<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462020000200413</article-id>
<article-id pub-id-type="doi">10.13053/cys-24-2-3368</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Information Retrieval from Software Bug Ontology Exploiting Formal Concept Analysis]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Goyal Jindal]]></surname>
<given-names><![CDATA[Shubhra]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Kaur]]></surname>
<given-names><![CDATA[Arvinder]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Guru Gobind Singh Indraprastha University  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>India</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>06</month>
<year>2020</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>06</month>
<year>2020</year>
</pub-date>
<volume>24</volume>
<numero>2</numero>
<fpage>413</fpage>
<lpage>428</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462020000200413&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462020000200413&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462020000200413&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: Knowledge extraction and structuring is attaining importance in real world applications such as e-commerce, decision support, problem solving and semantic web. Extraction of knowledge from collection of text documents is based upon identification of semantic content. Ontology plays an important role in accessing and structuring information. Developing an ontology are at the core of new strategies which requires accurate domain knowledge. Identification of structural and logical concepts is a time-consuming process. This work presents an ontology-based retrieval approach, that visualizes and structure the data of software bug reports domain. It exploits formal concept analysis (FCA) to elicit conceptualizations from bug reports datasets and a hierarchical taxonomy is generated of extracted knowledge. A lattice diagram of concepts and relationships is constructed from concept-relationship matrix created by FCA. Ontology is constructed on fluent editor tool and knowledge is extracted with the help of small queries executed on a reasoner window. The proposed approach is evaluated on 21 bug reports of apache projects of jira repository. It can be concluded that information can be retrieved easily from ontology as compared to manual extraction of data.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Knowledge extraction]]></kwd>
<kwd lng="en"><![CDATA[formal concept analysis]]></kwd>
<kwd lng="en"><![CDATA[ontology]]></kwd>
<kwd lng="en"><![CDATA[software bug reports]]></kwd>
<kwd lng="en"><![CDATA[concept-lattice]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gruber]]></surname>
<given-names><![CDATA[T.R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A translation approach to portable ontology specifications by a translation approach to portable ontology specifications]]></article-title>
<source><![CDATA[Knowledge Acquisition]]></source>
<year>1993</year>
<volume>5</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>199-220</page-range></nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Obitko]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Ontologies description and applications]]></article-title>
<source><![CDATA[Gerstner Laboratory for Intelligent Decision Making and Control]]></source>
<year>2001</year>
<page-range>1-35</page-range></nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Spear]]></surname>
<given-names><![CDATA[A.D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Ontology for the twenty first century : An introduction with recommendations]]></article-title>
<source><![CDATA[Institute for Formal Ontology and Medical Information Science]]></source>
<year>2006</year>
<page-range>1-37</page-range></nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Garla]]></surname>
<given-names><![CDATA[V.N.]]></given-names>
</name>
<name>
<surname><![CDATA[Brandt]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Ontology-guided feature engineering for clinical text classification]]></article-title>
<source><![CDATA[Journal of Biomedical Informatics]]></source>
<year>2012</year>
<volume>45</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>992-8</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Juckett]]></surname>
<given-names><![CDATA[D.A.]]></given-names>
</name>
<name>
<surname><![CDATA[Kasten]]></surname>
<given-names><![CDATA[E.P.]]></given-names>
</name>
<name>
<surname><![CDATA[Davis]]></surname>
<given-names><![CDATA[F.N.]]></given-names>
</name>
<name>
<surname><![CDATA[Gostine]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Concept detection using text exemplars aligned with a specialized ontology]]></article-title>
<source><![CDATA[Data &amp; Knowledge Engineering Data]]></source>
<year>2019</year>
<volume>119</volume>
<page-range>22-35</page-range></nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[De Maio]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Fenza]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Loia]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Senatore]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Hierarchical web resources retrieval by exploiting fuzzy formal concept analysis]]></article-title>
<source><![CDATA[Information Processing &amp; Management]]></source>
<year>2012</year>
<volume>48</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>399-418</page-range></nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Towards semi-automatic bug triage and severity prediction based on topic model and multi-feature of bug reports]]></source>
