{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T05:59:25Z","timestamp":1726034365649},"publisher-location":"Cham","reference-count":46,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030243043"},{"type":"electronic","value":"9783030243050"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24305-0_40","type":"book-chapter","created":{"date-parts":[[2019,6,28]],"date-time":"2019-06-28T12:02:51Z","timestamp":1561723371000},"page":"529-543","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Evaluation of Textual Similarity Techniques in Code Level Traceability"],"prefix":"10.1007","author":[{"given":"Viktor","family":"Csuvik","sequence":"first","affiliation":[]},{"given":"Andr\u00e1s","family":"Kicsi","sequence":"additional","affiliation":[]},{"given":"L\u00e1szl\u00f3","family":"Vid\u00e1cs","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,29]]},"reference":[{"key":"40_CR1","unstructured":"Gensim: Gensim webpage. https:\/\/radimrehurek.com\/gensim\/ . Accessed 2019"},{"key":"40_CR2","unstructured":"TIOBE programming community index. https:\/\/www.tiobe.com\/tiobe-index . Accessed 2019"},{"issue":"10","key":"40_CR3","doi-asserted-by":"publisher","first-page":"970","DOI":"10.1109\/TSE.2002.1041053","volume":"28","author":"G Antoniol","year":"2002","unstructured":"Antoniol, G., Canfora, G., Casazza, G., De Lucia, A., Merlo, E.: Recovering traceability links between code and documentation. IEEE Trans. Softw. Eng. 28(10), 970\u2013983 (2002)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"40_CR4","unstructured":"Apache Commons webpage (2019). http:\/\/commons.apache.org\/"},{"key":"40_CR5","doi-asserted-by":"crossref","unstructured":"Csuvik, V., Kicsi, A., Vid\u00e1cs, L.: Source code level word embeddings in aiding semantic test-to-code traceability. In: 10th International Workshop at the 41st International Conference on Software Engineering (ICSE) - SST 2019. IEEE (2019)","DOI":"10.1109\/SST.2019.00016"},{"key":"40_CR6","unstructured":"Dai, A.M., Olah, C., Le, Q.V.: Document Embedding with Paragraph Vectors, July 2015"},{"issue":"3","key":"40_CR7","doi-asserted-by":"publisher","first-page":"384","DOI":"10.2337\/dc14-2364","volume":"38","author":"RA DeFronzo","year":"2015","unstructured":"DeFronzo, R.A., et al.: Combination of empagliflozin and linagliptin as second-line therapy in subjects with type 2 diabetes inadequately controlled on metformin. Diab. Care 38(3), 384\u2013393 (2015)","journal-title":"Diab. Care"},{"key":"40_CR8","doi-asserted-by":"crossref","unstructured":"Dit, B., Guerrouj, L., Poshyvanyk, D., Antoniol, G.: Can better identifier splitting techniques help feature location? In: 2011 IEEE 19th International Conference on Program Comprehension (ICPC), ICPC 2011, pp. 11\u201320. IEEE, Washington, DC (2011)","DOI":"10.1109\/ICPC.2011.47"},{"key":"40_CR9","doi-asserted-by":"crossref","unstructured":"Guo, J., Cheng, J., Cleland-Huang, J.: Semantically enhanced software traceability using deep learning techniques. In: Proceedings - 2017 IEEE\/ACM 39th International Conference on Software Engineering, ICSE 2017, pp. 3\u201314. IEEE, May 2017","DOI":"10.1109\/ICSE.2017.9"},{"issue":"6","key":"40_CR10","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MS.2005.156","volume":"22","author":"JH Hayes","year":"2005","unstructured":"Hayes, J.H., Dekhtyar, A., Sundaram, S.K.: Improving after-the-fact tracing and mapping: supporting software quality predictions. IEEE Softw. 22(6), 30\u201337 (2005)","journal-title":"IEEE Softw."},{"issue":"2","key":"40_CR11","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s007999900025","volume":"3","author":"D Hiemstra","year":"2000","unstructured":"Hiemstra, D.: A probabilistic justification for using tf - idf term weighting in information retrieval. Int. J. Digit. Libr. 3(2), 131\u2013139 (2000)","journal-title":"Int. J. Digit. Libr."