{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T04:18:34Z","timestamp":1759033114527,"version":"3.37.3"},"reference-count":68,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,2,4]],"date-time":"2019-02-04T00:00:00Z","timestamp":1549238400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Software Qual J"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s11219-018-9428-4","type":"journal-article","created":{"date-parts":[[2019,2,4]],"date-time":"2019-02-04T04:03:32Z","timestamp":1549253012000},"page":"969-1014","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["API trustworthiness: an ontological approach for software library adoption"],"prefix":"10.1007","volume":"27","author":[{"given":"Ellis E.","family":"Eghan","sequence":"first","affiliation":[]},{"given":"Sultan S.","family":"Alqahtani","sequence":"additional","affiliation":[]},{"given":"Christopher","family":"Forbes","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5441-0385","authenticated-orcid":false,"given":"Juergen","family":"Rilling","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,4]]},"reference":[{"key":"9428_CR1","unstructured":"Alqahtani, S. S., Eghan, E. E., & Rilling, J. (2016). SV-AF\u2014a Security Vulnerability Analysis Framework, in 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE), pp. 219\u2013229."},{"key":"9428_CR2","doi-asserted-by":"crossref","unstructured":"Alqahtani, S. S., Eghan, E. E., & Rilling, J. (2017). Recovering semantic traceability links between APIs and security vulnerabilities: an ontological modeling approach. 10th IEEE International Conference on Software Testing, Verification and Validation.","DOI":"10.1109\/ICST.2017.15"},{"key":"9428_CR3","doi-asserted-by":"crossref","unstructured":"Artho, C., Suzaki, K., Di Cosmo, R., Treinen, R., Zacchiroli, S., & A. P. S. Distributions (2012). Why do software packages conflict?, 141\u2013150.","DOI":"10.1109\/MSR.2012.6224274"},{"key":"9428_CR4","unstructured":"Atkinson, C., Gutheil, M., & Kiko, K. (2006). On the relationship of ontologies and models. Proc. 2nd Work. MetaModelling Ontol. WoMM06 LNI P96 Gesellschaft fur Inform. Bonn, 47\u201360."},{"key":"9428_CR5","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-1-4614-6596-6_9","volume-title":"Developing software with open source software components. Finding source code on the web for remix and reuse","author":"C Ayala","year":"2013","unstructured":"Ayala, C., Franch, X., Conradi, R., Li, J., & Cruzes, D. (2013). Developing software with open source software components. Finding source code on the web for remix and reuse (pp. 167\u2013186). New York: Springer New York."},{"key":"9428_CR6","doi-asserted-by":"crossref","unstructured":"Bergel, A., Denier, S., Ducasse, S., Laval, J., Bellingard, F., Vaillergues, P., Balmas, F., & Mordal-Manet, K. (2009). SQUALE\u2014Software QUALity Enhancement. 2009 13th European Conference on Software Maintenance and Reengineering, 285\u2013288.","DOI":"10.1109\/CSMR.2009.13"},{"issue":"5","key":"9428_CR7","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1038\/scientificamerican0501-34","volume":"284","author":"T Berners-Lee","year":"2001","unstructured":"Berners-Lee, T., Hendler, J., & Lassila, O. (2001). The Semantic Web. Scientific American, 284(5), 34\u201343.","journal-title":"Scientific American"},{"key":"9428_CR8","doi-asserted-by":"crossref","unstructured":"Boland, T., Cleraux, C., & Fong, E. (2010). Toward a preliminary framework for assessing the trustworthiness of software (pp. 1\u201331). Gaithersburg: National Institute of Standards TechnologyInteragency\/Internal Report, U.S. Department of Commerce.","DOI":"10.6028\/NIST.IR.7755"},{"key":"9428_CR9","doi-asserted-by":"crossref","unstructured":"Cadariu, M., Bouwers, E., Visser, J., & Van Deursen, A. (2015). Tracking known security vulnerabilities in proprietary software systems. 