{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T23:09:52Z","timestamp":1772492992248,"version":"3.50.1"},"reference-count":68,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,10,20]],"date-time":"2016-10-20T00:00:00Z","timestamp":1476921600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1007\/s10664-016-9460-6","type":"journal-article","created":{"date-parts":[[2016,10,20]],"date-time":"2016-10-20T02:37:42Z","timestamp":1476931062000},"page":"996-1027","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["Estimating the number of remaining links in traceability recovery"],"prefix":"10.1007","volume":"22","author":[{"given":"Davide","family":"Falessi","sequence":"first","affiliation":[]},{"given":"Massimiliano","family":"Di Penta","sequence":"additional","affiliation":[]},{"given":"Gerardo","family":"Canfora","sequence":"additional","affiliation":[]},{"given":"Giovanni","family":"Cantone","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,20]]},"reference":[{"key":"9460_CR1","doi-asserted-by":"crossref","unstructured":"Abadi A, Nisenson M, Simionovici Y (2008) A traceability technique for specifications. In: The 16th IEEE international conference on program comprehension, ICPC 2008, Amsterdam, The Netherlands, June 10\u201313, 2008. IEEE CS, pp 103\u2013112","DOI":"10.1109\/ICPC.2008.30"},{"issue":"3","key":"9460_CR2","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1080\/00031305.1992.10475879","volume":"46","author":"NS Altman","year":"1992","unstructured":"Altman NS (1992) An introduction to kernel and nearest-neighbor nonparametric regression. Am Stat 46(3):175\u2013185","journal-title":"Am Stat"},{"key":"9460_CR3","doi-asserted-by":"crossref","unstructured":"Antoniol G, Canfora G, Casazza G, De Lucia A (2000) Identifying the starting impact set of a maintenance request: a case study. In: European conference on software maintenance and reengineering, CSMR, pp 227\u2013230","DOI":"10.1109\/CSMR.2000.827331"},{"issue":"10","key":"9460_CR4","doi-asserted-by":"crossref","first-page":"970","DOI":"10.1109\/TSE.2002.1041053","volume":"28","author":"G Antoniol","year":"2002","unstructured":"Antoniol G, Canfora G, Casazza G, De Lucia A, Merlo E (2002) Recovering traceability links between code and documentation. IEEE Trans Softw Eng 28(10):970\u2013983","journal-title":"IEEE Trans Softw Eng"},{"key":"9460_CR5","doi-asserted-by":"crossref","unstructured":"Asuncion HU, Asuncion AU, Taylor RN (2010) Software traceability with topic modeling. In: Proceedings of the 32nd ACM\/IEEE international conference on software engineering - volume 1, ICSE 2010, Cape Town, South Africa, 1\u20138 May 2010, pp 95\u2013104","DOI":"10.1145\/1806799.1806817"},{"key":"9460_CR6","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-540-72687-6_9","volume-title":"Computational intelligence based on lattice theory, studies in computational intelligence, vol 67","author":"I Athanasiadis","year":"2007","unstructured":"Athanasiadis I (2007) The fuzzy lattice reasoning (flr) classifier for mining environmental data. In: Kaburlasos V, Ritter G (eds) Computational intelligence based on lattice theory, studies in computational intelligence, vol 67. Springer, Berlin, Heidelberg, pp 175\u2013193. doi: 10.1007\/978-3-540-72687-6_9"},{"key":"9460_CR7","unstructured":"Baeza-Yates R, Ribeiro-Neto B (1999) Modern information retrieval. Addison-Wesley"},{"issue":"5","key":"9460_CR8","doi-asserted-by":"publisher","first-page":"1129","DOI":"10.1109\/TSMCA.2008.2001071","volume":"38","author":"CG Bai","year":"2008","unstructured":"Bai