{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:19:33Z","timestamp":1740122373467,"version":"3.37.3"},"reference-count":85,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,6,16]],"date-time":"2022-06-16T00:00:00Z","timestamp":1655337600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,6,16]],"date-time":"2022-06-16T00:00:00Z","timestamp":1655337600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1848608"],"award-info":[{"award-number":["CCF-1848608"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1910976"],"award-info":[{"award-number":["CCF-1910976"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1955837"],"award-info":[{"award-number":["CCF-1955837"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1007\/s10664-022-10175-w","type":"journal-article","created":{"date-parts":[[2022,6,16]],"date-time":"2022-06-16T01:02:41Z","timestamp":1655341361000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["An empirical study of data constraint implementations in Java"],"prefix":"10.1007","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7468-0043","authenticated-orcid":false,"given":"Juan Manuel","family":"Florez","sequence":"first","affiliation":[]},{"given":"Laura","family":"Moreno","sequence":"additional","affiliation":[]},{"given":"Zenong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Shiyi","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Andrian","family":"Marcus","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,16]]},"reference":[{"key":"10175_CR1","doi-asserted-by":"publisher","first-page":"86121","DOI":"10.1109\/ACCESS.2019.2918202","volume":"7","author":"QU Ain","year":"2019","unstructured":"Ain QU, Butt WH, Anwar MW, Azam F, Maqbool B (2019) A systematic review on code clone detection. IEEE Access 7:86121\u201386144. https:\/\/doi.org\/10.1109\/ACCESS.2019.2918202","journal-title":"IEEE Access"},{"key":"10175_CR2","doi-asserted-by":"publisher","unstructured":"Ali N, Gu\u00e9h\u00e9neuc YG, Antoniol G (2011) Trust-based requirements traceability. In: Proceedings of the 19th IEEE international conference on program comprehension (ICPC). https:\/\/doi.org\/10.1109\/ICPC.2011.42https:\/\/doi.org\/10.1109\/ICPC.2011.42, pp 111\u2013120","DOI":"10.1109\/ICPC.2011.42 10.1109\/ICPC.2011.42"},{"key":"10175_CR3","doi-asserted-by":"publisher","unstructured":"Ali N, Sharafi Z, Gu\u00e9h\u00e9neuc Y G, Antoniol G (2012) An empirical study on requirements traceability using eye-tracking. In: Proceedings of the 28th international conference on software maintenance (ICSM). https:\/\/doi.org\/10.1109\/ICSM.2012.6405271, pp 191\u2013200","DOI":"10.1109\/ICSM.2012.6405271"},{"issue":"5","key":"10175_CR4","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1109\/TSE.2012.71","volume":"39","author":"N Ali","year":"2013","unstructured":"Ali N, Gu\u00e9h\u00e9neuc Y G, Antoniol G (2013) Trustrace: mining software repositories to improve the accuracy of requirement traceability links. IEEE Trans Softw Eng 39(5):725\u2013741. https:\/\/doi.org\/10.1109\/TSE.2012.71","journal-title":"IEEE Trans Softw Eng"},{"key":"10175_CR5","doi-asserted-by":"publisher","unstructured":"Alspaugh TA, Scacchi W (2013) Ongoing software development without classical requirements. In: Proceedings of the 21st IEEE international requirements engineering conference (RE). https:\/\/doi.org\/10.1109\/RE.2013.6636716, pp 165\u2013174","DOI":"10.1109\/RE.2013.6636716"},{"issue":"10","key":"10175_CR6","doi-asserted-by":"publisher","first-page":"970","DOI":"10.1109\/TSE.2002.1041053","volume":"28","author":"G Antoniol","year":"2002","unstructured":"Antoniol G, Canfora G, Casazza G, De Lucia A, Merlo E (2002) Recovering traceability links between code and documentation. IEEE Trans Softw Eng 28(10):970\u2013983. https:\/\/doi.org\/10.1109\/TSE.2002.1041053","journal-title":"IEEE