{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T06:52:26Z","timestamp":1763535146984,"version":"3.40.3"},"publisher-location":"London","reference-count":72,"publisher":"Springer London","isbn-type":[{"type":"print","value":"9781447122388"},{"type":"electronic","value":"9781447122395"}],"license":[{"start":{"date-parts":[[2011,10,31]],"date-time":"2011-10-31T00:00:00Z","timestamp":1320019200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2011,10,31]],"date-time":"2011-10-31T00:00:00Z","timestamp":1320019200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-1-4471-2239-5_5","type":"book-chapter","created":{"date-parts":[[2012,1,30]],"date-time":"2012-01-30T16:03:17Z","timestamp":1327939397000},"page":"99-127","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Factors Impacting the Inputs of Traceability Recovery Approaches"],"prefix":"10.1007","author":[{"given":"Nasir","family":"Ali","sequence":"first","affiliation":[]},{"given":"Yann-Ga\u00ebl","family":"Gu\u00e9h\u00e9neuc","sequence":"additional","affiliation":[]},{"given":"Giuliano","family":"Antoniol","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,10,31]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, A., Nisenson, M., Simionovici, Y.: A traceability technique for specifications. In: The 16th IEEE International Conference on Program Comprehension (ICPC\u201908), pp. 103\u2013112. Amsterdam, The Netherlands (2008)","DOI":"10.1109\/ICPC.2008.30"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Ali, N.: Trustrace: Improving automated trace retrieval through resource trust analysis. In: ICPC \u201911: Proceedings of the International Conference on Program Comprehension (ICPC\u201911), p. 4. IEEE Computer Society, Washington, DC (2011)","DOI":"10.1109\/ICPC.2011.55"},{"key":"5_CR3","unstructured":"Antoniol, G.: Recovery of traceability links in software artifacts and systems. PhD Thesis, Montreal, QC (2003)"},{"issue":"10","key":"5_CR4","doi-asserted-by":"crossref","first-page":"970","DOI":"10.1109\/TSE.2002.1041053","volume":"28","author":"G. Antoniol","year":"2002","unstructured":"Antoniol, G., Canfora, G., Casazza, G., De Lucia, A., Merlo, E.: Recovering traceability links between code and documentation. IEEE Trans. Softw. Eng. 28(10), 970\u2013983. Piscataway, NJ (2002). ISSN:0098-5589","journal-title":"IEEE Trans. Softw. Eng."},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Antoniol, G., Hayes, J., Gu\u00e9h\u00e9neuc, Y.G., di Penta, M.: Reuse or rewrite: Combining textual, static, and dynamic analyses to assess the cost of keeping a system up-to-date. In: IEEE International Conference on Software Maintenance (ICSM\u201908), Beijing, China (2008)","DOI":"10.1109\/ICSM.2008.4658063"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Bianchi, A., Fasolino, A., Visaggio, G.: An exploratory case study of the maintenance effectiveness of traceability models. In: Proceedings of the 8th International Workshop on Program Comprehension (IWPC 2000), pp. 149\u2013158. IEEE Computer Society, Los Alamitos, CA (2000)","DOI":"10.1109\/WPC.2000.852489"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Binkley, D., Feild, H., Lawrie, D., Pighin, M.: Software fault prediction using language processing. In: Testing: Academic and Industrial Conference Practice and Research Techniques- MUTATION, 2007. TAICPART-MUTATION 2007, IEEE, pp. 99\u2013110. Windsor, UK (2007)","DOI":"10.1109\/TAIC.PART.2007.10"},{"issue":"11","key":"5_CR8","doi-asserted-by":"publisher","first-page":"1793","DOI":"10.1016\/j.jss.2009.06.036","volume":"82","author":"D. Binkley","year":"2009","unstructured":"Binkley, D., Feild, H., Lawrie, D., Pighin, M.: Increasing diversity: Natural language measures for software fault prediction. J. Syst. Softw. 