{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,26]],"date-time":"2024-07-26T02:10:01Z","timestamp":1721959801588},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2012,8,29]],"date-time":"2012-08-29T00:00:00Z","timestamp":1346198400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1007\/s10664-012-9224-x","type":"journal-article","created":{"date-parts":[[2012,8,28]],"date-time":"2012-08-28T09:56:14Z","timestamp":1346147774000},"page":"465-500","source":"Crossref","is-referenced-by-count":67,"title":["Configuring latent Dirichlet allocation based feature location"],"prefix":"10.1007","volume":"19","author":[{"given":"Lauren R.","family":"Biggers","sequence":"first","affiliation":[]},{"given":"Cecylia","family":"Bocovich","sequence":"additional","affiliation":[]},{"given":"Riley","family":"Capshaw","sequence":"additional","affiliation":[]},{"given":"Brian P.","family":"Eddy","sequence":"additional","affiliation":[]},{"given":"Letha H.","family":"Etzkorn","sequence":"additional","affiliation":[]},{"given":"Nicholas A.","family":"Kraft","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,8,29]]},"reference":[{"key":"9224_CR1","doi-asserted-by":"crossref","unstructured":"Abadi A, Nisenson M, Simionovici Y (2008) A traceability technique for specifications. In: Proc of the 16th IEEE int\u2019l conf on program comprehension, pp\u00a0103\u2013112. doi: 10.1109\/ICPC.2008.30","DOI":"10.1109\/ICPC.2008.30"},{"key":"9224_CR2","doi-asserted-by":"crossref","unstructured":"Abebe S, Haiduc S, Marcus A, Tonella P, Antoniol G (2009a) Analyzing the evolution of the source code vocabulary. In: Proc of the 13th European conf on software maintenance and reengineering, pp\u00a0189\u2013198. doi: 10.1109\/CSMR.2009.61","DOI":"10.1109\/CSMR.2009.61"},{"key":"9224_CR3","doi-asserted-by":"crossref","unstructured":"Abebe S, Haiduc S, Tonella P, Marcus A (2009b) Lexicon bad smells in software. In: Proc of the 16th working conf on reverse engineering, pp\u00a095\u201399. doi: 10.1109\/WCRE.2009.26","DOI":"10.1109\/WCRE.2009.26"},{"issue":"1\u20132","key":"9224_CR4","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1020281327116","volume":"50","author":"C Andrieu","year":"2003","unstructured":"Andrieu C, Freitas N, Doucet A, Jordan M (2003) An introduction to mcmc for machine learning. Mach Learn 50(1\u20132):5\u201343","journal-title":"Mach Learn"},{"issue":"10","key":"9224_CR5","doi-asserted-by":"crossref","first-page":"970","DOI":"10.1109\/TSE.2002.1041053","volume":"28","author":"G Antoniol","year":"2002","unstructured":"Antoniol G, Canfora G, Casazza G, Lucia AD, Merlo E (2002) Recovering traceability links between code and documentation. IEEE Trans Softw Eng 28(10):970\u2013983","journal-title":"IEEE Trans Softw Eng"},{"key":"9224_CR6","unstructured":"Asuncion A, Welling M, Smyth P, Teh Y (2009) On smoothing and inference for topic models. In: Proc of the 25th conf on uncertainty in artificial intelligence, pp\u00a027\u201334"},{"key":"9224_CR7","doi-asserted-by":"crossref","unstructured":"Asuncion H, Asuncion A, Taylor R (2010) Software traceability with topic modeling. In: Proc of the 32nd int\u2019l conf on software engineering, pp\u00a095\u2013104. doi: 10.1145\/1806799.1806817","DOI":"10.1145\/1806799.1806817"},{"key":"9224_CR8","doi-asserted-by":"crossref","unstructured":"Baldi P, Linstead E, Lopes C, Bajracharya S (2008) A theory of aspects as latent topics. In: Proc of the ACM SIGPLAN conf on object-oriented programming, systems, languages, and applications, pp\u00a0543\u2013562. doi: 10.1145\/1449955.1449807","DOI":"10.1145\/1449955.1449807"},{"key":"9224_CR9","unstructured":"Basili V, Caldiera G, Rombach H (1994) The goal question metric approach. ftp:\/\/ftp.cs.umd.edu\/pub\/sel\/papers\/gqm.pdf . Accessed 15 Feb 2011"},{"key":"9224_CR10","doi-asserted-by":"crossref","unstructured":"Beard M, Kraft N, Etzkorn L, Lukins S (2011) Measuring the accuracy