{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T19:23:04Z","timestamp":1725909784498},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319569932"},{"type":"electronic","value":"9783319569949"}],"license":[{"start":{"date-parts":[[2017,8,20]],"date-time":"2017-08-20T00:00:00Z","timestamp":1503187200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-56994-9_11","type":"book-chapter","created":{"date-parts":[[2017,8,19]],"date-time":"2017-08-19T02:08:25Z","timestamp":1503108505000},"page":"156-171","source":"Crossref","is-referenced-by-count":3,"title":["Search-Based Requirements Traceability Recovery"],"prefix":"10.1007","author":[{"given":"Adnane","family":"Ghannem","sequence":"first","affiliation":[]},{"given":"Mohammed Salah","family":"Hamdi","sequence":"additional","affiliation":[]},{"given":"Marouane","family":"Kessentini","sequence":"additional","affiliation":[]},{"given":"Hany H.","family":"Ammar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,20]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1007\/978-3-642-28714-5_16","volume-title":"Proceedings on Requirements Engineering: Foundation for Software Quality: 18th International Working Conference, (REFSQ 2012), Essen, Germany","author":"J Cleland-Huang","year":"2012","unstructured":"Cleland-Huang, J., et al.: Trace queries for safety requirements in high assurance systems. In: Regnell, B., Damian, D. (eds.) Proceedings on Requirements Engineering: Foundation for Software Quality: 18th International Working Conference, (REFSQ 2012), Essen, Germany, pp. 179\u2013193. Springer, Heidelberg (2012)"},{"issue":"3","key":"11_CR2","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1007\/s11334-007-0024-1","volume":"3","author":"J Hayes","year":"2007","unstructured":"Hayes, J., et al.: REquirements TRacing On target (RETRO): improving software maintenance through traceability recovery. Innov. Syst. Softw. Eng. 3(3), 193\u2013202 (2007)","journal-title":"Innov. Syst. Softw. Eng."},{"key":"11_CR3","volume-title":"Requirements Traceability Recovery","author":"L Brod\u00e9n","year":"2011","unstructured":"Brod\u00e9n, L.: Requirements Traceability Recovery. Lund University, Lund (2011)"},{"key":"11_CR4","first-page":"372","volume-title":"Genetic Algorithms in Search Optimization and Machine Learning","author":"ED Goldberg","year":"1989","unstructured":"Goldberg, E.D.: Genetic Algorithms in Search Optimization and Machine Learning, p. 372. Addison-Wesley Longman Publishing Co., Inc., Reading (1989)"},{"issue":"1","key":"11_CR5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2379776.2379787","volume":"45","author":"M Harman","year":"2012","unstructured":"Harman, M., Mansouri, S.A., Zhang, Y.: Search-based software engineering: trends, techniques and applications. ACM Comput. Surv. 45(1), 1\u201361 (2012)","journal-title":"ACM Comput. Surv."},{"key":"11_CR6","unstructured":"Standish, CHAOS Manifesto: Think Big Act Small (2013)"},{"key":"11_CR7","series-title":"Lecture Notes in Business Information Processing","volume-title":"Design Requirements Engineering: A Ten-Year Perspective","year":"2009","unstructured":"Lyytinen, K.J., et al. (eds.): Design Requirements Engineering: A Ten-Year Perspective. Lecture Notes in Business Information Processing. Springer, Heidelberg (2009)"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Pete Sawyer, B.P., Heymans, P.: Requirements engineering: foundation for software quality. In: 13th International Working Conference (REFSQ 2007), Trondheim, Norway, vol. 386. Springer, Heidelberg (2007)","DOI":"10.1007\/978-3-540-73031-6"},{"key":"11_CR9","unstructured":"ISO\/IE-26702, IEEE Standard for Application and Management of the Systems Engineering Process. IEEE Std. 1220-2005 (Revision of IEEE Std. 1220-1998), p. 0_1\u201387 (2005)"},{"key":"11_CR10","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/978-3-642-02161-9_2","volume-title":"Software Engineering for Self-adaptive Systems","author":"J Andersson","year":"2009","unstructured":"Andersson, J., et al.: Modeling dimensions of