Trans Softw Eng"},{"key":"10175_CR7","unstructured":"Apache Ant (2021) Targets. https:\/\/archive.apache.org\/dist\/ant\/manual\/apache-ant-1.10.6-manual.zip"},{"key":"10175_CR8","doi-asserted-by":"publisher","unstructured":"Baker BS (1995) On finding duplication and near-duplication in large software systems. In: Proceedings of 2nd working conference on reverse engineering. https:\/\/doi.org\/10.1109\/WCRE.1995.514697, pp 86\u201395","DOI":"10.1109\/WCRE.1995.514697"},{"issue":"9","key":"10175_CR9","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1109\/TSE.2007.70725","volume":"33","author":"S Bellon","year":"2007","unstructured":"Bellon S, Koschke R, Antoniol G, Krinke J, Merlo E (2007) Comparison and evaluation of clone detection tools. IEEE Trans Softw Eng 33(9):577\u2013591. https:\/\/doi.org\/10.1109\/TSE.2007.70725","journal-title":"IEEE Trans Softw Eng"},{"key":"10175_CR10","doi-asserted-by":"publisher","first-page":"106235","DOI":"10.1016\/j.infsof.2019.106235","volume":"119","author":"D Blasco","year":"2020","unstructured":"Blasco D, Cetina C, Pastor \u00d3 (2020) A fine-grained requirement traceability evolutionary algorithm: Kromaia, a commercial video game case study. Inf Softw Technol 119:106235. https:\/\/doi.org\/10.1016\/j.infsof.2019.106235","journal-title":"Inf Softw Technol"},{"issue":"6","key":"10175_CR11","doi-asserted-by":"publisher","first-page":"1565","DOI":"10.1007\/s10664-013-9255-y","volume":"19","author":"M Borg","year":"2014","unstructured":"Borg M, Runeson P, Ard\u00f6 A (2014) Recovering from a decade: a systematic mapping of information retrieval approaches to software traceability. Empir Softw Eng 19(6):1565\u20131616. https:\/\/doi.org\/10.1007\/s10664-013-9255-y","journal-title":"Empir Softw Eng"},{"issue":"1","key":"10175_CR12","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/TSE.2007.70746","volume":"34","author":"T Breaux","year":"2008","unstructured":"Breaux T, Ant\u00f3n A (2008) Analyzing regulatory rules for privacy and security requirements. IEEE Trans Softw Eng 34(1):5\u201320. https:\/\/doi.org\/10.1109\/TSE.2007.70746","journal-title":"IEEE Trans Softw Eng"},{"key":"10175_CR13","unstructured":"Business Rules Group (2003) The Business Rules Manifesto. https:\/\/www.businessrulesgroup.org\/brmanifesto.htm"},{"key":"10175_CR14","doi-asserted-by":"publisher","unstructured":"Cemus K, Cerny T, Donahoo MJ (2015) Evaluation of approaches to business rules maintenance in enterprise information systems. In: Proceedings of the 2015 conference on research in adaptive and convergent systems, RACS. https:\/\/doi.org\/10.1145\/2811411.2811476. Association for Computing Machinery, New York, pp 324\u2013329","DOI":"10.1145\/2811411.2811476"},{"key":"10175_CR15","doi-asserted-by":"publisher","unstructured":"Cerny T, Donahoo MJ (2011) How to reduce costs of business logic maintenance. In: 2011 IEEE International conference on computer science and automation engineering. https:\/\/doi.org\/10.1109\/CSAE.2011.5953174, vol 1, pp 77\u201382","DOI":"10.1109\/CSAE.2011.5953174"},{"key":"10175_CR16","doi-asserted-by":"publisher","unstructured":"Chaparro O, Aponte J, Ortega F, Marcus A (2012) Towards the automatic extraction of structural business rules from legacy databases. In: 2012 19th Working conference on reverse engineering. https:\/\/doi.org\/10.1109\/WCRE.2012.57, pp 479\u2013488","DOI":"10.1109\/WCRE.2012.57"},{"key":"10175_CR17","doi-asserted-by":"publisher","unstructured":"Cleland-Huang J, Gotel OCZ, Huffman Hayes J, M\u00e4der P, Zisman A (2014a) Software traceability: trends and future directions. In: Proceedings of the on future of software engineering (FOSE 2014), FOSE 2014. https:\/\/doi.org\/10.1145\/2593882.2593891. ACM, New York, pp 