{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T09:13:15Z","timestamp":1761988395733,"version":"3.38.0"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2011,6,11]],"date-time":"2011-06-11T00:00:00Z","timestamp":1307750400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Requirements Eng"],"published-print":{"date-parts":[[2011,9]]},"DOI":"10.1007\/s00766-011-0121-4","type":"journal-article","created":{"date-parts":[[2011,6,10]],"date-time":"2011-06-10T11:18:03Z","timestamp":1307704683000},"page":"209-226","source":"Crossref","is-referenced-by-count":28,"title":["Application of swarm techniques to requirements tracing"],"prefix":"10.1007","volume":"16","author":[{"given":"Hakim","family":"Sultanov","sequence":"first","affiliation":[]},{"given":"Jane Huffman","family":"Hayes","sequence":"additional","affiliation":[]},{"given":"Wei-Keat","family":"Kong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,6,11]]},"reference":[{"issue":"12","key":"121_CR1","doi-asserted-by":"crossref","first-page":"1226","DOI":"10.1109\/TC.1976.1674590","volume":"25","author":"B Boehm","year":"1976","unstructured":"Boehm B (1976) Software engineering. IEEE Trans Comput 25(12):1226\u20131241","journal-title":"IEEE Trans Comput"},{"issue":"3","key":"121_CR2","first-page":"21","volume":"19","author":"J Johnson","year":"2000","unstructured":"Johnson J (2000) Turning chaos into success. IEEE Softw Mag 19(3):21\u201327","journal-title":"IEEE Softw Mag"},{"key":"121_CR3","unstructured":"Top Software Engineering Issues within Department of Defense and Defense Industry (2006) National Defense Industrial Association"},{"key":"121_CR4","doi-asserted-by":"crossref","unstructured":"Tun TT, Jackson M, Laney R, Nuseibeh B, Yu Y (2009) Are your lights off? Using problem frames to diagnose system failures. In: Proceedings of the IEEE international conference on requirements engineering, vol 0, pp 343\u2013348","DOI":"10.1109\/RE.2009.31"},{"key":"121_CR5","unstructured":"Hayes J, Dekhtyar A, Sundaram S, Howard (2004) Helping analysts trace requirements: an objective look. In: Proceedings of the 12th IEEE international conference in requirements engineering, 2004, pp 249\u2013259"},{"key":"121_CR6","volume-title":"Fundamentals of computational swarm intelligence","author":"AP Engelbrecht","year":"2006","unstructured":"Engelbrecht AP (2006) Fundamentals of computational swarm intelligence. Wiley, USA"},{"key":"121_CR7","doi-asserted-by":"crossref","unstructured":"Antoniol G, Penta MD, Harman M (2005) Search-based techniques applied to optimization of project planning for a massive maintenance project. In: Proceedings of the 21st IEEE international conference on software maintenance, pp 240\u2013249","DOI":"10.1109\/ICSM.2005.79"},{"key":"121_CR8","unstructured":"Lam CP, Xiao J, Li H (2007) Ant colony optimisation for generation of conformance testing sequences using a characterising set. In: Proceedings of the third conference on IASTED international conference: advances in computer science and technology, pp 140\u2013146"},{"key":"121_CR9","doi-asserted-by":"crossref","unstructured":"Reitz M (2006) Software evolvability by component-orientation. In: Proceedings of the second international IEEE workshop on software evolvability, pp 66\u201373","DOI":"10.1109\/SOFTWARE-EVOLVABILITY.2006.13"},{"key":"121_CR10","doi-asserted-by":"crossref","unstructured":"Ayari K, Bouktif S, Antoniol G (2007) Automatic mutation test input data generation via ant colony. In: Proceedings of the 9th annual conference on genetic and evolutionary computation, pp 1074\u20131081","DOI":"10.1145\/1276958.1277172"},{"key":"121_CR11","doi-asserted-by":"crossref","unstructured":"Diaz-Aviles E, Nejdl W, Schmidt-Thieme L (2009) Swarming to rank for information retrieval. In: Proceedings of the 11th annual conference on genetic and evolutionary computation, pp 9\u201316","DOI":"10.1145\/1569901.1569904"},{"issue":"2","key":"121_CR12","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/s10664-009-9114-z","volume":"15","author":"X Zou","year":"2009","unstructured":"Zou X, Settimi R, Cleland-Huang J (2009) Improving automated requirements trace retrieval: a study of term-based enhancement methods. Empir Softw Eng 