{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T03:52:16Z","timestamp":1760586736056,"version":"3.41.0"},"reference-count":64,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2015,10,1]],"date-time":"2015-10-01T00:00:00Z","timestamp":1443657600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information and Software Technology"],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1016\/j.infsof.2015.05.003","type":"journal-article","created":{"date-parts":[[2015,5,21]],"date-time":"2015-05-21T10:24:05Z","timestamp":1432203845000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":47,"special_numbering":"C","title":["MSR4SM: Using topic models to effectively mining software repositories for software maintenance tasks"],"prefix":"10.1016","volume":"66","author":[{"given":"Xiaobing","family":"Sun","sequence":"first","affiliation":[]},{"given":"Bixin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Hareton","family":"Leung","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yun","family":"Li","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.infsof.2015.05.003_b0005","doi-asserted-by":"crossref","unstructured":"V. Rajlich, Software evolution and maintenance, in: Proceedings of the on Future of Software Engineering, FOSE 2014, Hyderabad, India, May 31\u2013June 7, 2014, pp. 133\u2013144.","DOI":"10.1145\/2593882.2593893"},{"key":"10.1016\/j.infsof.2015.05.003_b0010","doi-asserted-by":"crossref","unstructured":"S. Wang, D. Lo, L. Jiang, Understanding widespread changes: a taxonomic study, in: 17th European Conference on Software Maintenance and Reengineering, CSMR 2013, Genova, Italy, March 5\u20138, 2013, pp. 5\u201314.","DOI":"10.1109\/CSMR.2013.11"},{"key":"10.1016\/j.infsof.2015.05.003_b0015","doi-asserted-by":"crossref","unstructured":"S. Wang, D. Lo, Version history, similar report, and structure: putting them together for improved bug localization, in: 22nd International Conference on Program Comprehension, ICPC 2014, Hyderabad, India, June 2\u20133, 2014, pp. 53\u201363.","DOI":"10.1145\/2597008.2597148"},{"key":"10.1016\/j.infsof.2015.05.003_b0020","doi-asserted-by":"crossref","unstructured":"S.W. Thomas, Mining software repositories using topic models, in: Proceedings of the 33rd International Conference on Software Engineering, 2011, pp. 1138\u20131139.","DOI":"10.1145\/1985793.1986020"},{"issue":"2","key":"10.1016\/j.infsof.2015.05.003_b0025","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1002\/smr.344","article-title":"A survey and taxonomy of approaches for mining software repositories in the context of software evolution","volume":"19","author":"Kagdi","year":"2007","journal-title":"J. Softw. Mainten."},{"key":"10.1016\/j.infsof.2015.05.003_b0030","doi-asserted-by":"crossref","unstructured":"J. Anderson, S. Salem, H. Do, Improving the effectiveness of test suite through mining historical data, in: Proceedings of the 11th Working Conference on Mining Software Repositories, MSR 2014, May 31\u2013June 1, 2014, Hyderabad, India, 2014, pp. 142\u2013151.","DOI":"10.1145\/2597073.2597084"},{"key":"10.1016\/j.infsof.2015.05.003_b0035","doi-asserted-by":"crossref","unstructured":"M. Torchiano, F. Ricca, Impact analysis by means of unstructured knowledge in the context of bug repositories, in: Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, 2010, pp. 47:1\u201347:4.","DOI":"10.1145\/1852786.1852847"},{"issue":"1","key":"10.1016\/j.infsof.2015.05.003_b0040","first-page":"53","article-title":"Feature location in source code: a taxonomy and survey","volume":"25","author":"Dit","year":"2013","journal-title":"J. Softw.: Evol. Process"},{"key":"10.1016\/j.infsof.2015.05.003_b0045","doi-asserted-by":"crossref","unstructured":"F. Palomba, G. Bavota, M. Di