{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T14:53:58Z","timestamp":1773500038581,"version":"3.50.1"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2014,7,3]],"date-time":"2014-07-03T00:00:00Z","timestamp":1404345600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2015,4]]},"DOI":"10.1007\/s10664-014-9315-y","type":"journal-article","created":{"date-parts":[[2014,7,2]],"date-time":"2014-07-02T09:34:50Z","timestamp":1404293690000},"page":"442-478","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":35,"title":["An empirical study on the importance of source code entities for requirements traceability"],"prefix":"10.1007","volume":"20","author":[{"given":"Nasir","family":"Ali","sequence":"first","affiliation":[]},{"given":"Zohreh","family":"Sharafi","sequence":"additional","affiliation":[]},{"given":"Yann-Ga\u00ebl","family":"Gu\u00e9h\u00e9neuc","sequence":"additional","affiliation":[]},{"given":"Giuliano","family":"Antoniol","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,7,3]]},"reference":[{"key":"9315_CR1","doi-asserted-by":"crossref","unstructured":"Abadi A, Nisenson M, Simionovici Y (2008) A traceability technique for specifications. In: Proceeding of 16th IEEE international conference on program comprehension, pp 103 \u2013112","DOI":"10.1109\/ICPC.2008.30"},{"key":"9315_CR2","doi-asserted-by":"crossref","unstructured":"Abebe SL, Tonella P (2011) Towards the extraction of domain concepts from the identifiers. In: Proceeding of 18th working conference on reverse engineering (WCRE), pp 77\u201386","DOI":"10.1109\/WCRE.2011.19"},{"key":"9315_CR3","volume-title":"Software and systems traceability, chapter 7","author":"N Ali","year":"2011","unstructured":"Ali N, Gu\u00e9h\u00e9neuc Y-G, Antoniol G (2011a) Factors impacting the inputs of traceability recovery approaches. In: Zisman A, Cleland-Huang J, Gotel O (eds) Software and systems traceability, chapter 7. Springer, New York"},{"key":"9315_CR4","doi-asserted-by":"crossref","unstructured":"Ali N, Gueheneuc Y-G, Antoniol G (2011b) Requirements traceability for object oriented systems by partitioning source code. In: Proceedings of 18th working conference on reverse engineering, WCRE \u201911. IEEE Computer Society, Washington, DC, pp pp 45\u201354","DOI":"10.1109\/WCRE.2011.16"},{"key":"9315_CR5","doi-asserted-by":"crossref","unstructured":"Ali N, Gu\u00e9h\u00e9neuc Y-G, Antoniol G (2011c) Trust-based requirements traceability. In: Proceeding of 19th IEEE international conference on program comprehension. IEEE Computer Society, Washington, DC,p 10","DOI":"10.1109\/ICPC.2011.42"},{"issue":"PrePrints","key":"9315_CR6","first-page":"1","volume":"99","author":"N Ali","year":"2012","unstructured":"Ali N, Gu\u00e9h\u00e9neuc Y-G, Antoniol G (2012a) Trustrace: mining software repositories to improve the accuracy of requirement traceability links. IEEE Trans Softw Eng 99(PrePrints):1","journal-title":"IEEE Trans Softw Eng"},{"key":"9315_CR7","doi-asserted-by":"crossref","unstructured":"Ali N, Sharafi Z, Gu\u00e9h\u00e9neuc Y-G, Antoniol G (2012b) An empirical study on requirements traceability using eye-tracking. In: Proceedings of IEEE international conference on software maintenance, pp 191\u2013200","DOI":"10.1109\/ICSM.2012.6405271"},{"issue":"1","key":"9315_CR8","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1023\/A:1018916522804","volume":"9","author":"G Antoniol","year":"2000","unstructured":"Antoniol G, Caprile B, Potrich A, Tonella P (2000) Design-code traceability for object-oriented systems. Ann Softw Eng 9(1):35\u201358","journal-title":"Ann Softw Eng"},{"issue":"10","key":"9315_CR9","doi-asserted-by":"crossref","first-page":"970","DOI":"10.1109\/TSE.2002.1041053","volume":"28","author":"G Antoniol","year":"2002","unstructured":"Antoniol G, Canfora G, Casazza G, De Lucia A, Merlo E (2002) Recovering traceability links between code and documentation. IEEE Trans Softw Eng 28(10):970\u2013983","journal-title":"IEEE Trans Softw Eng"},{"key":"9315_CR10","doi-asserted-by":"crossref","unstructured":"Bachmann A, Bird C, Rahman F, Devanbu P, Bernstein A (2010) The missing links: bugs and bug-fix