},{"issue":"6","key":"40_CR12","doi-asserted-by":"publisher","first-page":"1754","DOI":"10.1007\/s10664-013-9261-0","volume":"19","author":"E Hill","year":"2014","unstructured":"Hill, E., Binkley, D., Lawrie, D., Pollock, L., Vijay-Shanker, K.: An empirical study of identifier splitting techniques. Empirical Softw. Eng. 19(6), 1754\u20131780 (2014)","journal-title":"Empirical Softw. Eng."},{"key":"40_CR13","doi-asserted-by":"crossref","unstructured":"Kaushik, N., Tahvildari, L., Moore, M.: Reconstructing traceability between bugs and test cases: an experimental study. In: 2011 18th Working Conference on Reverse Engineering, pp. 411\u2013414. IEEE, October 2011","DOI":"10.1109\/WCRE.2011.58"},{"key":"40_CR14","doi-asserted-by":"crossref","unstructured":"Kicsi, A., et al.: Feature analysis using information retrieval, community detection and structural analysis methods in product line adoption. J. Syst. Softw. (2019)","DOI":"10.1016\/j.jss.2019.05.001"},{"key":"40_CR15","doi-asserted-by":"crossref","unstructured":"Kicsi, A., T\u00f3th, L., Vid\u00e1cs, L.: Exploring the benefits of utilizing conceptual information in test-to-code traceability. In: Proceedings of the 6th International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering, pp. 8\u201314 (2018)","DOI":"10.1145\/3194104.3194106"},{"key":"40_CR16","doi-asserted-by":"crossref","unstructured":"Kicsi, A., Vid\u00e1cs, L., Besz\u00e9des, A., Kocsis, F., Kov\u00e1cs, I.: Information retrieval based feature analysis for product line adoption in 4GL systems. In: Proceedins of the 17th International Conference on Computational Science and Its Applications - ICCSA 2017, pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/ICCSA.2017.7999651"},{"key":"40_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-319-90421-4_10","volume-title":"New Opportunities for Software Reuse","author":"A Kicsi","year":"2018","unstructured":"Kicsi, A., Vid\u00e1cs, L., Csuvik, V., Horv\u00e1th, F., Besz\u00e9des, \u00c1., Kocsis, F.: Supporting product line adoption by combining syntactic and textual feature extraction. In: Capilla, R., Gallina, B., Cetina, C. (eds.) ICSR 2018. LNCS, vol. 10826, pp. 148\u2013163. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-90421-4_10"},{"key":"40_CR18","doi-asserted-by":"crossref","unstructured":"Kochhar, P.S., Xia, X., Lo, D., Li, S.: Practitioners\u2019 expectations on automated fault localization. In: Proceedings of the 25th International Symposium on Software Testing and Analysis - ISSTA 2016, pp. 165\u2013176. ACM Press, New York (2016)","DOI":"10.1145\/2931037.2931051"},{"key":"40_CR19","unstructured":"Le, Q.V., Mikolov, T.: Distributed representations of sentences and documents. Technical report (2014)"},{"key":"40_CR20","doi-asserted-by":"crossref","unstructured":"Lefebvre-Ulrikson, W., Da Costa, G., Rigutti, L., Blum, I.: Data Mining. New York (2016)","DOI":"10.1016\/B978-0-12-804647-0.00009-7"},{"key":"40_CR21","doi-asserted-by":"crossref","unstructured":"Levy, O., Goldberg, Y.: Linguistic regularities in sparse and explicit word representations. Technical report (2014)","DOI":"10.3115\/v1\/W14-1618"},{"issue":"05","key":"40_CR22","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1142\/S0218194005002543","volume":"15","author":"ANDRIAN MARCUS","year":"2005","unstructured":"Marcus, A., Maletic, J.I., Sergeyev, A.: Recovery of traceability links between software documentation and source code. Int. J. Softw. Eng. Knowl. Eng., 811\u2013836 (2005)","journal-title":"International Journal of Software Engineering and Knowledge Engineering"},{"key":"40_CR23","unstructured":"Mathieu, N., Hamou-Lhadj, A.: Word embeddings for the software engineering domain. In: Proceedings of the 15th International Conference on Mining Software Repositories - MSR 2018, pp. 38\u201341 (2018)"},{"key":"40_CR24","unstructured":"Mikolov, T., Sutskever, I., Chen, K., Corrado, G., Dean, J.: Distributed representations of words and phrases