Penta, R. Oliveto, A. De Lucia, D. Poshyvanyk, Detecting bad smells in source code using change history information, in: IEEE\/ACM International Conference on Automated Software Engineering, 2013, pp. 268\u2013278.","DOI":"10.1109\/ASE.2013.6693086"},{"issue":"3","key":"10.1016\/j.infsof.2015.05.003_b0050","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1145\/567793.567795","article-title":"Two case studies of open source software development: Apache and Mozilla","volume":"11","author":"Mockus","year":"2002","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"issue":"5","key":"10.1016\/j.infsof.2015.05.003_b0055","doi-asserted-by":"crossref","first-page":"933","DOI":"10.1007\/s10664-012-9233-9","article-title":"Integrating conceptual and logical couplings for change impact analysis in software","volume":"18","author":"Kagdi","year":"2013","journal-title":"Empir. Softw. Eng."},{"key":"10.1016\/j.infsof.2015.05.003_b0060","doi-asserted-by":"crossref","unstructured":"D.M. Germ\u00e1n, A study of the contributors of PostgreSQL, in: Proceedings of the 2006 International Workshop on Mining Software Repositories, MSR 2006, Shanghai, China, May 22\u201323, 2006, 2006, pp. 163\u2013164.","DOI":"10.1145\/1137983.1138022"},{"key":"10.1016\/j.infsof.2015.05.003_b0065","doi-asserted-by":"crossref","unstructured":"E. Kouters, B. Vasilescu, A. Serebrenik, M.G.J. van den Brand, Who\u2019s who in Gnome: Using LSA to merge software repository identities, in: 28th IEEE International Conference on Software Maintenance, ICSM 2012, Trento, Italy, September 23\u201328, 2012, pp. 592\u2013595.","DOI":"10.1109\/ICSM.2012.6405329"},{"year":"2005","series-title":"Data Mining: Concepts and Techniques","author":"Han","key":"10.1016\/j.infsof.2015.05.003_b0070"},{"year":"2008","series-title":"Introduction to Information Retrieval","author":"Manning","key":"10.1016\/j.infsof.2015.05.003_b0075"},{"year":"1999","series-title":"Data Preparation for Data Mining","author":"Pyle","key":"10.1016\/j.infsof.2015.05.003_b0080"},{"issue":"2","key":"10.1016\/j.infsof.2015.05.003_b0085","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/j.joi.2011.11.004","article-title":"Adding community and dynamic to topic models","volume":"6","author":"Li","year":"2012","journal-title":"J. Informetrics"},{"key":"10.1016\/j.infsof.2015.05.003_b0090","unstructured":"K. Barnard, P. Duygulu, D.A. Forsyth, N. de F., D.M. Blei, M.I. Jordan, Matching words and pictures, J. Mach. Learn. Res. 3 (2003) 1107\u20131135."},{"key":"10.1016\/j.infsof.2015.05.003_b0095","first-page":"993","article-title":"Latent Dirichlet allocation","volume":"3","author":"Blei","year":"2003","journal-title":"J. Mach. Learn. Res."},{"key":"10.1016\/j.infsof.2015.05.003_b0100","doi-asserted-by":"crossref","unstructured":"S.W. Thomas, A.E. Hassan, D. Blostein, Mining unstructured software repositories, in: Evolving Software Systems, 2014, pp. 139\u2013162.","DOI":"10.1007\/978-3-642-45398-4_5"},{"key":"10.1016\/j.infsof.2015.05.003_b0105","doi-asserted-by":"crossref","unstructured":"A. Panichella, B. Dit, R. Oliveto, M. Di Penta, D. Poshyvanyk, A. De Lucia, How to effectively use topic models for software engineering tasks? An approach based on genetic algorithms, in: 35th International Conference on Software Engineering, 2013, pp. 522\u2013531.","DOI":"10.1109\/ICSE.2013.6606598"},{"issue":"9","key":"10.1016\/j.infsof.2015.05.003_b0110","doi-asserted-by":"crossref","first-page":"972","DOI":"10.1016\/j.infsof.2010.04.002","article-title":"Bug localization using latent Dirichlet allocation","volume":"52","author":"Lukins","year":"2010","journal-title":"Inf. Softw. Technol."