{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:25:55Z","timestamp":1730319955636,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,28]],"date-time":"2018-05-28T00:00:00Z","timestamp":1527465600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,28]]},"DOI":"10.1145\/3196398.3196446","type":"proceedings-article","created":{"date-parts":[[2018,7,23]],"date-time":"2018-07-23T13:02:25Z","timestamp":1532350945000},"page":"414-425","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Automatic classification of software artifacts in open-source applications"],"prefix":"10.1145","author":[{"given":"Yuzhan","family":"Ma","sequence":"first","affiliation":[{"name":"Washington State University"}]},{"given":"Sarah","family":"Fakhoury","sequence":"additional","affiliation":[{"name":"Washington State University"}]},{"given":"Michael","family":"Christensen","sequence":"additional","affiliation":[{"name":"Washington State University"}]},{"given":"Venera","family":"Arnaoudova","sequence":"additional","affiliation":[{"name":"Washington State University"}]},{"given":"Waleed","family":"Zogaan","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology"}]},{"given":"Mehdi","family":"Mirakhorli","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology"}]}],"member":"320","published-online":{"date-parts":[[2018,5,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1299015.1299021"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-016-9466-0"},{"key":"e_1_3_2_1_3_1","first-page":"993","article-title":"Latent dirichlet allocation","author":"Blei David M","year":"2003","journal-title":"Journal of machine Learning research 3"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-016-9461-5"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806825"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062525"},{"key":"e_1_3_2_1_8_1","unstructured":"Jacob Cohen. 1988. Statistical power analysis for the behavioral sciences. Jacob Cohen. 1988. Statistical power analysis for the behavioral sciences."},{"volume-title":"Retrieved","year":"2018","author":"Danial Al","key":"e_1_3_2_1_9_1"},{"volume-title":"Retrieved","year":"2018","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2006.15"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2013.6613840"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-005-3861-2"},{"volume-title":"Latent semantic analysis. Annual review of information science and technology 38, 1","year":"2004","author":"Dumais Susan T","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568295"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486911"},{"volume-title":"Retrieved","year":"2018","key":"e_1_3_2_1_17_1"},{"volume-title":"Proceedings of the International Conference on Software Maintenance (ICSM). 131--142","author":"Michael","key":"e_1_3_2_1_18_1"},{"volume-title":"Proceedings of the International Conference on Mining Software Repositories (MSR)","year":"2013","author":"Gousios Georgios","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597122"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642970"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"volume-title":"Computing inter-rater reliability for observational data: an overview and tutorial. Tutorials in quantitative methods for psychology 8, 1","year":"2012","author":"Hallgren Kevin A","key":"e_1_3_2_1_23_1"},{"volume-title":"Retrieved","year":"2018","author":"GitHub Inc.","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/645326.649721"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9393-5"},{"volume-title":"The measurement of observer agreement for categorical data. Biometrics","year":"1977","author":"Landis Richard J","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1370788.1370799"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9230-z"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491432"},{"volume-title":"Online Replication Package. (March","year":"2018","author":"Yuzhan Ma.","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","first-page":"139","article-title":"One-class SVMs for document classification","author":"Manevitz Larry M","year":"2001","journal-title":"Journal of machine Learning research 2"},{"volume-title":"Comparison of the predicted and observed secondary structure of T4 phage lysozyme. Biochimica et Biophysica Acta (BBA 2, 405","year":"1975","author":"Matthews Brian W","key":"e_1_3_2_1_33_1"},{"key":"e_1_3_2_1_34_1","volume-title":"AAAI-98 workshop on learning for text categorization","volume":"752","author":"McCallum Andrew","year":"1998"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2479217"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9512-6"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.63"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2011.399"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2014.6912267"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCICCT.2014.6993144"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2006.02.048"},{"volume-title":"Workshop on Evaluation Frameworks for Open Source Software (EFOSS).","year":"2006","author":"Robles Gregorio","key":"e_1_3_2_1_42_1"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/361219.361220"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.11"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1108\/eb026526"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2010.33"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487629"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2009.5069496"},{"key":"e_1_3_2_1_49_1","first-page":"37","article-title":"Is Naive Bayes a good classifier for document classification","volume":"5","author":"Ting SL","year":"2011","journal-title":"International Journal of Software Engineering and Its Applications"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chemolab.2005.09.003"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.19"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-009-9111-2"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11334-005-0011-3"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.07.035"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2652524.2652564"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-016-9476-y"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2017.80"}],"event":{"name":"ICSE '18: 40th International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"],"location":"Gothenburg Sweden","acronym":"ICSE '18"},"container-title":["Proceedings of the 15th International Conference on Mining Software Repositories"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196398.3196446","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T18:33:23Z","timestamp":1673375603000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196398.3196446"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,28]]},"references-count":57,"alternative-id":["10.1145\/3196398.3196446","10.1145\/3196398"],"URL":"https:\/\/doi.org\/10.1145\/3196398.3196446","relation":{},"subject":[],"published":{"date-parts":[[2018,5,28]]},"assertion":[{"value":"2018-05-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}