{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T03:09:34Z","timestamp":1775012974492,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2009,3,6]],"date-time":"2009-03-06T00:00:00Z","timestamp":1236297600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Requirements Eng"],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1007\/s00766-009-0079-7","type":"journal-article","created":{"date-parts":[[2009,3,5]],"date-time":"2009-03-05T06:07:30Z","timestamp":1236233250000},"page":"73-89","source":"Crossref","is-referenced-by-count":66,"title":["Towards automated requirements prioritization and triage"],"prefix":"10.1007","volume":"14","author":[{"given":"Chuan","family":"Duan","sequence":"first","affiliation":[]},{"given":"Paula","family":"Laurent","sequence":"additional","affiliation":[]},{"given":"Jane","family":"Cleland-Huang","sequence":"additional","affiliation":[]},{"given":"Charles","family":"Kwiatkowski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,3,6]]},"reference":[{"issue":"3","key":"79_CR1","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MC.2003.1185216","volume":"36","author":"AM Davis","year":"2003","unstructured":"Davis AM (2003) The art of requirements triage. IEEE Comput 36(3):42\u201349","journal-title":"IEEE Comput"},{"issue":"9","key":"79_CR2","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MSPEC.2005.1502526","volume":"42","author":"H Goldstein","year":"2005","unstructured":"Goldstein H (2005) Who killed the virtual case file? IEEE Spectr 42(9):24\u201335","journal-title":"IEEE Spectr"},{"key":"79_CR3","unstructured":"Standish Group (1995) CHAOS report"},{"key":"79_CR4","doi-asserted-by":"crossref","unstructured":"Laurent P, Cleland-Huang J, Duan C (2007) Towards automated requirements triage. In: IEEE conference on requirements engineering, New Delhi","DOI":"10.1109\/RE.2007.63"},{"key":"79_CR5","unstructured":"Brackett JW (1990) Software engineering. In: Proceedings of software engineering institute, 19(1.2). Carnegie Mellon University, Pittsburgh"},{"key":"79_CR6","unstructured":"Karlsson J (1995) Towards a strategy for software requirements selection. Licentiate Thesis 513, Department of Computer and Information Science, Linkoping University"},{"key":"79_CR7","volume-title":"Extreme programming explained: embrace change","author":"K Beck","year":"2000","unstructured":"Beck K (2000) Extreme programming explained: embrace change. Addison-Wesley, Reading"},{"key":"79_CR8","volume-title":"Software requirements","author":"KE Wiegers","year":"1999","unstructured":"Wiegers KE (1999) Software requirements. Microsoft Press, Redmond"},{"key":"79_CR9","volume-title":"Managing software requirements: a use case approach","author":"D Leffingwell","year":"2003","unstructured":"Leffingwell D, Widrig D (2003) Managing software requirements: a use case approach, 2nd edn. Addison-Wesley, Boston","edition":"2"},{"key":"79_CR10","volume-title":"Requirements prioritization introduction","author":"NR Mead","year":"2006","unstructured":"Mead NR (2006) Requirements prioritization introduction. Software Engineering Institute Web Publication, Carnegie Mellon University, Pittsburgh"},{"issue":"5","key":"79_CR11","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1109\/52.605933","volume":"14","author":"J Karlsson","year":"1997","unstructured":"Karlsson J, Ryan K (1997) A cost-value approach for prioritizing requirements. IEEE Softw 14(5):67\u201375","journal-title":"IEEE Softw"},{"issue":"7","key":"79_CR12","doi-asserted-by":"crossref","first-page":"902","DOI":"10.1109\/32.29489","volume":"15","author":"BW Boehm","year":"1989","unstructured":"Boehm BW, Ross R (1989) Theory-W software project management: principles and examples. IEEE Trans Softw Eng 15(7):902\u2013916","journal-title":"IEEE Trans Softw Eng"},{"key":"79_CR13","doi-asserted-by":"crossref","unstructured":"Moisiadis F (2000) Prioritising scenario evolution. In: 4th international conference on requirements engineering, Schaumburg, pp 85\u201394","DOI":"10.1109\/ICRE.2000.855595"},{"key":"79_CR14","doi-asserted-by":"crossref","unstructured":"Azar