{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T02:48:23Z","timestamp":1768013303543,"version":"3.49.0"},"reference-count":92,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,12,23]],"date-time":"2013-12-23T00:00:00Z","timestamp":1387756800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Requirements Eng"],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1007\/s00766-013-0197-0","type":"journal-article","created":{"date-parts":[[2013,12,22]],"date-time":"2013-12-22T08:21:18Z","timestamp":1387700478000},"page":"309-329","source":"Crossref","is-referenced-by-count":31,"title":["Supporting requirements to code traceability through refactoring"],"prefix":"10.1007","volume":"19","author":[{"given":"Anas","family":"Mahmoud","sequence":"first","affiliation":[]},{"given":"Nan","family":"Niu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,12,23]]},"reference":[{"key":"197_CR1","unstructured":"Advani D, Hassoun Y, Counsell S (2005) Refactoring trends across N versions of N Java open source systems: an empirical study. SCSIS-Birkbeck, University of London Technical Report"},{"key":"197_CR2","doi-asserted-by":"crossref","unstructured":"Anquetil N, Fourrier C, Lethbridge T (1999) Experiments with clustering as a software remodularization method. In: Working conference on reverse engineering, pp 235\u2013255","DOI":"10.1109\/WCRE.1999.806964"},{"key":"197_CR3","unstructured":"Anquetil N, Lethbridge T (1998) Assessing the relevance of identifier names in a legacy software system. In: Conference of the centre for advanced studies on collaborative research, pp 4\u201314"},{"key":"197_CR4","doi-asserted-by":"crossref","first-page":"970","DOI":"10.1109\/TSE.2002.1041053","volume":"28","author":"G Antoniol","year":"2002","unstructured":"Antoniol G, Canfora G, Casazza G, De Lucia A, Merlo E (2002) Recovering traceability links between code and documentation. IEEE Trans Softw Eng 28:970\u2013983","journal-title":"IEEE Trans Softw Eng"},{"key":"197_CR5","doi-asserted-by":"crossref","unstructured":"Antoniol G, Di Penta M, Merlo E (2004) An automatic approach to identify class evolution discontinuities. In: International workshop on principles of software evolution, pp 31\u201340","DOI":"10.1109\/IWPSE.2004.1334766"},{"key":"197_CR6","doi-asserted-by":"crossref","unstructured":"Aslam J, Yilmaz E, Pavlu V (2005) A geometric interpretation of r-precision and its correlation with average precision. In: Annual international ACM SIGIR conference on research and development in information retrieval, pp 573\u2013574","DOI":"10.1145\/1076034.1076134"},{"key":"197_CR7","doi-asserted-by":"crossref","unstructured":"Asuncion H, Asuncion A, Taylor R (2010) Software traceability with topic modeling. In: International conference on software engineering, pp 95\u2013104","DOI":"10.1145\/1806799.1806817"},{"key":"197_CR8","unstructured":"Aversano L, Cerulo L, Di Penta M (2010) How clones are maintained: an empirical study. In: European conference on software maintenance and reengineering, pp 81\u201390"},{"key":"197_CR9","doi-asserted-by":"crossref","unstructured":"Baker B (1995) On finding duplication and near-duplication in large software systems. In: Working conference on reverse engineering, pp 86\u201395","DOI":"10.1109\/WCRE.1995.514697"},{"key":"197_CR10","doi-asserted-by":"crossref","unstructured":"Baxter I, Yahin A, Moura L, Sant\u2019Anna M, Bier L (1998) Clone detection using abstract syntax trees. In: ICSM, pp 368\u2013377","DOI":"10.1109\/ICSM.1998.738528"},{"key":"197_CR11","doi-asserted-by":"crossref","unstructured":"Ben Charrada E, Koziolek A, Glinz M (2012) Identifying outdated requirements based on source code changes. In: International requirements engineering conference, pp 61 \u201370","DOI":"10.1109\/RE.2012.6345840"},{"issue":"7","key":"197_CR12","doi-asserted-by":"crossref","first-page":"430","DOI":"10.1016\/j.scico.2009.02.006","volume":"74","author":"D Binkley","year":"2009","unstructured":"Binkley D, Lawrie D, Maex S, Morrell C (2009) Identifier