{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:43:44Z","timestamp":1740141824838,"version":"3.37.3"},"reference-count":95,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,8,23]],"date-time":"2021-08-23T00:00:00Z","timestamp":1629676800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,8,23]],"date-time":"2021-08-23T00:00:00Z","timestamp":1629676800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100003359","name":"Generalitat Valenciana","doi-asserted-by":"publisher","award":["PROMETEO\/2018\/176","ACIF\/2018\/171"],"award-info":[{"award-number":["PROMETEO\/2018\/176","ACIF\/2018\/171"]}],"id":[{"id":"10.13039\/501100003359","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007136","name":"Secretar\u00eda de Estado de Investigaci\u00f3n, Desarrollo e Innovaci\u00f3n","doi-asserted-by":"publisher","award":["TIN2016-80811-P"],"award-info":[{"award-number":["TIN2016-80811-P"]}],"id":[{"id":"10.13039\/501100007136","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100014440","name":"Ministerio de Ciencia, Innovaci\u00f3n y Universidades","doi-asserted-by":"publisher","award":["RTI2018-096411-B-I00"],"award-info":[{"award-number":["RTI2018-096411-B-I00"]}],"id":[{"id":"10.13039\/100014440","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Softw Syst Model"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s10270-021-00920-y","type":"journal-article","created":{"date-parts":[[2021,8,23]],"date-time":"2021-08-23T15:06:03Z","timestamp":1629731163000},"page":"399-433","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Enhancing software model encoding for feature location approaches based on machine learning techniques"],"prefix":"10.1007","volume":"21","author":[{"given":"Ana C.","family":"Marc\u00e9n","sequence":"first","affiliation":[]},{"given":"Francisca","family":"P\u00e9rez","sequence":"additional","affiliation":[]},{"given":"\u00d3scar","family":"Pastor","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Cetina","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,23]]},"reference":[{"issue":"10","key":"920_CR1","doi-asserted-by":"crossref","first-page":"970","DOI":"10.1109\/TSE.2002.1041053","volume":"28","author":"G Antoniol","year":"2002","unstructured":"Antoniol, G., Canfora, G., Casazza, G., De Lucia, A., Merlo, E.: Recovering traceability links between code and documentation. IEEE Trans. Softw. Eng. 28(10), 970\u2013983 (2002)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"920_CR2","doi-asserted-by":"publisher","first-page":"3551","DOI":"10.1007\/s10270-019-00727-y","volume":"18","author":"L Arcega","year":"2019","unstructured":"Arcega, L., Font, J., Haugen, \u00d8., Cetina, C.: An approach for bug localization in models using two levels: model and metamodel. Softw. Syst. Model. 18, 3551\u20133576 (2019). https:\/\/doi.org\/10.1007\/s10270-019-00727-y","journal-title":"Softw. Syst. Model."},{"key":"920_CR3","doi-asserted-by":"crossref","unstructured":"Arcuri, A., Briand, L.: A Hitchhiker\u2019s guide to statistical tests for assessing randomized algorithms in software engineering. Softw. Test. Verifi. Reliab. 24(3), 219\u2013250 (2014)","DOI":"10.1002\/stvr.1486"},{"issue":"3","key":"920_CR4","doi-asserted-by":"crossref","first-page":"594","DOI":"10.1007\/s10664-013-9249-9","volume":"18","author":"A Arcuri","year":"2013","unstructured":"Arcuri, A., Fraser, G.: Parameter tuning or default values? An empirical investigation in search-based software engineering. Empir. Softw. Eng. 18(3), 594\u2013623 (2013)","journal-title":"Empir. Softw. Eng."},{"key":"920_CR5","doi-asserted-by":"crossref","unstructured":"B.\u00a0Le, T.D., Lo, D., Le\u00a0Goues, C., Grunske, L.: A learning-to-rank based fault localization approach using likely invariants. In: Proceedings of the 25th International Symposium on Software Testing and Analysis, pp. 177\u2013188. ACM, New York, USA (2016)","DOI":"10.1145\/2931037.2931049"},{"key":"920_CR6","doi-asserted-by":"crossref","unstructured":"Ballar\u00edn, M., Marc\u00e9n, A.C., Pelechano, V., Cetina, C.: Measures to report the location problem of model fragment location. In: Proceedings of the 21th ACM\/IEEE International Conference on Model Driven Engineering Languages and Systems, pp. 189\u2013199. ACM, New York, USA (2018)","DOI":"10.1145\/3239372.3239397"},{"key":"920_CR7","doi-asserted-by":"crossref","first-page":"106,430","DOI":"10.1016\/j.infsof.2020.106430","volume":"129","author":"M Ballar\u00edn","year":"2021","unstructured":"Ballar\u00edn, M., Marc\u00e9n, A.C., Pelechano, V., Cetina, C.: On the influence of model fragment properties on a machine learning-based approach for feature location. Inf. Softw. Technol. 