of information retrieval based bug localization techniques. In: Proc of the 18th working conf on reverse engineering, pp 124\u2013128. doi: 10.1109\/WCRE.2011.23","DOI":"10.1109\/WCRE.2011.23"},{"key":"9224_CR11","unstructured":"Biggerstaff T, Mitbander B, Webster D (1993) The concept assignment problem in program understanding. In: Proc of the int\u2019l conf on software engineering, pp\u00a0482\u2013498"},{"key":"9224_CR12","first-page":"993","volume":"3","author":"D Blei","year":"2003","unstructured":"Blei D, Ng A, Jordan M (2003) Latent Dirichlet allocation. J Mach Learn Res 3:993\u20131022","journal-title":"J Mach Learn Res"},{"key":"9224_CR13","doi-asserted-by":"crossref","unstructured":"Canfora G, Cerulo L (2006) Fine grained indexing of software repositories to support impact analysis. In: Proc of the 3rd int\u2019l wksp on mining software repositories, pp 105\u2013111. doi: 10.1145\/1137983.1138009","DOI":"10.1145\/1137983.1138009"},{"issue":"1","key":"9224_CR14","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1214\/09-AOAS309","volume":"4","author":"J Chang","year":"2010","unstructured":"Chang J, Blei D (2010) Hierarchical relational models for document networks. Ann Appl Stat 4(1):124\u2013150","journal-title":"Ann Appl Stat"},{"key":"9224_CR15","doi-asserted-by":"crossref","unstructured":"Corley C, Kraft N, Etzkorn L, Lukins S (2011) Recovering traceability links between source code and fixed bugs via patch analysis. In: Proc of the 6th int\u2019l wks on traceability in emerging forms of software engineering, pp 31\u201337. doi: 10.1145\/1987856.1987863","DOI":"10.1145\/1987856.1987863"},{"key":"9224_CR16","author":"A De\u00a0Lucia","year":"2007","unstructured":"De\u00a0Lucia A, Fasano F, Oliveto R, Tortora G (2007) Recovering traceability links in software artifact management systems using information retrieval methods. ACM Trans Softw Eng Methodol 16(4). doi: 10.1145\/1276933.1276934","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"9224_CR17","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9","volume":"41","author":"S Deerwester","year":"1990","unstructured":"Deerwester S, Dumais S, Furnas G, Landauer T, Harshman R (1990) Indexing by latent semantic analysis. J Am Soc Inf Sci 41:391\u2013407","journal-title":"J Am Soc Inf Sci"},{"key":"9224_CR18","doi-asserted-by":"crossref","unstructured":"Dit B, Guerrouj L, Poshyvanyk D, Antoniol G (2011a) Can better identifier splitting techniques help feature location? In: Proc of the 19th IEEE int\u2019l conf on program comprehension, pp 11\u201320. doi: 10.1109\/ICPC.2011.47","DOI":"10.1109\/ICPC.2011.47"},{"key":"9224_CR19","doi-asserted-by":"crossref","unstructured":"Dit B, Revelle M, Gethers M, Poshyvanyk D (2011b) Feature location in source code: a taxonomy and survey. J Softw Maint Evol: Res Pract. doi: 10.1002\/smr.567","DOI":"10.1002\/smr.567"},{"issue":"4","key":"9224_CR20","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1109\/TSE.2008.36","volume":"34","author":"M Eaddy","year":"2005","unstructured":"Eaddy M, Zimmermann T, Sherwood K, Garg V, Murphy G, Nagappan N, Aho A (2008) Do crosscutting concerns cause defects? IEEE Trans Softw Eng 34(4):497\u2013515","journal-title":"IEEE Trans Softw Eng"},{"key":"9224_CR21","doi-asserted-by":"crossref","unstructured":"Eisenberg A, Volder KD (2005) Dynamic feature traces: finding features in unfamiliar code. In: Proc of the 21st IEEE int\u2019l conf on software maintenance, pp\u00a0337\u2013346. doi: 10.1109\/ICSM.2005.42","DOI":"10.1109\/ICSM.2005.42"},{"key":"9224_CR22","doi-asserted-by":"crossref","unstructured":"Fluri B, Wursch M, Gall H (2007) Do code and comments co-evolve? On the relation between source code and comment changes. In: Proc of the 14th working conf on reverse engineering, pp\u00a070\u201379. doi: 10.1109\/WCRE.2007.21","DOI":"10.1109\/WCRE.2007.21"},{"key":"9224_CR23","volume-title":"Information retrieval: data