length and limited programmer memory. Sci Comput Program 74(7):430\u2013445","journal-title":"Sci Comput Program"},{"key":"197_CR13","first-page":"993","volume":"3","author":"D Blei","year":"2003","unstructured":"Blei D, Ng A, Jordan MI (2003) Allocation. J Mach Learn Res 3:993\u20131022","journal-title":"J Mach Learn Res"},{"key":"197_CR14","doi-asserted-by":"crossref","unstructured":"Bourquin F, Keller R (2007) High-impact refactoring based on architecture violations. In: European conference on software maintenance and reengineering, pp 149\u2013158","DOI":"10.1109\/CSMR.2007.25"},{"key":"197_CR15","doi-asserted-by":"crossref","first-page":"804","DOI":"10.1109\/TSE.2005.114","volume":"31","author":"M Bruntink","year":"2005","unstructured":"Bruntink M, Van Deursen A, Van Engelen R, Tourw\u00e9 T (2005) On the use of clone detection for identifying crosscutting concern coden. IEEE Trans Softw Eng 31:804\u2013818","journal-title":"IEEE Trans Softw Eng"},{"key":"197_CR16","doi-asserted-by":"crossref","unstructured":"Caprile B, Tonella P (2000) Restructuring program identifier names. In: International conference on software maintenance, pp 97\u2013107","DOI":"10.1109\/ICSM.2000.883022"},{"issue":"9","key":"197_CR17","doi-asserted-by":"crossref","first-page":"796","DOI":"10.1109\/TSE.2003.1232285","volume":"29","author":"J Cleland-Huang","year":"2003","unstructured":"Cleland-Huang J, Chang C, Christensen M (2003) Event-based traceability for managing evolutionary change. IEEE Trans Softw Eng 29(9):796\u2013810","journal-title":"IEEE Trans Softw Eng"},{"key":"197_CR18","doi-asserted-by":"crossref","unstructured":"Cleland-Huang J, Heimdahl M, Huffman-Hayes J, Lutz R, M\u00e4der P (2012) Trace queries for safety requirements in high assurance systems. In: International conference on requirements engineering: foundation for software quality, pp 179\u2013193","DOI":"10.1007\/978-3-642-28714-5_16"},{"key":"197_CR19","doi-asserted-by":"crossref","unstructured":"Cleland-Huang J, Settimi R, Duan C, Zou X (2005) Utilizing supporting evidence to improve dynamic requirements traceability. In: International conference on requirements engineering, pp 135\u2013144","DOI":"10.1109\/RE.2005.78"},{"issue":"6","key":"197_CR20","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/MC.2007.195","volume":"40","author":"J Cleland-Huang","year":"2007","unstructured":"Cleland-Huang J, Settimi R, Romanova E (2007) Best practices for automated traceability. Computer 40(6):27\u201335","journal-title":"Computer"},{"key":"197_CR21","unstructured":"David K (2003) Selected papers on computer languages. In: CSLI lecture notes, vol 139. Center for the Study of Language and Information"},{"key":"197_CR22","doi-asserted-by":"crossref","unstructured":"De Lucia A, Di Penta M, Oliveto R, Panichella A, Panichelle S (2012) Using IR methods for labeling source code artifacts: Is it worthwhile? In: International conference on program comprehension, pp 193\u2013202","DOI":"10.1109\/ICPC.2012.6240488"},{"key":"197_CR23","doi-asserted-by":"crossref","unstructured":"De Lucia A, Oliveto R, Sgueglia P (2006) Incremental approach and user feedbacks: a silver bullet for traceability recovery. In: International conference on software maintenance, pp 299\u2013309","DOI":"10.1109\/ICSM.2006.32"},{"issue":"1","key":"197_CR24","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/s10664-008-9090-8","volume":"14","author":"A De Lucia","year":"2009","unstructured":"De Lucia A, Oliveto R, Tortora G (2009) Assessing IR-based traceability recovery tools through controlled experiments. Empir Softw Eng 14(1):57\u201392","journal-title":"Empir Softw Eng"},{"key":"197_CR25","doi-asserted-by":"crossref","DOI":"10.1007\/b97673","volume-title":"Design and analysis of experiments","author":"A Dean","year":"1999","unstructured":"Dean A, Voss D (1999) Design and analysis of experiments. Springer, New York"},{"issue":"6","key":"197_CR26","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9","volume":"41","author":"S