{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,14]],"date-time":"2024-07-14T23:26:57Z","timestamp":1720999617505},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2017,2,10]],"date-time":"2017-02-10T00:00:00Z","timestamp":1486684800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1007\/s11432-015-0860-9","type":"journal-article","created":{"date-parts":[[2017,2,14]],"date-time":"2017-02-14T03:11:22Z","timestamp":1487041882000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Reflective feature location: knowledge in mind meets information in system"],"prefix":"10.1007","volume":"60","author":[{"given":"Xin","family":"Peng","sequence":"first","affiliation":[]},{"given":"Zhengchang","family":"Xing","sequence":"additional","affiliation":[]},{"given":"Sen","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Wenyi","family":"Qian","sequence":"additional","affiliation":[]},{"given":"V\u00e1clav","family":"Rajlich","sequence":"additional","affiliation":[]},{"given":"Wenyun","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,2,10]]},"reference":[{"key":"860_CR1","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1002\/smr.567","volume":"25","author":"B Dit","year":"2013","unstructured":"Dit B, Revelle M, Gethers M, et al. Feature location in source code: a taxonomy and survey. J Softw Evol Proc, 2013, 25: 53\u201395","journal-title":"J Softw Evol Proc"},{"key":"860_CR2","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1145\/175290.175300","volume":"37","author":"T J Biggerstaff","year":"1994","unstructured":"Biggerstaff T J, Mitbander B G, Webster D E. Program understanding and the concept assignment problem. Commun ACM, 1994, 37: 72\u201382","journal-title":"Commun ACM"},{"key":"860_CR3","volume-title":"Software Engineering: the Current Practice","author":"V Rajlich","year":"2012","unstructured":"Rajlich V. Software Engineering: the Current Practice. 1st ed. BocaRaton: CRC Press, 2012","edition":"1"},{"key":"860_CR4","first-page":"271","volume-title":"The role of concepts in program comprehension","author":"V Rajlich","year":"2002","unstructured":"Rajlich V, Wilde N. The role of concepts in program comprehension. In: Proceedings of the 10th International Workshop on Program Comprehension, Paris, 2002. 271\u2013278"},{"key":"860_CR5","doi-asserted-by":"crossref","first-page":"1250018","DOI":"10.1142\/S0219649212500189","volume":"11","author":"L A Wilson","year":"2012","unstructured":"Wilson L A, Petrenko M, Rajlich V. Using concept maps to assist program comprehension and concept location: an empirical study. J Inf Knowl Manag, 2012. 11: 1250018","journal-title":"J Inf Knowl Manag"},{"key":"860_CR6","first-page":"351","volume-title":"On the use of relevance feedback in ir-based concept location","author":"G Gay","year":"2009","unstructured":"Gay G, Haiduc S, Marcus A, et al. On the use of relevance feedback in ir-based concept location. In: Proceedings of the 25th IEEE International Conference on Software Maintenance, Edmonton, 2009. 351\u2013360"},{"key":"860_CR7","first-page":"762","volume-title":"Improving feature location practice with multi-faceted interactive exploration","author":"J Wang","year":"2013","unstructured":"Wang J, Peng X, Xing Z, et al. Improving feature location practice with multi-faceted interactive exploration. In: Proceedings of the 35th International Conference on Software Engineering, San Francisco, 2013. 762\u2013771"},{"key":"860_CR8","first-page":"842","volume-title":"Automatic query reformulations for text retrieval in software engineering","author":"S Haiduc","year":"2013","unstructured":"Haiduc S, Bavota G, Marcus A, et al. Automatic query reformulations for text retrieval in software engineering. In: Proceedings of the 35th International Conference on Software Engineering, San Francisco, 2013. 842\u2013851"},{"key":"860_CR9","first-page":"90","volume-title":"Automatic query performance assessment during the retrieval of software artifacts","author":"S Haiduc","year":"2012","unstructured":"Haiduc S, Bavota G, Oliveto R, et al. Automatic query performance assessment during the retrieval of software artifacts. In: Proceedings of the 27th IEEE\/ACM International Conference on Automated Software Engineering, Essen, 2012. 