structures and algorithms","author":"C Fox","year":"1992","unstructured":"Fox C (1992) Lexical analysis and stoplists. In: Frakes W, Baeza-Yates R (eds) Information retrieval: data structures and algorithms. Prentice-Hall, Englewood Cliffs, NJ"},{"key":"9224_CR24","doi-asserted-by":"crossref","unstructured":"Gay G, Haiduc S, Marcus A, Menzies T (2009) On the use of relevance feedback in IR-based concept location. In: Proc of the IEEE int\u2019l conf on software maintenance, pp 351\u2013360. doi: 10.1109\/ICSM.2009.5306315","DOI":"10.1109\/ICSM.2009.5306315"},{"key":"9224_CR25","doi-asserted-by":"crossref","unstructured":"Gethers M, Poshyvanyk D (2010) Using relational topic models to capture coupling among classes in object-oriented software systems. In: Proc of the int\u2019l conf on software maintenance, pp 1\u201310. doi: 10.1109\/ICSM.2010.5609687","DOI":"10.1109\/ICSM.2010.5609687"},{"issue":"Suppl\u00a01","key":"9224_CR26","doi-asserted-by":"crossref","first-page":"5228","DOI":"10.1073\/pnas.0307752101","volume":"101","author":"T Griffiths","year":"2004","unstructured":"Griffiths T, Steyvers M (2004) Finding scientific topics. Proc Natl Acad Sci 101(Suppl\u00a01):5228\u20135235. doi: 10.1073\/pnas.0307752101","journal-title":"Proc Natl Acad Sci"},{"key":"9224_CR27","unstructured":"Heinrich G (2009) Parameter estimation for text analysis. Tech Rep, Fraunhofer IGD, Darmstadt, Germany. http:\/\/www.arbylon.net\/publications\/text-est2.pdf . Version\u00a02.9. Accessed 15 Feb 2011"},{"key":"9224_CR28","doi-asserted-by":"crossref","unstructured":"Hill E, Pollock L, Vijay-Shanker K (2007) Exploring the neighborhood with Dora to expedite software maintenance. In: Proc of the 22nd int\u2019l conf on automated software engineering, pp 14\u201323. doi: 10.1145\/1321631.1321637","DOI":"10.1145\/1321631.1321637"},{"key":"9224_CR29","doi-asserted-by":"crossref","unstructured":"Lawrie D, Binkley D (2011) Expanding identifiers to normalize source code vocabulary. In: Proc of the 27th IEEE int\u2019l conf on software maintenance, pp 113\u2013122. doi: 10.1109\/ICSM.2011.6080778","DOI":"10.1109\/ICSM.2011.6080778"},{"key":"9224_CR30","doi-asserted-by":"crossref","unstructured":"Liu D, Marcus A, Poshyvanyk D, Rajlich V (2007) Feature location via information retrieval based filtering of a single scenario execution trace. In: Proc of the 22nd int\u2019l conf on automated software engineering, pp 234\u2013243. doi: 10.1145\/1321631.1321667","DOI":"10.1145\/1321631.1321667"},{"key":"9224_CR31","doi-asserted-by":"crossref","unstructured":"Liu Y, Poshyvanyk D, Ferenc R, Gyimothy T, Chrisochoides N (2009) Modeling class cohesion as mixtures of latent topics. In: Proc of the 25th IEEE int\u2019l conf on software maintenance, pp 233\u2013242. doi: 10.1109\/ICSM.2009.5306318","DOI":"10.1109\/ICSM.2009.5306318"},{"key":"9224_CR32","doi-asserted-by":"crossref","unstructured":"Lukins S, Kraft N, Etzkorn L (2008) Source code retrieval for bug localization using latent Dirichlet allocation. In: Proc of the 15th working conf on reverse engineering. doi: 10.1109\/WCRE.2008.33","DOI":"10.1109\/WCRE.2008.33"},{"issue":"9","key":"9224_CR33","doi-asserted-by":"crossref","first-page":"972","DOI":"10.1016\/j.infsof.2010.04.002","volume":"52","author":"S Lukins","year":"2010","unstructured":"Lukins S, Kraft N, Etzkorn L (2010) Bug localization using latent Dirichlet allocation. Inf Softw Technol 52(9):972\u2013990","journal-title":"Inf Softw Technol"},{"key":"9224_CR34","doi-asserted-by":"crossref","unstructured":"Marcus A, Menzies T (2010) Software is data too. In: Proc of the FSE\/SDP wksp on future of software engineering research, pp 229\u2013232. doi: 10.1145\/1882362.1882410","DOI":"10.1145\/1882362.1882410"},{"key":"9224_CR35","doi-asserted-by":"crossref","unstructured":"Marcus A, Poshyvanyk D (2005) The conceptual cohesion of classes. In: Proc of the 21st IEEE int\u2019l conf on software