commits. In: Proceedings of the 18th ACM SIGSOFT international symposium on foundations of software engineering, FSE \u201910. ACM, New York, pp 97\u2013106","DOI":"10.1145\/1882291.1882308"},{"issue":"10","key":"9315_CR11","doi-asserted-by":"crossref","first-page":"543","DOI":"10.1145\/1449955.1449807","volume":"43","author":"PF Baldi","year":"2008","unstructured":"Baldi PF, Lopes CV, Linstead EJ, Bajracharya SK (2008) A theory of aspects as latent topics. Sigplan Not 43(10):543\u2013562","journal-title":"Sigplan Not"},{"key":"9315_CR12","doi-asserted-by":"crossref","unstructured":"Bednarik R, Tukiainen M (2006) An eye-tracking methodology for characterizing program comprehension processes. In: Proceedings of the 2006 symposium on eye tracking research & applications. ETRA \u201906. ACM, New York, pp 125\u2013132","DOI":"10.1145\/1117309.1117356"},{"key":"9315_CR13","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-010-9924-0","volume-title":"Treatise on basic philosophy: vol. 3: ontology I: the furniture of the world","author":"M Bunge","year":"1977","unstructured":"Bunge M (1977) Treatise on basic philosophy: vol. 3: ontology I: the furniture of the world. Reidel, Boston"},{"key":"9315_CR14","doi-asserted-by":"crossref","unstructured":"Busjahn T, Schulte C, Busjahn A (2011) Analysis of code reading to gain more insight in program comprehension. In: Proceedings of the 11th Koli calling international conference on computing education research. Koli Calling \u201911. ACM, New York, pp 1\u20139","DOI":"10.1145\/2094131.2094133"},{"key":"9315_CR15","doi-asserted-by":"crossref","first-page":"493","DOI":"10.1007\/s10664-009-9125-9","volume":"15","author":"G Cepeda Porras","year":"2010","unstructured":"Cepeda Porras G, Gu\u00e9h\u00e9neuc Y-G (2010) An empirical study on the efficiency of different design pattern representations in uml class diagrams. Empir Softw Eng 15:493\u2013522","journal-title":"Empir Softw Eng"},{"key":"9315_CR16","doi-asserted-by":"crossref","unstructured":"Dagenais B, Ossher H, Bellamy RKE, Robillard MP, de Vries JP (2010) Moving into a new software project landscape. In: Proceedings of the 32nd ACM\/IEEE international conference on software engineering - volume 1. ICSE \u201910. ACM, New York, pp 275\u2013284","DOI":"10.1145\/1806799.1806842"},{"key":"9315_CR17","doi-asserted-by":"crossref","unstructured":"De Lucia A, Fasano F, Oliveto R, Tortora G (2007) Recovering traceability links in software artifact management systems using information retrieval methods. ACM Trans Softw Eng Methodol 16(4)","DOI":"10.1145\/1276933.1276934"},{"key":"9315_CR18","doi-asserted-by":"crossref","unstructured":"De Lucia A, Di Penta M, Oliveto R, Panichella A, Panichella S (2011a) Improving ir-based traceability recovery using smoothing filters. In: Proceeding of 19th IEEE international conference on program comprehension, pp 21 \u201330","DOI":"10.1109\/ICPC.2011.34"},{"key":"9315_CR19","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1109\/TSE.2010.89","volume":"37","author":"A Lucia De","year":"2011","unstructured":"De Lucia A, Di Penta M, Oliveto R (2011b) Improving source code lexicon via traceability and information retrieval. IEEE Trans Softw Eng 37:205\u2013227","journal-title":"IEEE Trans Softw Eng"},{"key":"9315_CR20","doi-asserted-by":"crossref","unstructured":"De Lucia A, Marcus A, Oliveto R, Poshyvanyk D (2012) Information retrieval methods for automated traceability recovery. In: Software and systems traceability, pp 71\u201398","DOI":"10.1007\/978-1-4471-2239-5_4"},{"key":"9315_CR21","unstructured":"De Smet B, Lempereur L, Sharafi Z, Gu\u00e9h\u00e9neuc Y-G, Antoniol G, Habra N (2012) Taupe: visualizing and analyzing eye-tracking data. Sci Comput Program"},{"key":"9315_CR22","doi-asserted-by":"crossref","unstructured":"Dit B, Panichella A, Moritz E, Oliveto R, Di Penta M, Poshyvanyk D, De Lucia A (2013) Configuring topic models for software engineering tasks in tracelab. In: Proceedings of 7th ACM\/IEEE international conference in software engineering, vol 13, pp 