129, 106,430 (2021)","journal-title":"Inf. Softw. Technol."},{"issue":"Feb","key":"920_CR8","first-page":"281","volume":"13","author":"J Bergstra","year":"2012","unstructured":"Bergstra, J., Bengio, Y.: Random search for hyper-parameter optimization. J. Mach. Learn. Res. 13(Feb), 281\u2013305 (2012)","journal-title":"J. Mach. Learn. Res."},{"issue":"1","key":"920_CR9","doi-asserted-by":"crossref","first-page":"53","DOI":"10.18201\/ijisae.2018637931","volume":"6","author":"P Beyranvand","year":"2018","unstructured":"Beyranvand, P., Kucuktezcan, C.F., Cataltepe, Z., Genc, V.M.I.: A novel feature selection method for the dynamic security assessment of power systems based on multi-layer perceptrons. Int. J. Intell. Syst. Appl. Eng. 6(1), 53\u201358 (2018)","journal-title":"Int. J. Intell. Syst. Appl. Eng."},{"key":"920_CR10","doi-asserted-by":"crossref","unstructured":"Bianchini, M., Maggini, M., Jain, L.C. (eds.): Handbook on Neural Information Processing, Intelligent Systems Reference Library, vol.\u00a049, 1st edn. Springer, Verlag (2013)","DOI":"10.1007\/978-3-642-36657-4"},{"issue":"Jan","key":"920_CR11","first-page":"993","volume":"3","author":"DM Blei","year":"2003","unstructured":"Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent dirichlet allocation. J. Mach. Learn. Res. 3(Jan), 993\u20131022 (2003)","journal-title":"J. Mach. Learn. Res."},{"issue":"1","key":"920_CR12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2200\/S00751ED2V01Y201701SWE004","volume":"3","author":"M Brambilla","year":"2017","unstructured":"Brambilla, M., Cabot, J., Wimmer, M.: Model-driven software engineering in practice. Synth. Lect. Softw. Eng. 3(1), 1\u2013207 (2017)","journal-title":"Synth. Lect. Softw. Eng."},{"key":"920_CR13","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1016\/j.neucom.2017.11.077","volume":"300","author":"J Cai","year":"2018","unstructured":"Cai, J., Luo, J., Wang, S., Yang, S.: Feature selection in machine learning: a new perspective. Neurocomputing 300, 70\u201379 (2018)","journal-title":"Neurocomputing"},{"issue":"3","key":"920_CR14","first-page":"453","volume":"4","author":"SD Canuto","year":"2013","unstructured":"Canuto, S.D., Bel\u00e9m, F.M., Almeida, J.M., Gon\u00e7alves, M.A.: A comparative study of learning-to-rank techniques for tag recommendation. J. Inf. Data Manag. 4(3), 453 (2013)","journal-title":"J. Inf. Data Manag."},{"issue":"3","key":"920_CR15","doi-asserted-by":"crossref","first-page":"501","DOI":"10.1007\/s10515-018-0231-z","volume":"25","author":"Z Cao","year":"2018","unstructured":"Cao, Z., Tian, Y., Le, T.D.B., Lo, D.: Rule-based specification mining leveraging Learning to Rank. Autom. Softw. Eng. 25(3), 501\u2013530 (2018)","journal-title":"Autom. Softw. Eng."},{"issue":"1","key":"920_CR16","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.compeleceng.2013.11.024","volume":"40","author":"G Chandrashekar","year":"2014","unstructured":"Chandrashekar, G., Sahin, F.: A survey on feature selection methods. Comput. Electr. Eng. 40(1), 16\u201328 (2014)","journal-title":"Comput. Electr. Eng."},{"key":"920_CR17","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1016\/j.infsof.2017.04.003","volume":"88","author":"M Chochlov","year":"2017","unstructured":"Chochlov, M., English, M., Buckley, J.: A historical, textual analysis approach to feature location. Inf. Softw. Technol. 88, 110\u2013126 (2017)","journal-title":"Inf. Softw. Technol."},{"key":"920_CR18","first-page":"250","volume-title":"Practical Nonparametric Statistics","author":"W Conover","year":"1999","unstructured":"Conover, W.: Practical Nonparametric Statistics, 3rd edn., pp. 250\u2013257. Wiley, New York (1999)","edition":"3"},{"key":"920_CR19","doi-asserted-by":"crossref","unstructured":"Corley, C.S., Damevski, K., Kraft, N.A.: Exploring the use of deep learning for feature location. In: 2015 IEEE International Conference on Software Maintenance and Evolution (ICSME), pp. 556\u2013560. IEEE Computer Society, Washington, USA (2015)","DOI":"10.1109\/ICSM.2015.7332513"},{"key":"920_CR20","doi-asserted-by":"crossref","unstructured":"Cruz, D., Figueiredo, E., Martinez, J.: A literature review and comparison of three feature location techniques using ArgoUML-SPL. In: Proceedings of the 13th International Workshop on Variability Modelling of Software-Intensive Systems, p.