maintenance, pp 133\u2013142. doi: 10.1109\/ICSM.2005.89","DOI":"10.1109\/ICSM.2005.89"},{"key":"9224_CR36","doi-asserted-by":"crossref","unstructured":"Marcus A, Sergeyev A, Rajlich V, Maletic J (2004) An information retrieval approach to concept location in source code. In: Proc of the 11th working conf on reverse engineering, pp 214\u2013223. doi: 10.1109\/WCRE.2004.10","DOI":"10.1109\/WCRE.2004.10"},{"key":"9224_CR37","doi-asserted-by":"crossref","unstructured":"Maskeri G, Sarkar S, Heafield K (2008) Mining business topics in source code using latent Dirichlet allocation. In: Proc of the 1st India software engineering conf. doi: 10.1145\/1342211.1342234","DOI":"10.1145\/1342211.1342234"},{"key":"9224_CR38","unstructured":"Minka T (2009) Estimating a Dirichlet distribution. Tech Rep http:\/\/research.microsoft.com\/en-us\/um\/people\/minka\/papers\/dirichlet\/minka-dirichlet.pdf . Accessed 20 Jun 2011"},{"key":"9224_CR39","doi-asserted-by":"crossref","unstructured":"Oliveto R, Gethers M, Poshyvanyk D, De\u00a0Lucia A (2010) On the equivalence of information retrieval methods for automated traceability link recovery. In: Proc of the IEEE int\u2019l conf on program comprehension, pp 68\u201371. doi: 10.1109\/ICPC.2010.20","DOI":"10.1109\/ICPC.2010.20"},{"issue":"6","key":"9224_CR40","doi-asserted-by":"crossref","first-page":"420","DOI":"10.1109\/TSE.2007.1016","volume":"33","author":"D Poshyvanyk","year":"2007","unstructured":"Poshyvanyk D, Gueheneuc Y, Marcus A, Antoniol G, Rajlich V (2007) Feature location using probabilistic ranking of methods based on execution scenarios and information retrieval. IEEE Trans Softw Eng 33(6):420\u2013432","journal-title":"IEEE Trans Softw Eng"},{"issue":"1","key":"9224_CR41","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s10664-008-9088-2","volume":"14","author":"D Poshyvanyk","year":"2009","unstructured":"Poshyvanyk D, Marcus A, Ferenc R, Gyim\u00f3thy T (2009) Using information retrieval based coupling measures for impact analysis. Empir Software Eng 14(1):5\u201332","journal-title":"Empir Software Eng"},{"issue":"8","key":"9224_CR42","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1145\/1145287.1145289","volume":"49","author":"V Rajlich","year":"2006","unstructured":"Rajlich V (2006) Changing the paradigm of software engineering. Commun ACM 49(8):67\u201370","journal-title":"Commun ACM"},{"key":"9224_CR43","doi-asserted-by":"crossref","unstructured":"Rajlich V, Wilde N (2002) The role of concepts in program comprehension. In: Proc of the 10th IEEE int\u2019l wksp on program comprehension, pp 271\u2013278. doi: 10.1109\/WPC.2002.1021348","DOI":"10.1109\/WPC.2002.1021348"},{"key":"9224_CR44","doi-asserted-by":"crossref","unstructured":"Rao S, Kak A (2011) Retrieval from software libraries for bug localization: a comparative study with generic and composite text models. In: Proc of the 8th working conf on mining software repositories, pp 43\u201352. doi: 10.1145\/1985441.1985451","DOI":"10.1145\/1985441.1985451"},{"key":"9224_CR45","doi-asserted-by":"crossref","unstructured":"Ratanotayanon S, Choi H, Sim S (2010) My repository runneth over: an empirical study on diversifying data sources to improve feature search. In: Proc of the 18th IEEE int\u2019l conf on program comprehension, pp 206\u2013215. doi: 10.1109\/ICPC.2010.33","DOI":"10.1109\/ICPC.2010.33"},{"key":"9224_CR46","doi-asserted-by":"crossref","unstructured":"Revelle M, Poshyvanyk D (2009) An exploratory study on assessing feature location techniques. In: Proc of the 17th int\u2019l conf on program comprehension, pp 218\u2013222. doi: 10.1109\/ICPC.2009.5090045","DOI":"10.1109\/ICPC.2009.5090045"},{"key":"9224_CR47","doi-asserted-by":"crossref","unstructured":"Revelle M, Dit B, Poshyvanyk D (2010) Using data fusion and web mining to support feature location in software. In: Proc of the 18th IEEE int\u2019l conf on program comprehension, pp 