{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:44:44Z","timestamp":1772909084969,"version":"3.50.1"},"reference-count":79,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,11,23]],"date-time":"2016-11-23T00:00:00Z","timestamp":1479859200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,11,23]],"date-time":"2016-11-23T00:00:00Z","timestamp":1479859200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1319680"],"award-info":[{"award-number":["CCF-1319680"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-0447594"],"award-info":[{"award-number":["CCF-0447594"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1007\/s10664-016-9479-8","type":"journal-article","created":{"date-parts":[[2016,11,23]],"date-time":"2016-11-23T07:21:19Z","timestamp":1479885679000},"page":"1103-1142","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":40,"title":["Tackling the term-mismatch problem in automated trace retrieval"],"prefix":"10.1007","volume":"22","author":[{"given":"Jin","family":"Guo","sequence":"first","affiliation":[]},{"given":"Marek","family":"Gibiec","sequence":"additional","affiliation":[]},{"given":"Jane","family":"Cleland-Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,23]]},"reference":[{"key":"9479_CR1","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1016\/j.scico.2014.09.012","volume":"98","author":"SL Abebe","year":"2015","unstructured":"Abebe SL, Tonella P (2015) Extraction of domain concepts from the source code. Sci Comput Program 98:680\u2013706","journal-title":"Sci Comput Program"},{"key":"9479_CR2","unstructured":"Agrwal R, Srikant R (1994) Fast algorithms for mining association rules. In: Proceedings of the 20th International Conference on very large data Bases (VLDB\u201994). Santiago, Chile, pp 487\u2013499"},{"key":"9479_CR3","doi-asserted-by":"crossref","unstructured":"Antoniol G, Canfora G, de Lucia A, Casazza G (2000) Information retrieval models for recovering traceability links between code and documentation. In: ICSM \u201900: Proceedings of the international conference on software maintenance (ICSM\u201900). IEEE Computer Society, Washington, DC, USA, p 40","DOI":"10.1109\/ICSM.2000.883003"},{"issue":"10","key":"9479_CR4","doi-asserted-by":"publisher","first-page":"970","DOI":"10.1109\/TSE.2002.1041053","volume":"28","author":"G Antoniol","year":"2002","unstructured":"Antoniol G, Canfora G, Casazza G, De Lucia A, Merlo E (2002) Recovering traceability links between code and documentation. IEEE Trans Softw Eng 28(10):970\u2013983","journal-title":"IEEE Trans Softw Eng"},{"issue":"3","key":"9479_CR5","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1007\/s10115-009-0259-2","volume":"25","author":"N Assawamekin","year":"2010","unstructured":"Assawamekin N, Sunetnanta T, Pluempitiwiriyawej C (2010) Ontology-based multiperspective requirements traceability framework. Knowl Inf Syst 25(3):493\u2013522","journal-title":"Knowl Inf Syst"},{"key":"9479_CR6","unstructured":"Baeza-Yates RA, Ribeiro-Neto BA (1999) Modern information retrieval. ACM Press\/Addison-Wesley"},{"key":"9479_CR7","unstructured":"Bennett KH, Rajlich VT (2000) Software maintenance and evolution: a roadmap. In: ICSE \u201900: Proceedings of the Conference on the future of software engineering. ACM, New York, NY, USA, pp 73\u201387"},{"key":"9479_CR8","unstructured":"Berenbach B, Gruseman D, Cleland-Huang J (2010) Application of just in time tracing to regulatory codes. In: Proceedings of the conference on systems engineering research. Stevens Institute of Technology. Holbroken, NJ"},{"key":"9479_CR9","unstructured":"Breaux TD, Rao A (2013) Formal analysis of privacy requirements specifications for multi-tier applications. In: 21st IEEE international requirements engineering conference, RE, 