55\u201369","DOI":"10.1145\/2593882.2593891"},{"key":"10175_CR18","doi-asserted-by":"publisher","unstructured":"Cleland-Huang J, Rahimi M, M\u00e4der P (2014b) Achieving lightweight trustworthy traceability. In: Proceedings of the 22nd ACM SIGSOFT International symposium on foundations of software engineering, FSE 2014. https:\/\/doi.org\/10.1145\/2635868.2666612. Association for Computing Machinery, New York, pp 849\u2013852","DOI":"10.1145\/2635868.2666612"},{"issue":"1","key":"10175_CR19","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1177\/001316446002000104","volume":"20","author":"J Cohen","year":"1960","unstructured":"Cohen J (1960) A coefficient of agreement for nominal scales. Educ Psychol Meas 20(1):37\u201346","journal-title":"Educ Psychol Meas"},{"key":"10175_CR20","doi-asserted-by":"crossref","unstructured":"Cosentino V, Cabot J, Albert P, Bauquel P, Perronnet J (2012) A model driven reverse engineering framework for extracting business rules out of a java application. In: Bikakis A, Giurca A (eds) Rules on the web: research and applications. Lecture Notes in Computer Science. Springer, Berlin, pp 17\u201331","DOI":"10.1007\/978-3-642-32689-9_3"},{"key":"10175_CR21","doi-asserted-by":"publisher","unstructured":"Cosentino V, Cabot J, Albert P, Bauquel P, Perronnet J (2013) Extracting business rules from COBOL: a model-based framework. In: Proceedings of the 20th working conference on reverse engineering (WCRE). https:\/\/doi.org\/10.1109\/WCRE.2013.6671316, pp 409\u2013416","DOI":"10.1109\/WCRE.2013.6671316"},{"key":"10175_CR22","doi-asserted-by":"publisher","unstructured":"De Lucia A, Marcus A, Oliveto R, Poshyvanyk D (2012) Information retrieval methods for automated traceability recovery. In: Cleland-Huang J, Gotel O, Zisman A (eds) Software and systems traceability. https:\/\/doi.org\/10.1007\/978-1-4471-2239-5_4. Springer, London, pp 71\u201398","DOI":"10.1007\/978-1-4471-2239-5_4"},{"issue":"12","key":"10175_CR23","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1145\/290133.290149","volume":"41","author":"R D\u00f6mges","year":"1998","unstructured":"D\u00f6mges R, Pohl K (1998) Adapting traceability environments to project-specific needs. Commun ACM 41(12):54\u201362. https:\/\/doi.org\/10.1145\/290133.290149","journal-title":"Commun ACM"},{"key":"10175_CR24","doi-asserted-by":"publisher","unstructured":"Dong J, Zhao Y (2007) Experiments on design pattern discovery. In: Proceedings of the 3rd international workshop on predictor models in software engineering (PROMISE). https:\/\/doi.org\/10.1109\/PROMISE.2007.6. IEEE Computer Society, Washington, DC, pp 12\u201312","DOI":"10.1109\/PROMISE.2007.6"},{"key":"10175_CR25","doi-asserted-by":"publisher","unstructured":"Eaddy M, Aho AV, Antoniol G, Gu\u00e9h\u00e9neuc yg (2008a) cerberus: tracing requirements to source code using information retrieval, dynamic analysis, and program analysis. In: Proceedings of the 16th IEEE international conference on program comprehension. https:\/\/doi.org\/10.1109\/ICPC.2008.39, pp 53\u201362","DOI":"10.1109\/ICPC.2008.39"},{"issue":"4","key":"10175_CR26","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1109\/TSE.2008.36","volume":"34","author":"M Eaddy","year":"2008","unstructured":"Eaddy M, Zimmermann T, Sherwood KD, Garg V, Murphy GC, Nagappan N, Aho AV (2008b) Do crosscutting concerns cause defects? IEEE Trans Softw Eng 34(4):497\u2013515. https:\/\/doi.org\/10.1109\/TSE.2008.36","journal-title":"IEEE Trans Softw Eng"},{"key":"10175_CR27","doi-asserted-by":"publisher","unstructured":"Fard AM, Mesbah A (2013) JSNOSE: detecting JavaScript code smells. In: 2013 IEEE 13th International working conference on source code analysis and manipulation (SCAM). https:\/\/doi.org\/10.1109\/SCAM.2013.6648192, pp 116\u2013125","DOI":"10.1109\/SCAM.2013.6648192"},{"key":"10175_CR28","doi-asserted-by":"crossref","unstructured":"Florez