{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T19:56:24Z","timestamp":1730318184104,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,25]],"date-time":"2017-08-25T00:00:00Z","timestamp":1503619200000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Basic Research Program of China","award":["973 Program 2014CB340702"]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. 61373013"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CAREER CCF-1350837"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,8,25]]},"DOI":"10.1145\/2970276.2970367","type":"proceedings-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T08:40:09Z","timestamp":1472200809000},"page":"202-213","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":41,"title":["Multi-objective test report prioritization using image understanding"],"prefix":"10.1145","author":[{"given":"Yang","family":"Feng","sequence":"first","affiliation":[{"name":"University of California at Irvine, USA"}]},{"given":"James A.","family":"Jones","sequence":"additional","affiliation":[{"name":"University of California at Irvine, USA"}]},{"given":"Zhenyu","family":"Chen","sequence":"additional","affiliation":[{"name":"Nanjing University, China"}]},{"given":"Chunrong","family":"Fang","sequence":"additional","affiliation":[{"name":"Nanjing University, China"}]}],"member":"320","published-online":{"date-parts":[[2016,8,25]]},"reference":[{"volume-title":"O\u2019Reilly Media","year":"2008","author":"Bradski G.","key":"e_1_3_2_1_1_1","unstructured":"G. Bradski and A. Kaehler . Learning OpenCV: Computer vision with the OpenCV library . \u201d O\u2019Reilly Media , Inc .\u201d, 2008 . G. Bradski and A. Kaehler. Learning OpenCV: Computer vision with the OpenCV library. \u201d O\u2019Reilly Media, Inc.\u201d, 2008."},{"volume-title":"Microsoft technical report, MSR-TR-2003-79","year":"2003","author":"Cai D.","key":"e_1_3_2_1_2_1","unstructured":"D. Cai , S. Yu , J.-R. Wen , and W.-Y. Ma . Vips: a visionbased page segmentation algorithm. Technical report , Microsoft technical report, MSR-TR-2003-79 , 2003 . D. Cai, S. Yu, J.-R. Wen, and W.-Y. Ma. Vips: a visionbased page segmentation algorithm. Technical report, Microsoft technical report, MSR-TR-2003-79, 2003."},{"first-page":"124","volume-title":"Proceedings of the 25th international conference on Software engineering","author":"Chan K.","key":"e_1_3_2_1_3_1","unstructured":"K. Chan , Z. C. L. Liang , and A. Michail . Design recovery of interactive graphical applications . In Proceedings of the 25th international conference on Software engineering , pages 114\u2013 124 . IEEE Computer Society, 2003. K. Chan, Z. C. L. Liang, and A. Michail. Design recovery of interactive graphical applications. In Proceedings of the 25th international conference on Software engineering, pages 114\u2013124. IEEE Computer Society, 2003."},{"first-page":"16","volume-title":"Proceedings of the 23rd International Conference on Computational Linguistics: Demonstrations","author":"Che W.","key":"e_1_3_2_1_4_1","unstructured":"W. Che , Z. Li , and T. Liu . Ltp: A chinese language technology platform . In Proceedings of the 23rd International Conference on Computational Linguistics: Demonstrations , pages 13\u2013 16 . Association for Computational Linguistics, 2010. W. Che, Z. Li, and T. Liu. Ltp: A chinese language technology platform. In Proceedings of the 23rd International Conference on Computational Linguistics: Demonstrations, pages 13\u201316. Association for Computational Linguistics, 2010."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.02.022"},{"first-page":"1093","volume-title":"Proceedings of the 34th International Conference on Software Engineering","author":"Dang Y.","key":"e_1_3_2_1_6_1","unstructured":"Y. Dang , R. Wu , H. Zhang , D. Zhang , and P. Nobel . Rebucket: a method for clustering duplicate crash reports based on call stack similarity . In Proceedings of the 34th International Conference on Software Engineering , pages 1084\u2013 1093 . IEEE Press, 2012. Y. Dang, R. Wu, H. Zhang, D. Zhang, and P. Nobel. Rebucket: a method for clustering duplicate crash reports based on call stack similarity. In Proceedings of the 34th International Conference on Software Engineering, pages 1084\u20131093. IEEE Press, 2012."