82(11), 1793\u20131803 (2009)","journal-title":"J. Syst. Softw"},{"key":"5_CR9","first-page":"31","volume":"0","author":"S. Butler","year":"2009","unstructured":"Butler, S., Wermelinger, M., Yu, Y., Sharp, H.: Relating identifier naming flaws and code quality: An empirical study. IEEE Comput. Soc. 0, pp. 31\u201335, Los Alamitos, CA (2009)","journal-title":"IEEE Comput. Soc"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Chan, T.: Impact of programming and application-specific knowledge on maintenance effort: A hazard rate model. In: IEEE International Conference on Software Maintenance (ICSM\u201908), pp. 47\u201356. IEEE, Orlando, FL (2008)","DOI":"10.1109\/ICSM.2008.4658053"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Chantree, F., Nuseibeh, B., de Roeck, A., Willis, A.: Identifying nocuous ambiguities in natural language requirements. In: 14th IEEE International Conference Requirements Engineering, pp. 59\u201368. Minneapolis, MN (2006)","DOI":"10.1109\/RE.2006.31"},{"issue":"9","key":"5_CR12","doi-asserted-by":"publisher","first-page":"796","DOI":"10.1109\/TSE.2003.1232285","volume":"29","author":"J. Cleland-Huang","year":"2003","unstructured":"Cleland-Huang, J., Chang, C.K., Christensen, M.: Event-based traceability for managing evolutionary change. IEEE Trans. Softw. Eng. 29(9), 796\u2013810 (2003)","journal-title":"IEEE Trans. Softw. Eng"},{"key":"5_CR13","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/MC.2007.195","volume":"40","author":"J. Cleland-Huang","year":"2007","unstructured":"Cleland-Huang, J., Berenbach, B., Clark, S., Settimi, R., Romanova, E.: Best practices for automated traceability. Computer 40, 27\u201335 (2007)","journal-title":"Computer"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Cuddeback, D., JHH, Dekhtyar, A.: Automated Requirements Traceability: The Study of Human Analysts. IEEE Computer Society, Los Alamitos, CA (2010)","DOI":"10.1109\/RE.2010.35"},{"key":"5_CR15","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s10664-008-9090-8","volume":"14","author":"A. De Lucia","year":"2009","unstructured":"De Lucia, A., Oliveto, R., Tortora, G.: Assessing IR-based traceability recovery tools through controlled experiments. Empirical Softw. Eng. 14, 57\u201392 (2009)","journal-title":"Empirical Softw. Eng"},{"key":"5_CR16","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s11219-006-9219-1","volume":"14","author":"F. Deissenboeck","year":"2006","unstructured":"Deissenboeck, F., Pizka, M.: Concise and consistent naming. Softw. Qual. J. 14, 261\u2013282 (2006)","journal-title":"Softw. Qual. J"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Dekhtyar, A., Hayes, J., Larsen, J.: Make the most of your time: How should the analyst work with automated traceability tools? In: International Workshop on Predictor Models in Software Engineering (PROMISE\u201907: ICSE Workshops 2007), pp. 1\u20134. Minneapolis, MN (2007)","DOI":"10.1109\/PROMISE.2007.8"},{"key":"5_CR18","unstructured":"Eder, J., Panagos, E., Rabinovich, M.: Time constraints in workflow systems. In: Proceedings of the 11th International Conference on Advanced Information Systems Engineering, pp. 286\u2013300. Springer, London, CAiSE \u201999 (1999)"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Egyed, A.: A scenario-driven approach to traceability. In: Proceedings of the 23rd International Conference on Software Engineering (ICSE\u201901), pp. 123\u2013132. Toronto, ON (2001)","DOI":"10.1109\/ICSE.2001.919087"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Egyed, A., Gr\u00fcnbacher, P.: Automating requirements traceability: Beyond the record & replay paradigm. In: ASE\u201902: Proceedings of the 17th IEEE international conference on Automated software engineering, p. 163. IEEE Computer Society, Washington, DC (2002)","DOI":"10.1109\/ASE.2002.1115010"},{"issue":"6","key":"5_CR21","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MS.2004.40","volume":"21","author":"A. Egyed","year":"2004","unstructured":"Egyed, A., Gr\u00fcnbacher, P.: Identifying requirements conflicts and cooperation: How quality attributes and automated traceability can help. Softw. IEEE 21(6), 50\u201358 (2004)","journal-title":"Softw. IEEE"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Egyed, A., Biffl, S., Heindl, M., Gr\u00fcnbacher, P.: A value-based approach for understanding costbenefit trade-offs during automated software traceability. In: Proceedings of the 3rd International Workshop on Traceability in Emerging Forms of Software Engineering, pp. 2\u20137. ACM, New York, NY, TEFSE \u201905 (2005)","DOI":"10.1145\/1107656.1107658"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Egyed, A., Graf, F., Gr\u00fcnbacher, P.: Effort and quality of recovering requirements-to-code traces: Two exploratory experiments. In: IEEE International Conference on Requirements Engineering, pp. 221\u2013230. IEEE Computer Society, Los Alamitos, CA (2010)","DOI":"10.1109\/RE.2010.34"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Fabbrini, F., Fusani, M., Gnesi, S., Lami, G.: The linguistic approach to the natural language requirements quality: Benefit of the use of an automatic tool. In: Proceedings of the 26th Annual NASA Goddard, Software Engineering Workshop, pp. 97\u2013105. IEEE Computer Society, Los Alamitos, CA (2001)","DOI":"10.1109\/SEW.2001.992662"},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"Gervasi, V., Zowghi, D.: On the role of ambiguity in requirement engineering. In: REFSQ, pp. 248\u2013254.Springer, Berlin\/Heidelberg (2010)","DOI":"10.1007\/978-3-642-14192-8_22"},{"key":"5_CR26","unstructured":"Ghazarian, A.: A design-rule-based constructive approach to building traceable software. PhD Thesis, Toronto, ON (2009)"},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Gibson, M.D., Conheeney, K.: Domain knowledge reuse during requirements engineering. In: Proceedings of the 7th International Conference on Advanced Information Systems Engineering, pp. 283\u2013296. Springer, London (1995)","DOI":"10.1007\/3-540-59498-1_253"},{"key":"5_CR28","doi-asserted-by":"crossref","unstructured":"Gleich, B., Creighton, O., Kof, L.: Ambiguity Detection: Towards a Tool Explaining Ambiguity Sources. Requirements Engineering: Foundation for Software Quality, pp. 218\u2013232. Essen, Germany (2010)","DOI":"10.1007\/978-3-642-14192-8_20"},{"key":"5_CR29","volume-title":"An Adult\u00e2s Guide to Style","author":"A. Gregorc","year":"1982","unstructured":"Gregorc, A.: An Adult\u00e2s Guide to Style. Gregorc Associates, Inc., Columbia, CT (1982)"},{"key":"5_CR30","unstructured":"Gr\u00fcnbacher, P., Briggs, R.: Surfacing tacit knowledge in requirements negotiation: Experiences using easywinwin. In: Proceedings of the 34th Annual Hawaii International Conference on System Sciences, 2001, p. 8 (2001)"},{"key":"5_CR31","doi-asserted-by":"crossref","unstructured":"Haiduc, S., Marcus, A.: On the use of domain terms in source code. In: The 16th IEEE International Conference on Program Comprehension (ICPC\u201908), pp. 113\u2013122 (2008)","DOI":"10.1109\/ICPC.2008.29"},{"issue":"5","key":"5_CR32","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1049\/ip-sen:20020694","volume":"149","author":"T. Hall","year":"2002","unstructured":"Hall, T., Beecham, S., Rainer, A.: Requirements problems in twelve software companies: an empirical analysis. Softw. IEE Proc. 149(5), 153\u2013160 (2002)","journal-title":"Softw. IEE Proc"},{"key":"5_CR33","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/S0166-4115(08)62386-9","volume-title":"Human Mental Workload","author":"S.G. Hart","year":"1988","unstructured":"Hart, S.G., Stavenland, L.E.: Development of NASA-TLX (Task Load Index): Results of empirical and theoretical research. In: Hancock, P.A., Meshkati, N. (eds) Human Mental Workload, chap. 7, pp. 139\u2013183. Elsevier, Amsterdam (1988)"},{"key":"5_CR34","doi-asserted-by":"crossref","unstructured":"Hausmann, J., Heckel, R., Taentzer, G.: Detection of conflicting functional requirements in a use case-driven approach. In: Proceedings of the 24rd International Conference on Software Engineering (ICSE\u201902), pp. 105\u2013115. IEEE, Washington, DC (2005)","DOI":"10.1145\/581352.581355"},{"key":"5_CR35","doi-asserted-by":"crossref","unstructured":"Hayes, J.: Building a requirement fault taxonomy: Experiences from a NASA verification and validation research project. In: 14th International Symposium on Software Reliability Engineering, (ISSRE\u201903). pp. 49\u201359. Denver, CO (2003a)","DOI":"10.1109\/ISSRE.2003.1251030"},{"key":"5_CR36","unstructured":"Hayes, J.H.: Building a requirement fault taxonomy: Experiences from a NASA verification and validation research project. In: Proceedings of the 14th International Symposium on Software Reliability Engineering. IEEE Computer Society, Washington, DC, ISSRE \u201903 (2003b)"},{"key":"5_CR37","doi-asserted-by":"crossref","unstructured":"Hayes, J.H., Dekhtyar, A.: Humans in the traceability loop: Can\u2019t live with \u2019em, can\u2019t live without \u2019em. In: Proceedings of the 3rd International Workshop on Traceability in Emerging Forms of Software Engineering, pp. 20\u201323. ACM, New York, NY. TEFSE \u201905, doi: http:\/\/doi.acm.org\/10.1145\/1107656.1107661 (2005)","DOI":"10.1145\/1107656.1107661"},{"key":"5_CR38","doi-asserted-by":"crossref","unstructured":"Hayes, J.H., Dekhtyar, A., Osborne, J.: Improving requirements tracing via information retrieval. In: RE \u201903: Proceedings of the 11th IEEE International Conference on Requirements Engineering, p. 138. IEEE Computer Society, Washington, DC (2003)","DOI":"10.1109\/ICRE.2003.1232745"},{"key":"5_CR39","doi-asserted-by":"crossref","unstructured":"Hayes, J.H., Dekhtyar, A., Sundaram, S.: Text mining for software engineering: how analyst feedback impacts final results. In: Proceedings of the 2005 International Workshop on Mining Software Repositories, pp. 1\u20135. ACM, New York, NY, MSR \u201905 (2005)","DOI":"10.1145\/1083142.1083153"},{"key":"5_CR40","first-page":"165","volume-title":"Prereqir: Recovering pre-requirements via cluster analysis","author":"J.H. Hayes","year":"2008","unstructured":"Hayes, J.H., Antoniol, G., Gu\u00e9h\u00e9neuc, Y.G.: Prereqir: Recovering pre-requirements via cluster analysis, vol. 0, pp. 165\u2013174. IEEE Computer Society, Los Alamitos, CA (2008)"},{"issue":"1","key":"5_CR41","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/s10270-007-0066-8","volume":"8","author":"W. Jirapanthong","year":"2007","unstructured":"Jirapanthong, W., Zisman, A.: Xtraque: Traceability for product line systems. Softw. Syst. Model. 