{"id":"https://openalex.org/W3190062199","doi":"https://doi.org/10.1109/iccta43079.2017.9497154","title":"Bug Localization Approach Based on Similar Bug Report, Stack Trace and Source Code Structure","display_name":"Bug Localization Approach Based on Similar Bug Report, Stack Trace and Source Code Structure","publication_year":2017,"publication_date":"2017-10-28","ids":{"openalex":"https://openalex.org/W3190062199","doi":"https://doi.org/10.1109/iccta43079.2017.9497154","mag":"3190062199"},"language":"en","primary_location":{"id":"doi:10.1109/iccta43079.2017.9497154","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccta43079.2017.9497154","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 27th International Conference on Computer Theory and Applications (ICCTA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036106417","display_name":"Kyaw Ei Ei Swe","orcid":null},"institutions":[{"id":"https://openalex.org/I4210089821","display_name":"University of Computer Studies Mandalay","ror":"https://ror.org/008jssb69","country_code":"MM","type":"education","lineage":["https://openalex.org/I4210089821"]}],"countries":["MM"],"is_corresponding":true,"raw_author_name":"Kyaw Ei Ei Swe","raw_affiliation_strings":["University of Computer Studies, Mandalay, Mandalay, Myanmar"],"affiliations":[{"raw_affiliation_string":"University of Computer Studies, Mandalay, Mandalay, Myanmar","institution_ids":["https://openalex.org/I4210089821"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046537131","display_name":"Hnin Min Oo","orcid":null},"institutions":[{"id":"https://openalex.org/I4210089821","display_name":"University of Computer Studies Mandalay","ror":"https://ror.org/008jssb69","country_code":"MM","type":"education","lineage":["https://openalex.org/I4210089821"]}],"countries":["MM"],"is_corresponding":false,"raw_author_name":"Hnin Min Oo","raw_affiliation_strings":["University of Computer Studies, Mandalay, Mandalay, Myanmar"],"affiliations":[{"raw_affiliation_string":"University of Computer Studies, Mandalay, Mandalay, Myanmar","institution_ids":["https://openalex.org/I4210089821"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5036106417"],"corresponding_institution_ids":["https://openalex.org/I4210089821"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.5518616,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"57","last_page":"62"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8216263055801392},{"id":"https://openalex.org/keywords/trace","display_name":"TRACE (psycholinguistics)","score":0.7547881007194519},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.654908299446106},{"id":"https://openalex.org/keywords/software-bug","display_name":"Software bug","score":0.6398687958717346},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6175963878631592},{"id":"https://openalex.org/keywords/software-maintenance","display_name":"Software maintenance","score":0.5507385730743408},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5240134000778198},{"id":"https://openalex.org/keywords/rank","display_name":"Rank (graph theory)","score":0.5114297270774841},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.49324601888656616},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4780897796154022},{"id":"https://openalex.org/keywords/software-regression","display_name":"Software regression","score":0.4640257954597473},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.44362443685531616},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.3933331370353699},{"id":"https://openalex.org/keywords/software-system","display_name":"Software system","score":0.3403064012527466},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.3351321518421173},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.28689315915107727},{"id":"https://openalex.org/keywords/software-quality","display_name":"Software quality","score":0.22943013906478882}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8216263055801392},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.7547881007194519},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.654908299446106},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.6398687958717346},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6175963878631592},{"id":"https://openalex.org/C101317890","wikidata":"https://www.wikidata.org/wiki/Q940053","display_name":"Software maintenance","level":4,"score":0.5507385730743408},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5240134000778198},{"id":"https://openalex.org/C164226766","wikidata":"https://www.wikidata.org/wiki/Q7293202","display_name":"Rank (graph theory)","level":2,"score":0.5114297270774841},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.49324601888656616},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4780897796154022},{"id":"https://openalex.org/C191727507","wikidata":"https://www.wikidata.org/wiki/Q24346","display_name":"Software regression","level":5,"score":0.4640257954597473},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.44362443685531616},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3933331370353699},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.3403064012527466},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.3351321518421173},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.28689315915107727},{"id":"https://openalex.org/C117447612","wikidata":"https://www.wikidata.org/wiki/Q1412670","display_name":"Software quality","level":4,"score":0.22943013906478882},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccta43079.2017.9497154","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccta43079.2017.9497154","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 27th International Conference on Computer Theory and Applications (ICCTA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W142212369","https://openalex.org/W1532325895","https://openalex.org/W1985947101","https://openalex.org/W2010833880","https://openalex.org/W2013655083","https://openalex.org/W2018663431","https://openalex.org/W2058230372","https://openalex.org/W2079317829","https://openalex.org/W2096598529","https://openalex.org/W2111403266","https://openalex.org/W2113351233","https://openalex.org/W2116737258","https://openalex.org/W2131346202","https://openalex.org/W2139270835","https://openalex.org/W2554979658","https://openalex.org/W3149255455"],"related_works":["https://openalex.org/W3009111612","https://openalex.org/W2044225531","https://openalex.org/W2597543511","https://openalex.org/W3045036521","https://openalex.org/W2901462014","https://openalex.org/W3004570974","https://openalex.org/W2135303064","https://openalex.org/W2123854374","https://openalex.org/W2033329795","https://openalex.org/W3186317565"],"abstract_inverted_index":{"Bug":[0,19],"localization":[1,20,51],"helps":[2],"software":[3,25,42],"developers":[4],"to":[5,32,36,65,68,79],"track":[6],"post-released":[7],"faulty":[8,56,62],"source":[9,57,63,82],"files":[10,64,85],"with":[11,100,124,138],"the":[12,81,93,97,115,119,132,136,165],"help":[13],"of":[14,109,111,121,147],"user's":[15],"reported":[16],"bug":[17,50,84,104],"files.":[18,58,112],"gains":[21],"high":[22],"popularity":[23],"in":[24,41,145],"maintenance":[26],"since":[27],"many":[28],"recent":[29],"years":[30],"due":[31],"its":[33],"essential":[34],"role":[35],"fix":[37,66],"unavoidable":[38],"bugs":[39],"encountered":[40],"development":[43],"process.":[44],"In":[45],"this":[46],"paper,":[47],"we":[48,90],"propose":[49],"approach":[52],"for":[53],"locating":[54],"erroneous":[55],"It":[59],"recommends":[60],"relevant":[61],"according":[67],"their":[69],"highest":[70],"similarity":[71],"scores.":[72],"We":[73,113,129],"additionally":[74],"exploit":[75],"information":[76,108],"retrieval":[77],"techniques":[78],"consider":[80],"and":[83,106,127,134,143,154],"as":[86],"documents":[87,105],"so":[88],"that":[89,164],"can":[91],"retrieve":[92],"similar":[94],"terms":[95,146],"from":[96],"code":[98],"structures":[99],"different":[101],"levels,":[102],"historical":[103],"stack-trace":[107],"both":[110],"implement":[114],"proposed":[116,166],"system":[117,167],"on":[118],"top":[120],"BugLocator":[122,142],"equipped":[123],"our":[125],"methods":[126],"contributions.":[128],"then":[130],"perform":[131],"experiments":[133],"compare":[135],"results":[137,162,171],"proficient":[139],"contemporary":[140],"approaches:":[141],"BLUiR":[144],"top-N":[148],"rank,":[149],"mean":[150,155],"average":[151],"precision":[152],"(MAP)":[153],"reciprocal":[156],"rank":[157],"(MRR)":[158],"evaluation":[159],"metrics.":[160],"The":[161],"show":[163],"achieves":[168],"more":[169],"significant":[170],"than":[172],"other":[173],"approaches.":[174]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