Deerwester","year":"1990","unstructured":"Deerwester S, Dumais S, Furnas G, Landauer T, Harshman R (1990) Indexing by latent semantic analysis. J Am Soc Inf Sci 41(6):391\u2013407","journal-title":"J Am Soc Inf Sci"},{"key":"197_CR27","doi-asserted-by":"crossref","unstructured":"Deissenb\u00f6ck F, Pizka M (2005) Concise and consistent naming. In: International workshop on program comprehension, pp 97\u2013106","DOI":"10.1109\/WPC.2005.14"},{"key":"197_CR28","first-page":"1","volume":"7","author":"J Dem\u0161ar","year":"2006","unstructured":"Dem\u0161ar J (2006) Statistical comparisons of classifiers over multiple data sets. J Mach Learn Res 7:1\u201330","journal-title":"J Mach Learn Res"},{"key":"197_CR29","doi-asserted-by":"crossref","unstructured":"Dig D, Johnson R (2005) The role of refactorings in API evolution. In: International conference on software maintenance, pp 389\u2013398","DOI":"10.1109\/ICSM.2005.90"},{"issue":"1","key":"197_CR30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1767751.1767754","volume":"20","author":"E DualaEkoko","year":"2010","unstructured":"DualaEkoko E, Robillard M (2010) Clone region descriptors: representing and tracking duplication in source code. ACM Trans Softw Eng Methodol 20(1):1\u201331","journal-title":"ACM Trans Softw Eng Methodol"},{"issue":"2","key":"197_CR31","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1109\/TSE.2003.1178051","volume":"9","author":"A Egyed","year":"2003","unstructured":"Egyed A (2003) A scenario-driven approach to trace dependency analysis. IEEE Trans Softw Eng 9(2):116\u2013132","journal-title":"IEEE Trans Softw Eng"},{"issue":"1","key":"197_CR32","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/32.895984","volume":"27","author":"S Eick","year":"1998","unstructured":"Eick S, Graves T, Karr A, Marron J, Mockus A (1998) Does code decay? Assessing the evidence from change management data. IEEE Trans Softw Eng 27(1):1\u201312","journal-title":"IEEE Trans Softw Eng"},{"key":"197_CR33","doi-asserted-by":"crossref","unstructured":"Feilkas M, Ratiu D, Jurgens E (2009) The loss of architectural knowledge during system evolution: an industrial case study. In: International conference on program comprehension, pp 188\u2013197","DOI":"10.1109\/ICPC.2009.5090042"},{"issue":"10","key":"197_CR34","doi-asserted-by":"crossref","first-page":"2241","DOI":"10.1016\/j.jss.2012.04.013","volume":"85","author":"M Fokaefs","year":"2012","unstructured":"Fokaefs M, Tsantalis N, Stroulia E, Chatzigeorgiou A (2012) Identification and application of extract class refactorings in object-oriented systems. J Syst Softw 85(10):2241\u20132260","journal-title":"J Syst Softw"},{"issue":"2","key":"197_CR35","first-page":"1","volume":"11","author":"F Fontanaa","year":"2011","unstructured":"Fontanaa F, Braionea P, Zanonia M (2011) Automatic detection of bad smells in code: an experimental assessment. J Object Technol 11(2):1\u20138","journal-title":"J Object Technol"},{"key":"197_CR36","volume-title":"Refactoring: improving the design of existing code","author":"M Fowler","year":"1999","unstructured":"Fowler M (1999) Refactoring: improving the design of existing code. Addison\u2013Wesley, Reading"},{"key":"197_CR37","doi-asserted-by":"crossref","unstructured":"Furnas G, Deerwester S, Dumais S, Landauer T, Xarshman R, Streeter L, Lochbaum K (1988) Information retrieval using a singular value decomposition model of latent semantic structure. In: Annual international ACM SIGIR conference on research and development in information retrieval, pp 465\u2013480","DOI":"10.1145\/62437.62487"},{"key":"197_CR38","unstructured":"Gabrilovich E, Markovitch S (2007) Computing semantic relatedness using wikipedia-based explicit semantic analysis. In: international joint conference on artificial intelligence, pp 1606\u20131611"},{"key":"197_CR39","volume-title":"Design patterns: elements of reusable object-oriented software","author":"E Gamma","year":"1995","unstructured":"Gamma E, Helm R, Johnson R, Vlissides J (1995) Design patterns: elements of reusable object-oriented software. Addison-Wesley, Reading"},{"key":"197_CR40","doi-asserted-by":"crossref","unstructured":"Gibiec M, Czauderna A, Cleland-Huang J (2010) Towards mining replacement queries for hard-to-retrieve traces. In: International conference on automated software engineering, pp 245\u2013254","DOI":"10.1145\/1858996.1859046"},{"issue":"1\u20134","key":"197_CR41","first-page":"35","volume":"9","author":"A Giulio","year":"2000","unstructured":"Giulio A, Caprile B, PotrichA Tonella P (2000) Design-code traceability for object-oriented systems. Ann Softw Eng 9(1\u20134):35\u201358","journal-title":"Ann Softw Eng"},{"key":"197_CR42","doi-asserted-by":"crossref","unstructured":"Gotel O, Cleland-Huang J, Huffman-Hayes J, Zisman A, Egyed A, Gr\u00fcnbacher P, Antoniol G (2012) The quest for ubiquity: a roadmap for software and systems traceability research. In: international conference on requirements engineering, pp 71\u201380","DOI":"10.1109\/RE.2012.6345841"},{"key":"197_CR43","doi-asserted-by":"crossref","unstructured":"Gotel O, Morris S (2011) Out of the labyrinth: leveraging other disciplines for requirements traceability. In: IEEE international requirements engineering conference, pp 121\u2013130","DOI":"10.1109\/RE.2011.6051655"},{"key":"197_CR44","doi-asserted-by":"crossref","unstructured":"Guerrouj L (2013) Normalizing source code vocabulary to support program comprehension and software quality. In: International conference on software engineering, pp 1385\u20131388","DOI":"10.1109\/ICSE.2013.6606723"},{"key":"197_CR45","doi-asserted-by":"crossref","unstructured":"Haiduc S, Aponte J, Moreno L, Marcus A (2010) On the use of automated text summarization techniques for summarizing source code. In: Working conference on reverse engineering, pp 35\u201344","DOI":"10.1109\/WCRE.2010.13"},{"key":"197_CR46","doi-asserted-by":"crossref","unstructured":"Han E, Karypis G (2000) Centroid-based document classification: analysis and experimental results. In: European conference on principles of data mining and knowledge discovery, pp 424\u2013431","DOI":"10.1007\/3-540-45372-5_46"},{"key":"197_CR47","unstructured":"Huffman-Hayes J, Dekhtyar A, Osborne (2003) J Improving requirements tracing via information retrieval. In: International conference on requirements engineering, pp 138\u2013147"},{"issue":"1","key":"197_CR48","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/TSE.2006.3","volume":"32","author":"J Huffman-Hayes","year":"2006","unstructured":"Huffman-Hayes J, Dekhtyar A, Sundaram S (2006) Advancing candidate link generation for requirements tracing: the study of methods. IEEE Trans Softw Eng 32(1):4\u201319","journal-title":"IEEE Trans Softw Eng"},{"issue":"6","key":"197_CR49","doi-asserted-by":"crossref","first-page":"1449","DOI":"10.1016\/j.ipm.2007.03.009","volume":"43","author":"K Jones","year":"2007","unstructured":"Jones K (2007) Automatic summarising: the state of the art. Inf Process Manag 43(6):1449\u20131481","journal-title":"Inf Process Manag"},{"issue":"7","key":"197_CR50","doi-asserted-by":"crossref","first-page":"654","DOI":"10.1109\/TSE.2002.1019480","volume":"28","author":"T Kamiya","year":"2002","unstructured":"Kamiya T, Kusumoto S, Inoue K (2002) CCFinder: a multilinguistic token-based code clone detection system for large scale source code. IEEE Trans Softw Eng 28(7):654\u2013670","journal-title":"IEEE Trans Softw Eng"},{"key":"197_CR51","unstructured":"Kati\u0107 M, Fertalj K (2009) Towards an appropriate software refactoring tool support. In: WSEAS international conference on applied computer science, pp 140\u2013145"},{"key":"197_CR52","unstructured":"Kim M, Bergman L, Lau T, Notkin D (2004) An ethnographic study of copy and paste programming practices in OOPL. In: International symposium on empirical software engineering, pp 83\u201392"},{"issue":"2","key":"197_CR53","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1002\/smr.329","volume":"18","author":"R