2015 IEEE 22nd Int. Conf. Softw. Anal. Evol. Reengineering, SANER 2015 - Proc, 516\u2013519.","DOI":"10.1109\/SANER.2015.7081868"},{"key":"9428_CR10","doi-asserted-by":"crossref","unstructured":"Cingolani, P., & Alcala-Fdez, J. (2012). jFuzzyLogic: a robust and flexible Fuzzy-Logic inference system language implementation. 2012 IEEE International Conference on Fuzzy Systems, 1\u20138.","DOI":"10.1109\/FUZZ-IEEE.2012.6251215"},{"key":"9428_CR11","unstructured":"Cossette, B. E. & Walker, R. J. (2012). Seeking the ground truth: a retroactive study on the evolution and migration of software libraries. Proc. ACM SIGSOFT 20th Int. Symp. Found. Softw. Eng, 55:1\u201355."},{"key":"9428_CR12","doi-asserted-by":"crossref","unstructured":"Decan, A., Mens, T., Claes, M., & Grosjean, P. (2016). When GitHub meets CRAN: an analysis of inter-repository package dependency problems. 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER), 493\u2013504.","DOI":"10.1109\/SANER.2016.12"},{"key":"9428_CR13","doi-asserted-by":"crossref","unstructured":"Di Penta, M., German, D. M., Gu\u00e9h\u00e9neuc, Y.-G., and Antoniol, G. (2010). An exploratory study of the evolution of software licensing, Proc. 32nd ACM\/IEEE Int. Conf. Softw. Eng. - ICSE \u201810, vol. 1, p. 145.","DOI":"10.1145\/1806799.1806824"},{"issue":"2","key":"9428_CR14","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1002\/smr.328","volume":"18","author":"D Dig","year":"2006","unstructured":"Dig, D., & Johnson, R. (2006). How do APIs evolve? A story of refactoring. Journal of Software Maintenance and Evolution: Research and Practice, 18(2), 83\u2013107.","journal-title":"Journal of Software Maintenance and Evolution: Research and Practice"},{"key":"9428_CR15","volume-title":"Learning SPARQL","author":"B DuCharme","year":"2011","unstructured":"DuCharme, B. (2011). Learning SPARQL (2nd ed.). Sebastopol: O\u2019Reilly Media.","edition":"2"},{"key":"9428_CR16","unstructured":"F. S. Foundation (2014). Various licenses and comments about them. GNU Project [Online]. Available: \n                    https:\/\/www.gnu.org\/licenses\/license-list.en.html\n                    \n                  . Accessed 22 July 2017."},{"issue":"5","key":"9428_CR17","first-page":"38","volume":"32","author":"JZ Gao","year":"1999","unstructured":"Gao, J. Z., Chen, C., Toyoshima, Y., & Leung, D. K. (1999). Engineering on the Internet for global software production. Computer (Long. Beach. Calif)., 32(5), 38\u201347.","journal-title":"Computer (Long. Beach. Calif)."},{"key":"9428_CR18","doi-asserted-by":"crossref","unstructured":"German, D. M. & Hassan, A. E., (2009). License integration patterns: addressing license mismatches in component-based development. 2009 IEEE 31st International Conference on Software Engineering, 188\u2013198.","DOI":"10.1109\/ICSE.2009.5070520"},{"key":"9428_CR19","doi-asserted-by":"crossref","unstructured":"Hemel, A., Kalleberg, K. T., Vermaas, R., & Dolstra, E. (2011). Finding software license violations through binary code clone detection. Proceeding of the 8th working conference on Mining software repositories - MSR \u201811, 63\u201372.","DOI":"10.1145\/1985441.1985453"},{"issue":"2","key":"9428_CR20","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1016\/j.jss.2010.10.025","volume":"84","author":"B Henderson-Sellers","year":"2011","unstructured":"Henderson-Sellers, B. (2011). Bridging metamodels and ontologies in software engineering. Journal of Systems and Software, 84(2), 301\u2013313.","journal-title":"Journal of Systems and Software"},{"key":"9428_CR21","unstructured":"Hmood, A., Schugerl, P., Rilling, J., & Charland, P. (2010). OntEQAM\u2014a methodology for assessing evolvability as a quality factor in software ecosystems. Defence R&D Canada - Valcartier, Valcartier QUE (CAN), 8."