self-adaptive software systems. In: Cheng, B.C., et al. (eds.) Software Engineering for Self-adaptive Systems, pp. 27\u201347. Springer, Heidelberg (2009)"},{"key":"11_CR11","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1007\/978-3-642-39742-4_9","volume-title":"Search Based Software Engineering","author":"A Ghannem","year":"2013","unstructured":"Ghannem, A., El Boussaidi, G., Kessentini, M.: Model refactoring using interactive genetic algorithm. In: Ruhe, G., Zhang, Y. (eds.) Search Based Software Engineering, pp. 96\u2013110. Springer, Heidelberg (2013)"},{"key":"11_CR12","doi-asserted-by":"crossref","first-page":"209","DOI":"10.7551\/mitpress\/3927.001.0001","volume-title":"An Introduction to Genetic Algorithms","author":"M Mitchell","year":"1998","unstructured":"Mitchell, M.: An Introduction to Genetic Algorithms, p. 209. MIT Press, Cambridge (1998)"},{"issue":"4598","key":"11_CR13","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1126\/science.220.4598.671","volume":"220","author":"S Kirkpatrick","year":"1983","unstructured":"Kirkpatrick, S., Gelatt, C.D., Vecchi, M.P.: Optimization by simulated annealing. Science 220(4598), 671\u2013680 (1983)","journal-title":"Science"},{"key":"11_CR14","first-page":"680","volume-title":"Genetic Programming: On the Programming of Computers by Means of Natural Selection","author":"RJ Koza","year":"1992","unstructured":"Koza, R.J.: Genetic Programming: On the Programming of Computers by Means of Natural Selection, p. 680. MIT Press, Cambridge (1992)"},{"issue":"2","key":"11_CR15","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1109\/4235.996017","volume":"6","author":"K Deb","year":"2002","unstructured":"Deb, K., et al.: A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comput. 6(2), 182\u2013197 (2002)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Howe, C.D.: RiTa: creativity support for computational literature. In: Proceedings of the 7th ACM Conference on Creativity and Cognition, pp. 205\u2013210. ACM, Berkeley (2009)","DOI":"10.1145\/1640233.1640265"},{"issue":"10","key":"11_CR17","doi-asserted-by":"crossref","first-page":"970","DOI":"10.1109\/TSE.2002.1041053","volume":"28","author":"G Antoniol","year":"2002","unstructured":"Antoniol, G., et al.: Recovering traceability links between code and documentation. IEEE Trans. Softw. Eng. (TSE) 28(10), 970\u2013983 (2002)","journal-title":"IEEE Trans. Softw. Eng. (TSE)"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Gethers, M., et al.: On integrating orthogonal information retrieval methods to improve traceability recovery. In: 27th IEEE International Conference on Software Maintenance (ICSM 2011) (2011)","DOI":"10.1109\/ICSM.2011.6080780"},{"key":"11_CR19","unstructured":"Challenge, T.: Proceedings of the 6th International Workshop on Traceability in Emerging Forms of Software Engineering. ACM, Waikiki (2011)"},{"issue":"1","key":"11_CR20","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MS.2005.1","volume":"22","author":"J Nattoch Dag","year":"2005","unstructured":"Nattoch Dag, J., et al.: A linguistic-engineering approach to large-scale requirements management. IEEE Softw. 22(1), 32\u201339 (2005)","journal-title":"IEEE Softw."},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Jun, L., et al.: Poirot: a distributed tool supporting enterprise-wide automated traceability. In: 14th IEEE International Conference Requirements Engineering (RE 2006) (2006)","DOI":"10.1109\/RE.2006.48"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Lormans, M., van Deursen, A.: Can LSI help reconstructing requirements traceability in design and test? In: Proceedings of the 10th European Conference on Software Maintenance and Reengineering (CSMR 2006) (2006)","DOI":"10.1109\/CSMR.2006.13"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Marcus, A., Xie, X., Poshyvanyk, D.: When and how to visualize traceability links? In: Proceedings of the 3rd International Workshop on Traceability in Emerging Forms of Software Engineering, pp. 56\u201361. ACM, Long Beach (2005)","DOI":"10.1145\/1107656.1107669"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"De Lucia, A., et al.: ADAMS re-trace: a traceability recovery tool. In: 9th European Conference on Software Maintenance and Reengineering (CSMR 2005) (2005)","DOI":"10.1109\/CSMR.2005.7"},{"issue":"3","key":"11_CR25","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1049\/iet-sen:20070062","volume":"2","author":"Y Zhang","year":"2008","unstructured":"Zhang, Y., et al.: Ontological approach for the semantic recovery of traceability links between software artefacts. IET Softw. 