{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T04:39:37Z","timestamp":1725597577386},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2014,8,3]],"date-time":"2014-08-03T00:00:00Z","timestamp":1407024000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1007\/s10664-014-9331-y","type":"journal-article","created":{"date-parts":[[2014,8,2]],"date-time":"2014-08-02T04:41:53Z","timestamp":1406954513000},"page":"1354-1383","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":99,"title":["Automated prediction of bug report priority using multi-factor analysis"],"prefix":"10.1007","volume":"20","author":[{"given":"Yuan","family":"Tian","sequence":"first","affiliation":[]},{"given":"David","family":"Lo","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Xia","sequence":"additional","affiliation":[]},{"given":"Chengnian","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,3]]},"reference":[{"issue":"3","key":"9331_CR1","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/2000791.2000794","volume":"20","author":"J Anvik","year":"2011","unstructured":"Anvik J, Murphy GC (2011) Reducing the effort of bug report triage: recommenders for development-oriented decisions. TOSEM 20(3):10","journal-title":"TOSEM"},{"key":"9331_CR2","doi-asserted-by":"crossref","unstructured":"Anvik J, Hiew L, Murphy GC (2005) Coping with an open bug repository. In: ETX, pp 35\u201339","DOI":"10.1145\/1117696.1117704"},{"issue":"10","key":"9331_CR3","doi-asserted-by":"crossref","first-page":"2275","DOI":"10.1016\/j.jss.2012.04.053","volume":"85","author":"P Bhattacharya","year":"2012","unstructured":"Bhattacharya P, Neamtiu I, Shelton CR (2012) Automated, highly-accurate, bug assignment using machine learning and tossing graphs. J Syst Softw 85(10):2275\u20132292","journal-title":"J Syst Softw"},{"key":"9331_CR4","doi-asserted-by":"crossref","unstructured":"Cohen WW (1995) Fast effective rule induction. In: ICML","DOI":"10.1016\/B978-1-55860-377-6.50023-2"},{"key":"9331_CR5","unstructured":"Crammer K, Singer Y (2001) On the algorithmic implementation of multiclass kernel-based vector machines. J Mach Learn Res 2"},{"key":"9331_CR6","unstructured":"Cubranic D, Murphy GC (2004) Automatic bug triage using text categorization. In: SEKE, pp 92\u201397"},{"key":"9331_CR7","unstructured":"Duda R, Hart P, Stork D (2000) Pattern classification. Wiley Interscience"},{"key":"9331_CR8","unstructured":"Eclipse (2012) http:\/\/wiki.eclipse.org\/Bug_Reporting_FAQ#What_is_the_difference_between_Severity_and_Priority.3F"},{"key":"9331_CR9","doi-asserted-by":"crossref","unstructured":"Forman G (2008) Bns feature scaling: an improved representation over tf-idf for svm text classification. In: CIKM","DOI":"10.1145\/1458082.1458119"},{"key":"9331_CR10","doi-asserted-by":"crossref","unstructured":"Gegick M, Rotella P, Xie T (2010) Identifying security bug reports via text mining: an industrial case study. In: MSR","DOI":"10.1109\/MSR.2010.5463340"},{"key":"9331_CR11","unstructured":"Han J, Kamber M, Pei J (2011) Data mining: concepts and techniques. Morgan Kaufmann"},{"key":"9331_CR12","unstructured":"Hiew L (2006) Assisted detection of duplicate bug reports. Master\u2019s thesis, The University Of British Columbia"},{"key":"9331_CR13","doi-asserted-by":"crossref","unstructured":"Hosseini H, Nguyen R, Godfrey M (2012) A market-based bug allocation mechanism using predictive bug lifetimes. In: CSMR","DOI":"10.1109\/CSMR.2012.25"},{"key":"9331_CR14","unstructured":"Huang L, Ng V, Persing I, Geng R, Bai X, Tian J (2011) AutoODC: automated generation of orthogonal defect classifications. In: ASE"},{"key":"9331_CR15","doi-asserted-by":"crossref","unstructured":"Jalbert N, Weimer W (2008) Automated duplicate detection for bug tracking systems. In: DSN","DOI":"10.1109\/DSN.2008.4630070"},{"key":"9331_CR16","doi-asserted-by":"crossref","unstructured":"Jeong G, Kim S, Zimmermann T (2009) Improving bug triage with bug tossing graphs. In: ESEC\/SIGSOFT FSE, pp 111\u2013120","DOI":"10.1145\/1595696.1595715"},{"key":"9331_CR17","doi-asserted-by":"crossref","unstructured":"Khomh F, Chan B, Zou Y, Hassan AE (2011) An entropy evaluation approach for triaging field crashes: a case study of mozilla firefox. In: WCRE","DOI":"10.1109\/WCRE.2011.39"},{"key":"9331_CR18","doi-asserted-by":"crossref","unstructured":"Kim S, Whitehead EJ (2006) How long did it take to fix bugs? In: MSR","DOI":"10.1145\/1137983.1138027"},{"key":"9331_CR19","doi-asserted-by":"crossref","unstructured":"Lamkanfi A, Demeyer S, Giger E, Goethals B (2010) Predicting the severity of a reported bug. In: MSR","DOI":"10.1109\/MSR.2010.5463284"},{"key":"9331_CR20","doi-asserted-by":"crossref","unstructured":"Lamkanfi A, Demeyer S, Soetens Q, Verdonck T (2011) Comparing mining algorithms for predicting the severity of a reported bug. In: CSMR","DOI":"10.1109\/CSMR.2011.31"},{"key":"9331_CR21","doi-asserted-by":"crossref","unstructured":"Manning CD, Raghavan P, Schutze H (2008) Introduction to information retrieval. Cambridge","DOI":"10.1017\/CBO9780511809071"},{"key":"9331_CR22","doi-asserted-by":"crossref","unstructured":"Menzies T, Marcus A (2008) Automated severity assessment of software defect reports. In: ICSM","DOI":"10.1109\/ICSM.2008.4658083"},{"key":"9331_CR23","doi-asserted-by":"crossref","unstructured":"Nguyen AT, Nguyen TT, Nguyen TN, Lo D, Sun C (2012) Duplicate bug report detection with a combination of information retrieval and topic modeling. In: ASE","DOI":"10.1145\/2351676.2351687"},{"key":"9331_CR24","unstructured":"PorterStemmer (2011) www.ils.unc.edu\/~keyeg\/java\/porter\/PorterStemmer.java"},{"key":"9331_CR25","doi-asserted-by":"crossref","unstructured":"Robertson S, Zaragoza H, Taylor M (2004) Simple BM25 extension to multiple weighted fields. In: CIKM","DOI":"10.1145\/1031171.1031181"},{"key":"9331_CR26","doi-asserted-by":"crossref","unstructured":"Runeson P, Alexandersson M, Nyholm O (2007) Detection of duplicate defect reports using natural language processing. In: ICSE, pp 499\u2013510","DOI":"10.1109\/ICSE.2007.32"},{"key":"9331_CR27","doi-asserted-by":"crossref","unstructured":"Sun C, Lo D, Wang X, Jiang J, Khoo SC (2010) A discriminative model approach for accurate duplicate bug report retrieval. In: ICSE","DOI":"10.1145\/1806799.1806811"},{"key":"9331_CR28","doi-asserted-by":"crossref","unstructured":"Sun C, Lo D, Khoo SC, Jiang J (2011) Towards more accurate retrieval of duplicate bug reports. In: ASE","DOI":"10.1109\/ASE.2011.6100061"},{"key":"9331_CR29","unstructured":"SVM-MultiClass (2011) http:\/\/svmlight.joachims.org\/svm_multiclass.html"},{"key":"9331_CR30","doi-asserted-by":"crossref","unstructured":"Tamrawi A, Nguyen TT, Al-Kofahim J, Nguyen TN (2011) Fuzzy set-based automatic bug triaging. In: ICSE, pp 884\u2013887","DOI":"10.1145\/1985793.1985934"},{"key":"9331_CR31","doi-asserted-by":"crossref","unstructured":"Tian Y, Lo D, Sun C (2012) Information retrieval based nearest neighbor classification for fine-grained bug severity prediction. In: WCRE","DOI":"10.1109\/WCRE.2012.31"},{"key":"9331_CR32","doi-asserted-by":"crossref","unstructured":"Wang X, Zhang L, Xie T, Anvik J, Sun J (2008) An approach to detecting duplicate bug reports using natural language and execution information. In: ICSE, pp 461\u2013470","DOI":"10.1145\/1368088.1368151"},{"key":"9331_CR33","doi-asserted-by":"crossref","unstructured":"Wei\u00df C, Premraj R, Zimmermann T, Zeller A (2007) How long will it take to fix this bug? In: MSR, p 1","DOI":"10.1109\/MSR.2007.13"},{"key":"9331_CR34","unstructured":"WEKA (2011) http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/ . Weka 3: Data Mining Software"},{"key":"9331_CR35","doi-asserted-by":"crossref","unstructured":"Xia X, Lo D, Wen M, Shihab E, Zhou B (2014) An empirical study of bug report field reassignment. In: CSMR-WCRE","DOI":"10.1109\/CSMR-WCRE.2014.6747167"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-014-9331-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-014-9331-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-014-9331-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,13]],"date-time":"2019-08-13T09:56:31Z","timestamp":1565690191000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-014-9331-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8,3]]},"references-count":35,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2015,10]]}},"alternative-id":["9331"],"URL":"https:\/\/doi.org\/10.1007\/s10664-014-9331-y","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,8,3]]}}}