CG, Cai KY, Hu QP, Ng SH (2008) On the trend of remaining software defect estimation. IEEE Trans Syst Man Cybern Part A Syst Humans 38(5):1129\u20131142. doi: 10.1109\/TSMCA.2008.2001071","journal-title":"IEEE Trans Syst Man Cybern Part A Syst Humans"},{"key":"9460_CR9","unstructured":"Baker RD Edgington E (ed) (1995) Modern permutation test software. Marcel Decker"},{"key":"9460_CR10","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1162\/jmlr.2003.3.4-5.993","volume":"3","author":"DM Blei","year":"2003","unstructured":"Blei DM, Ng AY, Jordan MI (2003) Latent dirichlet allocation. J Mach Learn Res 3:993\u20131022. doi: 10.1162\/jmlr.2003.3.4-5.993","journal-title":"J Mach Learn Res"},{"issue":"6","key":"9460_CR11","doi-asserted-by":"publisher","first-page":"1565","DOI":"10.1007\/s10664-013-9255-y","volume":"19","author":"M Borg","year":"2014","unstructured":"Borg M, Runeson P, Ard\u00f6 A (2014) Recovering from a decade: a systematic mapping of information retrieval approaches to software traceability. Empir Softw Eng 19(6):1565\u20131616. doi: 10.1007\/s10664-013-9255-y","journal-title":"Empir Softw Eng"},{"key":"9460_CR12","doi-asserted-by":"crossref","unstructured":"Breiman L, Breiman L (1996) Bagging predictors. In: Machine learning, pp 123\u2013140","DOI":"10.1007\/BF00058655"},{"issue":"6","key":"9460_CR13","doi-asserted-by":"crossref","first-page":"518","DOI":"10.1109\/32.852741","volume":"26","author":"LC Briand","year":"2000","unstructured":"Briand LC, Emam KE, Freimut BG, Laitenberger O (2000) A comprehensive evaluation of capture-recapture models for estimating software defect content. IEEE Trans Softw Eng 26(6):518\u2013540","journal-title":"IEEE Trans Softw Eng"},{"issue":"1","key":"9460_CR14","doi-asserted-by":"publisher","first-page":"9:1","DOI":"10.1145\/2559978","volume":"23","author":"LC Briand","year":"2014","unstructured":"Briand LC, Falessi D, Nejati S, Sabetzadeh M, Yue T (2014) Traceability and SysML design slices to support safety inspections: a controlled experiment. ACM Trans Softw Eng Methodol 23(1):9:1\u20139:43. doi: 10.1145\/2559978","journal-title":"ACM Trans Softw Eng Methodol"},{"issue":"2","key":"9460_CR15","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/S0164-1212(97)00003-4","volume":"40","author":"K Cai","year":"1998","unstructured":"Cai K (1998) On estimating the number of defects remaining in software. J Syst Softw 40(2):93\u2013114. doi: 10.1016\/S0164-1212(97)00003-4","journal-title":"J Syst Softw"},{"key":"9460_CR16","doi-asserted-by":"crossref","unstructured":"Capobianco G, De Lucia A, Oliveto R, Panichella A, Panichella S (2009) On the role of the nouns in IR-based traceability recovery. In: The 17th IEEE international conference on program comprehension, ICPC 2009, Vancouver, British Columbia, Canada, May 17\u201319, 2009. IEEE CS, pp 148\u2013157","DOI":"10.1109\/ICPC.2009.5090038"},{"key":"9460_CR17","doi-asserted-by":"publisher","unstructured":"Chen T, Sahinoglu M, von Mayrhauser A, Hajjar A, Anderson C (1999) How much testing is enough? Applying stopping rules to behavioral model testing. In: 4th IEEE international symposium on high-assurance systems engineering, 1999. Proceedings, pp 249\u2013256. doi: 10.1109\/HASE.1999.809500","DOI":"10.1109\/HASE.1999.809500"},{"key":"9460_CR18","doi-asserted-by":"crossref","unstructured":"Cleland-Huang J, Settimi R, Duan C, Zou X (2005) Utilizing supporting evidence to improve dynamic requirements traceability. In: 13th IEEE international conference on requirements engineering (RE 