105\u2013109","DOI":"10.1109\/TEFSE.2013.6620164"},{"issue":"4","key":"9315_CR23","doi-asserted-by":"crossref","first-page":"455","DOI":"10.3758\/BF03195475","volume":"34","author":"AT Duchowski","year":"2002","unstructured":"Duchowski AT (2002) A breadth-first survey of eye-tracking applications. Behav Res Methods 34(4):455\u2013470","journal-title":"Behav Res Methods"},{"key":"9315_CR24","volume-title":"Eye tracking methodology: theory and practice","author":"AT Duchowski","year":"2007","unstructured":"Duchowski AT (2007) Eye tracking methodology: theory and practice. Springer, New York"},{"key":"9315_CR25","doi-asserted-by":"crossref","unstructured":"Erol B, Berkner K, Joshi S (2006) Multimedia thumbnails for documents. In: Proceedings of the 14th annual ACM international conference on Multimedia. MULTIMEDIA \u201906. ACM, New York, pp 231\u2013240","DOI":"10.1145\/1180639.1180701"},{"key":"9315_CR26","doi-asserted-by":"crossref","unstructured":"Gethers M, Savage T, Di Penta M, Oliveto R, Poshyvanyk D, De Lucia A (2011) Codetopics: which topic am i coding now? In: Proceedings of the 33rd international conference on software engineering. ACM, pp 1034\u20131036","DOI":"10.1145\/1985793.1985988"},{"key":"9315_CR27","doi-asserted-by":"crossref","unstructured":"Gotel OCZ, Finkelstein CW (1994) An analysis of the requirements traceability problem. In: 1st international conference on requirements engineering, pp 94\u2013101","DOI":"10.1109\/ICRE.1994.292398"},{"issue":"Suppl 1","key":"9315_CR28","doi-asserted-by":"crossref","first-page":"5228","DOI":"10.1073\/pnas.0307752101","volume":"101","author":"TL Griffiths","year":"2004","unstructured":"Griffiths TL, Steyvers M (2004) Finding scientific topics. Proc Natl Acad Sci USA 101(Suppl 1):5228\u20135235","journal-title":"Proc Natl Acad Sci USA"},{"key":"9315_CR29","doi-asserted-by":"crossref","unstructured":"Gu\u00e9h\u00e9neuc YG (2006) Taupe: towards understanding program comprehension. In: Proceedings of conference of the center for advanced studies on collaborative research. ACM, pp 1\u201313","DOI":"10.1145\/1188966.1188968"},{"issue":"8","key":"9315_CR30","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1109\/TSE.2002.1027796","volume":"28","author":"BA Kitchenham","year":"2002","unstructured":"Kitchenham BA, Pfleeger SL, Pickard LM, Jones PW, Hoaglin DC, El Emam K, Rosenberg J (2002) Preliminary guidelines for empirical research in software engineering. Trans Softw Eng 28(8):721\u2013734","journal-title":"Trans Softw Eng"},{"key":"9315_CR31","volume-title":"Information retrieval architecture and algorithms","author":"G Kowalski","year":"2010","unstructured":"Kowalski G (2010) Information retrieval architecture and algorithms. Springer, New York"},{"issue":"2","key":"9315_CR32","doi-asserted-by":"crossref","first-page":"545","DOI":"10.11144\/Javeriana.upsy10-2.cdcp","volume":"10","author":"G Macbeth","year":"2011","unstructured":"Macbeth G, Razumiejczyk E, Ledesma RD (2011) Cliff\u2019s delta calculator: a non-parametric effect size program for two groups of observations. Univ Psychol 10(2):545\u2013555","journal-title":"Univ Psychol"},{"key":"9315_CR33","doi-asserted-by":"crossref","unstructured":"Marcus A, Maletic JI (2003) Recovering documentation-to-source-code traceability links using latent semantic indexing. In: Proceedings of 25th international conference on software engineering. IEEE CS Press, Portland, pp 125\u2013135","DOI":"10.1109\/ICSE.2003.1201194"},{"key":"9315_CR34","doi-asserted-by":"crossref","unstructured":"Maskeri G, Sarkar S, Heafield K (2008) Mining business topics in source code using latent dirichlet allocation. In: Proceedings of the 1st India software engineering conference, ISEC \u201908. ACM, New York, pp 113\u2013120","DOI":"10.1145\/1342211.1342234"},{"issue":"3","key":"9315_CR35","doi-asserted-by":"crossref","first-page":"801","DOI":"10.1111\/j.1083-6101.2007.00351.x","volume":"12","author":"B Pan","year":"2007","unstructured":"Pan B, Hembrooke H, Joachims T, Lorigo L, Gay G, Granka L (2007) In Google we trust: users\u2019 decisions on rank, position, and relevance. J Comput-Mediat Commun 12(3):801\u2013823","journal-title":"J Comput-Mediat