8(1), 117\u2013144 (2007)","journal-title":"Softw. Syst. Model"},{"key":"5_CR42","doi-asserted-by":"crossref","unstructured":"Joseph, J.C.: Requirements engineering and management: The key to designing quality complex systems. In: The TQM Magazine, vol. 12, pp. 400\u2013407. MCB UP Ltd., Bradford, West Yorkshire (2000)","DOI":"10.1108\/09544780010351760"},{"issue":"2","key":"5_CR43","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/BF02919967","volume":"3","author":"E. Kamsties","year":"1998","unstructured":"Kamsties, E., Hormann, K., Schlich, M.: Requirements engineering in small and medium enterprises. Req. Eng. 3(2), 84\u201390 (1998)","journal-title":"Req. Eng"},{"key":"5_CR44","unstructured":"Kamsties, E., Berry, D., Paech, B.: Detecting ambiguities in requirements documents using inspections. In: Workshop on Inspections in Software Engineering, pp. 68\u201380. Paris, France (2001)"},{"issue":"3","key":"5_CR45","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1002\/sys.20005","volume":"7","author":"J. Kasser","year":"2004","unstructured":"Kasser, J.: The first requirements elucidator demonstration (FRED) Tool. Syst. Eng. 7(3), 243\u2013256 (2004)","journal-title":"Syst. Eng"},{"key":"5_CR46","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.infsof.2008.09.009","volume":"51","author":"B. Kitchenham","year":"2009","unstructured":"Kitchenham, B., Brereton, O., Budgen, D., Turner, M., Bailey, J., Linkman, S.: Systematic literature reviews in software engineering \u2013 A systematic literature review. Inform. Softw. Technol. 51, 7\u201315 (2009)","journal-title":"Inform. Softw. Technol"},{"issue":"4","key":"5_CR47","doi-asserted-by":"publisher","first-page":"696","DOI":"10.1111\/j.1467-8535.2008.00847.x","volume":"40","author":"W. Lau","year":"2009","unstructured":"Lau, W., Yuen, A.: Exploring the effects of gender and learning styles on computer programming performance: Implications for programming pedagogy. Brit. J. Educat. Technol. 40(4), 696\u2013712 (2009)","journal-title":"Brit. J. Educat. Technol"},{"key":"5_CR48","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/s10664-006-9032-2","volume":"12","author":"D. Lawrie","year":"2007","unstructured":"Lawrie, D., Feild, H., Binkley, D.: Quantifying identifier quality: An analysis of trends. Empirical Softw. Eng. 12, 359\u2013388 (2007a)","journal-title":"Empirical Softw. Eng"},{"key":"5_CR49","doi-asserted-by":"crossref","unstructured":"Lawrie, D., Morrell, C., Feild, H., Binkley, D. : What\u2019s in a name? A study of identifiers. In: Proceedings of the 14th IEEE International Conference on Program Comprehension, pp. 3\u201312. IEEE Computer Society, Washington, DC (2006)","DOI":"10.1109\/ICPC.2006.51"},{"key":"5_CR50","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s11334-007-0031-2","volume":"3","author":"D. Lawrie","year":"2007","unstructured":"Lawrie, D., Morrell, C., Feild, H., Binkley, D.: Effective identifier names for comprehension and memory. Innov. Syst. Softw. Eng. 3, 303\u2013318 (2007b)","journal-title":"Innov. Syst. Softw. Eng"},{"issue":"4","key":"5_CR51","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1109\/69.706056","volume":"10","author":"J. Lee","year":"2002","unstructured":"Lee, J., Kuo, J.: New approach to requirements trade-off analysis for complex systems. Knowl. Data Eng. IEEE Trans. 