2005), 29 August - 2 September 2005, Paris, France. IEEE CS, pp 135\u2013144","DOI":"10.1109\/RE.2005.78"},{"issue":"438","key":"9460_CR19","doi-asserted-by":"crossref","first-page":"307","DOI":"10.2307\/3615525","volume":"66","author":"DJ Colwell","year":"1982","unstructured":"Colwell DJ, Gillett JR (1982) 66.49 Spearman versus Kendall. Math Gaz 66 (438):307\u2013309","journal-title":"Math Gaz"},{"key":"9460_CR20","doi-asserted-by":"crossref","unstructured":"Cover TM, Thomas JA (1991) Elements of information theory. Wiley-Interscience","DOI":"10.1002\/0471200611"},{"key":"9460_CR21","doi-asserted-by":"crossref","unstructured":"Cuddeback D, Dekhtyar A, Huffman Hayes J, Holden J, Kong W-K (2011) Towards overcoming human analyst fallibility in the requirements tracing process. In: Proceedings of the 33rd international conference on software engineering, ICSE 2011, Waikiki, Honolulu, HI, USA, May 21\u201328, 2011. ACM, pp 860\u2013863","DOI":"10.1145\/1985793.1985925"},{"key":"9460_CR22","doi-asserted-by":"publisher","unstructured":"Czauderna A, Cleland-Huang J, Cinar M, Berenbach B (2012) Just-in-time traceability for mechatronics systems. In: IEEE second workshop on requirements engineering for systems, services and systems-of-systems (RES4), 2012, pp 1\u20139. doi: 10.1109\/RES4.2012.6347691","DOI":"10.1109\/RES4.2012.6347691"},{"issue":"1","key":"9460_CR23","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1007\/s007660200002","volume":"7","author":"JN Dag","year":"2002","unstructured":"Dag JN, Regnell B, Carlshamre P, Andersson M, Karlsson J (2002) A feasibility study of automated natural language requirements analysis in market-driven development. Requir Eng 7(1):20\u201333","journal-title":"Requir Eng"},{"key":"9460_CR24","doi-asserted-by":"crossref","unstructured":"De Lucia A, Oliveto R, Sgueglia P (2006) Incremental approach and user feedbacks: a silver bullet for traceability recovery. In: 22nd IEEE international conference on software maintenance (ICSM 2006), 24\u201327 September 2006, Philadelphia, Pennsylvania, USA. IEEE Computer Society, pp 299\u2013309","DOI":"10.1109\/ICSM.2006.32"},{"key":"9460_CR25","doi-asserted-by":"crossref","unstructured":"De Lucia A, Fasano F, Oliveto R, Tortora G (2007) Recovering traceability links in software artifact management systems using information retrieval methods. ACM Trans Softw Eng Methodol 16(4)","DOI":"10.1145\/1276933.1276934"},{"issue":"1","key":"9460_CR26","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/s10664-008-9090-8","volume":"14","author":"A De Lucia","year":"2009","unstructured":"De Lucia A, Oliveto R, Tortora G (2009) Assessing IR-based traceability recovery tools through controlled experiments. Empir Softw Eng 14(1):57\u201392","journal-title":"Empir Softw Eng"},{"key":"9460_CR27","doi-asserted-by":"crossref","unstructured":"De Lucia A, Di Penta M, Oliveto R, Panichella A, Panichella S (2011) Improving IR-based traceability recovery using smoothing filters. In: The 19th IEEE international conference on program comprehension, ICPC 2011, Kingston, ON, Canada, June 22\u201324, 2011. IEEE Computer Society, pp 21\u201330","DOI":"10.1109\/ICPC.2011.34"},{"issue":"6","key":"9460_CR28","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9","volume":"41","author":"S Deerwester","year":"1990","unstructured":"Deerwester S, Dumais ST, Furnas GW, Landauer TK, Harshman R (1990) Indexing by latent semantic analysis. J Am Soc Inf Sci 41(6):391\u2013407","journal-title":"J Am Soc Inf Sci"},{"key":"9460_CR29","doi-asserted-by":"crossref","unstructured":"Dekhtyar