JM, Moreno L, Zhang Z, Wei S, Marcus A (2022) An empirical study of data constraint implementations in Java (Replication Package). https:\/\/doi.org\/10.5281\/zenodo.6624695","DOI":"10.1007\/s10664-022-10175-w"},{"key":"10175_CR29","volume-title":"Refactoring: improving the design of existing code","author":"M Fowler","year":"2018","unstructured":"Fowler M (2018) Refactoring: improving the design of existing code. Addison-Wesley Professional, Boston"},{"key":"10175_CR30","doi-asserted-by":"publisher","unstructured":"Gabel M, Jiang L, Su Z (2008) Scalable detection of semantic clones. In: Proceedings of the 30th international conference on software engineering, ICSE \u201908. https:\/\/doi.org\/10.1145\/1368088.1368132. Association for Computing Machinery, New York, pp 321\u2013330","DOI":"10.1145\/1368088.1368132"},{"key":"10175_CR31","volume-title":"Design patterns: elements of reusable object-oriented software","author":"E Gamma","year":"1995","unstructured":"Gamma E, Helm R, Johnson R, Vlissides J (1995) Design patterns: elements of reusable object-oriented software. Addison-Wesley Longman Publishing Co. Inc., Boston"},{"key":"10175_CR32","unstructured":"Google (2021a) Guava: Google core libraries for java. https:\/\/github.com\/google\/guava"},{"key":"10175_CR33","unstructured":"Google (2021b) Guava: preconditions. https:\/\/github.com\/google\/guava\/wiki\/PreconditionsExplained#preconditions"},{"issue":"5","key":"10175_CR34","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1109\/TSE.2008.48","volume":"34","author":"YG Gu\u00e9h\u00e9neuc","year":"2008","unstructured":"Gu\u00e9h\u00e9neuc YG, Antoniol G (2008) DeMIMA: a multilayered approach for design pattern identification. IEEE Trans Softw Eng 34(5):667\u2013684. https:\/\/doi.org\/10.1109\/TSE.2008.48","journal-title":"IEEE Trans Softw Eng"},{"key":"10175_CR35","doi-asserted-by":"publisher","unstructured":"Gu\u00e9h\u00e9neuc Y G, Sahraoui HA, Zaidi F (2004) Fingerprinting design patterns. In: Proceedings of the 11th working conference on reverse engineering (WCRE). https:\/\/doi.org\/10.1109\/WCRE.2004.21, pp 172\u2013181","DOI":"10.1109\/WCRE.2004.21"},{"key":"10175_CR36","doi-asserted-by":"publisher","unstructured":"Guo J, Zou Y (2008) Detecting clones in business applications. In: 2008 15th Working conference on reverse engineering. https:\/\/doi.org\/10.1109\/WCRE.2008.12, pp 91\u2013100","DOI":"10.1109\/WCRE.2008.12"},{"key":"10175_CR37","doi-asserted-by":"publisher","unstructured":"Guo J, Cheng J, Cleland-Huang J (2017) Semantically enhanced software traceability using deep learning techniques. In: Proceedings of the 39th IEEE\/ACM international conference on software engineering (ICSE). https:\/\/doi.org\/10.1109\/ICSE.2017.9, pp 3\u201314","DOI":"10.1109\/ICSE.2017.9"},{"issue":"4","key":"10175_CR38","doi-asserted-by":"publisher","first-page":"1117","DOI":"10.1587\/transinf.2015EDP7202","volume":"E99.D","author":"T Hatano","year":"2016","unstructured":"Hatano T, Ishio T, Okada J, Sakata Y, Inoue K (2016) Dependency-based extraction of conditional statements for understanding business rules. IEICE Trans Inf Syst E99.D(4):1117\u20131126. https:\/\/doi.org\/10.1587\/transinf.2015EDP7202","journal-title":"IEICE Trans Inf Syst"},{"key":"10175_CR39","unstructured":"Hay D, Healy KA (2000) Defining business rules ${\\sim }$ what are they really?, rev 1.3 edn. Business Rule Group"},{"key":"10175_CR40","unstructured":"HTTP Working Group (2021) Hypertext transfer protocol\u2014HTTP\/1.0. https:\/\/www.w3.org\/Protocols\/HTTP\/1.0\/draft-ietf-http-spec.html"},{"key":"10175_CR41","doi-asserted-by":"publisher","unstructured":"Huang H, Tsai WT, Bhattacharya S, Chen X, Wang Y, Sun J (1996) Business rule extraction from legacy code. In: Proceedings of the 