Zhang. 2020. Process metrics for software defect prediction in object-oriented programs. IET Softw. 14 (2020) 283\u2013292.","DOI":"10.1049\/iet-sen.2018.5439"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"crossref","unstructured":"Haoxiang Zhang Shaowei Wang Tse-Hsun\u00a0Peter Chen Ying Zou and A. Hassan. 2019. An Empirical Study of Obsolete Answers on Stack Overflow. IEEE Transactions on Software Engineering 47 (2019) 850\u2013862.","DOI":"10.1109\/TSE.2019.2906315"}],"event":{"name":"ICSCA 2025: 2025 14th International Conference on Software and Computer Applications","acronym":"ICSCA 2025","location":"Kuala Lumpur Malaysia"},"container-title":["Proceedings of the 2025 14th International Conference on Software and Computer Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3731806.3731807","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T20:53:10Z","timestamp":1758660790000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3731806.3731807"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,20]]},"references-count":30,"alternative-id":["10.1145\/3731806.3731807","10.1145\/3731806"],"URL":"https:\/\/doi.org\/10.1145\/3731806.3731807","relation":{},"subject":[],"published":{"date-parts":[[2025,2,20]]},"assertion":[{"value":"2025-09-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}