15(2):119\u2013146","journal-title":"Empir Softw Eng"},{"key":"121_CR13","doi-asserted-by":"crossref","first-page":"800","DOI":"10.1109\/32.83915","volume":"17","author":"Y Maarek","year":"1991","unstructured":"Maarek Y, Berry D, Kaiser G (1991) An information retrieval approach for automatically constructing software libraries. IEEE Trans Softw Eng 17:800\u2013813","journal-title":"IEEE Trans Softw Eng"},{"key":"121_CR14","doi-asserted-by":"crossref","unstructured":"Niu N, Easterbrook S (2008) Extracting and modeling product line functional requirements. In: Proceedings of the IEEE international conference on requirements engineering, vol 0, pp 155\u2013164","DOI":"10.1109\/RE.2008.49"},{"issue":"3","key":"121_CR15","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1007\/s00766-009-0096-6","volume":"15","author":"S Sundaram","year":"2010","unstructured":"Sundaram S, Hayes JH, Dekhtyar A, Holbrook A (2010) Assessing traceability of software engineering artifacts. Requir Eng J 15(3):211\u2013220","journal-title":"Requir Eng J"},{"key":"121_CR16","doi-asserted-by":"crossref","unstructured":"Sultanov H, Hayes JH (2010) Application of swarm techniques to requirements engineering: requirements tracing. In: Proceedings of the paper presented at the 18th international requirement engineering conference, Sydney, Australia","DOI":"10.1109\/RE.2010.33"},{"issue":"2","key":"121_CR17","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/BF01417909","volume":"3","author":"J-L Deneubourg","year":"1990","unstructured":"Deneubourg J-L, Aaron S, Goss S, Pasteels JM (1990) The self-organizing exploratory pattern of the argentine ant. J Insect Behav 3(2):159\u2013168","journal-title":"J Insect Behav"},{"key":"121_CR18","volume-title":"Fundamentals of computational swarm intelligence","author":"AP Engelbrecht","year":"2006","unstructured":"Engelbrecht AP (2006) Fundamentals of computational swarm intelligence. Wiley, USA"},{"key":"121_CR19","doi-asserted-by":"crossref","unstructured":"Gotel O, Finkelstein A (1997) Extended requirements traceability: results of an industrial case study, p 169","DOI":"10.1109\/ISRE.1997.566866"},{"key":"121_CR20","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511809071","volume-title":"Introduction to information retrieval, 1st edn","author":"CD Manning","year":"2008","unstructured":"Manning CD, Raghavan P, Sch\u00fctze H (2008) Introduction to information retrieval, 1st edn. Cambridge University Press, Cambridge"},{"issue":"6","key":"121_CR21","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/MC.2007.195","volume":"40","author":"J Cleland-Huang","year":"2007","unstructured":"Cleland-Huang J, Settimi R, Romanova E, Berenbach B, Clark S (2007) Best practices for automated traceability. Computer 40(6):27\u201335","journal-title":"Computer"},{"issue":"10","key":"121_CR22","doi-asserted-by":"crossref","first-page":"970","DOI":"10.1109\/TSE.2002.1041053","volume":"28","author":"G Antoniol","year":"2002","unstructured":"Antoniol G, Canfora G, Casazza GA, Lucia D, Merlo E (2002) Recovering traceability links between code and documentation. IEEE Trans Softw Eng 28(10):970\u2013983","journal-title":"IEEE Trans Softw Eng"},{"key":"121_CR23","doi-asserted-by":"crossref","unstructured":"Marcus A, Maletic JI (2003) Recovering documentation-to-source-code traceability links using latent semantic indexing. In: Proceedings of the 25th international conference on software engineering, pp 125\u2013135","DOI":"10.1109\/ICSE.2003.1201194"},{"key":"121_CR24","doi-asserted-by":"crossref","unstructured":"Hayes JH, Dekhtyar A, Osborne J (2003) Improving requirements tracing via information retrieval. In: Proceedings of the 11th IEEE international conference on requirements engineering, p 138","DOI":"10.1109\/ICRE.2003.1232745"},{"key":"121_CR25","doi-asserted-by":"crossref","unstructured":"Egyed A, Gr\u00fcnbacher P, Graf F (2010) Effort and quality of recovering requirements-to-code traces: two exploratory experiments. In: Proceedings of the 18th international IEEE requirements engineering conference","DOI":"10.1109\/RE.2010.34"},{"key":"121_CR26","doi-asserted-by":"crossref","unstructured":"Panis M (2010) Successful deployment of requirements traceability in a commercial engineering organization\u2026really. In: Proceedings of the 18th international IEEE requirements engineering conference","DOI":"10.1109\/RE.2010.43"},{"key":"121_CR27","doi-asserted-by":"crossref","unstructured":"Zou X, Settimi R, Cleland-Huang J (2006) Phrasing in dynamic requirements trace retrieva. In: Proceedings of the paper presented at the computer software and applications conference, 2006. COMPSAC \u201806. 