},{"issue":"3","key":"10.1016\/j.infsof.2015.05.003_b0115","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1007\/s10664-012-9224-x","article-title":"Configuring latent Dirichlet allocation based feature location","volume":"19","author":"Biggers","year":"2014","journal-title":"Empir. Softw. Eng."},{"issue":"9","key":"10.1016\/j.infsof.2015.05.003_b0120","doi-asserted-by":"crossref","first-page":"627","DOI":"10.1109\/TSE.2006.88","article-title":"Feature identification: an epidemiological metaphor","volume":"32","author":"Antoniol","year":"2006","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"3","key":"10.1016\/j.infsof.2015.05.003_b0125","doi-asserted-by":"crossref","first-page":"664","DOI":"10.1016\/j.jss.2012.10.270","article-title":"Improving feature location using structural similarity and iterative graph mapping","volume":"86","author":"Peng","year":"2013","journal-title":"J. Syst. Softw."},{"key":"10.1016\/j.infsof.2015.05.003_b0130","doi-asserted-by":"crossref","unstructured":"A. Chen, E. Chou, J. Wong, A.Y. Yao, Q. Zhang, S. Zhang, A. Michail, CVSSearch: Searching through Source Code Using CVS Comments, in: ICSM, 2001, p. 364.","DOI":"10.1109\/ICSM.2001.972749"},{"issue":"2","key":"10.1016\/j.infsof.2015.05.003_b0135","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1007\/s10664-011-9194-4","article-title":"Integrating information retrieval, execution and link analysis algorithms to improve feature location in software","volume":"18","author":"Dit","year":"2013","journal-title":"Empir. Softw. Eng."},{"issue":"8","key":"10.1016\/j.infsof.2015.05.003_b0140","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1002\/stvr.1475","article-title":"A survey of code-based change impact analysis techniques","volume":"23","author":"Li","year":"2013","journal-title":"Softw. Test., Verif. Reliab."},{"key":"10.1016\/j.infsof.2015.05.003_b0145","doi-asserted-by":"crossref","unstructured":"J. Law, G. Rothernel, Whole program path-based dynamic impact analysis, in: Proceedings of the International Conference on Software Engineering, 2003, pp. 308\u2013318.","DOI":"10.1109\/ICSE.2003.1201210"},{"key":"10.1016\/j.infsof.2015.05.003_b0150","doi-asserted-by":"crossref","unstructured":"S. Zhang, Z. Gu, Y. Lin, J.J. Zhao, Change impact analysis for AspectJ programs, in: Proceedings of the International Conference on Software Maintenance, 2008, pp. 87\u201396.","DOI":"10.1109\/ICSM.2008.4658057"},{"issue":"6","key":"10.1016\/j.infsof.2015.05.003_b0155","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1109\/TSE.2005.72","article-title":"Mining version histories to guide software changes","volume":"31","author":"Zimmermann","year":"2005","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/j.infsof.2015.05.003_b0160","doi-asserted-by":"crossref","unstructured":"A. Jermakovics, A. Sillitti, G. Succi, Mining and visualizing developer networks from version control systems, in: Proceedings of the 4th International Workshop on Cooperative and Human Aspects of Software Engineering, CHASE 2011, May 21, 2011, Waikiki, Honolulu, HI, USA, 2011, pp. 24\u201331.","DOI":"10.1145\/1984642.1984647"},{"key":"10.1016\/j.infsof.2015.05.003_b0165","doi-asserted-by":"crossref","unstructured":"C. Lewis, Z. Lin, C. Sadowski, X. Zhu, R. Ou, E.J. Whitehead Jr., Does bug prediction support human developers? Findings from a Google case study, in: 35th International Conference on Software Engineering, ICSE \u201913, May 18\u201326, 2013, San Francisco, CA, USA, 2013, pp. 372\u2013381.","DOI":"10.1109\/ICSE.2013.6606583"},{"key":"10.1016\/j.infsof.2015.05.003_b0170","doi-asserted-by":"crossref","unstructured":"M. Fischer, M. Pinzger, H.C. Gall, Populating a release history database from version control and bug tracking systems, in: 