20th international computer software and applications conference (COMPSAC). https:\/\/doi.org\/10.1109\/CMPSAC.1996.544158, pp 162\u2013167","DOI":"10.1109\/CMPSAC.1996.544158"},{"key":"10175_CR42","unstructured":"iTrust (2021a) Chronic disease risks. See replication package"},{"key":"10175_CR43","unstructured":"iTrust (2021b) UC51 enter\/edit basic health metrics. See replication package"},{"key":"10175_CR44","unstructured":"JavaParser (2021) JavaParser. https:\/\/javaparser.org\/"},{"key":"10175_CR45","unstructured":"jEdit (2021) Closing and exiting. http:\/\/www.jedit.org\/users-guide\/closing-exiting.html"},{"key":"10175_CR46","unstructured":"Joda-Time (2021) GregorianJulian (GJ) calendar system. https:\/\/www.joda.org\/joda-time\/calgj.html"},{"key":"10175_CR47","doi-asserted-by":"publisher","unstructured":"Kaczor O, Gu\u00e9h\u00e9neuc YG, Hamel S (2006) Efficient identification of design patterns with bit-vector algorithm. In: Proceedings of the 10th European conference on software maintenance and reengineering (CSMR). https:\/\/doi.org\/10.1109\/CSMR.2006.25, pp 10\u2013184","DOI":"10.1109\/CSMR.2006.25"},{"key":"10175_CR48","doi-asserted-by":"publisher","unstructured":"Kapser C, Godfrey MW (2006) \u201cCloning considered harmful\u201d considered harmful. In: Proceedings of the 13th working conference on reverse engineering (WCRE). https:\/\/doi.org\/10.1109\/WCRE.2006.1, pp 19\u201328","DOI":"10.1109\/WCRE.2006.1"},{"key":"10175_CR49","doi-asserted-by":"publisher","unstructured":"Komondoor R, Horwitz S (2001) Using slicing to identify duplication in source code. In: Cousot P (ed) Static analysis. Lecture Notes in Computer Science. https:\/\/doi.org\/10.1007\/3-540-47764-0_3. Springer, Berlin, pp 40\u201356","DOI":"10.1007\/3-540-47764-0_3"},{"key":"10175_CR50","volume-title":"Content analysis: an introduction to its methodology","author":"K Krippendorff","year":"2004","unstructured":"Krippendorff K (2004) Content analysis: an introduction to its methodology. Sage, Thousand Oaks"},{"key":"10175_CR51","doi-asserted-by":"publisher","unstructured":"Kuang H, Nie J, Hu H, Rempel P, L\u00fc J, Egyed A, M\u00e4der P (2017) Analyzing closeness of code dependencies for improving IR-based traceability recovery. In: Proceedings of the 24th IEEE international conference on software analysis, evolution and reengineering (SANER). https:\/\/doi.org\/10.1109\/SANER.2017.7884610, pp 68\u201378","DOI":"10.1109\/SANER.2017.7884610"},{"key":"10175_CR52","unstructured":"Larman C (2005) Applying UML and patterns: an introduction to object-oriented analysis and design and iterative development. In: Applying UML and patterns: an introduction to object-oriented analysis and design and iterative development, 3rd edn. PTR, 2005. Prentice Hall, Upper Saddle River"},{"issue":"2","key":"10175_CR53","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1145\/2644805","volume":"58","author":"B Livshits","year":"2015","unstructured":"Livshits B, Sridharan M, Smaragdakis Y, Lhot\u00e1k O, Amaral JN, Chang BYE, Guyer SZ, Khedker UP, M\u00f8ller A, Vardoulakis D (2015) In defense of soundiness: a manifesto. Commun ACM 58(2):44\u201346. https:\/\/doi.org\/10.1145\/2644805","journal-title":"Commun ACM"},{"issue":"3","key":"10175_CR54","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MS.2013.60","volume":"30","author":"P M\u00e4der","year":"2013","unstructured":"M\u00e4der P, Jones PL, Zhang Y, Cleland-Huang J (2013) Strategic traceability for safety-critical projects. IEEE Softw 30(3):58\u201366. https:\/\/doi.org\/10.1109\/MS.2013.60","journal-title":"IEEE Softw"},{"key":"10175_CR55","doi-asserted-by":"publisher","unstructured":"McMillan C, Poshyvanyk D, Revelle M (2009) Combining textual and structural analysis of software artifacts for traceability link recovery. In: Proceedings