J, Smith RK, Cordes D (2007) Value-oriented requirements prioritization in a small development organization. IEEE Softw 32\u201373","DOI":"10.1109\/MS.2007.30"},{"key":"79_CR15","doi-asserted-by":"crossref","unstructured":"Cleland-Huang J, Settimi R, Duan C, Zou X (2005) Utilizing supporting evidence to improve dynamic requirements traceability. In: International requirements engineering conference, Paris, France, pp 135\u2013144","DOI":"10.1109\/RE.2005.78"},{"key":"79_CR16","unstructured":"Cleland-Huang J, Settimi R, BenKhadra O, Berezhanskaya E, Christina S (2005) Goal-centric traceability for managing non-functional requirements. In: International. conference on software engineering, pp 362\u2013371"},{"key":"79_CR17","volume-title":"Mastering the requirements process","author":"S Robertson","year":"1999","unstructured":"Robertson S, Robertson J (1999) Mastering the requirements process. Addison-Wesley, Reading"},{"key":"79_CR18","volume-title":"Information retrieval systems\u2014theory and implementation","author":"G Kowalski","year":"1997","unstructured":"Kowalski G (1997) Information retrieval systems\u2014theory and implementation. Kluwer, Dordrecht"},{"key":"79_CR19","doi-asserted-by":"crossref","unstructured":"Cutting DR, Karger DR, Pedersen JO, Tukey JW (1992) Scatter\/gather: a cluster-based approach to browsing large document collections. In: Conference on research and development in information retrieval, Copenhagen, Denmark, June 21\u201324, pp 318\u2013329","DOI":"10.1145\/133160.133214"},{"key":"79_CR20","unstructured":"Ertz L, Steinbach M, Kumar V (2001) Finding topics in collections of documents: a shared nearest neighbor approach. In: Text mine \u201801, workshop on text mining, first SIAM intn\u2019l conf. on data mining, Chicago"},{"key":"79_CR21","unstructured":"Zamir O, Etzioni O, Madani O, Karp RM (1997) Fast and intuitive clustering of web documents. In: Proceedings of the third international conference on knowledge discovery and data mining, 14\u201317 August, pp 287\u2013290"},{"issue":"1\/2","key":"79_CR22","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1023\/A:1007612920971","volume":"42","author":"IS Dhillon","year":"2001","unstructured":"Dhillon IS, Modha DS (2001) Concept decompositions for large sparse text data using clustering. Mach Learn 42(1\/2):143\u2013175","journal-title":"Mach Learn"},{"key":"79_CR23","unstructured":"Steinbach M, Karypis G, Kumar V (2000) A comparison of document clustering techniques. KDD workshop on text mining"},{"key":"79_CR24","doi-asserted-by":"crossref","unstructured":"Hsia P, Hsu CT, Kung DC, Holder LB (1996) User-centered system decomposition: Z-based requirements clustering. In: Proceedings of the 2nd international conference on requirements engineering, Colorado Springs, p 126","DOI":"10.1109\/ICRE.1996.491437"},{"key":"79_CR25","doi-asserted-by":"crossref","unstructured":"Yaung AT (1992) Design and implementation of a requirements clustering analyzer for software system decomposition. In: ACM\/SIGAPP symposium on applied computing: technological challenges of the 1990\u2019s, Kansas City, pp 1048\u20131054","DOI":"10.1145\/130069.130129"},{"key":"79_CR26","doi-asserted-by":"crossref","unstructured":"Al-Otaiby TN, AlSherif M, Bond WP (2005) Toward software requirements modularization using hierarchical clustering techniques. In: Proceedings of the 43rd annual southeast regional conference, vol 2, Kennesaw, GA, pp 223\u2013228","DOI":"10.1145\/1167253.1167305"},{"key":"79_CR27","doi-asserted-by":"crossref","unstructured":"Chen K, Zhang W, Zhao H, Mei H (2005) An approach to constructing feature models based on requirements clustering. In: International conference on requirements engineering, Paris, France, pp 31\u201340","DOI":"10.1109\/RE.2005.9"},{"issue":"4","key":"79_CR28","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1023\/A:1008617922496","volume":"4","author":"L Goldin","year":"1997","unstructured":"Goldin L, Berry DM (1997) AbstFinder, a