<year>2014</year>
<conf-name><![CDATA[ IEEE 38th Annual Compute Software and Applications Conference]]></conf-name>
<conf-loc> </conf-loc>
<page-range>97-106</page-range></nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kanwal]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Maqbool]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Bug prioritization to facilitate bug report triage]]></article-title>
<source><![CDATA[Journal of Computer Science and Technology]]></source>
<year>2012</year>
<volume>27</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>397-412</page-range></nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jin]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Dashbalbar]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Improving predictions about bug severity by utilizing bugs classified as normal 1]]></article-title>
<source><![CDATA[Contemporary Engineering Sciences]]></source>
<year>2016</year>
<volume>9</volume>
<numero>19</numero>
<issue>19</issue>
<page-range>933-42</page-range></nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sharma]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Sharma]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Gujral]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[A novel way of assessing software bug severity using dictionary of critical terms]]></source>
<year>2015</year>
<volume>70</volume>
<conf-name><![CDATA[ 4th International Conference on Eco-friendly Computing and Communication Systems]]></conf-name>
<conf-loc> </conf-loc>
<page-range>632-9</page-range></nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lamkanfi]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Demeyer]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Giger]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Goethals]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Predicting the severity of a reported bug]]></source>
<year>2010</year>
<conf-name><![CDATA[ 7th IEEE Working Conference on Mining Software Repositories]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-10</page-range></nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kaur]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Goyal]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Text analytics based severity prediction of software bugs for apache projects]]></article-title>
<source><![CDATA[International Journal of System Assurance Engineering and Management]]></source>
<year>2019</year>
<volume>10</volume>
<page-range>765-82</page-range></nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jindal]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Malhotra]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Jain]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Prediction of defect severity by mining software project reports]]></article-title>
<source><![CDATA[International Journal of System Assurance Engineering and Management]]></source>
<year>2016</year>
<volume>8</volume>
<page-range>334-51</page-range></nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Malhotra]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Severity assessment of software defect reports using text classification]]></article-title>
<source><![CDATA[International Journal of Computer Applications]]></source>
<year>2013</year>
<volume>83</volume>
<numero>11</numero>
<issue>11</issue>
<page-range>13-6</page-range></nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lessmann]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Member]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Baesens]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Mues]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Pietsch]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Benchmarking classification models for software defect prediction : a proposed framework and novel findings]]></article-title>
<source><![CDATA[IEEE Transactions on Software Engineering]]></source>
<year>2008</year>
<volume>34</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>485-96</page-range></nlm-citation>
</ref>
<ref id="B16">
<label>16</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tran]]></surname>
<given-names><![CDATA[H.M.]]></given-names>
</name>
<name>
<surname><![CDATA[Lange]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Chulkov]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Applying semantic techniques to search and analyze bug tracking data]]></article-title>
<source><![CDATA[Journal of Network and Systems Management]]></source>
<year>2009</year>
<volume>17</volume>
<page-range>285-308</page-range></nlm-citation>
</ref>
<ref id="B17">
<label>17</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tran]]></surname>
<given-names><![CDATA[H.M.]]></given-names>
</name>
<name>
<surname><![CDATA[Le]]></surname>
<given-names><![CDATA[S.T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Software bug ontology supporting semantic bug search on peer to peer networks]]></article-title>
<source><![CDATA[New Generation Computing]]></source>
<year>2014</year>
<volume>32</volume>
<page-range>145-62</page-range></nlm-citation>
</ref>
<ref id="B18">
<label>18</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Duarte]]></surname>
<given-names><![CDATA[B.B.]]></given-names>
</name>
<name>
<surname><![CDATA[Falbo]]></surname>
<given-names><![CDATA[R.A.]]></given-names>
</name>
<name>