10(4), 551\u2013562 (2002)","journal-title":"Knowl. Data Eng. IEEE Trans"},{"key":"5_CR52","first-page":"32","volume-title":"Adams Re-Trace: A Traceability Recovery Tool","author":"A.D. Lucia","year":"2005","unstructured":"Lucia, A.D., Fasano, F., Oliveto, R., Tortora, G.: Adams Re-Trace: A Traceability Recovery Tool, vol. 0, pp. 32\u201341. IEEE Computer Society, Los Alamitos, CA (2005)"},{"key":"5_CR53","doi-asserted-by":"crossref","first-page":"1301","DOI":"10.1145\/1276933.1276934","volume":"16","author":"A.D. Lucia","year":"2007","unstructured":"Lucia, A.D., Fasano, F., Oliveto, R., Tortora, G.: Recovering traceability links in software artifact management systems using information retrieval methods. ACM Trans. Softw. Eng. Methodol. 16, 1301\u20131350 (2007)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"5_CR54","first-page":"205","volume":"99","author":"A.D. Lucia","year":"2010","unstructured":"Lucia, A.D., Penta, M.D., Oliveto, R.: Improving source code lexicon via traceability and information retrieval. IEEE Trans. Softw. Eng. 99, 205\u2013227 (2010)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"5_CR55","first-page":"274","volume-title":"Coconut: Code Comprehension Nurturant Using Traceability","author":"A.D. Lucia","year":"2006","unstructured":"Lucia, A.D., Penta, M.D., Oliveto, R., Zurolo, F.: Coconut: Code Comprehension Nurturant Using Traceability, pp. 274\u2013275. IEEE Computer Society, Los Alamitos, CA (2006)"},{"key":"5_CR56","doi-asserted-by":"crossref","unstructured":"Madani, N., Guerrouj, L., Di Penta, M., Gu\u00e9h\u00e9neuc, Y.G., Antoniol, G.: Recognizing words from source code identifiers using speech recognition techniques. In: Proceeding of the Conference on Software Maintenance and Reengineering, pp. 69\u201378. IEEE, Madrid, Spain (2010)","DOI":"10.1109\/CSMR.2010.31"},{"key":"5_CR57","unstructured":"Maletic, J., Munson, E., Marcus, A., Nguyen, T.: Using a hypertext model for traceability link conformance analysis. In: Proceedings of the 2nd International Workshop on Traceability in Emerging Forms of Software Engineering, pp. 47\u201354. Montreal, Canada (2003)"},{"key":"5_CR58","doi-asserted-by":"crossref","unstructured":"Marcus, A., Maletic, J.I.: Recovering documentation-to-source-code traceability links using latent semantic indexing. In: ICSE \u201903: Proceedings of the 25th International Conference on Software Engineering, pp. 125\u2013135. IEEE Computer Society, Washington, DC (2003)","DOI":"10.1109\/ICSE.2003.1201194"},{"key":"5_CR59","doi-asserted-by":"crossref","unstructured":"Marcus, A., Poshyvanyk, D.: The conceptual cohesion of classes. In: Proceedings of the 21st IEEE International Conference on Software Maintenance, pp. 133\u2013142. IEEE Computer Society, Washington, DC (2005)","DOI":"10.1109\/ICSM.2005.89"},{"issue":"1","key":"5_CR60","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/TSE.2009.50","volume":"36","author":"N. Moha","year":"2010","unstructured":"Moha, N., Gu\u00e9h\u00e9neuc, Y.G., Duchien, L., Le Meur, A.F.: Decor: A method for the specification and detection of code and design smells. Softw. Eng. IEEE Trans. 36(1), 20\u201336 (2010)","journal-title":"Softw. Eng. IEEE Trans"},{"key":"5_CR61","doi-asserted-by":"crossref","unstructured":"Oliveto, R., Gethers, M., Poshyvanyk, D., De Lucia, A.: On the equivalence of information retrieval methods for automated traceability link recovery. In: Proceedings of the 2010 IEEE 18th International Conference on Program Comprehension, pp. 68\u201371. IEEE Computer Society, Washington, DC, ICPC \u201910 (2010)","DOI":"10.1109\/ICPC.2010.20"},{"issue":"1","key":"5_CR62","doi-asserted-by":"publisher","first-page":"15","DOI":"10.2190\/T6R2-5111-5805-10MT","volume":"36","author":"Y. Park","year":"2007","unstructured":"Park, Y., Black, J.: Identifying the impact of domain knowledge and cognitive style on webbased