30th annual international, pp 265\u2013272","DOI":"10.1109\/COMPSAC.2006.66"},{"issue":"2","key":"121_CR28","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1016\/S0164-1212(03)00242-5","volume":"72","author":"G Spanoudakis","year":"2004","unstructured":"Spanoudakis G, Zisman A, Perez-Minana E, Krause P (2004) Rule-based generation of requirements traceability relations. J Syst Softw 72(2):105\u2013127","journal-title":"J Syst Softw"},{"key":"121_CR29","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195131581.001.0001","volume-title":"Swarm intelligence: from natural to artificial systems, 1st edn","author":"E Bonabeau","year":"1999","unstructured":"Bonabeau E, Dorigo M, Theraulaz G (1999) Swarm intelligence: from natural to artificial systems, 1st edn. Oxford University Press, USA"},{"key":"121_CR30","doi-asserted-by":"crossref","unstructured":"van der Merwe D, Engelbrecht A (2003) Data clustering using particle swarm optimization. In: Proceedings of the 2003 congress on evolutionary computation. CEC \u201903, pp 215\u2013220","DOI":"10.1109\/CEC.2003.1299577"},{"key":"121_CR31","doi-asserted-by":"crossref","unstructured":"Cui X, Potok TE, Palathingal P (2005) Document clustering using particle swarm optimization. IEEE swarm intelligence symposium, The Westin","DOI":"10.1109\/SIS.2005.1501621"},{"issue":"3","key":"121_CR32","doi-asserted-by":"crossref","first-page":"6843","DOI":"10.1016\/j.eswa.2008.08.022","volume":"36","author":"MH Aghdam","year":"2009","unstructured":"Aghdam MH, Ghasem-Aghaee N, Basiri ME (2009) Text feature selection using ant colony optimization. Expert Syst Appl 36(3):6843\u20136853","journal-title":"Expert Syst Appl"},{"issue":"3","key":"121_CR33","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1108\/eb046814","volume":"14","author":"M Porter","year":"1980","unstructured":"Porter M (1980) An algorithm for suffix stripping. Program 14(3):130\u2013137","journal-title":"Program"},{"key":"121_CR34","unstructured":"Pine Email System. [Online]. Available: http:\/\/www.washington.edu\/pine\/ . Accessed 19 Feb 2010"},{"key":"121_CR35","unstructured":"NASA IV&V facility metrics data program: glossary and definitions. [Online] Available: http:\/\/mdp.ivv.nasa.gov\/mdp_glossary.html#CM1.%207 . Accessed 19 Feb 2010"},{"issue":"3","key":"121_CR36","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1007\/s11334-007-0024-1","volume":"3","author":"J Hayes","year":"2007","unstructured":"Hayes J, Dekhtyar A, Sundaram S, Holbrook E, Vadlamudi S, April A (2007) Requirements tracing on target: improving software maintenance through traceability recovery. Innov Syst Softw Eng 3(3):193\u2013202","journal-title":"Innov Syst Softw Eng"},{"key":"121_CR37","volume-title":"Journey to the ants: a story of scientific exploration","author":"B H\u00f6lldobler","year":"1998","unstructured":"H\u00f6lldobler B, Wilson EO (1998) Journey to the ants: a story of scientific exploration. Belknap Press of Harvard University Press, USA"}],"container-title":["Requirements Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-011-0121-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00766-011-0121-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-011-0121-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T02:38:23Z","timestamp":1741228703000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00766-011-0121-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6,11]]},"references-count":37,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2011,9]]}},"alternative-id":["121"],"URL":"https:\/\/doi.org\/10.1007\/s00766-011-0121-4","relation":{},"ISSN":["0947-3602","1432-010X"],"issn-type":[{"type":"print","value":"0947-3602"},{"type":"electronic","value":"1432-010X"}],"subject":[],"published":{"date-parts":[[2011,6,11]]}}}