of the 5th ICSE workshop on traceability in emerging forms of software engineering (TEFSE). https:\/\/doi.org\/10.1109\/TEFSE.2009.5069582. IEEE Computer Society, Washington, DC, pp 41\u201348","DOI":"10.1109\/TEFSE.2009.5069582"},{"key":"10175_CR56","volume-title":"Qualitative data analysis: a methods sourcebook, 3rd edn","author":"MB Miles","year":"2014","unstructured":"Miles MB, Huberman AM, Salda\u00f1a J (2014) Qualitative data analysis: a methods sourcebook, 3rd edn. SAGE Publications, Inc, Thousand Oaks"},{"issue":"3","key":"10175_CR57","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1109\/TSE.2015.2479217","volume":"42","author":"M Mirakhorli","year":"2016","unstructured":"Mirakhorli M, Cleland-Huang J (2016) Detecting, tracing, and monitoring architectural tactics in code. IEEE Trans Softw Eng 42(3):205\u2013220. https:\/\/doi.org\/10.1109\/TSE.2015.2479217","journal-title":"IEEE Trans Softw Eng"},{"key":"10175_CR58","volume-title":"Practical C programming, 3rd edn. Nutshell Handbook","author":"S Oualline","year":"1997","unstructured":"Oualline S (1997) Practical C programming, 3rd edn. Nutshell Handbook. O\u2019Reilly, Sebastopol"},{"key":"10175_CR59","doi-asserted-by":"publisher","unstructured":"Pandita R, Xiao X, Zhong H, Xie T, Oney S, Paradkar A (2012) Inferring method specifications from natural language API descriptions. In: 2012 34th International conference on software engineering (ICSE). https:\/\/doi.org\/10.1109\/ICSE.2012.6227137, pp 815\u2013825","DOI":"10.1109\/ICSE.2012.6227137"},{"key":"10175_CR60","doi-asserted-by":"publisher","unstructured":"Park C, Kang Y, Wu C, Yi K (2004) A static reference flow analysis to understand design pattern behavior. In: Proceedings of the 11th working conference on reverse engineering (WCRE). https:\/\/doi.org\/10.1109\/WCRE.2004.9, pp 300\u2013301","DOI":"10.1109\/WCRE.2004.9"},{"key":"10175_CR61","doi-asserted-by":"publisher","unstructured":"Rahimi M, Goss W, Cleland-Huang J (2016) Evolving requirements-to-code trace links across versions of a software system. In: 2016 IEEE International conference on software maintenance and evolution (ICSME). https:\/\/doi.org\/10.1109\/ICSME.2016.57, pp 99\u2013109","DOI":"10.1109\/ICSME.2016.57"},{"issue":"1","key":"10175_CR62","doi-asserted-by":"publisher","first-page":"2:1","DOI":"10.1145\/3280988","volume":"28","author":"A Razzaq","year":"2018","unstructured":"Razzaq A, Wasala A, Exton C, Buckley J (2018) The state of empirical evaluation in static feature location. Trans Softw Eng Methodol 28(1):2:1\u20132:58. https:\/\/doi.org\/10.1145\/3280988","journal-title":"Trans Softw Eng Methodol"},{"key":"10175_CR63","doi-asserted-by":"publisher","unstructured":"Rempel P, M\u00e4der P, Kuschke T, Cleland-Huang J (2014) Mind the gap: assessing the conformance of software traceability to relevant guidelines. In: Proceedings of the 36th IEEE\/ACM international conference on software engineering (ICSE), ICSE 2014. https:\/\/doi.org\/10.1145\/2568225.2568290. Association for Computing Machinery, Hyderabad, pp 943\u2013954","DOI":"10.1145\/2568225.2568290"},{"key":"10175_CR64","unstructured":"Rhino (2021) ECMAScript language specification. https:\/\/www.ecma-international.org\/publications\/files\/ECMA-ST-ARCH\/ECMA-262%203rd%20edition,%20December%201999.pdf"},{"issue":"7","key":"10175_CR65","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1016\/j.scico.2009.02.007","volume":"74","author":"CK Roy","year":"2009","unstructured":"Roy CK, Cordy JR, Koschke R (2009) Comparison and evaluation of code clone detection techniques and tools: a qualitative approach. Sci Comput Program 74(7):470\u2013495","journal-title":"Sci Comput Program"},{"key":"10175_CR66","doi-asserted-by":"publisher","unstructured":"Saied MA, Sahraoui H, Dufour B (2015) An observational