2013, Rio de Janeiro-RJ, Brazil, July 15\u201319, 2013, pp 14\u201320"},{"key":"9479_CR10","doi-asserted-by":"crossref","unstructured":"Broder AZ, Fontoura M, Gabrilovich E, Joshi A, Josifovski V, Zhang T (2007) Robust classification of rare queries using web knowledge. In: SIGIR \u201907: Proceedings of the 30th annual international ACM SIGIR conference on research and development in information retrieval. ACM, New York, NY, USA, pp 231\u2013238","DOI":"10.1145\/1277741.1277783"},{"key":"9479_CR11","doi-asserted-by":"crossref","unstructured":"Cleland-Huang J, Guo J (2014) Towards more intelligent trace retrieval algorithms. In: (RAISE) Workshop on realizing artificial intelligence synergies in software engineering","DOI":"10.1145\/2593801.2593802"},{"issue":"9","key":"9479_CR12","doi-asserted-by":"publisher","first-page":"796","DOI":"10.1109\/TSE.2003.1232285","volume":"29","author":"J Cleland-Huang","year":"2003","unstructured":"Cleland-Huang J, Chang CK, Christensen M (2003) Event-based traceability for managing evolutionary change. IEEE Trans Softw Eng 29(9):796\u2013810","journal-title":"IEEE Trans Softw Eng"},{"key":"9479_CR13","doi-asserted-by":"crossref","unstructured":"Cleland-Huang J, Settimi R, Duan C, Zou X (2005) Utilizing supporting evidence to improve dynamic requirements traceability. In: 13th IEEE international conference on requirements engineering (RE 2005), 29 August\u20132 September 2005, Paris, France, pp 135\u2013144","DOI":"10.1109\/RE.2005.78"},{"key":"9479_CR14","doi-asserted-by":"crossref","unstructured":"Cleland-Huang J, Settimi R, Zou X, Solc P (2006) The detection and classification of non-functional requirements with application to early aspects. In: RE, pp 36\u201345","DOI":"10.1109\/RE.2006.65"},{"issue":"6","key":"9479_CR15","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/MC.2007.195","volume":"40","author":"J Cleland-Huang","year":"2007","unstructured":"Cleland-Huang J, Berenbach B, Clark S, Settimi R, Romanova E (2007) Best practices for automated traceability. Computer 40(6):27\u201335","journal-title":"Computer"},{"issue":"2","key":"9479_CR16","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/s00766-007-0045-1","volume":"12","author":"J Cleland-Huang","year":"2007","unstructured":"Cleland-Huang J, Settimi R, Zou X, Solc P (2007) Automated detection and classification of non-functional requirements. Requir Eng 12(2):103\u2013120","journal-title":"Requir Eng"},{"key":"9479_CR17","doi-asserted-by":"crossref","unstructured":"Cleland-Huang J, Czauderna A, Gibiec M, Emenecker J (2010) A machine learning approach for tracing regulatory codes to product specific requirements. In: ICSE \u201910: Proceedings of the 32nd ACM\/IEEE international conference on software engineering. ACM, New York, NY, USA, pp 155\u2013164","DOI":"10.1145\/1806799.1806825"},{"key":"9479_CR18","unstructured":"CoEST (2008) Center of excellence for software traceability, \n                    http:\/\/www.traceabilitycenter.org"},{"key":"9479_CR19","doi-asserted-by":"crossref","unstructured":"Cuddeback D, Dekhtyar A, Hayes JH (2010) Automated requirements traceability: the study of human analysts. In: RE\u201910: Proceedings of the IEEE international requirements engineering conference. IEEE","DOI":"10.1109\/RE.2010.35"},{"key":"9479_CR20","doi-asserted-by":"crossref","unstructured":"Dasgupta T, Grechanik M, Moritz E, Dit B, Poshyvanyk D (2013) Enhancing software traceability by automatically expanding corpora with relevant documentation. In: 2013 IEEE international conference on software maintenance, Eindhoven, The Netherlands, September 22\u201328, 2013, pp 320\u2013 329","DOI":"10.1109\/ICSM.2013.43"},{"key":"9479_CR21","unstructured":"Dietrich T, Cleland-Huang J, Shin Y (2013) Learning