19th International Conference on Software Maintenance (ICSM 2003), The Architecture of Existing Systems, 22\u201326 September 2003, Amsterdam, The Netherlands, 2003, p. 23.","DOI":"10.1109\/ICSM.2003.1235403"},{"key":"10.1016\/j.infsof.2015.05.003_b0175","doi-asserted-by":"crossref","unstructured":"S. Kim, H. Zhang, R. Wu, L. Gong, Dealing with noise in defect prediction, in: Proceedings of the 33rd International Conference on Software Engineering, ICSE 2011, May 21\u201328, 2011, Waikiki, Honolulu, HI, USA, 2011, pp. 481\u2013490.","DOI":"10.1145\/1985793.1985859"},{"key":"10.1016\/j.infsof.2015.05.003_b0180","doi-asserted-by":"crossref","unstructured":"A. Guzzi, A. Bacchelli, M. Lanza, M. Pinzger, A. van Deursen, Communication in open source software development mailing lists, in: Proceedings of the 10th Working Conference on Mining Software Repositories, MSR \u201913, May 18\u201319, 2013, San Francisco, CA, USA, 2013, pp. 277\u2013286.","DOI":"10.1109\/MSR.2013.6624039"},{"key":"10.1016\/j.infsof.2015.05.003_b0185","doi-asserted-by":"crossref","unstructured":"A. Bacchelli, M. Lanza, R. Robbes, Linking e-mails and source code artifacts, in: Proceedings of the 32nd ACM\/IEEE International Conference on Software Engineering, ICSE 2010, 1\u20138 May 2010, vol. 1, Cape Town, South Africa, 2010, pp. 375\u2013384.","DOI":"10.1145\/1806799.1806855"},{"key":"10.1016\/j.infsof.2015.05.003_b0190","doi-asserted-by":"crossref","DOI":"10.1155\/2012\/792024","article-title":"Clustering methodologies for software engineering","author":"Shtern","year":"2012","journal-title":"Adv. Softw. Eng."},{"key":"10.1016\/j.infsof.2015.05.003_b0195","doi-asserted-by":"crossref","unstructured":"M. Revelle, B. Dit, D. Poshyvanyk, Using data fusion and web mining to support feature location in software, in: The 18th IEEE International Conference on Program Comprehension, ICPC 2010, June 30\u2013July 2, 2010, Braga, Minho, Portugal, 2010, pp. 14\u201323.","DOI":"10.1109\/ICPC.2010.10"},{"key":"10.1016\/j.infsof.2015.05.003_b0200","doi-asserted-by":"crossref","unstructured":"D. Liu, A. Marcus, D. Poshyvanyk, V. Rajlich, Feature location via information retrieval based filtering of a single scenario execution trace, in: 22nd IEEE\/ACM International Conference on Automated Software Engineering (ASE 2007), November 5\u20139, 2007, Atlanta, GA, USA, 2007, pp. 234\u2013243.","DOI":"10.1145\/1321631.1321667"},{"issue":"2","key":"10.1016\/j.infsof.2015.05.003_b0205","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1080\/00031305.1998.10480559","article-title":"Violin plots: a box plot-density trace synergism","volume":"52","author":"Hintze","year":"1998","journal-title":"Am. Statist."},{"issue":"272","key":"10.1016\/j.infsof.2015.05.003_b0210","doi-asserted-by":"crossref","first-page":"1096","DOI":"10.1080\/01621459.1955.10501294","article-title":"A multiple comparison procedure for comparing several treatments with a control","volume":"50","author":"Dunnett","year":"1955","journal-title":"J. Am. Statist. Assoc."},{"issue":"6","key":"10.1016\/j.infsof.2015.05.003_b0215","doi-asserted-by":"crossref","first-page":"738","DOI":"10.1214\/12-EJS691","article-title":"Rank-based multiple test procedures and simultaneous confidence intervals","author":"Konietschke","year":"2012","journal-title":"Electron. J. Statist."