and their compositionality. Technical report (2013)"},{"key":"40_CR25","unstructured":"Mikolov, T., Sutskever, I., Chen, K., Corrado, G., Dean, J.: Distributed representations of words and phrases and their compositionality. In: Proceedings of the 26th International Conference on Neural Information Processing Systems, NIPS 2013, vol. 2, pp. 3111\u20133119, December 2013"},{"key":"40_CR26","unstructured":"Mondrian webpage (2019). http:\/\/www.theusrus.de\/Mondrian\/"},{"key":"40_CR27","doi-asserted-by":"crossref","unstructured":"Nguyen, T.D., Nguyen, A.T., Phan, H.D., Nguyen, T.N.: Exploring API embedding for API usages and applications. In: Proceedings - 2017 IEEE\/ACM 39th International Conference on Software Engineering, ICSE 2017, pp. 438\u2013449. IEEE, May 2017","DOI":"10.1109\/ICSE.2017.47"},{"key":"40_CR28","doi-asserted-by":"crossref","unstructured":"Paik, J.H.: A novel TF-IDF weighting scheme for effective ranking. In: Proceedings of the 36th international ACM SIGIR Conference on Research and Development in Information Retrieval - SIGIR 2013, p. 343. ACM Press, New York (2013)","DOI":"10.1145\/2484028.2484070"},{"key":"40_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-540-73101-6_14","volume-title":"Agile Processes in Software Engineering and Extreme Programming","author":"P Bouillon","year":"2007","unstructured":"Bouillon, P., Krinke, J., Meyer, N., Steimann, F.: EzUnit: a framework for associating failed unit tests with potential programming errors. In: Concas, G., Damiani, E., Scotto, M., Succi, G. (eds.) XP 2007. LNCS, vol. 4536, pp. 101\u2013104. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-73101-6_14"},{"key":"40_CR30","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.jss.2013.10.019","volume":"88","author":"A Qusef","year":"2014","unstructured":"Qusef, A., Bavota, G., Oliveto, R., De Lucia, A., Binkley, D.: Recovering test-to-code traceability using slicing and textual analysis. J. Syst. Softw. 88, 147\u2013168 (2014)","journal-title":"J. Syst. Softw."},{"key":"40_CR31","doi-asserted-by":"crossref","unstructured":"Qusef, A., Bavota, G., Oliveto, R., De Lucia, A., Binkley, D.: SCOTCH: test-to-code traceability using slicing and conceptual coupling. In: IEEE International Conference on Software Maintenance, ICSM, pp. 63\u201372. IEEE (2011)","DOI":"10.1109\/ICSM.2011.6080773"},{"issue":"11","key":"40_CR32","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.1002\/smr.1573","volume":"25","author":"A Qusef","year":"2013","unstructured":"Qusef, A., Bavota, G., Oliveto, R., Lucia, A.D., Binkley, D.: Evaluating test-to-code traceability recovery methods through controlled experiments. J. Softw. Evol. Process 25(11), 1167\u20131191 (2013)","journal-title":"J. Softw. Evol. Process"},{"issue":"4","key":"40_CR33","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MS.2009.161","volume":"27","author":"M Robillard","year":"2010","unstructured":"Robillard, M., Walker, R., Zimmermann, T.: Recommendation systems for software engineering. IEEE Softw. 27(4), 80\u201386 (2010)","journal-title":"IEEE Softw."},{"key":"40_CR34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45135-5","volume-title":"Recommendation Systems in Software Engineering","year":"2014","unstructured":"Robillard, M.P., Maalej, W., Walker, R.J., Zimmermann, T. (eds.): Recommendation Systems in Software Engineering. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-45135-5"},{"key":"40_CR35","doi-asserted-by":"crossref","unstructured":"Rompaey, B.V., Demeyer, S.: Establishing traceability links between unit test cases and units under test. In: European Conference on Software Maintenance and Reengineering, CSMR, pp. 209\u2013218. IEEE (2009)","DOI":"10.1109\/CSMR.2009.39"},{"key":"40_CR36","unstructured":"Sneed, H.: Reverse engineering of test cases for selective regression testing. In: European Conference on Software Maintenance and Reengineering, CSMR 2004, pp. 69\u201374. IEEE (2004)"},{"issue":"4","key":"40_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1082983.1083169","volume":"30","author":"Senthil Karthikeyan Sundaram","year":"2005","unstructured":"Sundaram, S.K., Hayes, J.H., Dekhtyar, A.: Baselines in requirements tracing. In: ACM SIGSOFT Software Engineering Notes, vol. 30, p. 1. ACM Press, New York (2005)","journal-title":"ACM SIGSOFT Software Engineering Notes"},{"key":"40_CR38","doi-asserted-by":"crossref","unstructured":"Tufano, M., Watson, C., Bavota, G., Di Penta, M., White, M., Poshyvanyk, D.: Deep learning similarities from different representations of source code. In: Proceedings of the 15th International Conference on Mining Software Repositories - MSR 2018, vol. 18, pp. 542\u2013553 (2018)","DOI":"10.1145\/3196398.3196431"},{"key":"40_CR39","doi-asserted-by":"crossref","unstructured":"Wang, S., Tang, J., Aggarwal, C., Liu, H.: Linked document embedding for classification. In: Proceedings of the 25th ACM International on Conference on Information and Knowledge Management - CIKM 2016, pp. 115\u2013124. ACM Press, New York (2016)","DOI":"10.1145\/2983323.2983755"},{"key":"40_CR40","doi-asserted-by":"crossref","unstructured":"White, M., Tufano, M., Vendome, C., Poshyvanyk, D.: Deep learning code fragments for code clone detection. In: Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering - ASE 2016, pp. 87\u201398 (2016)","DOI":"10.1145\/2970276.2970326"},{"issue":"1","key":"40_CR41","doi-asserted-by":"publisher","first-page":"e1001745","DOI":"10.1371\/journal.pbio.1001745","volume":"12","author":"G Wilson","year":"2014","unstructured":"Wilson, G., et al.: Best practices for scientific computing. PLoS Biol. 12(1), e1001745 (2014)","journal-title":"PLoS Biol."},{"issue":"2","key":"40_CR42","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/s11334-005-0011-3","volume":"1","author":"S Yadla","year":"2005","unstructured":"Yadla, S., Hayes, J.H., Dekhtyar, A.: Tracing requirements to defect reports: an application of information retrieval techniques. Innovations Syst. Softw. Eng. 1(2), 116\u2013124 (2005)","journal-title":"Innovations Syst. Softw. Eng."},{"key":"40_CR43","doi-asserted-by":"crossref","unstructured":"Yang, X., Lo, D., Xia, X., Bao, L., Sun, J.: Combining word embedding with information retrieval to recommend similar bug reports. In: Proceedings - International Symposium on Software Reliability Engineering, ISSRE, pp. 127\u2013137. IEEE, October 2016","DOI":"10.1109\/ISSRE.2016.33"},{"key":"40_CR44","doi-asserted-by":"crossref","unstructured":"Ye, X., Shen, H., Ma, X., Bunescu, R., Liu, C.: From word embeddings to document similarities for improved information retrieval in software engineering. In: Proceedings of the 38th International Conference on Software Engineering - ICSE 2016, pp. 404\u2013415. ACM Press, New York (2016)","DOI":"10.1145\/2884781.2884862"},{"key":"40_CR45","doi-asserted-by":"crossref","unstructured":"Zhao, T., Cao, Q., Sun, Q.: An improved approach to traceability recovery based on word embeddings. In: Proceedings - Asia-Pacific Software Engineering Conference, APSEC, vol. 2017-Decem, pp. 81\u201389. IEEE, December 2018","DOI":"10.1109\/APSEC.2017.14"},{"key":"40_CR46","unstructured":"Zhu, Z., Hu, J.: Context aware document embedding, July 2017"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2019"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24305-0_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,17]],"date-time":"2023-09-17T21:06:20Z","timestamp":1694984780000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24305-0_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030243043","9783030243050"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24305-0_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"29 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Saint Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}