<surname><![CDATA[Guizzardi]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Guizzardi]]></surname>
<given-names><![CDATA[R.S.S.]]></given-names>
</name>
<name>
<surname><![CDATA[Souza]]></surname>
<given-names><![CDATA[V.E.S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Towards an ontology of software defects, errors and failures]]></source>
<year>2018</year>
<volume>11157</volume>
<conf-name><![CDATA[ Conceptual Modeling (ER´18), Lecture Notes in Computer Science]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B19">
<label>19</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[&#352;kopljanac]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Bla&#353;kovi]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Formal concept analysis &#8211; overview and applications]]></source>
<year>2014</year>
<volume>69</volume>
<conf-name><![CDATA[ 24th DAAAM, International Symposium on Intelligent Manufacturing and Automation]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1258-67</page-range></nlm-citation>
</ref>
<ref id="B20">
<label>20</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Seganti]]></surname>
<given-names><![CDATA[A.B.]]></given-names>
</name>
<name>
<surname><![CDATA[Kapla]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Collaborative editing of ontologies using fluent editor and ontorion]]></source>
<year>2016</year>
<volume>1</volume>
<conf-name><![CDATA[ International Experiences and Directions Workshop on OWL]]></conf-name>
<conf-loc> </conf-loc>
<page-range>45-55</page-range></nlm-citation>
</ref>
<ref id="B21">
<label>21</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Uren]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Cimiano]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Handschuh]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Vargas-Vera]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Motta]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Ciravegna]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Annotation for knowledge management : requirements and a survey of the state of the art]]></article-title>
<source><![CDATA[Journal of Web Semantics]]></source>
<year>2006</year>
<volume>4</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>14-28</page-range></nlm-citation>
</ref>
<ref id="B22">
<label>22</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Stumme]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Maedche]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Bottom-up merging of ontologies]]></source>
<year>2001</year>
<volume>1</volume>
<conf-name><![CDATA[ 17th International Joint Conference on Artificial Intelligence]]></conf-name>
<conf-loc> </conf-loc>
<page-range>225-30</page-range></nlm-citation>
</ref>
<ref id="B23">
<label>23</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hotho]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Maedche]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Staab]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Ontology-based text document clustering]]></source>
<year>1998</year>
<page-range>1-13</page-range></nlm-citation>
</ref>
<ref id="B24">
<label>24</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Blomqvist]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<source><![CDATA[Pattern ranking for semi-automatic ontology construction]]></source>
<year>2008</year>
<conf-name><![CDATA[ ACM Symposium on Applied Computing March]]></conf-name>
<conf-loc> </conf-loc>
<page-range>2248-55</page-range></nlm-citation>
</ref>
<ref id="B25">
<label>25</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Khoury]]></surname>
<given-names><![CDATA[P.E.]]></given-names>
</name>
<name>
<surname><![CDATA[Coquery]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Hacid]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[An ontological interface for software developers to select security patterns]]></source>
<year>2008</year>
<conf-name><![CDATA[ 19th International Workshop on Database and Expert Systems Applications]]></conf-name>
<conf-loc> </conf-loc>
<page-range>297-301</page-range></nlm-citation>
</ref>
<ref id="B26">
<label>26</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Reinhartz]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Mark]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Extracting core requirements for software product lines]]></article-title>
<source><![CDATA[Requirements Engineering]]></source>
<year>2019</year>
<volume>25</volume>
<page-range>47-65</page-range></nlm-citation>
</ref>
<ref id="B27">
<label>27</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schuegerl]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Rilling]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Charland]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Enriching se ontologies with bug report quality]]></source>
<year>2008</year>
<page-range>1-15</page-range></nlm-citation>
</ref>
<ref id="B28">
<label>28</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Priss]]></surname>
<given-names><![CDATA[U.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Formal concept analysis in information science]]></article-title>
<source><![CDATA[Annual Review of Information Science and Technology]]></source>
<year>2006</year>
<volume>40</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>521-43</page-range></nlm-citation>
</ref>
<ref id="B29">
<label>29</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Guo]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Gibiec]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Tackling the term-mismatch problem in automated trace retrieval]]></article-title>