effective query transformations for enhanced requirements trace retrieval. In: 2013 28th IEEE\/ACM International Conference on Automated Software Engineering, ASE, 2013, Silicon valley, CA, USA. November 11\u201315, 2013, pp 586\u2013591"},{"issue":"2","key":"9479_CR22","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1109\/TSE.2003.1178051","volume":"29","author":"A Egyed","year":"2003","unstructured":"Egyed A (2003) A scenario-driven approach to trace dependency analysis. IEEE Trans Softw Eng 29(2):116\u2013132","journal-title":"IEEE Trans Softw Eng"},{"key":"9479_CR23","unstructured":"FAA. AC20-115C. Do-178c: Software considerations in airborne systems and equipment certification"},{"issue":"1","key":"9479_CR24","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/TSE.2011.122","volume":"39","author":"D Falessi","year":"2013","unstructured":"Falessi D, Cantone G, Canfora G (2013) Empirical principles and an industrial case study in retrieving equivalent requirements via natural language processing techniques. IEEE Trans Software Eng 39(1):18\u201344","journal-title":"IEEE Trans Software Eng"},{"issue":"2","key":"9479_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1513876.1513877","volume":"3","author":"E Gabrilovich","year":"2009","unstructured":"Gabrilovich E, Broder A, Fontoura M, Joshi A, Josifovski V, Riedel L, Zhang T (2009) Classifying search queries using the web as a source of knowledge. ACM Trans Web 3(2):1\u201328","journal-title":"ACM Trans Web"},{"key":"9479_CR26","doi-asserted-by":"crossref","unstructured":"Gervasi V, Zowghi D (2014) Supporting traceability through affinity mining. In 2014 IEEE 22nd International Requirements Engineering Conference (RE), Karlskrona, pp 143\u2013152","DOI":"10.1109\/RE.2014.6912256"},{"key":"9479_CR27","doi-asserted-by":"crossref","unstructured":"Gibiec M, Czauderna A, Cleland-Huang J (2010) Towards mining replacement queries for hard-to-retrieve traces. In: ASE \u201910: Proceedings of the IEEE\/acm international conference on automated software engineering. ACM, New York, NY, USA, pp 245\u2013254","DOI":"10.1145\/1858996.1859046"},{"key":"9479_CR28","unstructured":"Gotel OCZ, Finkelstein ACW (1994) An analysis of the requirements traceability problem. pp 94\u2013101"},{"key":"9479_CR29","doi-asserted-by":"crossref","unstructured":"Gotel O, Finkelstein A (1997) Extended requirements traceability: results of an industrial case study. In: RE \u201997: Proceedings of the 3rd IEEE international symposium on requirements engineering. IEEE Computer Society, Washington, DC, USA, p 169","DOI":"10.1109\/ISRE.1997.566866"},{"key":"9479_CR30","unstructured":"Grando A, Schwab R (2013) Building and evaluating an ontology-based tool for reasoning about consent permission. In: AMIA annual symposium proceedings, pp 514\u2013523"},{"key":"9479_CR31","doi-asserted-by":"crossref","unstructured":"Grando M, Boxwala A, Schwab R, Alipanah N (2012) Ontological approach for the management of informed consent permissions. In: 2012 IEEE second international conference on healthcare informatics imaging and systems biology (HISB), pp 51\u201360","DOI":"10.1109\/HISB.2012.19"},{"issue":"2","key":"9479_CR32","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1006\/knac.1993.1008","volume":"5","author":"TR Gruber","year":"1993","unstructured":"Gruber TR (1993) A translation approach to portable ontology specifications. Knowledge acquisition 5(2):199\u2013220","journal-title":"Knowledge acquisition"},{"issue":"1\u20132","key":"9479_CR33","doi-asserted-by":"crossref","first-page":"3","DOI":"10.3233\/SW-2010-0015","volume":"1","author":"G Guizzardi","year":"2010","unstructured":"Guizzardi G (2010) Theoretical foundations and engineering tools for building ontologies