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2013.44"},{"first-page":"1308","volume-title":"Proceedings of the 34th International Conference on Software Engineering","author":"Feng Y.","key":"e_1_3_2_1_8_1","unstructured":"Y. Feng and Z. Chen . Multi-label software behavior learning . In Proceedings of the 34th International Conference on Software Engineering , pages 1305\u2013 1308 . IEEE Press, 2012. Y. Feng and Z. Chen. Multi-label software behavior learning. In Proceedings of the 34th International Conference on Software Engineering, pages 1305\u20131308. IEEE Press, 2012."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786862"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/11428817_45"},{"first-page":"61","volume-title":"Dependable Systems and Networks With FTCS and DCC, 2008. DSN 2008. IEEE International Conference on","author":"Jalbert N.","key":"e_1_3_2_1_11_1","unstructured":"N. Jalbert and W. Weimer . Automated duplicate detection for bug tracking systems . In Dependable Systems and Networks With FTCS and DCC, 2008. DSN 2008. IEEE International Conference on , pages 52\u2013 61 . IEEE, 2008. N. Jalbert and W. Weimer. Automated duplicate detection for bug tracking systems. In Dependable Systems and Networks With FTCS and DCC, 2008. DSN 2008. IEEE International Conference on, pages 52\u201361. IEEE, 2008."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.77"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1196378"},{"first-page":"134","volume-title":"IEEE Workshop on Visual Languages","author":"Kurlander D.","key":"e_1_3_2_1_14_1","unstructured":"D. Kurlander and S. Feiner . Editable graphical histories . In IEEE Workshop on Visual Languages , pages 127\u2013 134 . Citeseer, 1988. D. Kurlander and S. Feiner. Editable graphical histories. In IEEE Workshop on Visual Languages, pages 127\u2013134. Citeseer, 1988."},{"volume-title":"Conditional random fields: Probabilistic models for segmenting and labeling sequence data","year":"2001","author":"Lafferty J.","key":"e_1_3_2_1_15_1","unstructured":"J. Lafferty , A. McCallum , and F. C. Pereira . Conditional random fields: Probabilistic models for segmenting and labeling sequence data . 2001 . J. Lafferty, A. McCallum, and F. C. Pereira. Conditional random fields: Probabilistic models for segmenting and labeling sequence data. 2001."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2010.5463284"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2006.68"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.23"},{"issue":"1","key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/meet.14504901100","article-title":"Crowdsourcing for usability testing","volume":"49","author":"Liu D.","year":"2012","unstructured":"D. Liu , R. G. Bias , M. Lease , and R. Kuipers . Crowdsourcing for usability testing . Proceedings of the American Society for Information Science and Technology , 49 ( 1 ): 1 \u2013 10 , 2012 . D. Liu, R. G. Bias, M. Lease, and R. Kuipers. Crowdsourcing for usability testing. Proceedings of the American Society for Information Science and Technology, 49(1):1\u201310, 2012.","journal-title":"Proceedings of the American Society for Information Science and Technology"},{"key":"e_1_3_2_1_20_1","first-page":"01","article-title":"A survey of the use of crowdsourcing in software engineering","volume":"15","author":"Mao K.","year":"2015","unstructured":"K. Mao , L. Capra , M. Harman , and Y. Jia . A survey of the use of crowdsourcing in software engineering . RN , 15 : 01 , 2015 . K. Mao, L. Capra, M. Harman, and Y. Jia. A survey of the use of crowdsourcing in software engineering. RN, 15:01, 2015.","journal-title":"RN"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/581339.581381"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062490"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31753-8_52"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351687"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2013.13"},{"first-page":"475","volume-title":"Software Engineering, 2003. Proceedings. 25th International Conference on","author":"Podgurski A.","key":"e_1_3_2_1_26_1","unstructured":"A. Podgurski , D. Leon , P. Francis , W. Masri , M. Minch , J. Sun , and B. Wang . Automated support for classifying software failure reports . In Software Engineering, 2003. Proceedings. 25th International Conference on , pages 465\u2013 475 . IEEE, 2003. A. Podgurski, D. Leon, P. Francis, W. Masri, M. Minch, J. Sun, and B. Wang. Automated support for classifying software failure reports. In Software Engineering, 2003. Proceedings. 25th International Conference on, pages 465\u2013475. IEEE, 2003."},{"volume-title":"Springer","year":"2007","author":"Popescu A.-M.","key":"e_1_3_2_1_27_1","unstructured":"A.