Kolb","year":"2006","unstructured":"Kolb R, Muthig D, Patzke T, Yamauchi K (2006) Refactoring a legacy component for reuse in a software product line: a case study: practice articles. J Softw Maint Evol 18(2):109\u2013132","journal-title":"J Softw Maint Evol"},{"key":"197_CR54","doi-asserted-by":"crossref","unstructured":"Koschke R, Falke R, Frenzel P (2006) Clone detection using abstract syntax suffix trees. In: Working conference on reverse engineering, pp 253\u2013262","DOI":"10.1109\/WCRE.2006.18"},{"issue":"4","key":"197_CR55","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1145\/232069.232092","volume":"21","author":"K Laitinen","year":"1996","unstructured":"Laitinen K (1996) Estimating understandability of software documents. SIGSOFT Softw Eng Notes 21(4):81\u201392","journal-title":"SIGSOFT Softw Eng Notes"},{"key":"197_CR56","doi-asserted-by":"crossref","unstructured":"Lawrie D, Binkley D, Morrell C (2010) Normalizing source code vocabulary. In: Working conference on reverse engineering, pp 3\u201312","DOI":"10.1109\/WCRE.2010.10"},{"key":"197_CR57","doi-asserted-by":"crossref","unstructured":"Lawrie D, Feild H, Binkley D (2007) Extracting meaning from abbreviated identifiers. In: International working conference on source code analysis and manipulation, pp 213\u2013222","DOI":"10.1109\/SCAM.2007.17"},{"issue":"3","key":"197_CR58","first-page":"213","volume":"1","author":"M Lehman","year":"1984","unstructured":"Lehman M (1984) On understanding laws, evolution, and conservation in the large-program life cycle. J Syst Softw 1(3):213\u2013221","journal-title":"J Syst Softw"},{"issue":"6","key":"197_CR59","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1109\/MS.2003.1241364","volume":"20","author":"T Lethbridge","year":"2003","unstructured":"Lethbridge T, Singer J, Forward A (2003) How software engineers use documentation: the state of the practice. IEEE Softw 20(6):35\u201339","journal-title":"IEEE Softw"},{"key":"197_CR60","doi-asserted-by":"crossref","unstructured":"Luo J, Meng B, Liu M, Tu X, Zhang K (2012) Query expansion using explicit semantic analysis. In: International conference on internet multimedia computing and service, pp 123\u2013126","DOI":"10.1145\/2382336.2382371"},{"key":"197_CR61","doi-asserted-by":"crossref","unstructured":"M\u00e4der P, Gotel O, Philippow I (2008) Rule-based maintenance of post-requirements traceability relations. In: International requirements engineering conference, pp 23\u201332","DOI":"10.1109\/RE.2008.24"},{"key":"197_CR62","doi-asserted-by":"crossref","unstructured":"Mahmoud A, Niu N (2011) Source code indexing for automated tracing. In: International workshop on traceability in emerging forms of software engineering, pp 3\u20139","DOI":"10.1145\/1987856.1987859"},{"key":"197_CR63","doi-asserted-by":"crossref","unstructured":"Mahmoud A, Niu N (2013) Supporting requirements traceability through refactoring. In: International requirements engineering conference, pp 32\u201341","DOI":"10.1109\/RE.2013.6636703"},{"key":"197_CR64","doi-asserted-by":"crossref","unstructured":"Mahmoud A, Niu N, Xu S (2012) A semantic relatedness approach for traceability link recovery. In: International conference on program comprehension, pp 183\u2013192","DOI":"10.1109\/ICPC.2012.6240487"},{"key":"197_CR65","doi-asserted-by":"crossref","unstructured":"Maletic J, Marcus A (2000) Using latent semantic analysis to identify similarities in source code to support program understanding. In: International conference on tools with artificial intelligence, pp 46\u201353","DOI":"10.1109\/TAI.2000.889845"},{"key":"197_CR66","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511809071","volume-title":"Introduction to information retrieval","author":"C Manning","year":"2008","unstructured":"Manning C, Raghavan P, Schtze H (2008) Introduction to information retrieval. Cambridge University Press, Cambridge"},{"key":"197_CR67","doi-asserted-by":"crossref","unstructured":"M\u00e4ntyl\u00e4 M, Lassenius C (2006) Drivers for software