14\u201323. doi: 10.1109\/ICPC.2010.10","DOI":"10.1109\/ICPC.2010.10"},{"key":"9224_CR48","volume-title":"Automatic text processing: the transformation, analysis and retrieval of information by computer","author":"G Salton","year":"1989","unstructured":"Salton G (1989) Automatic text processing: the transformation, analysis and retrieval of information by computer. Addison-Wesley, Reading, MA"},{"issue":"5","key":"9224_CR49","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1016\/0306-4573(88)90021-0","volume":"24","author":"G Salton","year":"1988","unstructured":"Salton G, Buckley C (1988) Term-weighting approaches in automatic text retrieval. Inf Process Manag 24(5):513\u2013523","journal-title":"Inf Process Manag"},{"key":"9224_CR50","doi-asserted-by":"crossref","unstructured":"Savage T, Dit B, Gethers M, Poshyvanyk D (2010) TopicXP: exploring topics in source code using latent dirichlet allocation. In: Proc of the 26th IEEE int\u2019l conf on software maintenance, pp 1\u20136. doi: 10.1109\/ICSM.2010.5609654","DOI":"10.1109\/ICSM.2010.5609654"},{"key":"9224_CR51","doi-asserted-by":"crossref","unstructured":"Scanniello G, Marcus A (2011) Clustering support for static concept location in source code. In: Proc of the 19th IEEE int\u2019l conf on program comprehension, pp 1\u201310. doi: 10.1109\/ICPC.2011.13","DOI":"10.1109\/ICPC.2011.13"},{"issue":"1","key":"9224_CR52","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1504\/IJCAT.2012.048208","volume":"44","author":"P Shao","year":"2012","unstructured":"Shao P, Atkison T, Kraft N, Smith R (2012) Combining lexical and structural information for static bug localization. Int J Comput Appl Technol 44(1):61\u201371","journal-title":"Int J Comput Appl Technol"},{"key":"9224_CR53","doi-asserted-by":"crossref","unstructured":"Thomas S, Adams B, Hassan A, Blostein D (2011) Modeling the evolution of topics in source code histories. In: Proc of the 8th IEEE working conf on mining software repositories, pp 173\u2013182. doi: 10.1145\/1985441.1985467","DOI":"10.1145\/1985441.1985467"},{"key":"9224_CR54","doi-asserted-by":"crossref","unstructured":"Tian K, Revelle M, Poshyvanyk D (2009) Using latent Dirichlet allocation for automatic categorization of software. In: Proc of the 6th IEEE working conf on mining software repositories, pp\u00a0163\u2013166. doi: 10.1109\/MSR.2009.5069496","DOI":"10.1109\/MSR.2009.5069496"},{"key":"9224_CR55","doi-asserted-by":"crossref","unstructured":"Vinz B, Etzkorn L (2006) A synergistic approach to program comprehension. In: Proc of the 14th IEEE int\u2019l conf on program comprehension, pp\u00a069\u201373. doi: 10.1109\/ICPC.2006.7","DOI":"10.1109\/ICPC.2006.7"},{"key":"9224_CR56","doi-asserted-by":"crossref","unstructured":"Wei X, Croft W (2006) Lda-based document models for ad-hoc retrieval. In: Proc of ACM SIGIR, pp 178\u2013185. doi: 10.1145\/1148170.1148204","DOI":"10.1145\/1148170.1148204"},{"issue":"2","key":"9224_CR57","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1145\/1131421.1131424","volume":"15","author":"W Zhao","year":"2006","unstructured":"Zhao W, Zhang L, Liu Y, Sun J, Yang F (2006) SNIAFL: towards a static noninteractive approach to feature location. ACM Trans Softw Eng Methodol 15(2):195\u2013226","journal-title":"ACM Trans Softw Eng Methodol"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-012-9224-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-012-9224-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-012-9224-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T21:15:12Z","timestamp":1559250912000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-012-9224-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8,29]]},"references-count":57,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,6]]}},"alternative-id":["9224"],"URL":"https:\/\/doi.org\/10.1007\/s10664-012-9224-x","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,8,29]]}}}