},{"key":"9428_CR22","doi-asserted-by":"crossref","unstructured":"Hmood, A., Keivanloo, I., & Rilling, J. (2012). SE-EQUAM\u2014an evolvable quality metamodel. 2012 IEEE 36th Annual Computer Software and Applications Conference Workshops, 334\u2013339.","DOI":"10.1109\/COMPSACW.2012.67"},{"key":"9428_CR23","doi-asserted-by":"crossref","unstructured":"Hora, A. & Valente, M. T. (2015). apiwave: keeping track of API popularity and migration, 321\u2013323.","DOI":"10.1109\/ICSM.2015.7332478"},{"key":"9428_CR24","unstructured":"I. E. Commission (2000). Programmable controllers\u2014part 7: fuzzy control programming."},{"key":"9428_CR25","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.infsof.2015.02.014","volume":"65","author":"K Jezek","year":"2015","unstructured":"Jezek, K., Dietrich, J., & Brada, P. (2015). How Java APIs break\u2014an empirical study. Information and Software Technology, 65, 129\u2013146.","journal-title":"Information and Software Technology"},{"key":"9428_CR26","doi-asserted-by":"crossref","unstructured":"Jiang, H., Zhang, J., Ren, Z., & Zhang, T. (2017). An unsupervised approach for discovering relevant tutorial fragments for APIs. 2017 IEEE\/ACM 39th International Conference on Software Engineering (ICSE), 38\u201348.","DOI":"10.1109\/ICSE.2017.12"},{"key":"9428_CR27","doi-asserted-by":"crossref","unstructured":"Kagdi, H., Yusuf, S., & Maletic, J. I. (2006). Mining sequences of changed-files from version histories. Proceedings of the 2006 international workshop on Mining software repositories - MSR \u201806, 47.","DOI":"10.1145\/1137983.1137996"},{"key":"9428_CR28","doi-asserted-by":"crossref","unstructured":"Kagdi, H., Collard, M. L., & Maletic, J. I. (2007). Comparing approaches to mining source code for call-usage patterns. Fourth International Workshop on Mining Software Repositories (MSR\u201907:ICSE Workshops 2007), 20\u201326.","DOI":"10.1109\/MSR.2007.3"},{"issue":"7","key":"9428_CR29","doi-asserted-by":"publisher","first-page":"654","DOI":"10.1109\/TSE.2002.1019480","volume":"28","author":"T Kamiya","year":"2002","unstructured":"Kamiya, T., Kusumoto, S., & Inoue, K. (2002). CCFinder: a multilinguistic token-based code clone detection system for large scale source code. IEEE Transactions on Software Engineering, 28(7), 654\u2013670.","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"10","key":"9428_CR30","doi-asserted-by":"publisher","first-page":"726","DOI":"10.1145\/1932682.1869518","volume":"45","author":"P Kapur","year":"2010","unstructured":"Kapur, P., Cossette, B., & Walker, R. J. (2010). Refactoring references for library migration. ACM SIGPLAN Notices, 45(10), 726.","journal-title":"ACM SIGPLAN Notices"},{"key":"9428_CR31","doi-asserted-by":"crossref","unstructured":"I. Keivanloo, C. Forbes, J. Rilling, and P. Charland, (2011). Towards sharing source code facts using linked data. Proceeding 3rd Int. Work. Search-driven Dev. users, infrastructure, tools, Eval. - SUITE \u201811, 25\u201328.","DOI":"10.1145\/1985429.1985436"},{"key":"9428_CR32","unstructured":"Kuhn, B. M., Sebro, A. K., & Gingerich, D. (2016). Chapter 10 The lesser GPL, Free Software Foundation & Software Freedom Law Center, . [Online]. Available: \n                    https:\/\/copyleft.org\/guide\/comprehensive-gpl-guidech11.html\n                    \n                  ."