},{"key":"10.1016\/j.infsof.2015.05.003_b0220","doi-asserted-by":"crossref","unstructured":"S. Wang, D. Lo, B. Vasilescu, A. Serebrenik, EnTagRec: an enhanced tag recommendation system for software information sites, in: 30th IEEE International Conference on Software Maintenance and Evolution, September 29\u2013October 3, 2014, Victoria, BC, Canada, 2014, pp. 291\u2013300.","DOI":"10.1109\/ICSME.2014.51"},{"year":"2005","series-title":"Effect Size for Research. A Broad Practical Approach","author":"Grissom","key":"10.1016\/j.infsof.2015.05.003_b0225"},{"year":"1979","series-title":"Information Retrieval","author":"van Rijsbergen","key":"10.1016\/j.infsof.2015.05.003_b0230"},{"issue":"4","key":"10.1016\/j.infsof.2015.05.003_b0235","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1109\/TSE.2008.36","article-title":"Do crosscutting concerns cause defects?","volume":"34","author":"Eaddy","year":"2008","journal-title":"IEEE Trans. Software Eng."},{"issue":"1","key":"10.1016\/j.infsof.2015.05.003_b0240","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s10664-008-9088-2","article-title":"Using information retrieval based coupling measures for impact analysis","volume":"14","author":"Poshyvanyk","year":"2009","journal-title":"Empir. Softw. Eng."},{"issue":"6","key":"10.1016\/j.infsof.2015.05.003_b0245","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1109\/TSE.2005.72","article-title":"Mining version histories to guide software changes","volume":"31","author":"Zimmermann","year":"2005","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"8","key":"10.1016\/j.infsof.2015.05.003_b0250","doi-asserted-by":"crossref","first-page":"1437","DOI":"10.1016\/j.infsof.2013.02.003","article-title":"FCA-CIA: an approach of using FCA to support cross-level change impact analysis for object oriented Java programs","volume":"55","author":"Li","year":"2013","journal-title":"Inf. Softw. Technol."},{"key":"10.1016\/j.infsof.2015.05.003_b0255","doi-asserted-by":"crossref","unstructured":"X. Sun, B. Li, B. Li, W. Wen, A comparative study of static CIA techniques, in: Proceedings of the Fourth Asia\u2013Pacific Symposium on Internetware, 23, 2012.","DOI":"10.1145\/2430475.2430498"},{"issue":"5","key":"10.1016\/j.infsof.2015.05.003_b0260","doi-asserted-by":"crossref","first-page":"725","DOI":"10.1109\/TSE.2012.71","article-title":"Trustrace: mining software repositories to improve the accuracy of requirement traceability links","volume":"39","author":"Ali","year":"2013","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/j.infsof.2015.05.003_b0265","doi-asserted-by":"crossref","unstructured":"T. Wang, H. Wang, G. Yin, C.X. Ling, X. Li, P. Zou, Mining software profile across multiple repositories for hierarchical categorization, in: Proceedings of the 2013 IEEE International Conference on Software Maintenance, ICSM \u201913, 2013, pp. 240\u2013249, ISBN 978-0-7695-4981-1.","DOI":"10.1109\/ICSM.2013.35"},{"key":"10.1016\/j.infsof.2015.05.003_b0270","doi-asserted-by":"crossref","unstructured":"J. Hu, X. Sun, D. Lo, B. Li, Modeling the evolution of development topics using dynamic topic models, in: 22nd IEEE International Conference on Software Analysis, Evolution, and Reengineering, SANER 2015, March 2\u20136, 2015, Montreal, QC, Canada, 2015, pp. 3\u201312.","DOI":"10.1109\/SANER.2015.7081810"},{"key":"10.1016\/j.infsof.2015.05.003_b0275","doi-asserted-by":"crossref","unstructured":"S.W. Thomas, Mining software repositories using topic models, in: Proceedings of the 33rd International Conference on Software Engineering, ICSE \u201911, 2011, pp. 1138\u20131139, ISBN 978-1-4503-0445-0.","DOI":"10.1145\/1985793.1986020"},{"key":"10.1016\/j.infsof.2015.05.003_b0280","series-title":"Computer and Information Science","first-page":"27","article-title":"What information in software historical repositories do we need to support software maintenance tasks? An approach based on topic model","author":"Sun","year":"2015"},{"key":"10.1016\/j.infsof.2015.05.003_b0285","doi-asserted-by":"crossref","unstructured":"K. Herzig, A. Zeller, The impact of tangled code changes, in: Proceedings of the 10th Working Conference on Mining Software Repositories, MSR \u201913, 2013, pp. 121\u2013130, ISBN 978-1-4673-2936-1.","DOI":"10.1109\/MSR.2013.6624018"},{"key":"10.1016\/j.infsof.2015.05.003_b0290","doi-asserted-by":"crossref","unstructured":"C. Kiefer, A. Bernstein, J. Tappolet, Mining software repositories with iSPAROL and a software evolution ontology, in: Proceedings of the Fourth International Workshop on Mining Software Repositories, MSR \u201907, 2007, pp. 10\u2013, ISBN 0-7695-2950-X.","DOI":"10.1109\/MSR.2007.21"},{"key":"10.1016\/j.infsof.2015.05.003_b0295","doi-asserted-by":"crossref","unstructured":"I. Keivanloo, C. Forbes, A. Hmood, M. Erfani, C. Neal, G. Peristerakis, J. Rilling, A linked data platform for mining software repositories, in: Proceedings of the 9th IEEE Working Conference on Mining Software Repositories, 2012, pp. 32\u201335, ISBN 978-1-4673-1761-0.","DOI":"10.1109\/MSR.2012.6224296"},{"key":"10.1016\/j.infsof.2015.05.003_b0300","doi-asserted-by":"crossref","unstructured":"G. Antoniol, V.F. Rollo, G. Venturi, Linear predictive coding and cepstrum coefficients for mining time variant information from software repositories, in: Proceedings of the 2005 International Workshop on Mining Software Repositories, 2005, pp. 1\u20135, ISBN 1-59593-123-6.","DOI":"10.1145\/1083142.1083156"},{"key":"10.1016\/j.infsof.2015.05.003_b0305","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1016\/j.ins.2011.09.034","article-title":"An evolutionary programming based asymmetric weighted least squares support vector machine ensemble learning methodology for software repository mining","volume":"191","author":"Yu","year":"2012","journal-title":"Inf. Sci."},{"key":"10.1016\/j.infsof.2015.05.003_b0310","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1016\/j.scico.2012.08.003","article-title":"Studying software evolution using topic models","volume":"80","author":"Thomas","year":"2014","journal-title":"Sci. Comput. Program."},{"issue":"2","key":"10.1016\/j.infsof.2015.05.003_b0315","doi-asserted-by":"crossref","first-page":"5: 1","DOI":"10.5381\/jot.2012.11.2.a5","article-title":"Automatic detection of bad smells in code: an experimental assessment","volume":"11","author":"Fontana","year":"2012","journal-title":"J. Object Technol."},{"issue":"4","key":"10.1016\/j.infsof.2015.05.003_b0320","doi-asserted-by":"crossref","first-page":"741","DOI":"10.1016\/j.infsof.2012.08.002","article-title":"Applying a smoothing filter to improve IR-based traceability recovery processes: An empirical investigation","volume":"55","author":"De Lucia","year":"2013","journal-title":"Inf. Softw. Technol."}],"container-title":["Information and Software Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950584915001007?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950584915001007?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T01:55:00Z","timestamp":1748397300000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0950584915001007"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":64,"alternative-id":["S0950584915001007"],"URL":"https:\/\/doi.org\/10.1016\/j.infsof.2015.05.003","relation":{},"ISSN":["0950-5849"],"issn-type":[{"type":"print","value":"0950-5849"}],"subject":[],"published":{"date-parts":[[2015,10]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"MSR4SM: Using topic models to effectively mining software repositories for software maintenance tasks","name":"articletitle","label":"Article Title"},{"value":"Information and Software Technology","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.infsof.2015.05.003","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2015 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}