A, Dekhtyar O, Holden J, Hayes JH, Cuddeback D, Kong W-K (2011) On human analyst performance in assisted requirements tracing: statistical analysis. In: RE 2011, 19th IEEE international requirements engineering conference, Trento, Italy, August 29 2011\u2013September 2, 2011. IEEE, pp 111\u2013120","DOI":"10.1109\/RE.2011.6051649"},{"key":"9460_CR30","doi-asserted-by":"crossref","unstructured":"Duan C, Cleland-Huang J (2007) Clustering support for automated tracing. In: 22nd IEEE\/ACM international conference on automated software engineering (ASE 2007), November 5\u20139, 2007, Atlanta, Georgia, USA. ACM, pp 244\u2013253","DOI":"10.1145\/1321631.1321668"},{"key":"9460_CR31","doi-asserted-by":"publisher","unstructured":"Falessi D, Reichel A (2015) Towards an open-source tool for measuring and visualizing the interest of technical debt. In: IEEE 7th international workshop on managing technical debt (MTD), 2015, pp 1\u20138. doi: 10.1109\/MTD.2015.7332618","DOI":"10.1109\/MTD.2015.7332618"},{"key":"9460_CR32","unstructured":"Falessi D, Briand LC, Cantone G (2009) The impact of automated support for linking equivalent requirements based on similarity measures, Tech. rep., Simula Research Laboratory Technical Report 2009\u2013 08"},{"issue":"1","key":"9460_CR33","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/TSE.2011.122","volume":"39","author":"D Falessi","year":"2011","unstructured":"Falessi D, Cantone G, Canfora G (2011) Empirical principles and an industrial case study in retrieving equivalent requirements via natural language processing techniques. IEEE Trans Softw Eng 39(1):18\u2013 44","journal-title":"IEEE Trans Softw Eng"},{"issue":"5","key":"9460_CR34","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MS.2014.17","volume":"31","author":"D Falessi","year":"2014","unstructured":"Falessi D, Shaw MA, Mullen K (2014) Achieving and maintaining CMMI maturity level 5 in a small organization. IEEE Softw 31(5):80\u201386. doi: 10.1109\/MS.2014.17","journal-title":"IEEE Softw"},{"key":"9460_CR35","doi-asserted-by":"crossref","unstructured":"Fellbaum C (1998) Wordnet: an electronic lexical database. The MIT Press","DOI":"10.7551\/mitpress\/7287.001.0001"},{"issue":"11","key":"9460_CR36","doi-asserted-by":"crossref","first-page":"985","DOI":"10.1109\/TSE.2003.1245300","volume":"29","author":"T Foss","year":"2003","unstructured":"Foss T, Stensrud E, Kitchenham B, Myrtveit I (2003) A simulation study of the model evaluation criterion MMRE. IEEE Trans Softw Eng 29(11):985\u2013995","journal-title":"IEEE Trans Softw Eng"},{"key":"9460_CR37","unstructured":"Freund Y, Mason L (1999) The alternating decision tree learning algorithm. In: In machine learning: proceedings of the sixteenth international conference. Morgan Kaufmann, pp 124\u2013133"},{"key":"9460_CR38","doi-asserted-by":"crossref","first-page":"1998","DOI":"10.1214\/aos\/1016218223","volume":"28","author":"J Friedman","year":"2000","unstructured":"Friedman J, Hastie T, Tibshirani R (2000) Additive logistic regression: a statistical view of boosting. Ann Stat 28:1998","journal-title":"Ann Stat"},{"key":"9460_CR39","doi-asserted-by":"crossref","unstructured":"Gethers M, Oliveto R, Poshyvanyk D, De Lucia A (2011) On integrating orthogonal information retrieval methods to improve traceability recovery. In: IEEE 27th international conference on software maintenance, ICSM 2011, Williamsburg, VA, USA, September 25\u201330, 2011. IEEE, pp 