as reference conceptual models. Semantic Web 1(1\u20132):3\u201310","journal-title":"Semantic Web"},{"key":"9479_CR34","doi-asserted-by":"crossref","unstructured":"Guo J (2016) Ontology learning and its application in software-intensive projects. In: Proceedings of the 38th international conference on software engineering, ICSE 2016, Austin, TX, USA, May 14\u201322, 2016 - Companion Volume, pp 843\u2013846","DOI":"10.1145\/2889160.2889264"},{"key":"9479_CR35","doi-asserted-by":"crossref","unstructured":"Guo J, Cleland-Huang J, Berenbach B (2013) Foundations for an expert system in domainspecific traceability In 2013 21st IEEE International Requirements Engineering Conference (RE), Rio de Janeiro 2013, pp 42\u201351","DOI":"10.1109\/RE.2013.6636704"},{"key":"9479_CR36","doi-asserted-by":"crossref","unstructured":"Guo J, Monaikul N, Plepel C, Cleland-Huang J (2014) Towards an intelligent domain-specific traceability solution. In: ACM\/IEEE international conference on automated software engineering, ASE \u201914, Vasteras, Sweden - September 15\u201319, 2014, pp 755\u2013766","DOI":"10.1145\/2642937.2642970"},{"key":"9479_CR37","doi-asserted-by":"crossref","unstructured":"Hayashi S, Yoshikawa T, Saeki M (2010) Sentence-to-code traceability recovery with domain ontologies. In: Han J, Thu TD (eds) APSEC. IEEE Computer Society, pp 385\u2013394","DOI":"10.1109\/APSEC.2010.51"},{"key":"9479_CR38","doi-asserted-by":"crossref","unstructured":"Hayes JH, Dekhtyar A, Sundaram SK (2006) Advancing candidate link generation for requirements tracing: the study of methods. IEEE Trans Softw Eng 32 (1):4\u201319","DOI":"10.1109\/TSE.2006.3"},{"key":"9479_CR39","unstructured":"Hayes JH, Dekhtyar A, Sundaram SK, Howard S (2004) Helping analysts trace requirements: an objective look. In: RE \u201904: Proceedings of the requirements engineering conference, 12th IEEE international. IEEE Computer Society, Washington, DC, USA, pp 249\u2013259"},{"key":"9479_CR40","doi-asserted-by":"crossref","unstructured":"Hill E, Fry ZP, Boyd H, Sridhara G, Novikova Y, Pollock LL, Vijay-Shanker K (2008) AMAP: Automatically mining abbreviation expansions in programs to enhance software maintenance tools. In: Proceedings of the 2008 international working conference on mining software repositories, MSR 2008 (Co-located with ICSE), Leipzig, Germany, May 10\u201311, 2008, Proceedings, pp 79\u201388","DOI":"10.1145\/1370750.1370771"},{"key":"9479_CR41","doi-asserted-by":"crossref","unstructured":"Hu J, Wang G, Lochovsky F, Sun J-T, Chen Z (2009) Understanding user\u2019s query intent with wikipedia. In: WWW \u201909: Proceedings of the 18th international conference on world wide web. ACM, New York, NY, USA, pp 471\u2013480","DOI":"10.1145\/1526709.1526773"},{"key":"9479_CR42","unstructured":"ISO (2010) Iso\/ts 21547:2010, health informatics security requirements for archiving of electronic health records. International Organization for Standards TC 215 Health Informatics, \n                    http:\/\/www.iso.org\/iso\/home.htm\n                    \n                   (Last accessed 12\/20\/10)"},{"key":"9479_CR43","doi-asserted-by":"crossref","unstructured":"Klein D, Manning CD (2003) Accurate unlexicalized parsing. In: Proceedings of the 41st annual meeting on association for computational linguistics - vol 1. ACL \u201903. Association for Computational Linguistics, Stroudsburg, PA, USA, pp 423\u2013430","DOI":"10.3115\/1075096.1075150"},{"key":"9479_CR44","doi-asserted-by":"crossref","unstructured":"Kof L, Gacitua R, Rouncefield M, Sawyer P (2010) Concept mapping as a means of requirements tracing. In: MaRK\u201910)","DOI":"10.1109\/MARK.2010.5623813"},{"key":"9479_CR45","doi-asserted-by":"crossref","unstructured":"Li Y, Cleland-Huang J (2009) Ontology-based trace retrieval. In: Traceability in emerging forms of software engineering (TEFSE2013. San Francisco, USA","DOI":"10.1109\/TEFSE.2013.6620151"},{"key":"9479_CR46","unstructured":"Lin D (1998) An information-theoretic definition of similarity. In: ICML., vol 98, pp 296\u2013304"},{"key":"9479_CR47","unstructured":"Lin J, Lin CC, Cleland-Huang J, Settimi R, Amaya J, Bedford G, Berenbach B, Khadra OB, Duan C, Zou X (2006) Poirot: a distributed tool supporting enterprise-wide automated traceability. In: RE, pp 356\u2013357"},{"key":"9479_CR48","doi-asserted-by":"crossref","unstructured":"Lohar S, Amornborvornwong S, Zisman A, Cleland-Huang J (2013) Improving trace accuracy through data-driven configuration and composition of tracing features. In: Joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on the foundations of software engineering, ESEC\/FSE\u201913, Saint Petersburg, Russian Federation, August 18\u201326, 2013, pp 378\u2013388","DOI":"10.1145\/2491411.2491432"},{"key":"9479_CR49","first-page":"299","volume":"0","author":"AD Lucia","year":"2006","unstructured":"Lucia AD, Oliveto R, Sgueglia P (2006) Incremental approach and user feedbacks: a silver bullet for traceability recovery. IEEE International Conference on Software Maintenance 0:299\u2013309","journal-title":"IEEE International Conference on Software Maintenance"},{"key":"9479_CR50","doi-asserted-by":"crossref","unstructured":"Lucia AD, Marcus A, Oliveto R, Poshyvanyk D (2012) Information retrieval methods for automated traceability recovery. In: Software and systems traceability., pp 71\u201398","DOI":"10.1007\/978-1-4471-2239-5_4"},{"issue":"3","key":"9479_CR51","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MS.2013.60","volume":"30","author":"P M\u00e4der","year":"2013","unstructured":"M\u00e4der P., Jones PL, Zhang Y, Cleland-Huang J (2013) Strategic traceability for safety-critical projects. IEEE Softw 30(3):58\u201366","journal-title":"IEEE Softw"},{"issue":"3","key":"9479_CR52","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/s00766-013-0199-y","volume":"20","author":"A Mahmoud","year":"2015","unstructured":"Mahmoud A, Niu N (2015) On the role of semantics in automated requirements tracing. Requir Eng 20(3):281\u2013300","journal-title":"Requir Eng"},{"key":"9479_CR53","unstructured":"Marcus A, Maletic JI (2000) Using latent semantic analysis to identify similarities in source code to support program understanding. In: ICTAI \u201900: Proceedings of the 12th IEEE international conference on tools with artificial intelligence. IEEE Computer Society, Washington, DC, USA, p 46"},{"key":"9479_CR54","doi-asserted-by":"crossref","unstructured":"Marcus A, Maletic JI (2003) Recovering documentation-to-source-code traceability links using latent semantic indexing. In: ICSE \u201903: Proceedings of the 25th international conference on software engineering. IEEE Computer Society, Washington, DC, USA, pp 125\u2013135","DOI":"10.1109\/ICSE.2003.1201194"},{"key":"9479_CR55","doi-asserted-by":"crossref","unstructured":"Mirakhorli M, Cleland-Huang J (2016) Detecting, tracing, and monitoring architectural tactics in code. IEEE Trans Software Eng 42(3):205\u2013220","DOI":"10.1109\/TSE.2015.2479217"},{"key":"9479_CR56","doi-asserted-by":"crossref","unstructured":"Mirakhorli M, Shin Y, Cleland-Huang J, \u00c7inar M (2012) A tactic-centric approach for automating traceability of quality concerns","DOI":"10.1109\/ICSE.2012.6227153"},{"key":"9479_CR57","doi-asserted-by":"crossref","unstructured":"Murta LGP, van der Hoek A, Werner CML (2006) Archtrace: Policy-based support for managing evolving architecture-to-implementation traceability links. In: ASE \u201906: Proceedings of the 21st IEEE\/ACM International Conference on Automated