\u00a016. ACM (2019)","DOI":"10.1145\/3302333.3302343"},{"key":"920_CR21","unstructured":"Dang, V.: The Lemur Project - Wiki - RankLib. http:\/\/sourceforge.net\/p\/lemur\/wiki\/RankLib\/ (2013). Accessed April 2017"},{"key":"920_CR22","unstructured":"De\u00a0Lucia, A., Fasano, F., Oliveto, R., Tortora, G.: Enhancing an artefact management system with traceability recovery features. In: Proceedings of the 20th IEEE International Conference on Software Maintenance, pp. 306\u2013315. IEEE (2004)"},{"key":"920_CR23","unstructured":"De\u00a0Lucia, A., Fasano, F., Oliveto, R., Tortora, G.: Can information retrieval techniques effectively support traceability link recovery? In: 14th IEEE International Conference on Program Comprehension, pp. 307\u2013316. IEEE (2006)"},{"issue":"6","key":"920_CR24","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9","volume":"41","author":"S Deerwester","year":"1990","unstructured":"Deerwester, S., Dumais, S.T., Furnas, G.W., Landauer, T.K., Harshman, R.: Indexing by latent semantic analysis. J. Am. Soc. Inf. Sci. 41(6), 391\u2013407 (1990)","journal-title":"J. Am. Soc. Inf. Sci."},{"issue":"1","key":"920_CR25","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1002\/smr.567","volume":"25","author":"B Dit","year":"2013","unstructured":"Dit, B., Revelle, M., Gethers, M., Poshyvanyk, D.: Feature location in source code: a taxonomy and survey. J. Softw. Evol. Process 25(1), 53\u201395 (2013)","journal-title":"J. Softw. Evol. Process"},{"key":"920_CR26","unstructured":"DL4J: Deeplearning4j Suite Overview. https:\/\/deeplearning4j.konduit.ai\/. Accessed 29 July 2021"},{"key":"920_CR27","doi-asserted-by":"crossref","DOI":"10.1002\/9780470512517","volume-title":"Computational Intelligence: An Introduction","author":"AP Engelbrecht","year":"2007","unstructured":"Engelbrecht, A.P.: Computational Intelligence: An Introduction, 2nd edn. Wiley Publishing, Chichester (2007)","edition":"2"},{"key":"920_CR28","doi-asserted-by":"crossref","unstructured":"Font, J., Arcega, L., Haugen, \u00d8., Cetina, C.: Feature location in model-based software product lines through a genetic algorithm. In: Proceedings of the 15th International Conference on Software Reuse: Bridging with Social-Awareness, pp. 39\u201354. Springer Verlag, Berlin (2016)","DOI":"10.1007\/978-3-319-35122-3_3"},{"key":"920_CR29","doi-asserted-by":"crossref","unstructured":"Font, J., Arcega, L., Haugen, \u00d8., Cetina, C.: Feature location in models through a genetic algorithm driven by information retrieval techniques. In: Proceedings of the ACM\/IEEE 19th International Conference on Model Driven Engineering Languages and Systems, pp. 272\u2013282 (2016)","DOI":"10.1145\/2976767.2976789"},{"key":"920_CR30","unstructured":"Frakes, W.B., Baeza-Yates, R.A. (eds.).: Information Retrieval: Data Structures and Algorithms, Prentice-Hall (1992)"},{"issue":"Nov","key":"920_CR31","first-page":"933","volume":"4","author":"Y Freund","year":"2003","unstructured":"Freund, Y., Iyer, R., Schapire, R.E., Singer, Y.: An efficient boosting algorithm for combining preferences. J. Mach. Learn. Res. 4(Nov), 933\u2013969 (2003)","journal-title":"J. Mach. Learn. Res."},{"issue":"10","key":"920_CR32","doi-asserted-by":"crossref","first-page":"2044","DOI":"10.1016\/j.ins.2009.12.010","volume":"180","author":"S Garc\u00eda","year":"2010","unstructured":"Garc\u00eda, S., Fern\u00e1ndez, A., Luengo, J., Herrera, F.: Advanced nonparametric tests for multiple comparisons in the design of experiments in computational intelligence and data mining: experimental analysis of power. Inf. Sci. 180(10), 2044\u20132064 (2010)","journal-title":"Inf. Sci."