133\u2013142","DOI":"10.1109\/ICSM.2011.6080780"},{"issue":"1","key":"9460_CR40","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/TSE.2006.3","volume":"32","author":"JH Hayes","year":"2006","unstructured":"Hayes JH, Dekhtyar A, Sundaram SK (2006) Advancing candidate link generation for requirements tracing: the study of methods. IEEE Trans Softw Eng 32(1):4\u201319","journal-title":"IEEE Trans Softw Eng"},{"key":"9460_CR41","unstructured":"Huffman Hayes J, Dekhtyar A, Osborne J (2003) Improving requirements tracing via information retrieval. In: 11th IEEE international conference on requirements engineering (RE 2003), 8\u201312 September 2003, Monterey Bay, CA, USA. IEEE CS, p 138"},{"key":"9460_CR42","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1145\/1985793.1985859","volume-title":"Proceedings of the 33rd international conference on software engineering, ICSE \u201911","author":"S Kim","year":"2011","unstructured":"Kim S, Zhang H, Wu R, Gong L (2011) Dealing with noise in defect prediction. In: Proceedings of the 33rd international conference on software engineering, ICSE \u201911, ACM, New York, NY, USA, pp 481\u2013490. doi: 10.1145\/1985793.1985859"},{"issue":"8","key":"9460_CR43","doi-asserted-by":"publisher","first-page":"1479","DOI":"10.1016\/j.infsof.2012.11.008","volume":"55","author":"S Krishnan","year":"2013","unstructured":"Krishnan S, Strasburg C, Lutz RR, Goseva-Popstojanova K, Dorman KS (2013) Predicting failure-proneness in an evolving software product line. Inf Softw Technol 55(8):1479\u20131495. doi: 10.1016\/j.infsof.2012.11.008","journal-title":"Inf Softw Technol"},{"issue":"10","key":"9460_CR44","doi-asserted-by":"publisher","first-page":"1161","DOI":"10.1002\/(SICI)1097-024X(199610)26:10\u23291161::AID-SPE58\u232a3.3.CO;2-O","volume":"26","author":"M Lindvall","year":"1996","unstructured":"Lindvall M, Sandahl K (1996) Practical implications of traceability. Softw Pract Exper 26(10):1161\u20131180. doi: 10.1002\/(SICI)1097-024X(199610)26:10\u23291161::AID-SPE58\u232a3.3.CO;2-O","journal-title":"Softw Pract Exper"},{"key":"9460_CR45","doi-asserted-by":"crossref","unstructured":"Lohar S, Amornborvornwong S, Zisman A, Cleland-Huang J (2013) Improving trace accuracy through data-driven configuration and composition of tracing features. In: Joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on the foundations of software engineering, ESEC\/FSE\u201913, Saint Petersburg, Russian Federation, August 18\u201326, 2013. ACM, pp 378\u2013388","DOI":"10.1145\/2491411.2491432"},{"key":"9460_CR46","doi-asserted-by":"crossref","unstructured":"Lormans M, van Deursen A (2006) Can lsi help reconstructing requirements traceability in design and test?. In: 10th European conference on software maintenance and reengineering (CSMR 2006), 22\u201324 March 2006, Bari, Italy. IEEE Computer Society, pp 47\u201356","DOI":"10.1109\/CSMR.2006.13"},{"issue":"6","key":"9460_CR47","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1007\/s10664-008-9078-4","volume":"13","author":"M Lormans","year":"2008","unstructured":"Lormans M, van Deursen A, Gro\u00df H (2008) An industrial case study in reconstructing requirements views. Empir Softw Eng 13(6):727\u2013760. doi: 10.1007\/s10664-008-9078-4","journal-title":"Empir Softw Eng"},{"key":"9460_CR48","doi-asserted-by":"publisher","unstructured":"Malaiya YK, Denton J (1998) Estimating the number of residual defects [in software]. In: High-assurance systems engineering symposium, 1998. Proceedings. Third IEEE international, pp 98\u2013105. doi: 10.1109\/HASE.1998.731600","DOI":"10.1109\/HASE.1998.731600"},{"key":"9460_CR49","doi-asserted-by":"crossref","unstructured":"Marcus