},{"key":"9428_CR33","doi-asserted-by":"crossref","unstructured":"del Bianco, V., Lavazza, L., Morasca, S., & Taibi, D. (2009). Quality of open source software: the QualiPSo trustworthiness model, 199\u2013212.","DOI":"10.1007\/978-3-642-02032-2_18"},{"key":"9428_CR34","doi-asserted-by":"crossref","unstructured":"Land, R., Sundmark, D., L\u00fcders, F., Krasteva, I., & Causevic, A. (2009). Reuse with software components\u2014a survey of industrial state of practice. Form. Found. Reuse Domain Eng, 150\u2013159.","DOI":"10.1007\/978-3-642-04211-9_15"},{"issue":"2","key":"9428_CR35","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1109\/MITP.2005.42","volume":"7","author":"D Larson","year":"2005","unstructured":"Larson, D., & Miller, K. (2005). Silver bullets for little monsters: making software more trustworthy. IT Prof., 7(2), 9\u201313.","journal-title":"IT Prof."},{"issue":"9","key":"9428_CR36","doi-asserted-by":"publisher","first-page":"1264","DOI":"10.1109\/TSE.2013.12","volume":"39","author":"W Maalej","year":"2013","unstructured":"Maalej, W., & Robillard, M. P. (2013). Patterns of knowledge in API reference documentation. IEEE Transactions on Software Engineering, 39(9), 1264\u20131282.","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"9\/10","key":"9428_CR37","doi-asserted-by":"publisher","first-page":"k.2003.06732iae","DOI":"10.1108\/k.2003.06732iae.006","volume":"32","author":"CJH Mann","year":"2003","unstructured":"Mann, C. J. H. (2003). The description logic handbook\u2014theory, implementation and applications. Kybernetes, 32(9\/10), k.2003.06732iae.006.","journal-title":"Kybernetes"},{"key":"9428_CR38","unstructured":"McCall, J. A., Richards, P. K., & Walters, G. F. (1977). Factors in software quality. Volume I. Concepts and definitions of software quality."},{"issue":"3\u20134","key":"9428_CR39","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/s10462-005-9012-8","volume":"24","author":"F McCarey","year":"2005","unstructured":"McCarey, F., Cinn\u00e9ide, M. \u00d3., & Kushmerick, N. (2005). Rascal: a recommender agent for agile reuse. Artificial Intelligence Review, 24(3\u20134), 253\u2013276.","journal-title":"Artificial Intelligence Review"},{"key":"9428_CR40","unstructured":"McGuinness, D. L. and Van Harmelen, F. (2004). Owl web ontology language overview. W3C Recomm. 10.2004\u201303, 2004, 1\u201312."},{"key":"9428_CR41","doi-asserted-by":"crossref","unstructured":"Mileva, Y. M., Dallmeier, V., Burger, M., & Zeller, A. (2009). Mining trends of library usage. Proc. Jt. Int. Annu. ERCIM Work. Princ. Softw. Evol. Softw. Evol, 57\u201362.","DOI":"10.1145\/1595808.1595821"},{"key":"9428_CR42","unstructured":"Mileva, Y. M., Dallmeier, V., & Zeller, A. (2010). Mining API popularity, Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 6303 LNCS, pp. 173\u2013180."},{"issue":"2","key":"9428_CR43","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MS.2010.159","volume":"28","author":"A Monden","year":"2011","unstructured":"Monden, A., Okahara, S., Manabe, Y., & Matsumoto, K. (2011). Guilty or not guilty: using clone metrics to determine open source licensing violations. IEEE Software, 28(2), 42\u201347.","journal-title":"IEEE Software"},{"key":"9428_CR44","doi-asserted-by":"crossref","unstructured":"Nguyen, V. H., Dashevskyi, S., & Massacci, F. (2016). An automatic method for assessing the versions affected by a vulnerability. Empirical Software Engineering, 21(6), 2268\u20132297.","DOI":"10.1007\/s10664-015-9408-2"},{"key":"9428_CR45","doi-asserted-by":"crossref","unstructured":"Parnas, D. L. (1994). Software aging. ICSE \u201894 Proceedings of the 16th international conference on Software engineering, 279\u2013287.","DOI":"10.1109\/ICSE.1994.296790"},{"issue":"8","key":"9428_CR46","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/6.144538","volume":"29","author":"SL Pfleeger","year":"1992","unstructured":"Pfleeger, S. L. (1992). Measuring software reliability. IEEE Spectrum, 29(8), 56\u201360.","journal-title":"IEEE Spectrum"},{"key":"9428_CR47","doi-asserted-by":"crossref","unstructured":"Plate, H., Ponta, S. E., & Sabetta, A. (2015). Impact assessment for vulnerabilities in open-source software libraries. 