},{"key":"920_CR33","unstructured":"Glorot, X., Bengio, Y.: Understanding the difficulty of training deep feedforward neural networks. In: Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, pp. 249\u2013256. JMLR.org (2010)"},{"key":"920_CR34","doi-asserted-by":"crossref","unstructured":"Gu, X., Zhang, H., Kim, S.: Deep code search. In: 2018 IEEE\/ACM 40th International Conference on Software Engineering (ICSE), pp. 933\u2013944. ACM, New York, USA (2018)","DOI":"10.1145\/3180155.3180167"},{"key":"920_CR35","doi-asserted-by":"crossref","unstructured":"Guo, J., Cheng, J., Cleland-Huang, J.: Semantically enhanced software traceability using deep learning techniques. In: 2017 IEEE\/ACM 39th International Conference on Software Engineering (ICSE), pp. 3\u201314. IEEE, IEEE Press Piscataway, New Jersey, USA (2017)","DOI":"10.1109\/ICSE.2017.9"},{"issue":"Mar","key":"920_CR36","first-page":"1157","volume":"3","author":"I Guyon","year":"2003","unstructured":"Guyon, I., Elisseeff, A.: An introduction to variable and feature selection. J. Mach. Learn. Res. 3(Mar), 1157\u20131182 (2003)","journal-title":"J. Mach. Learn. Res."},{"key":"920_CR37","doi-asserted-by":"crossref","unstructured":"Haiduc, S., Bavota, G., Oliveto, R., De\u00a0Lucia, A., Marcus, A.: Automatic query performance assessment during the retrieval of software artifacts. In: 2012 Proceedings of the 27th IEEE\/ACM International Conference on Automated Software Engineering, pp. 90\u201399. ACM, New York, USA (2012)","DOI":"10.1145\/2351676.2351690"},{"key":"920_CR38","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-84858-7","volume-title":"The Elements of Statistical Learning: Data Mining, Inference, and Prediction","author":"T Hastie","year":"2009","unstructured":"Hastie, T., Tibshirani, R., Friedman, J.: The Elements of Statistical Learning: Data Mining, Inference, and Prediction. Springer, Berlin (2009)"},{"key":"920_CR39","doi-asserted-by":"crossref","unstructured":"Haugen, \u00d8., M\u00f8ller-Pedersen, B., Oldevik, J., Olsen, G.K., Svendsen, A.: Adding standardized variability to domain specific languages. In: 2008 12th International Software Product Line Conference, pp. 139\u2013148. IEEE (2008)","DOI":"10.1109\/SPLC.2008.25"},{"key":"920_CR40","volume-title":"Neural Networks: a Comprehensive Foundation","author":"S Haykin","year":"1994","unstructured":"Haykin, S.: Neural Networks: a Comprehensive Foundation. Prentice Hall PTR, New Jersey (1994)"},{"key":"920_CR41","doi-asserted-by":"crossref","unstructured":"Ho-Quang, T., Chaudron, M.R., Sam\u00faelsson, I., Hjaltason, J., Karasneh, B., Osman, H.: Automatic classification of UML class diagrams from images. In: 2014 21st Asia-Pacific Software Engineering Conference, vol.\u00a01, pp. 399\u2013406. IEEE Computer Society, Washington, USA (2014)","DOI":"10.1109\/APSEC.2014.65"},{"key":"920_CR42","doi-asserted-by":"crossref","unstructured":"Holthusen, S., Wille, D., Legat, C., Beddig, S., Schaefer, I., Vogel-Heuser, B.: Family model mining for function block diagrams in automation software. In: 18th International Software Product Lines Conference, pp. 36\u201343. ACM, New York, USA (2014)","DOI":"10.1145\/2647908.2655965"},{"issue":"5","key":"920_CR43","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1016\/0893-6080(89)90020-8","volume":"2","author":"K Hornik","year":"1989","unstructured":"Hornik, K., Stinchcombe, M., White, H.: Multilayer feedforward networks are universal approximators. Neural Netw. 2(5), 359\u2013366 (1989)","journal-title":"Neural Netw."},{"key":"920_CR44","doi-asserted-by":"crossref","unstructured":"Kang, K.C., Cohen, S.G., Hess, J.A., Novak, W.E., Peterson, A.S.: Feature-Oriented Domain Analysis (FODA) Feasibility Study. Technical report, DTIC Document (1990)","DOI":"10.21236\/ADA235785"},{"key":"920_CR45","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1016\/j.jss.2017.06.023","volume":"136","author":"MF K\u0131ra\u00e7","year":"2018","unstructured":"K\u0131ra\u00e7, M.F., Aktemur, B., S\u00f6zer, H.: VISOR: a fast image processing pipeline with scaling and translation invariance for test oracle automation of visual output systems. J. Syst. Softw. 136, 266\u2013277 (2018)","journal-title":"J. Syst. Softw."},{"key":"920_CR46","unstructured":"Klambauer, G., Unterthiner, T., Mayr, A., Hochreiter, S.: Self-normalizing neural networks. In: Advances in Neural Information Processing Systems, pp. 971\u2013980. Curran Associates Inc., USA (2017)"},{"issue":"2\u20133","key":"920_CR47","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1080\/01638539809545028","volume":"25","author":"TK Landauer","year":"1998","unstructured":"Landauer, T.K., Foltz, P.W., Laham, D.: An introduction to latent semantic analysis. Discourse Process. 