2(3), 185\u2013203 (2008)","journal-title":"IET Softw."},{"issue":"2","key":"11_CR26","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1016\/S0164-1212(03)00242-5","volume":"72","author":"G Spanoudakis","year":"2004","unstructured":"Spanoudakis, G., et al.: Rule-based generation of requirements traceability relations. J. Syst. Softw. (JSS) 72(2), 105\u2013127 (2004)","journal-title":"J. Syst. Softw. (JSS)"},{"key":"11_CR27","volume-title":"The Software Factory","author":"MW Evans","year":"1989","unstructured":"Evans, M.W.: The Software Factory. Wiley, New York (1989)"},{"key":"11_CR28","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1007\/978-3-642-37422-7_12","volume-title":"Requirements Engineering: Foundation for Software Quality","author":"E Bouillon","year":"2013","unstructured":"Bouillon, E., M\u00e4der, P., Philippow, I.: A survey on usage scenarios for requirements traceability in practice. In: Doerr, J., Opdahl, A. (eds.) Requirements Engineering: Foundation for Software Quality, pp. 158\u2013173. Springer, Heidelberg (2013)"},{"key":"11_CR29","unstructured":"Jackson, J.: A keyphrase based traceability scheme. In: IEEE Colloquium on Tools and Techniques for Maintaining Traceability During Design (1991)"},{"key":"11_CR30","doi-asserted-by":"crossref","unstructured":"Gotel, O.C.Z., Finkelstein, A.C.W.: An analysis of the requirements traceability problem. In: Proceedings of the First International Conference on Requirements Engineering (RE 1994) (1994)","DOI":"10.1109\/ICRE.1994.292398"},{"issue":"6","key":"11_CR31","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9","volume":"41","author":"S Deerwester","year":"1990","unstructured":"Deerwester, S., et al.: Indexing by latent semantic analysis. J. Am. Soc. Inf. Sci. 41(6), 391\u2013407 (1990)","journal-title":"J. Am. Soc. Inf. Sci."},{"key":"11_CR32","doi-asserted-by":"crossref","unstructured":"Grechanik, M., McKinley, K.S., Perry, D.E.: Recovering and using use-case-diagram-to-source-code traceability links. In: Proceedings of the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, pp. 95\u2013104. ACM, Dubrovnik (2007)","DOI":"10.1145\/1287624.1287640"},{"key":"11_CR33","doi-asserted-by":"crossref","unstructured":"Asuncion, H.U., Asuncion, A.U., Taylor, R.N.: Software traceability with topic modeling. In: ACM\/IEEE 32nd International Conference on Software Engineering (ICSE 2010) (2010)","DOI":"10.1145\/1806799.1806817"},{"key":"11_CR34","doi-asserted-by":"crossref","unstructured":"Xiaofan, C., Grundy, J.: Improving automated documentation to code traceability by combining retrieval techniques. In: 26th IEEE\/ACM International Conference on Automated Software Engineering (ASE 2011) (2011)","DOI":"10.1109\/ASE.2011.6100057"},{"key":"11_CR35","doi-asserted-by":"crossref","unstructured":"Armstrong, B.T.: Can clustering improve requirements traceability? A tracelab-enabled study. Computer Science, Faculty of California Polytechnic State University San Luis Obispo (2013)","DOI":"10.15368\/theses.2013.231"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-56994-9_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,15]],"date-time":"2020-10-15T20:29:45Z","timestamp":1602793785000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-56994-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,20]]},"ISBN":["9783319569932","9783319569949"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-56994-9_11","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2017,8,20]]}}}