Commun"},{"key":"9315_CR36","doi-asserted-by":"crossref","unstructured":"Panichella A, Dit B, Oliveto R, Di Penta M, Poshyvanyk D, De Lucia A (2013) How to effectively use topic models for software engineering tasks? an approach based on genetic algorithms. In: Proceedings of the 2013 international conference on software engineering. IEEE Press, pp 522\u2013531","DOI":"10.1109\/ICSE.2013.6606598"},{"issue":"6","key":"9315_CR37","doi-asserted-by":"crossref","first-page":"420","DOI":"10.1109\/TSE.2007.1016","volume":"33","author":"D Poshyvanyk","year":"2007","unstructured":"Poshyvanyk D, Gu\u00e9h\u00e9neuc Y-G, Marcus A, Antoniol G, Rajlich V (2007) Feature location using probabilistic ranking of methods based on execution scenarios and information retrieval. IEEE Trans Softw Eng 33(6):420\u2013432","journal-title":"IEEE Trans Softw Eng"},{"issue":"3","key":"9315_CR38","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1037\/0033-2909.124.3.372","volume":"124","author":"K Rayner","year":"1998","unstructured":"Rayner K (1998) Eye movements in reading and information processing: 20 years of research. Psychol Bull 124(3):372","journal-title":"Psychol Bull"},{"key":"9315_CR39","unstructured":"Seeing Machine (2012) Seeing Machine\u2019s website - FaceLAB. http:\/\/www.seeingmachines.com\/product\/facelab\/ Accessed 13 July 2012"},{"key":"9315_CR40","doi-asserted-by":"crossref","unstructured":"Sharif B, Kagdi H (2011) On the use of eye tracking in software traceability. In: Proceedings of the 6th international workshop on traceability in emerging forms of software engineering (TEFSE). New York, pp 67\u201370","DOI":"10.1145\/1987856.1987872"},{"key":"9315_CR41","doi-asserted-by":"crossref","unstructured":"Sharif B, Maletic JI (2010) An eye tracking study on camelcase and under_score identifier styles. In: Proceedings of 18th international conference on program comprehension (ICPC). IEEE, pp 196\u2013205","DOI":"10.1109\/ICPC.2010.41"},{"key":"9315_CR42","doi-asserted-by":"crossref","unstructured":"Sharif B, Falcone M, Maletic JI (2012) An eye-tracking study on the role of scan time in finding source code defects. In: Proceedings of the symposium on eye tracking research and applications. ETRA \u201912. ACM, New York, pp 381\u2013384","DOI":"10.1145\/2168556.2168642"},{"key":"9315_CR43","unstructured":"Sun YH, He PL, Chen ZG (2004) An improved term weighting scheme for vector space model. In: Proceedings of 2004 international conference on machine learning and cybernetics, vol 3. IEEE, pp 1692\u20131695"},{"key":"9315_CR44","doi-asserted-by":"crossref","unstructured":"Uwano H, Nakamura M, Monden A, Matsumoto K (2006) Analyzing individual performance of source code review using reviewers\u2019 eye movement. In: Proceedings of the 2006 symposium on eye tracking research & applications (ETRA). ACM, New York, pp 133\u2013140","DOI":"10.1145\/1117309.1117357"},{"key":"9315_CR45","doi-asserted-by":"crossref","unstructured":"Wang J, Peng X, Xing Z, Zhao W (2011) An exploratory study of feature location process: distinct phases, recurring patterns, and elementary actions. In: Proceedings of 27th IEEE international conference on software maintenance (ICSM), pp 213\u2013222","DOI":"10.1109\/ICSM.2011.6080788"},{"key":"9315_CR46","doi-asserted-by":"crossref","unstructured":"Yusuf S, Kagdi H, Maletic JI (2007) Assessing the comprehension of uml class diagrams via eye tracking. In: Proceedings of 15th IEEE international conference on program comprehension (ICPC). IEEE,pp 113\u2013122","DOI":"10.1109\/ICPC.2007.10"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-014-9315-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-014-9315-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-014-9315-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T09:48:03Z","timestamp":1565603283000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-014-9315-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7,3]]},"references-count":46,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2015,4]]}},"alternative-id":["9315"],"URL":"https:\/\/doi.org\/10.1007\/s10664-014-9315-y","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,7,3]]}}}