25(2\u20133), 259\u2013284 (1998)","journal-title":"Discourse Process."},{"issue":"12","key":"920_CR48","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1145\/3170492.3136052","volume":"52","author":"R Lape\u00f1a","year":"2017","unstructured":"Lape\u00f1a, R., Font, J., Pastor, \u00d3., Cetina, C.: Analyzing the impact of natural language processing over feature location in models. ACM SIGPLAN Not. 52(12), 63\u201376 (2017)","journal-title":"ACM SIGPLAN Not."},{"key":"920_CR49","doi-asserted-by":"crossref","unstructured":"Lape\u00f1a, R., P\u00e9rez, F., Cetina, C., Pastor, \u00d3.: Improving traceability links recovery in process models through an ontological expansion of requirements. In: International Conference on Advanced Information Systems Engineering, pp. 261\u2013275. Springer Verlag, Berlin (2019)","DOI":"10.1007\/978-3-030-21290-2_17"},{"key":"920_CR50","unstructured":"Lavesson, N., Davidsson, P.: Quantifying the impact of learning algorithm parameter tuning. In: Proceedings, The Twenty-First National Conference on Artificial Intelligence and the Eighteenth Innovative Applications of Artificial Intelligence Conference, July 16\u201320, 2006, Boston, Massachusetts, USA, vol.\u00a06, pp. 395\u2013400. AAAI Press, California, USA (2006)"},{"key":"920_CR51","doi-asserted-by":"crossref","unstructured":"Lee, K., Kang, K.C., Lee, J.: Concepts and guidelines of feature modeling for product line software engineering. In: International Conference on Software Reuse, pp. 62\u201377. Springer Verlag, Berlin (2002)","DOI":"10.1007\/3-540-46020-9_5"},{"key":"920_CR52","doi-asserted-by":"crossref","unstructured":"Leech, G., Garside, R., Bryant, M.: CLAWS4: the tagging of the British National Corpus. In: Proceedings of the 15th Conference on Computational Linguistics\u2014Volume 1, pp. 622\u2013628. Association for Computational Linguistics (1994)","DOI":"10.3115\/991886.991996"},{"key":"920_CR53","doi-asserted-by":"crossref","unstructured":"Li, C., Ji, L., Yan, J.: Acronym disambiguation using word embedding. In: Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, pp. 4178\u20134179 (2015)","DOI":"10.1609\/aaai.v29i1.9713"},{"key":"920_CR54","doi-asserted-by":"crossref","unstructured":"Liu, D., Marcus, A., Poshyvanyk, D., Rajlich, V.: Feature location via information retrieval based filtering of a single scenario execution trace. In: Proceedings of the Twenty-Second IEEE\/ACM International Conference on Automated Software Engineering, pp. 234\u2013243. ACM, New York, NY, USA (2007)","DOI":"10.1145\/1321631.1321667"},{"issue":"4","key":"920_CR55","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1145\/1276933.1276934","volume":"16","author":"AD Lucia","year":"2007","unstructured":"Lucia, A.D., Fasano, F., Oliveto, R., Tortora, G.: Recovering traceability links in software artifact management systems using information retrieval methods. ACM Trans. Softw. Eng. Methodol.: TOSEM 16(4), 13 (2007)","journal-title":"ACM Trans. Softw. Eng. Methodol.: TOSEM"},{"key":"920_CR56","unstructured":"Lucia, D., et\u00a0al.: Information retrieval models for recovering traceability links between code and documentation. In: Proceedings of the International Conference on Software Maintenance, pp. 40\u201349. IEEE (2000)"},{"key":"920_CR57","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511809071","volume-title":"Introduction to Information Retrieval","author":"CD Manning","year":"2008","unstructured":"Manning, C.D., Raghavan, P., Sch\u00fctze, H., et al.: Introduction to Information Retrieval, vol. 1. Cambridge University Press, Cambridge (2008)"},{"key":"920_CR58","doi-asserted-by":"crossref","unstructured":"Marc\u00e9n, A.C., Font, J., Pastor, O., Cetina, C.: Towards feature location in models through a Learning to Rank approach. In: Proceedings of the 21st International Systems and Software Product Line Conference, SPLC 2017, Volume B, Sevilla, Spain, September 25\u201329, 2017, pp. 57\u201364. AC, New York, USA (2017)","DOI":"10.1145\/3109729.3109734"},{"key":"920_CR59","doi-asserted-by":"crossref","first-page":"110519","DOI":"10.1016\/j.jss.2020.110519","volume":"163","author":"AC Marc\u00e9n","year":"2020","unstructured":"Marc\u00e9n, A.C., Lape\u00f1a, R., Pastor, \u00d3., Cetina, C.: Traceability link recovery between requirements and models using an evolutionary algorithm guided by a Learning to Rank algorithm: train control and management case. J. Syst. Softw. 