2015 IEEE 31st Int. Conf. Softw. Maint. Evol. ICSME 2015 \u2013 Proc, 411\u2013420.","DOI":"10.1109\/ICSM.2015.7332492"},{"key":"9428_CR48","doi-asserted-by":"crossref","unstructured":"Raemaekers, S., Van Deursen, A., & Visser, J. (2012). Measuring software library stability through historical version analysis. IEEE Int. Conf. Softw. Maintenance, ICSM, 378\u2013387.","DOI":"10.1109\/ICSM.2012.6405296"},{"key":"9428_CR49","unstructured":"Raemaekers, S., Van Deursen, A., & Visser, J. (2014). Semantic versioning versus breaking changes: a study of the maven repository. Proc. - 2014 14th IEEE Int. Work. Conf. Source Code Anal. Manip. SCAM 2014, 215\u2013224."},{"key":"9428_CR50","doi-asserted-by":"crossref","unstructured":"Rahman, M. M., Roy, C. K., & Lo, D. (2016). RACK: automatic API recommendation using crowdsourced knowledge. 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER). 349\u2013359.","DOI":"10.1109\/SANER.2016.80"},{"issue":"3","key":"9428_CR51","doi-asserted-by":"publisher","first-page":"209","DOI":"10.6028\/jres.115.013","volume":"115","author":"T Rhodes","year":"2010","unstructured":"Rhodes, T., Boland, F., Fong, E., & Kass, M. (2010). Software assurance using structured assurance case models. Journal of Research of the National Institute of Standards and Technology, 115(3), 209\u2013216.","journal-title":"Journal of Research of the National Institute of Standards and Technology"},{"key":"9428_CR52","doi-asserted-by":"crossref","unstructured":"Robbes, R., Lungu, M., & R\u00f6thlisberger, D. (2012). How do developers react to API deprecation?. Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering - FSE \u201812, 1.","DOI":"10.1145\/2393596.2393662"},{"key":"9428_CR53","doi-asserted-by":"crossref","unstructured":"Samoladas, I., Gousios, G., Spinellis, D., & Stamelos, I. (2008). The SQO-OSS quality model: measurement based open source software evaluation. Open Source Development, Communities and Quality, Boston, MA: Springer US, 237\u2013248.","DOI":"10.1007\/978-0-387-09684-1_19"},{"key":"9428_CR54","unstructured":"Seedorf, S. & Mannheim, F. F. I. U. (2006). Applications of ontologies in software engineering. In 2nd International Workshop on Semantic Web Enabled Software Engineering (SWESE 2006)."},{"key":"9428_CR55","unstructured":"Seneviratne, O., Kagal, L., Weitzner, D., Abelson, H., Berners-Lee, T., & Shadbolt, N. (2009). Detecting creative commons license violations on images on the world wide web. WWW2009."},{"key":"9428_CR56","unstructured":"Taibi, D. (2008). Defining an open source software trustworthiness model. Proc 3rd Int Dr Symp Emperical Software Eng, 4."},{"key":"9428_CR57","doi-asserted-by":"crossref","unstructured":"Tan, T., He, M., Yang, Y., Wang, Q., & Li, M. (2008). An analysis to understand software trustworthiness. 2008 The 9th International Conference for Young Computer Scientists, 2366\u20132371.","DOI":"10.1109\/ICYCS.2008.484"},{"key":"9428_CR58","doi-asserted-by":"crossref","unstructured":"Teyton, C., Falleri, J. R., & Blanc, X. (2012). Mining library migration graphs. Proceedings of Work. Conf. Reverse Eng. WCRE. 289\u2013298.","DOI":"10.1109\/WCRE.2012.38"},{"key":"9428_CR59","doi-asserted-by":"crossref","unstructured":"Thung, F., Lo, D., & Lawall, J. (2013). Automated library recommendation. Proceedings of Workshop Conference on Reverse Engineering. WCRE, 182\u2013191.","DOI":"10.1109\/WCRE.2013.6671293"},{"key":"9428_CR60","first-page":"1","volume-title":"The unfortunate reality of insecure libraries","author":"J Williams","year":"2012","unstructured":"Williams, J., & Dabirsiaghi, A. (2012). The unfortunate reality of insecure libraries (pp. 1\u201326). Appleton: Asp. Secur. Inc."