<source><![CDATA[Empirical Software Engineering]]></source>
<year>2016</year>
<volume>22</volume>
<page-range>1103-42</page-range></nlm-citation>
</ref>
<ref id="B30">
<label>30</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tilley]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Cole]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Becker]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Eklund]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A survey of formal concept analysis support for software engineering activities]]></article-title>
<source><![CDATA[Formal Concept Analysis, Lecture Notes in Computer Science]]></source>
<year>2005</year>
<volume>3626</volume>
<page-range>250-71</page-range></nlm-citation>
</ref>
<ref id="B31">
<label>31</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cleary]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Exton]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Buckley]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[English]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An empirical analysis of information retrieval based concept location techniques in software comprehension]]></article-title>
<source><![CDATA[Empirical Software Engineering]]></source>
<year>2009</year>
<volume>14</volume>
<page-range>93-130</page-range></nlm-citation>
</ref>
<ref id="B32">
<label>32</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cimiano]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Hotho]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Stumme]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Tane]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Conceptual knowledge processing with formal concept analysis and ontologies]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Eklund]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Concept Lattices. ICFCA´04, Lecture Notes in Computer Science]]></source>
<year>2004</year>
<volume>2961</volume>
<page-range>189-207</page-range></nlm-citation>
</ref>
<ref id="B33">
<label>33</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Formica]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Ontology-based concept similarity in formal concept analysis]]></article-title>
<source><![CDATA[Information Sciences]]></source>
<year>2006</year>
<volume>176</volume>
<numero>18</numero>
<issue>18</issue>
<page-range>2624-41</page-range></nlm-citation>
</ref>
<ref id="B34">
<label>34</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hlomani]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Stacey]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Approaches, methods, metrics, measures, and subjectivity in ontology evaluation : A survey]]></source>
<year>2014</year>
<volume>1</volume>
<page-range>1-5</page-range><publisher-name><![CDATA[School of Computer Science, University of Guelph]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B35">
<label>35</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Brewster]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Alani]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Dasmahapatra]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Street]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Wilks]]></surname>
<given-names><![CDATA[C.B.Y.]]></given-names>
</name>
</person-group>
<source><![CDATA[Data driven ontology evaluation]]></source>
<year>2004</year>
<conf-name><![CDATA[ International Conference on Language Resources and Evaluation]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B36">
<label>36</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kaur]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Jindal]]></surname>
<given-names><![CDATA[S.G.]]></given-names>
</name>
</person-group>
<source><![CDATA[Bug report collection system]]></source>
<year>2017</year>
<conf-name><![CDATA[ 7th International Conference on Cloud Computing, Data Science &amp; Engineering &#8211; Confluence]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B37">
<label>37</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Brank]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Grobelnik]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Mladeni]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[A survey of ontology evaluation techniques]]></source>
<year>2005</year>
<conf-name><![CDATA[ 8th Int. Multi-Conf. Information Society]]></conf-name>
<conf-loc> </conf-loc>
<page-range>166-9</page-range></nlm-citation>
</ref>
<ref id="B38">
<label>38</label><nlm-citation citation-type="">
<collab>Data &amp; Dimensions</collab>
<source><![CDATA[The six primary dimensions for data]]></source>
<year>2016</year>
</nlm-citation>
</ref>
<ref id="B39">
<label>39</label><nlm-citation citation-type="">
<collab>Evo Ont-Software</collab>
<source><![CDATA[Evolution ontology]]></source>
<year>2017</year>
</nlm-citation>
</ref>
<ref id="B40">
<label>40</label><nlm-citation citation-type="">
<collab>IFI</collab>
<source><![CDATA[]]></source>
<year>2017</year>
</nlm-citation>
</ref>
<ref id="B41">
<label>41</label><nlm-citation citation-type="">
<collab>Baetle Bug and Enhancement Tracking Language</collab>
<source><![CDATA[]]></source>
<year>2017</year>
</nlm-citation>
</ref>
<ref id="B42">
<label>42</label><nlm-citation citation-type="">
<collab>Helios-Bug Ontology</collab>
<source><![CDATA[]]></source>
<year>2016</year>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