163, 110519 (2020)","journal-title":"J. Syst. Softw."},{"key":"920_CR60","doi-asserted-by":"crossref","unstructured":"Marc\u00e9n, A.C., P\u00e9rez, F., Cetina, C.: Ontological evolutionary encoding to bridge machine learning and conceptual models: approach and industrial evaluation. In: International Conference on Conceptual Modeling, pp. 491\u2013505. Springer, New York, USA (2017)","DOI":"10.1007\/978-3-319-69904-2_37"},{"key":"920_CR61","doi-asserted-by":"crossref","unstructured":"Marcus, A., Maletic, J.I.: Recovering documentation-to-source-code traceability links using latent semantic indexing. In: Proceedings of the 25th International Conference on Software Engineering, pp. 125\u2013135. IEEE (2003)","DOI":"10.1109\/ICSE.2003.1201194"},{"key":"920_CR62","doi-asserted-by":"publisher","unstructured":"Marcus, A., Sergeyev, A., Rajlich, V., Maletic, J.: An information retrieval approach to concept location in source code. In: Proceedings of the 11th Working Conference on Reverse Engineering, pp. 214\u2013223 (2004). https:\/\/doi.org\/10.1109\/WCRE.2004.10","DOI":"10.1109\/WCRE.2004.10"},{"key":"920_CR63","doi-asserted-by":"crossref","unstructured":"Martinez, J., Ziadi, T., Bissyand\u00e9, T.F., Klein, J., Traon, Y.L.: Bottom-up adoption of software product lines: a generic and extensible approach. In: Proceedings of the 19th International Conference on Software Product Lines, pp. 101\u2013110. ACM, New York, USA (2015)","DOI":"10.1145\/2791060.2791086"},{"key":"920_CR64","doi-asserted-by":"crossref","unstructured":"Martinez, J., Ziadi, T., Klein, J., Le\u00a0Traon, Y.: Identifying and visualising commonality and variability in model variants. In: European Conference on Modelling Foundations and Applications, pp. 117\u2013131. Springer (2014)","DOI":"10.1007\/978-3-319-09195-2_8"},{"issue":"2","key":"920_CR65","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1016\/0005-2795(75)90109-9","volume":"405","author":"BW Matthews","year":"1975","unstructured":"Matthews, B.W.: Comparison of the predicted and observed secondary structure of t4 phage lysozyme. Biochim. Biophys. Acta (BBA) Protein Struct. 405(2), 442\u2013451 (1975)","journal-title":"Biochim. Biophys. Acta (BBA) Protein Struct."},{"issue":"1","key":"920_CR66","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s00766-007-0054-0","volume":"13","author":"F Meziane","year":"2008","unstructured":"Meziane, F., Athanasakis, N., Ananiadou, S.: Generating natural language specifications from UML class diagrams. Requir. Eng. 13(1), 1\u201318 (2008)","journal-title":"Requir. Eng."},{"key":"920_CR67","unstructured":"Moreira, C., Calado, P., Martins, B.: Learning to rank experts in academic digital libraries. In: 15th Portuguese Conference on Artificial Intelligence, EPIA, Lisbon, Portugal (2011)"},{"key":"920_CR68","doi-asserted-by":"crossref","unstructured":"Narawita, C.R., Vidanage, K.: UML generator-an automated system for model driven development. In: 2016 Sixteenth International Conference on Advances in ICT for Emerging Regions (ICTer), pp. 250\u2013256. IEEE Computer Society, Washington, USA (2016)","DOI":"10.1109\/ICTER.2016.7829928"},{"key":"920_CR69","doi-asserted-by":"crossref","unstructured":"Nie, F., Zhu, W., Li, X.: Unsupervised feature selection with structured graph optimization. In: Thirtieth AAAI Conference on Artificial Intelligence, pp. 1302\u20131308. AAAI Press, California, USA (2016)","DOI":"10.1609\/aaai.v30i1.10168"},{"key":"920_CR70","doi-asserted-by":"crossref","unstructured":"Oliveto, R., Gethers, M., Poshyvanyk, D., De\u00a0Lucia, A.: On the equivalence of information retrieval methods for automated traceability link recovery. In: 18th International Conference on Program Comprehension, pp. 68\u201371. IEEE (2010)","DOI":"10.1109\/ICPC.2010.20"},{"key":"920_CR71","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1016\/j.infsof.2018.06.017","volume":"103","author":"F P\u00e9rez","year":"2018","unstructured":"P\u00e9rez, F., Lape\u00f1a, R., Font, J., Cetina, C.: Fragment retrieval on models for model maintenance: applying a multi-objective perspective to an industrial case study. Inf. Softw. Technol. 