Software Engineering. IEEE Computer Society, Washington, DC, USA, pp 135\u2013144","DOI":"10.1109\/ASE.2006.16"},{"key":"9479_CR58","unstructured":"Nauman M, Khan S (2007) Using personalizedweb search for enhancing common sense and folksonomy based intelligent search systems. In: WI \u201907: Proceedings of the IEEE\/WIC\/ACM international conference on web intelligence. IEEE Computer Society, Washington, DC, USA, pp 423\u2013 426"},{"key":"9479_CR59","unstructured":"PCI (2006) Pci security standard quick reference guide. Payment Card Industry Security Guidelines \n                    https:\/\/www.pcisecuritystandards.org\n                    \n                   (Last accessed 12\/30\/10)"},{"key":"9479_CR60","doi-asserted-by":"crossref","unstructured":"Porter M (1980) Porter\u2019s stemming algorithm, pp 130\u2013137","DOI":"10.1108\/eb046814"},{"issue":"1","key":"9479_CR61","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/32.895989","volume":"27","author":"B Ramesh","year":"2001","unstructured":"Ramesh B, Jarke M (2001) Toward reference models for requirements traceability. IEEE Trans Softw Eng 27(1):58\u201393","journal-title":"IEEE Trans Softw Eng"},{"key":"9479_CR62","unstructured":"Rempel P, M\u00e4der P., Kuschke T, Cleland-Huang J (2015) Traceability gap analysis for assessing the conformance of software traceability to relevant guidelines. In: Software Engineering & Management 2015, Multikonferenz der GI-fachbereiche Softwaretechnik (SWT) und Wirtschaftsinformatik (WI), FA WI-MAW, 17. M\u00e4rz - 20. M\u00e4rz 2015, Dresden, Germany, pp 120\u2013121"},{"key":"9479_CR63","volume-title":"Automatic text processing: the transformation, analysis, and retrieval of information by computer","author":"G Salton","year":"1989","unstructured":"Salton G (1989) Automatic text processing: the transformation, analysis, and retrieval of information by computer. Addison-Wesley Longman Publishing Co., Inc., Boston"},{"key":"9479_CR64","volume-title":"Introduction to modern information retrieval","author":"G Salton","year":"1986","unstructured":"Salton G, McGill M (1986) Introduction to modern information retrieval. McGraw-Hill, New York"},{"issue":"11","key":"9479_CR65","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1145\/361219.361220","volume":"18","author":"G Salton","year":"1975","unstructured":"Salton G, Wong A, Yang CS (1975) A vector space model for automatic indexing. Commun ACM 18(11):613\u2013620","journal-title":"Commun ACM"},{"key":"9479_CR66","unstructured":"Sarbanes-Oxley (2002) A guide to the sarbanes-oxley act. The Sarbanes-Oxley Compliance Guide 2002, \n                    http:\/\/www.soxtoolkit.com\/\n                    \n                   (Last accessed on 12\/30\/10)"},{"key":"9479_CR67","doi-asserted-by":"crossref","unstructured":"Shen D, Sun J-T, Yang Q, Chen Z (2006) Building bridges for web query classification. In: SIGIR \u201906: Proceedings of the 29th annual international ACM SIGIR conference on research and development in information retrieval. ACM, New York, NY, USA, pp 131\u2013138","DOI":"10.1145\/1148170.1148196"},{"key":"9479_CR68","doi-asserted-by":"crossref","unstructured":"Shin Y, Cleland-Huang J (2012) A comparative evaluation of two user feedback techniques for requirements trace retrieval. In: SAC, pp 1069\u20131074","DOI":"10.1145\/2245276.2231943"},{"key":"9479_CR69","doi-asserted-by":"crossref","unstructured":"Shin Y, Hayes JH, Cleland-Huang J (2015) Guidelines for benchmarking automated software traceability techniques. In: 8th IEEE\/ACM international symposium on software and systems traceability, SST, 2015, Florence, Italy, May 17, 2015, pp 61\u201367","DOI":"10.1109\/SST.2015.13"},{"issue":"2","key":"9479_CR70","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/S0164-1212(03)00242-5","volume":"72","author":"G