study on API usage constraints and their documentation. In: 2015 IEEE 22nd International conference on software analysis, evolution, and reengineering (SANER). https:\/\/doi.org\/10.1109\/SANER.2015.7081813, pp 33\u201342","DOI":"10.1109\/SANER.2015.7081813"},{"key":"10175_CR67","doi-asserted-by":"publisher","unstructured":"Shi N, Olsson RA (2006) Reverse engineering of design patterns from Java source code. In: Proceedings of the 21st IEEE\/ACM international conference on automated software engineering (ASE). https:\/\/doi.org\/10.1109\/ASE.2006.57, pp 123\u2013134","DOI":"10.1109\/ASE.2006.57"},{"key":"10175_CR68","doi-asserted-by":"publisher","unstructured":"Sneed HM (2001) Extracting business logic from existing COBOL programs as a basis for redevelopment. In: Proceedings of the 9th IEEE workshop on program comprehension (IWPC). https:\/\/doi.org\/10.1109\/WPC.2001.921728, pp 167\u2013175","DOI":"10.1109\/WPC.2001.921728"},{"key":"10175_CR69","doi-asserted-by":"publisher","unstructured":"Sneed HM, Erd\u00f6s K (1996) Extracting business rules from source code. In: Proceedings of the 4th IEEE workshop on program comprehension (WPC). https:\/\/doi.org\/10.1109\/WPC.1996.501138, Berlin, pp 240\u2013247","DOI":"10.1109\/WPC.1996.501138"},{"issue":"3","key":"10175_CR70","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/s00766-011-0121-4","volume":"16","author":"H Sultanov","year":"2011","unstructured":"Sultanov H, Hayes JH, Kong WK (2011) Application of swarm techniques to requirements tracing. Requir Eng 16(3):209\u2013226. https:\/\/doi.org\/10.1007\/s00766-011-0121-4","journal-title":"Requir Eng"},{"key":"10175_CR71","unstructured":"Swarm (2021) Seismic wave analysis and real-time monitor: user manual and reference guide. Version 2.8.10. https:\/\/github.com\/usgs\/swarm\/blob\/97f8b2f26830c764b816ca0a74270d5c0db35d06\/docs\/swarm_v2.pdf"},{"issue":"6","key":"10175_CR72","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1177\/2167696815587648","volume":"3","author":"M Syed","year":"2015","unstructured":"Syed M, Nelson SC (2015) Guidelines for establishing reliability when coding narrative data. Emerging Adulthood 3 (6):375\u2013387. https:\/\/doi.org\/10.1177\/2167696815587648","journal-title":"Emerging Adulthood"},{"key":"10175_CR73","doi-asserted-by":"publisher","unstructured":"Tan SH, Marinov D, Tan L, Leavens GT (2012) @tComment: testing Javadoc comments to detect comment-code inconsistencies. In: Verification and validation 2012 IEEE fifth international conference on software testing. https:\/\/doi.org\/10.1109\/ICST.2012.106, pp 260\u2013269","DOI":"10.1109\/ICST.2012.106"},{"issue":"1","key":"10175_CR74","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10664-009-9108-x","volume":"15","author":"S Thummalapenta","year":"2010","unstructured":"Thummalapenta S, Cerulo L, Aversano L, Di Penta M (2010) An empirical study on the maintenance of source code clones. Empir Softw Eng 15 (1):1\u201334. https:\/\/doi.org\/10.1007\/s10664-009-9108-x","journal-title":"Empir Softw Eng"},{"key":"10175_CR75","unstructured":"Tip F (1994) A survey of program slicing techniques. Tech. rep. CWI, Centre for Mathematics and Computer Science, NLD"},{"issue":"11","key":"10175_CR76","doi-asserted-by":"publisher","first-page":"896","DOI":"10.1109\/TSE.2006.112","volume":"32","author":"N Tsantalis","year":"2006","unstructured":"Tsantalis N, Chatzigeorgiou A, Stephanides G, Halkidis ST (2006) Design pattern detection using similarity scoring. IEEE Trans Softw Eng 32(11):896\u2013909. https:\/\/doi.org\/10.1109\/TSE.2006.112","journal-title":"IEEE Trans Softw Eng"},{"key":"10175_CR77","unstructured":"WALA (2021) WALA: T.J. Watson Libraries for analysis. https:\/\/github.com\/wala\/WALA"},{"issue":"7","key":"10175_CR78","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1016\/j.sysarc.2003.09.006","volume":"50","author":"WMN