refactoring decisions. In: International symposium on empirical software engineering, pp 297\u2013306","DOI":"10.1145\/1159733.1159778"},{"key":"197_CR68","doi-asserted-by":"crossref","unstructured":"Mayrand J, Leblanc C, Merlo E (1996) Experiment on the automatic detection of function clones in a software system using metrics. In: International conference on software maintenance, pp 244\u2013253","DOI":"10.1109\/ICSM.1996.565012"},{"key":"197_CR69","doi-asserted-by":"crossref","unstructured":"Mealy E, Carrington D, Strooper P, Wyeth P (2007) Improving usability of software refactoring tools. In: Australian software engineering conference, pp 307\u2013318","DOI":"10.1109\/ASWEC.2007.24"},{"key":"197_CR70","volume-title":"iTrust electronic health care system: a case study, chap. software and systems traceability","author":"A Meneely","year":"2012","unstructured":"Meneely A, Smith B, Williams L (2012) iTrust electronic health care system: a case study, chap. software and systems traceability. Springer, New York"},{"issue":"2","key":"197_CR71","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1109\/TSE.2004.1265817","volume":"30","author":"T Mens","year":"2004","unstructured":"Mens T, Tourw\u00e9 T (2004) A survey of software refactoring. IEEE Trans Softw Eng 30(2):126\u2013139","journal-title":"IEEE Trans Softw Eng"},{"key":"197_CR72","doi-asserted-by":"crossref","unstructured":"Moser R, Sillitti A, Abrahamsson P, Succi G (2006) Does refactoring improve reusability? In: International conference on reuse of off-the-shelf components, pp 287\u2013297","DOI":"10.1007\/11763864_21"},{"issue":"4","key":"197_CR73","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/MS.2006.105","volume":"23","author":"G Murphy","year":"2006","unstructured":"Murphy G, Kersten M, Findlater L (2006) How are java software developers using the eclipse IDE. IEEE Softw 23(4):76\u201383","journal-title":"IEEE Softw"},{"key":"197_CR74","doi-asserted-by":"crossref","unstructured":"Murphy-Hill E, Black AP (2008) Breaking the barriers to successful refactoring: observations and tools for extract method. In: ICSE, pp 421\u2013430","DOI":"10.1145\/1368088.1368146"},{"key":"197_CR75","doi-asserted-by":"crossref","unstructured":"Murphy-Hill E, Parnin C, Black AP (2009) How we refactor and how we know it. In: International conference on software engineering, pp 287\u2013297","DOI":"10.1109\/ICSE.2009.5070529"},{"key":"197_CR76","doi-asserted-by":"crossref","unstructured":"Niu N, Mahmoud A (2012) Enhancing candidate link generation for requirements tracing: the cluster hypothesis revisited. In: IEEE International requirements engineering conference, pp 81\u201390","DOI":"10.1109\/RE.2012.6345842"},{"key":"197_CR77","doi-asserted-by":"crossref","unstructured":"Niu N, Mahmoud A, Chen Z, Bradshaw G (2013) Departures from optimality: understanding human analysts information foraging in assisted requirements tracing. In: International conference on software engineering, pp 572\u2013581","DOI":"10.1109\/ICSE.2013.6606603"},{"key":"197_CR78","unstructured":"Opdyke W (1992) Refactoring object-oriented frameworks. Doctoral thesis, Department of Computer Science, University of Illinois at Urbana-Champaign"},{"key":"197_CR79","unstructured":"Opdyke W, Johnson R (1990) Refactoring: an aid in designing application frameworks and evolving object-oriented systems. In: Symposium on object-oriented programming emphasizing practical applications"},{"key":"197_CR80","unstructured":"Porter M (1997) An algorithm for suffix stripping. In: Readings in information retrieval. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, pp 313\u2013316"},{"key":"197_CR81","unstructured":"Roy C, Cordy J (2007) A survey on software clone detection research. Technical report 541. School of Computing TR 2007-541, Queens University"},{"key":"197_CR82","doi-asserted-by":"crossref","unstructured":"Roy C, Cordy J (2008) An empirical study of function clones in open source software. In: Working conference on reverse engineering, pp 81\u201390","DOI":"10.1109\/WCRE.2008.54"},{"key":"197_CR83","first-page":"395","volume":"3","author":"G Spanoudakis","year":"2004","unstructured":"Spanoudakis G, Zisman A (2004) Software traceability: a roadmap. Handb Softw Eng Knowl Eng 3:395\u2013428","journal-title":"Handb Softw Eng Knowl Eng"},{"key":"197_CR84","doi-asserted-by":"crossref","unstructured":"Sridhara G, Hill E, Muppaneni D, Pollock L, Vijay-Shanker K (2010) Towards automatically generating summary comments for java methods. In: International conference on automated software engineering, pp 43\u201352","DOI":"10.1145\/1858996.1859006"},{"issue":"3","key":"197_CR85","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1007\/s00766-011-0121-4","volume":"16","author":"H Sultanov","year":"2011","unstructured":"Sultanov H, Huffman-Hayes J, Kong W (2011) Application of swarm techniques to requirements tracing. Requir Eng J 16(3):209\u2013226","journal-title":"Requir Eng J"},{"issue":"3","key":"197_CR86","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1007\/s00766-009-0096-6","volume":"15","author":"S Sundaram","year":"2010","unstructured":"Sundaram S, Huffman-Hayes J, Dekhtyar A, Holbrook E (2010) Assessing traceability of software engineering artifacts. Requir Eng J 15(3):313\u2013335","journal-title":"Requir Eng J"},{"issue":"3","key":"197_CR87","first-page":"143","volume":"4","author":"A Takang","year":"1996","unstructured":"Takang A, Grubb P, Macredie R (1996) The effects of comments and identifier names on program comprehensibility: an experimental investigation. J Program Lang 4(3):143\u2013167","journal-title":"J Program Lang"},{"key":"197_CR88","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1007\/978-1-4020-5817-2_6","volume-title":"Evaluation of text and speech systems","author":"S Teufel","year":"2007","unstructured":"Teufel S (2007) An overview of evaluation methods in TREC ad hoc information retrieval and TREC question answering. In: Dybkjaer L, Hemsen H, Minker W (eds) Evaluation of text and speech systems. Springer, Netherlands, pp 163\u2013186"},{"key":"197_CR89","doi-asserted-by":"crossref","unstructured":"Thies A, Roth C (2010) Recommending rename refactorings. In: International workshop on recommendation systems for software engineering, pp 1\u20135","DOI":"10.1145\/1808920.1808921"},{"key":"197_CR90","doi-asserted-by":"crossref","unstructured":"Tourw\u00e9 T, Mens T (2003) Identifying refactoring opportunities using logic meta programming. In: European conference on software maintenance and reengineering, pp 91\u2013100","DOI":"10.1109\/CSMR.2003.1192416"},{"issue":"3","key":"197_CR91","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1109\/TSE.2009.1","volume":"35","author":"N Tsantalis","year":"2009","unstructured":"Tsantalis N, Chatzigeorgiou A (2009) Identification of move method refactoring opportunities. IEEE Trans Softw Eng 35(3):347\u2013367","journal-title":"IEEE Trans Softw Eng"},{"issue":"1","key":"197_CR92","first-page":"44","volume":"1","author":"D Wilking","year":"2007","unstructured":"Wilking D, Kahn U, Kowalewski S (2007) An empirical evaluation of refactoring. e-Inf Softw Eng J 1(1):44\u201360","journal-title":"e-Inf Softw Eng J"}],"container-title":["Requirements Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-013-0197-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00766-013-0197-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-013-0197-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,5]],"date-time":"2019-08-05T07:57:08Z","timestamp":1564991828000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00766-013-0197-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,23]]},"references-count":92,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,9]]}},"alternative-id":["197"],"URL":"https:\/\/doi.org\/10.1007\/s00766-013-0197-0","relation":{},"ISSN":["0947-3602","1432-010X"],"issn-type":[{"value":"0947-3602","type":"print"},{"value":"1432-010X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,12,23]]}}}