Spanoudakis","year":"2004","unstructured":"Spanoudakis G, Zisman A, P\u00e9rez-Mi\u00f1ana E, Krause P (2004) Rule-based generation of requirements traceability relations. J Syst Softw 72(2):105\u2013127","journal-title":"J Syst Softw"},{"key":"9479_CR71","unstructured":"Stanford (2013) Prot\u00e9g\u00e9: Open source ontology editor"},{"key":"9479_CR72","doi-asserted-by":"crossref","unstructured":"Sultanov H, Hayes JH (2013) Application of reinforcement learning to requirements engineering: requirements tracing. In: 21st IEEE International Requirements Engineering Conference, RE 2013, Rio de janeiro-RJ, Brazil, July 15\u201319, 2013, pp 52\u201361","DOI":"10.1109\/RE.2013.6636705"},{"issue":"3","key":"9479_CR73","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/s00766-011-0121-4","volume":"16","author":"H Sultanov","year":"2011","unstructured":"Sultanov H, Hayes JH, Kong W (2011) Application of swarm techniques to requirements tracing. Requir Eng 16(3):209\u2013226","journal-title":"Requir Eng"},{"key":"9479_CR74","unstructured":"Tufis D, Mason O (1998) Tagging romanian texts: a case study for qtag, a language independent probabilistic tagger. In: Proceedings of the first international conference on language resources and evaluation (LREC), pp 589\u2013596"},{"key":"9479_CR75","unstructured":"U.S. Food and Drug Administration (2002) General principles of software validation. U.S. Dept. of Health and Human Services 1:1"},{"key":"9479_CR76","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-4625-2","volume-title":"Experimentation in software engineering: an introduction","author":"C Wohlin","year":"2000","unstructured":"Wohlin C, Runeson P, H\u00f6st M, Ohlsson MC, Regnell B, Wessl\u00e9n A (2000) Experimentation in software engineering: an introduction. Kluwer Academic Publishers, Norwell"},{"key":"9479_CR77","doi-asserted-by":"crossref","unstructured":"Yurekli B, Capan G, Yilmazel B, Yilmazel O (2009) Guided navigation using query log mining through query expansion. In: NSS \u201909: Proceedings of the 2009 third international conference on network and system security. IEEE Computer Society, Washington, DC, USA, pp 560\u2013564","DOI":"10.1109\/NSS.2009.27"},{"issue":"3","key":"9479_CR78","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1049\/iet-sen:20070062","volume":"2","author":"Y Zhang","year":"2008","unstructured":"Zhang Y, Witte R, Rilling J, Haarslev V (2008) Ontological approach for the semantic recovery of traceability links between software artefacts. Software, IET 2 (3):185\u2013203","journal-title":"Software, IET"},{"issue":"2","key":"9479_CR79","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/s10664-009-9114-z","volume":"15","author":"X Zou","year":"2010","unstructured":"Zou X, Settimi R, Cleland-Huang J (2010) Improving automated requirements trace retrieval: a study of term-based enhancement methods. Empirical Softw Engg 15 (2):119\u2013146","journal-title":"Empirical Softw Engg"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-016-9479-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-016-9479-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-016-9479-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,17]],"date-time":"2020-05-17T15:06:40Z","timestamp":1589728000000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-016-9479-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,23]]},"references-count":79,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,6]]}},"alternative-id":["9479"],"URL":"https:\/\/doi.org\/10.1007\/s10664-016-9479-8","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,11,23]]},"assertion":[{"value":"23 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}