Wan-Kadir","year":"2004","unstructured":"Wan-Kadir WMN, Loucopoulos P (2004) Relating evolving business rules to software design. J Syst Archit 50(7):367\u2013382. https:\/\/doi.org\/10.1016\/j.sysarc.2003.09.006","journal-title":"J Syst Archit"},{"key":"10175_CR79","doi-asserted-by":"publisher","unstructured":"Wang X, Sun J, Yang X, He Z, Maddineni S (2004) Business rules extraction from large legacy systems. In: Proceedings of the 8th European conference on software maintenance and reengineering (CSMR). https:\/\/doi.org\/10.1109\/CSMR.2004.1281426, pp 249\u2013258","DOI":"10.1109\/CSMR.2004.1281426"},{"key":"10175_CR80","volume-title":"Software requirements, 3rd edn","author":"KE Wiegers","year":"2013","unstructured":"Wiegers KE, Beatty J (2013) Software requirements, 3rd edn. Microsoft Press, Redmond"},{"key":"10175_CR81","volume-title":"Writing effective business rules: a practical method","author":"GC Witt","year":"2012","unstructured":"Witt GC (2012) Writing effective business rules: a practical method. Morgan Kaufmann, Waltham"},{"key":"10175_CR82","doi-asserted-by":"publisher","unstructured":"Xiao X, Paradkar A, Thummalapenta S, Xie T (2012) Automated extraction of security policies from natural-language software documents. In: Proceedings of the ACM SIGSOFT 20th international symposium on the foundations of software engineering, FSE \u201912. https:\/\/doi.org\/10.1145\/2393596.2393608. Association for Computing Machinery, New York, pp 1\u201311","DOI":"10.1145\/2393596.2393608"},{"key":"10175_CR83","doi-asserted-by":"publisher","unstructured":"Yang J, Sethi U, Yan C, Cheung A, Lu S (2020) Managing data constraints in database-backed web applications. In: Proceedings of the 42nd ACM\/IEEE international conference on software engineering (ICSE), ICSE \u201920. https:\/\/doi.org\/10.1145\/3377811.3380375. Association for Computing Machinery, New York, pp 1098\u20131109","DOI":"10.1145\/3377811.3380375"},{"key":"10175_CR84","doi-asserted-by":"publisher","unstructured":"Zhou Y, Gu R, Chen T, Huang Z, Panichella S, Gall H (2017) Analyzing APIs documentation and code to detect directive defects. In: 2017 IEEE\/ACM 39th international conference on software engineering (ICSE). https:\/\/doi.org\/10.1109\/ICSE.2017.11, pp 27\u201337","DOI":"10.1109\/ICSE.2017.11"},{"key":"10175_CR85","doi-asserted-by":"publisher","unstructured":"Zogaan W, Sharma P, Mirahkorli M, Arnaoudova V (2017) Datasets from fifteen years of automated requirements traceability research: current state, characteristics, and quality. In: Proceedings of the 25th IEEE international requirements engineering conference (RE). https:\/\/doi.org\/10.1109\/RE.2017.80, pp 110\u2013121","DOI":"10.1109\/RE.2017.80"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-022-10175-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-022-10175-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-022-10175-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,26]],"date-time":"2022-07-26T05:15:08Z","timestamp":1658812508000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-022-10175-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,16]]},"references-count":85,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["10175"],"URL":"https:\/\/doi.org\/10.1007\/s10664-022-10175-w","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"type":"print","value":"1382-3256"},{"type":"electronic","value":"1573-7616"}],"subject":[],"published":{"date-parts":[[2022,6,16]]},"assertion":[{"value":"10 May 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 June 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There are no conflicts of interest or competing interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}],"article-number":"119"}}