103, 188\u2013201 (2018)","journal-title":"Inf. Softw. Technol."},{"issue":"6","key":"920_CR72","doi-asserted-by":"crossref","first-page":"420","DOI":"10.1109\/TSE.2007.1016","volume":"33","author":"D Poshyvanyk","year":"2007","unstructured":"Poshyvanyk, D., Gueheneuc, Y.G., Marcus, A., Antoniol, G., Rajlich, V.: Feature location using probabilistic ranking of methods based on execution scenarios and information retrieval. IEEE Trans. Softw. Eng. 33(6), 420\u2013432 (2007)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"6","key":"920_CR73","doi-asserted-by":"crossref","first-page":"1617","DOI":"10.2307\/1939920","volume":"74","author":"C Potvin","year":"1993","unstructured":"Potvin, C., Roff, D.A.: Distribution-free and robust statistical methods: viable alternatives to parametric statistics. Ecology 74(6), 1617\u20131628 (1993)","journal-title":"Ecology"},{"key":"920_CR74","unstructured":"Qin, T., Liu, T.Y.: Introducing LETOR 4.0 datasets. Computing Research Repository (CoRR) arXiv:1306.2597 (2013)"},{"issue":"4","key":"920_CR75","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1007\/s10791-009-9123-y","volume":"13","author":"T Qin","year":"2010","unstructured":"Qin, T., Liu, T.Y., Xu, J., Li, H.: LETOR: a benchmark collection for research on Learning to Rank for information retrieval. Inf. Retr. 13(4), 346\u2013374 (2010)","journal-title":"Inf. Retr."},{"key":"920_CR76","unstructured":"Qin, T., Tao\u00a0Qin, T.Y.L.: Microsoft Learning to Rank Datasets. https:\/\/www.microsoft.com\/en-us\/research\/project\/mslr\/ (2010). Accessed 23 Jun 2019"},{"key":"920_CR77","doi-asserted-by":"crossref","unstructured":"Rani, A.B., Kamal, A.N.B.: Text mining to concept mining: leads feature location in software system. In: 2018 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), pp. 1\u20137. IEEE (2018)","DOI":"10.1109\/ICCIC.2018.8782418"},{"key":"920_CR78","doi-asserted-by":"crossref","unstructured":"Refaeilzadeh, P., Tang, L., Liu, H.: Cross-validation. In: Liu, L., Tamer \u00d6zsu, M. (eds.) Encyclopedia of Database Systems, pp. 532\u2013538. Springer, Berlin (2009)","DOI":"10.1007\/978-0-387-39940-9_565"},{"key":"920_CR79","doi-asserted-by":"crossref","unstructured":"Rubin, J., Chechik, M.: A survey of feature location techniques. In: Reinhartz-Berger, I., Sturm, A., Clark, T., Cohen, S., Bettin, J. (eds.) Domain Engineering, pp. 29\u201358. Springer, Berlin (2013)","DOI":"10.1007\/978-3-642-36654-3_2"},{"key":"920_CR80","unstructured":"Salman, H.E., Seriai, A., Dony, C.: Feature location in a collection of product variants: combining information retrieval and hierarchical clustering. In: The 26th International Conference on Software Engineering and Knowledge Engineering, pp. 426\u2013430 (2014)"},{"key":"920_CR81","unstructured":"Salton, G., McGill, M.: Introduction to Modern Information Retrieval, McGraw-Hill Book Company (1986)"},{"issue":"1","key":"920_CR82","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.istr.2009.03.003","volume":"14","author":"A Shabtai","year":"2009","unstructured":"Shabtai, A., Moskovitch, R., Elovici, Y., Glezer, C.: Detection of malicious code by applying machine learning classifiers on static features: a state-of-the-art survey. Inf. Secur. Tech. Rep. 14(1), 16\u201329 (2009)","journal-title":"Inf. Secur. Tech. Rep."},{"issue":"3","key":"920_CR83","doi-asserted-by":"crossref","first-page":"356","DOI":"10.1109\/TSE.2010.90","volume":"37","author":"Q Song","year":"2011","unstructured":"Song, Q., Jia, Z., Shepperd, M., Ying, S., Liu, J.: A general software defect-proneness prediction framework. IEEE Trans. Softw. Eng. 37(3), 356\u2013370 (2011)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"2","key":"920_CR84","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1016\/S0164-1212(03)00242-5","volume":"72","author":"G Spanoudakis","year":"2004","unstructured":"Spanoudakis, G., Zisman, A., P\u00e9rez-Minana, E., Krause, P.: Rule-based generation of requirements traceability relations. J. Syst. Softw. 72(2), 105\u2013127 (2004)","journal-title":"J. Syst. Softw."