A, Maletic JI (2003) Recovering documentation-to-source-code traceability links using latent semantic indexing. In: Proceedings of the 25th international conference on software engineering, May 3-10, 2003, Portland, Oregon, USA. IEEE CS, pp 125\u2013137","DOI":"10.1109\/ICSE.2003.1201194"},{"key":"9460_CR50","doi-asserted-by":"publisher","unstructured":"Mirakhorli M, Cleland-Huang J (2011) Tracing architectural concerns in high assurance systems (nier track). In: Proceedings of the 33rd international conference on software engineering, ICSE \u201911, ACM, New York, NY, USA, pp 908\u2013911. doi: 10.1145\/1985793.1985942","DOI":"10.1145\/1985793.1985942"},{"key":"9460_CR51","doi-asserted-by":"publisher","unstructured":"Mirakhorli M, Shin Y, Cleland-Huang J, Cinar M (2012) A tactic-centric approach for automating traceability of quality concerns. In: 2012 34th international conference on software engineering (ICSE). doi: 10.1109\/ICSE.2012.6227153 , pp 639\u2013649","DOI":"10.1109\/ICSE.2012.6227153"},{"key":"9460_CR52","doi-asserted-by":"crossref","DOI":"10.4324\/9781410607034","volume-title":"Research design and statistical analysis","author":"JL Myers","year":"2003","unstructured":"Myers JL, Well AD (2003) Research design and statistical analysis. Lawrence Erlbaum Associates, New Jersey"},{"key":"9460_CR53","doi-asserted-by":"publisher","unstructured":"Nagappan N, Ball T, Zeller A (2006) Mining metrics to predict component failures. In: Proceedings of the 28th international conference on software engineering, ICSE \u201906, ACM, New York, NY, USA, pp 452\u2013461. doi: 10.1145\/1134285.1134349","DOI":"10.1145\/1134285.1134349"},{"key":"9460_CR54","doi-asserted-by":"crossref","unstructured":"Nam J, Kim S (2015) Clami: defect prediction on unlabeled datasets. In: Proceedings of the 30th IEEE\/ACM international conference on automated software engineering (ASE 2015)","DOI":"10.1109\/ASE.2015.56"},{"issue":"1","key":"9460_CR55","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/s10664-012-9218-8","volume":"19","author":"A Okutan","year":"2014","unstructured":"Okutan A, Yildiz OT (2014) Software defect prediction using bayesian networks. Empir Softw Eng 19(1):154\u2013181. doi: 10.1007\/s10664-012-9218-8","journal-title":"Empir Softw Eng"},{"key":"9460_CR56","unstructured":"Otis D, Burnham K, White G, Andersonm D (1978) Statistical inference from capture data on closed animal population. Wildl Monogr 62(135)"},{"key":"9460_CR57","doi-asserted-by":"crossref","unstructured":"Panichella A, Dit B, Oliveto R, Di Penta M, Poshyvanyk D, Lucia AD (2013) How to effectively use topic models for software engineering tasks? An approach based on genetic algorithms. In: 35th international conference on software engineering, ICSE \u201913, San Francisco, CA, USA, May 18\u201326, 2013. IEEE\/ACM, pp 522\u2013531","DOI":"10.1109\/ICSE.2013.6606598"},{"issue":"2","key":"9460_CR58","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1016\/S0164-1212(03)00090-6","volume":"72","author":"H Petersson","year":"2004","unstructured":"Petersson H, Thelin T, Runeson P, Wohlin C (2004) Capture-recapture in software inspections after 10 years research\u2013theory, evaluation and application. J Syst Softw 72(2):249\u2013264","journal-title":"J Syst Softw"},{"issue":"3","key":"9460_CR59","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1108\/eb046814","volume":"14","author":"MF Porter","year":"1980","unstructured":"Porter MF (1980) An algorithm for suffix stripping. Program 