90\u201399"},{"key":"860_CR10","first-page":"37","volume-title":"Combining formal concept analysis with information retrieval for concept location in source code","author":"D Poshyvanyk","year":"2007","unstructured":"Poshyvanyk D, Marcus A. Combining formal concept analysis with information retrieval for concept location in source code. In: Proceedings of the 15th International Conference on Program Comprehension, Banff, 2007. 37\u201348"},{"key":"860_CR11","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/52.469759","volume":"12","author":"P Kruchten","year":"1995","unstructured":"Kruchten P. The 4+ 1 view model of architecture. IEEE Softw, 1995, 12: 42\u201350","journal-title":"IEEE Softw"},{"key":"860_CR12","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1109\/32.917525","volume":"27","author":"G C Murphy","year":"2001","unstructured":"Murphy G C, Notkin D, Sullivan K J. Software reflexion models: bridging the gap between design and implementation. IEEE Trans Softw Eng, 2001, 27: 364\u2013380","journal-title":"IEEE Trans Softw Eng"},{"key":"860_CR13","doi-asserted-by":"crossref","first-page":"1383","DOI":"10.1007\/s10664-013-9285-5","volume":"19","author":"A D Lucia","year":"2014","unstructured":"Lucia A D, Penta M D, Oliveto R, et al. Labeling source code with information retrieval methods: an empirical study. Empir Softw Eng, 2014, 19: 1383\u20131420","journal-title":"Empir Softw Eng"},{"key":"860_CR14","first-page":"993","volume":"3","author":"D M Blei","year":"2003","unstructured":"Blei D M, Ng A Y, Jordan M I. Latent dirichlet allocation. J Mach Learn Res, 2003, 3: 993\u20131022","journal-title":"J Mach Learn Res"},{"key":"860_CR15","first-page":"39","volume-title":"Proceedings of the 23rd IEEE\/ACM International Conference on Automated Software Engineering","author":"A D Lucia","year":"2008","unstructured":"Lucia A D, Oliveto R, Tortora G. IR-based traceability recovery processes: an empirical comparison of \u201cone-shot\u201d and incremental processes. In: Proceedings of the 23rd IEEE\/ACM International Conference on Automated Software Engineering. Washington: IEEE Computer Society, 2008. 39\u201348"},{"key":"860_CR16","doi-asserted-by":"crossref","first-page":"664","DOI":"10.1016\/j.jss.2012.10.270","volume":"86","author":"X Peng","year":"2013","unstructured":"Peng X, Xing Z, Tan X, et al. Improving feature location using structural similarity and iterative graph mapping. J Syst Softw, 2013, 86: 664\u2013676","journal-title":"J Syst Softw"},{"key":"860_CR17","volume-title":"Modern Information Retrieval","author":"R Baeza-Yates","year":"1999","unstructured":"Baeza-Yates R, Ribeiro-Neto B. Modern Information Retrieval. 1st ed. New Jersey: Addison Wesley, 1999","edition":"1"},{"key":"860_CR18","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/TSE.2006.3","volume":"32","author":"J H Hayes","year":"2006","unstructured":"Hayes J H, Dekhtyar A, Sundaram S K. Advancing candidate link generation for requirements tracing: the study of methods. IEEE Trans Software Eng, 2006, 32: 4\u201319","journal-title":"IEEE Trans Software Eng"},{"key":"860_CR19","first-page":"213","volume-title":"An exploratory study of feature location process: distinct phases, recurring patterns, and elementary actions","author":"J Wang","year":"2011","unstructured":"Wang J, Peng X, Xing Z, et al. An exploratory study of feature location process: distinct phases, recurring patterns, and elementary actions. In: Proceedings of the IEEE 27th International Conference on Software Maintenance, Williamsburg, 2011. 