},{"key":"920_CR85","unstructured":"Stikkolorum, D.R., Putten, P.V.D., Sperandio, C., Chaudron, M.: Towards automated grading of uml class diagrams with machine learning. In: BNAIC\/BENELEARN (2019)"},{"key":"920_CR86","unstructured":"Team, D., et\u00a0al.: Deeplearning4j: open-source distributed deep learning for the JVM. Apache Softw. Found. License 2 (2016)"},{"issue":"2","key":"920_CR87","first-page":"101","volume":"25","author":"A Vargha","year":"2000","unstructured":"Vargha, A., Delaney, H.D.: A critique and improvement of the CL common language effect size statistics of Mcgraw and Wong. J. Educ. Behav. Stat. 25(2), 101\u2013132 (2000)","journal-title":"J. Educ. Behav. Stat."},{"issue":"3","key":"920_CR88","doi-asserted-by":"crossref","first-page":"698","DOI":"10.1109\/TKDE.2013.32","volume":"26","author":"J Wang","year":"2014","unstructured":"Wang, J., Zhao, P., Hoi, S.C., Jin, R.: Online feature selection and its applications. IEEE Trans. Knowl. Data Eng. 26(3), 698\u2013710 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"920_CR89","doi-asserted-by":"crossref","unstructured":"Wille, D., Holthusen, S., Schulze, S., Schaefer, I.: Interface variability in family model mining. In: 17th International Software Product Line Conference, pp. 44\u201351. ACM, New York, USA (2013)","DOI":"10.1145\/2499777.2500708"},{"issue":"4","key":"920_CR90","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1007\/s10270-009-0145-0","volume":"9","author":"S Winkler","year":"2010","unstructured":"Winkler, S., Pilgrim, J.: A survey of traceability in requirements engineering and model-driven development. Softw. Syst. Model.: SoSyM 9(4), 529\u2013565 (2010)","journal-title":"Softw. Syst. Model.: SoSyM"},{"key":"920_CR91","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-29044-2","volume-title":"Experimentation in Software Engineering","author":"C Wohlin","year":"2012","unstructured":"Wohlin, C., Runeson, P., H\u00f6st, M., Ohlsson, M.C., Regnell, B., Wessl\u00e9n, A.: Experimentation in Software Engineering. Springer, Berlin (2012)"},{"key":"920_CR92","doi-asserted-by":"crossref","unstructured":"Zhang, X., Haugen, \u00d8., M\u00f8ller-Pedersen, B.: Model comparison to synthesize a model-driven software product line. In: Proceedings of the 15th International Conference on Software Product Lines, pp. 90\u201399. IEEE Computer Society, Washington, USA (2011)","DOI":"10.1109\/SPLC.2011.24"},{"key":"920_CR93","doi-asserted-by":"crossref","unstructured":"Zhang, X., Haugen, \u00d8., M\u00f8ller-Pedersen, B.: Augmenting product lines. In: 19th Asia-Pacific Software Engineering Conference, vol.\u00a01, pp. 766\u2013771. IEEE, New Jersey, USA (2012)","DOI":"10.1109\/APSEC.2012.76"},{"issue":"1","key":"920_CR94","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/s13042-015-0347-4","volume":"9","author":"L Zheng","year":"2018","unstructured":"Zheng, L., Wang, H., Gao, S.: Sentimental feature selection for sentiment analysis of chinese online reviews. Int. J. Mach. Learn. Cybern. 9(1), 75\u201384 (2018)","journal-title":"Int. J. Mach. Learn. Cybern."},{"key":"920_CR95","doi-asserted-by":"crossref","unstructured":"Zhou, Z.H., Feng, J.: Deep forest: towards an alternative to deep neural networks. In: Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, IJCAI 2017, Melbourne, Australia, August 19\u201325, 2017, vol.\u00a01, pp. 3553\u20133559. ijcai.org, Marina del Rey, California (2017)","DOI":"10.24963\/ijcai.2017\/497"}],"container-title":["Software and Systems Modeling"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10270-021-00920-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10270-021-00920-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10270-021-00920-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T03:19:19Z","timestamp":1725679159000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10270-021-00920-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,23]]},"references-count":95,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["920"],"URL":"https:\/\/doi.org\/10.1007\/s10270-021-00920-y","relation":{},"ISSN":["1619-1366","1619-1374"],"issn-type":[{"type":"print","value":"1619-1366"},{"type":"electronic","value":"1619-1374"}],"subject":[],"published":{"date-parts":[[2021,8,23]]},"assertion":[{"value":"18 February 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 May 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 July 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 August 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}