information search behavior. J. Educat. Comput. Res. 36(1), 15\u201337 (2007)","journal-title":"J. Educat. Comput. Res"},{"key":"5_CR63","doi-asserted-by":"crossref","unstructured":"Rajlich, V., Wilde, N.: The role of concepts in program comprehension. In: Proceedings of the 10th International Workshop on Program Comprehension, p. 271. IEEE Computer Society, Washington, DC, IWPC \u201902 (2002)","DOI":"10.1109\/WPC.2002.1021348"},{"key":"5_CR64","unstructured":"Sherba, S.A.: Towards automating traceability: An incremental and scalable approach. PhD Thesis, Boulder, CO (2005)"},{"key":"5_CR65","volume-title":"Handbook of Parametric and Nonparametric Statistical Procedures","author":"D.J. Sheskin","year":"2007","unstructured":"Sheskin, D.J.: Handbook of Parametric and Nonparametric Statistical Procedures, 4th edn. Chapman & Hall\/CRC, London (2007)","edition":"4"},{"key":"5_CR66","first-page":"235","volume-title":"Empirical Studies of Programming Knowledge","author":"E. Soloway","year":"1989","unstructured":"Soloway, E., Ehrlich, K.: Empirical Studies of Programming Knowledge, pp. 235\u2013267. ACM, New York, NY (1989)"},{"issue":"2","key":"5_CR67","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/S0164-1212(03)00242-5","volume":"72","author":"G. Spanoudakis","year":"2004","unstructured":"Spanoudakis, G., Zisman, A., P\u00e9rez-Minana, E., Krause, P.: Rule-based generation of requirements traceability relations. J. Syst. Softw. 72(2), 105\u2013127 (2004)","journal-title":"J. Syst. Softw"},{"key":"5_CR68","doi-asserted-by":"crossref","unstructured":"Sundaram, S.K., Hayes, J.H., Dekhtyar, A.: Baselines in requirements tracing. In: Proceedings of the 2005 Workshop on Predictor Models in Software Engineering, pp. 1\u20136, ACM, New York, NY (2005)","DOI":"10.1145\/1082983.1083169"},{"issue":"1","key":"5_CR69","first-page":"45","volume":"18","author":"M. Taira","year":"2008","unstructured":"Taira, M.: The influence of domain knowledge and task requirement on the selection of learning strategies in the internet. Int. J. Creativ. Probl. Solv. 18(1), 45\u201353 (2008)","journal-title":"Int. J. Creativ. Probl. Solv"},{"issue":"3","key":"5_CR70","first-page":"143","volume":"4","author":"A.A. Takang","year":"1996","unstructured":"Takang, A.A., Grubb, P.A., Macredie, R.D.: The effects of comments and identifier names on program comprehensibility: An experimental investigation. J. Program. Lang. 4(3), 143\u2013167 (1996)","journal-title":"J. Program. Lang"},{"key":"5_CR71","volume-title":"Refactoring Workbook","author":"W.C. Wake","year":"2003","unstructured":"Wake, W.C.: Refactoring Workbook. Addison-Wesley Longman Publishing Co. Inc., Boston, MA (2003)"},{"key":"5_CR72","unstructured":"Zisman, A., Spanoudakis, G., P\u00e9rez-Mi\u00f1ana, E., Krause, P.: Towards a traceability approach for product families requirements. In: Proceedings of 3rd ICSE Workshop on Software Product Lines: Economics, Architectures, and Implications, Orlando, FL (2002)"}],"container-title":["Software and Systems Traceability"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4471-2239-5_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T12:16:37Z","timestamp":1742386597000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4471-2239-5_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,31]]},"ISBN":["9781447122388","9781447122395"],"references-count":72,"URL":"https:\/\/doi.org\/10.1007\/978-1-4471-2239-5_5","relation":{},"subject":[],"published":{"date-parts":[[2011,10,31]]},"assertion":[{"value":"31 October 2011","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}