14(3):130\u2013137","journal-title":"Program"},{"key":"9460_CR60","doi-asserted-by":"publisher","unstructured":"Rahman F, Posnett D, Herraiz I, Devanbu P (2013) Sample size vs. bias in defect prediction. In: Proceedings of the 2013 9th joint meeting on foundations of software engineering, ESEC\/FSE 2013, ACM, New York, NY, USA, pp 147\u2013157. doi: 10.1145\/2491411.2491418","DOI":"10.1145\/2491411.2491418"},{"key":"9460_CR61","unstructured":"Russell SJ, Norvig P (2003) Artificial intelligence: a modern approach, 2nd edn. Pearson Education"},{"key":"9460_CR62","doi-asserted-by":"crossref","unstructured":"Settimi R, Cleland-Huang J, Khadra OB, Mody J, Lukasik W, DePalma C (2004) Supporting software evolution through dynamically retrieving traces to UML artifacts. In: 7th international workshop on principles of software evolution (IWPSE 2004), 6\u20137 September 2004, Kyoto, Japan. IEEE Computer Society, pp 49\u201354","DOI":"10.1109\/IWPSE.2004.1334768"},{"key":"9460_CR63","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1111\/j.2517-6161.1974.tb00994.x","volume":"36","author":"M Stone","year":"1974","unstructured":"Stone M (1974) Cross-validatory choice and assesment of statistical predictions (with discussion). J R Stat Soc Ser B 36:111\u2013147","journal-title":"J R Stat Soc Ser B"},{"key":"9460_CR64","volume-title":"Data mining: practical machine learning tools and techniques","author":"IH Witten","year":"2011","unstructured":"Witten IH, Frank E, Hall MA (2011) Data mining: practical machine learning tools and techniques, 3rd edn. Morgan Kaufmann Publishers Inc., San Francisco","edition":"3"},{"key":"9460_CR65","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-4625-2","volume-title":"Experimentation in software engineering: an introduction","author":"C Wohlin","year":"2000","unstructured":"Wohlin C, Runeson P, H\u00f6st M, Ohlsson MC, Regnell B, Wessl\u00e9n A (2000) Experimentation in software engineering: an introduction. Kluwer Academic Publishers, Norwell"},{"issue":"2","key":"9460_CR66","first-page":"116","volume":"1","author":"S Yadla","year":"2005","unstructured":"Yadla S, Huffman Hayes J, Dekhtyar A (2005) Tracing requirements to defect reports: an application of information retrieval techniques. ISSE 1(2):116\u2013124","journal-title":"ISSE"},{"key":"9460_CR67","unstructured":"Zou X, Settimi R, Cleland-Huang J (2007) Term-based enhancement factors for improving automated requirement trace retrieval. In: ACM international symposium on grand challenges of traceability"},{"issue":"2","key":"9460_CR68","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/s10664-009-9114-z","volume":"15","author":"X Zou","year":"2010","unstructured":"Zou X, Settimi R, Cleland-Huang J (2010) Improving automated requirements trace retrieval: a study of term-based enhancement methods. Empir Softw Eng 15(2):119\u2013146","journal-title":"Empir Softw Eng"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-016-9460-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-016-9460-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-016-9460-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,20]],"date-time":"2024-06-20T02:01:43Z","timestamp":1718848903000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-016-9460-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,20]]},"references-count":68,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,6]]}},"alternative-id":["9460"],"URL":"https:\/\/doi.org\/10.1007\/s10664-016-9460-6","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,10,20]]}}}