},{"key":"9428_CR61","doi-asserted-by":"crossref","unstructured":"Witte R., Zhang Y., & Rilling J. (2007). Empowering software maintainers with semantic web technologies. ESWC, 4519, 37\u201352.","DOI":"10.1007\/978-3-540-72667-8_5"},{"key":"9428_CR62","doi-asserted-by":"crossref","unstructured":"Wu, Y., Manabe, Y., Kanda, T., German, D. M., & Inoue, K. (2015). A method to detect license inconsistencies in large-scale open source projects. 2015 IEEE\/ACM 12th Working Conference on Mining Software Repositories, 324\u2013333.","DOI":"10.1109\/MSR.2015.37"},{"issue":"11","key":"9428_CR63","doi-asserted-by":"publisher","first-page":"857","DOI":"10.1007\/s00607-012-0204-1","volume":"94","author":"M W\u00fcrsch","year":"2012","unstructured":"W\u00fcrsch, M., Ghezzi, G., Hert, M., Reif, G., & Gall, H. C. (2012). SEON: a pyramid of ontologies for software evolution and its applications. Computing, 94(11), 857\u2013885.","journal-title":"Computing"},{"key":"9428_CR64","doi-asserted-by":"crossref","unstructured":"Xavier, L., Brito, A., Hora, A., & Valente, M. T., (2017). Historical and impact analysis of API breaking changes: a large-scale study. 2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER), 138\u2013147.","DOI":"10.1109\/SANER.2017.7884616"},{"key":"9428_CR65","doi-asserted-by":"crossref","unstructured":"Yang Y., Wang Q., & Li M. (2009). Process trustworthiness as a capability indicator for measuring and improving software trustworthiness. ICSP, 5543, 389\u2013401.","DOI":"10.1007\/978-3-642-01680-6_35"},{"issue":"1","key":"9428_CR66","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/0020-0255(75)90017-1","volume":"9","author":"LA Zadeh","year":"1975","unstructured":"Zadeh, L. A. (1975). The concept of a linguistic variable and its application to approximate reasoning-III. Information Sciences, 9(1), 43\u201380.","journal-title":"Information Sciences"},{"issue":"3","key":"9428_CR67","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1049\/iet-sen:20070062","volume":"2","author":"Y Zhang","year":"2008","unstructured":"Zhang, Y., Witte, R., Rilling, J., & Haarslev, V. (2008). Ontological approach for the semantic recovery of traceability links between software artefacts. IET Software, 2(3), 185.","journal-title":"IET Software"},{"key":"9428_CR68","unstructured":"Zhong, H. & Mei, H. (2017). An empirical study on API usages. IEEE Trans. Softw. Eng. (Early Access), 1."}],"container-title":["Software Quality Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-018-9428-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11219-018-9428-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-018-9428-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,3]],"date-time":"2020-02-03T19:13:05Z","timestamp":1580757185000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11219-018-9428-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,4]]},"references-count":68,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["9428"],"URL":"https:\/\/doi.org\/10.1007\/s11219-018-9428-4","relation":{},"ISSN":["0963-9314","1573-1367"],"issn-type":[{"type":"print","value":"0963-9314"},{"type":"electronic","value":"1573-1367"}],"subject":[],"published":{"date-parts":[[2019,2,4]]},"assertion":[{"value":"4 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}