prototype natural language text abstraction finder for use in requirements elicitation. Autom Softw Eng 4(4):375\u2013412","journal-title":"Autom Softw Eng"},{"key":"79_CR29","volume-title":"Algorithms for clustering data","author":"AK Jain","year":"1988","unstructured":"Jain AK, Dubes RC (1988) Algorithms for clustering data. Prentice Hall, Englewood Cliffs"},{"issue":"3","key":"79_CR30","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1109\/2.910904","volume":"34","author":"B Nuseibeh","year":"2001","unstructured":"Nuseibeh B (2001) Weaving together requirements and archi-tecture. IEEE Comput 34(3):115\u2013117","journal-title":"IEEE Comput"},{"key":"79_CR31","doi-asserted-by":"crossref","unstructured":"Cleland-Huang J, Settimi R, Zou X, Solc P (2006) The detection and classification of non-functional requirements with application to early aspects. In: IEEE conference on requirements eng., Minneapolis, MN, pp 39\u201348","DOI":"10.1109\/RE.2006.65"},{"key":"79_CR32","unstructured":"SugarCRM, Product Information. Available at http:\/\/www.sugarcrm.com\/crm\/"},{"key":"79_CR33","doi-asserted-by":"crossref","unstructured":"Cleland-Huang J, Habrat R (2007) Visual support in automated tracing. In: International workshop on requirements engineering visualization, New Delhi, India, October","DOI":"10.1109\/REV.2007.7"},{"issue":"4","key":"79_CR34","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1145\/99935.99938","volume":"15","author":"F Can","year":"1990","unstructured":"Can F, Ozkarahan EA (1990) Concepts and effectiveness of the cover-coefficient-based clustering methodology for text databases. ACM Trans Database Syst 15(4):483\u2013517","journal-title":"ACM Trans Database Syst"},{"key":"79_CR35","doi-asserted-by":"crossref","unstructured":"Duan C, Cleland-Huang J (2007) Clustering support for automated tracing. In: IEEE international conference on automated software engineering, Atlanta, Georgia, November, pp 244\u2013253","DOI":"10.1145\/1321631.1321668"},{"key":"79_CR36","unstructured":"Duan C (2008) Clustering and its application in requirements engineering. Technical report #08-001. School of Computing, DePaul University"},{"issue":"6","key":"79_CR37","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/MC.2007.195","volume":"40","author":"J Cleland-Huang","year":"2007","unstructured":"Cleland-Huang J, Berenbach B, Clark S, Settimi R, Romanova E (2007) Best practices for automated traceability. IEEE Comput 40(6):27\u201335","journal-title":"IEEE Comput"},{"key":"79_CR38","doi-asserted-by":"crossref","unstructured":"Denne M, Cleland-Huang J (2004) The incremental funding method, a data driven approach to software development. IEEE Softw 39\u201347","DOI":"10.1109\/MS.2004.1293071"},{"key":"79_CR39","volume-title":"Algorithms for clustering data","author":"AK Jain","year":"1988","unstructured":"Jain AK, Dubes RC (1988) Algorithms for clustering data. Prentice-Hall, Englewood Cliffs"},{"key":"79_CR40","doi-asserted-by":"crossref","unstructured":"Duan C, Cleland-Huang J, Mobasher B (2008) A consensus based approach to constrained clustering of software requirements. In: Accepted at ACM 17th conference on information and knowledge management, California, October","DOI":"10.1145\/1458082.1458225"}],"container-title":["Requirements Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-009-0079-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00766-009-0079-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-009-0079-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T05:59:27Z","timestamp":1559109567000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00766-009-0079-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3,6]]},"references-count":40,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2009,6]]}},"alternative-id":["79"],"URL":"https:\/\/doi.org\/10.1007\/s00766-009-0079-7","relation":{},"ISSN":["0947-3602","1432-010X"],"issn-type":[{"value":"0947-3602","type":"print"},{"value":"1432-010X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,3,6]]}}}