-M. Popescu and O. Etzioni . Extracting product features and opinions from reviews. In Natural language processing and text mining, pages 9\u201328 . Springer , 2007 . A.-M. Popescu and O. Etzioni. Extracting product features and opinions from reviews. In Natural language processing and text mining, pages 9\u201328. Springer, 2007."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.962562"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1026543900054"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.32"},{"first-page":"676","volume-title":"Proceedings of the 37th International Conference on Software Engineering-Volume 1","author":"Salman I.","key":"e_1_3_2_1_31_1","unstructured":"I. Salman , A. T. Misirli , and N. Juristo . Are students representatives of professionals in software engineering experiments? In Proceedings of the 37th International Conference on Software Engineering-Volume 1 , pages 666\u2013 676 . IEEE Press, 2015. I. Salman, A. T. Misirli, and N. Juristo. Are students representatives of professionals in software engineering experiments? In Proceedings of the 37th International Conference on Software Engineering-Volume 1, pages 666\u2013676. IEEE Press, 2015."},{"key":"e_1_3_2_1_32_1","unstructured":"Q. Shi Z. Chen C. Fang Y. Feng and B. Xu. Measuring the diversity of a test set with distance entropy. Q. Shi Z. Chen C. Fang Y. Feng and B. Xu. Measuring the diversity of a test set with distance entropy."},{"first-page":"1010","volume-title":"Proceedings of the 23rd International Conference on Computational Linguistics","author":"Shutova E.","key":"e_1_3_2_1_33_1","unstructured":"E. Shutova , L. Sun , and A. Korhonen . Metaphor identification using verb and noun clustering . In Proceedings of the 23rd International Conference on Computational Linguistics , pages 1002\u2013 1010 . E. Shutova, L. Sun, and A. Korhonen. Metaphor identification using verb and noun clustering. In Proceedings of the 23rd International Conference on Computational Linguistics, pages 1002\u20131010."},{"key":"e_1_3_2_1_34_1","unstructured":"Association for Computational Linguistics 2010. Association for Computational Linguistics 2010."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100061"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806811"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.31"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2012.48"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368151"},{"first-page":"143","volume-title":"Reengineering and Reverse Engineering (CSMR-WCRE), 2014 Software Evolution Week-IEEE Conference on","author":"Xia X.","key":"e_1_3_2_1_40_1","unstructured":"X. Xia , Y. Feng , D. Lo , Z. Chen , and X. Wang . Towards more accurate multi-label software behavior learning. In Software Maintenance , Reengineering and Reverse Engineering (CSMR-WCRE), 2014 Software Evolution Week-IEEE Conference on , pages 134\u2013 143 . IEEE, 2014. X. Xia, Y. Feng, D. Lo, Z. Chen, and X. Wang. Towards more accurate multi-label software behavior learning. In Software Maintenance, Reengineering and Reverse Engineering (CSMR-WCRE), 2014 Software Evolution Week-IEEE Conference on, pages 134\u2013143. IEEE, 2014."},{"first-page":"367","volume-title":"Advanced Data Mining and Applications","author":"Yu L.","key":"e_1_3_2_1_41_1","unstructured":"L. Yu , W.-T. Tsai , W. Zhao , and F. Wu . Predicting defect priority based on neural networks . In Advanced Data Mining and Applications , pages 356\u2013 367 . Springer, 2010. L. Yu, W.-T. Tsai, W. Zhao, and F. Wu. Predicting defect priority based on neural networks. In Advanced Data Mining and Applications, pages 356\u2013367. Springer, 2010."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.63"}],"event":{"name":"ASE'16: ACM\/IEEE International Conference on Automated Software Engineering","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"],"location":"Singapore Singapore","acronym":"ASE'16"},"container-title":["Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2970276.2970367","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2970276.2970367","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,18]],"date-time":"2023-01-18T19:21:40Z","timestamp":1674069700000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970276.2970367"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,25]]},"references-count":42,"alternative-id":["10.1145\/2970276.2970367","10.1145\/2970276"],"URL":"https:\/\/doi.org\/10.1145\/2970276.2970367","relation":{},"subject":[],"published":{"date-parts":[[2016,8,25]]},"assertion":[{"value":"2016-08-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}