213\u2013222"},{"key":"860_CR20","doi-asserted-by":"crossref","first-page":"1155","DOI":"10.1002\/spe.2346","volume":"46","author":"R Pawlak","year":"2015","unstructured":"Pawlak R, Monperrus M, Petitprez N, et al. Spoon: a library for implementing analyses and transformations of java source code. Softw Pract Exper, 2015, 46: 1155\u20131179","journal-title":"Softw Pract Exper"},{"key":"860_CR21","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1145\/1276933.1276934","volume":"16","author":"A D Lucia","year":"2007","unstructured":"Lucia A D, Fasano F, Oliveto R, et al. Recovering traceability links in software artifact management systems using information retrieval methods. ACM Trans Softw Eng Meth, 2007, 16: 13","journal-title":"ACM Trans Softw Eng Meth"},{"key":"860_CR22","first-page":"1","volume-title":"iFL: an interactive environment for understanding feature implementations","author":"S Hayashi","year":"2010","unstructured":"Hayashi S, Sekine K, Saeki M. iFL: an interactive environment for understanding feature implementations. In: Proceedings of the 26th IEEE International Conference on Software Maintenance, Timisoara, 2010. 1\u20135"},{"key":"860_CR23","first-page":"151","volume-title":"Rethinking user interfaces for feature location","author":"F Beck","year":"2015","unstructured":"Beck F, Dit B, Velasco-Madden J, et al. Rethinking user interfaces for feature location. In: Proceedings of the IEEE 23rd International Conference on Program Comprehension, Florence, 2015. 151\u2013162"},{"key":"860_CR24","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1016\/j.infsof.2006.10.017","volume":"49","author":"A Kuhn","year":"2007","unstructured":"Kuhn A, Ducasse S, G\u00eerba T. Semantic clustering: identifying topics in source code. Inform Softw Tech, 2007, 49: 230\u2013243","journal-title":"Inform Softw Tech"},{"key":"860_CR25","first-page":"223","volume-title":"Supporting program comprehension with source code summarization","author":"S Haiduc","year":"2010","unstructured":"Haiduc S, Aponte J, Marcus A. Supporting program comprehension with source code summarization. In: Proceedings of the 32nd ACM\/IEEE International Conference on Software Engineering, Cape Town, 2010. 223\u2013226"},{"key":"860_CR26","first-page":"7","volume-title":"Developers\u2019 code context models for change tasks","author":"T Fritz","year":"2014","unstructured":"Fritz T, Shepherd D C, Kevic K, et al. Developers\u2019 code context models for change tasks. In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, Hong Kong, 2014. 7\u201318"},{"key":"860_CR27","first-page":"14","volume-title":"Exploring the neighborhood with dora to expedite software maintenance","author":"E Hill","year":"2007","unstructured":"Hill E, Pollock L L, Vijay-Shanker K. Exploring the neighborhood with dora to expedite software maintenance. In: Proceedings of the 22nd IEEE\/ACM International Conference on Automated Software Engineering, Atlanta, 2007. 14\u201323"},{"key":"860_CR28","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/13487689.13487691","volume":"17","author":"M P Robillard","year":"2008","unstructured":"Robillard M P. Topology analysis of software dependencies. ACM Trans Softw Eng Meth, 2008, 17: 18","journal-title":"ACM Trans Softw Eng Meth"},{"key":"860_CR29","first-page":"457","volume-title":"Matching dependence-related queries in the system dependence graph","author":"X Wang","year":"2010","unstructured":"Wang X, Lo D, Cheng J, et al. Matching dependence-related queries in the system dependence graph. In: Proceedings of the 25th IEEE\/ACM International Conference on Automated Software Engineering, Antwerp, 2010. 457\u2013466"},{"key":"860_CR30","first-page":"111","volume-title":"Portfolio: finding relevant functions and their usage","author":"C McMillan","year":"2011","unstructured":"McMillan C, Grechanik M, Poshyvanyk D, et al. Portfolio: finding relevant functions and their usage. In: Proceedings of the 33rd International Conference on Software Engineering, Waikiki, 2011. 111\u2013120"},{"key":"860_CR31","first-page":"140","volume-title":"Exploring the use of concern element role information in feature location evaluation","author":"E Hill","year":"2015","unstructured":"Hill E, Shepherd D, Pollock L L. Exploring the use of concern element role information in feature location evaluation. In: Proceedings of the IEEE 23rd International Conference on Program Comprehension, Florence, 2015. 140\u2013150"},{"key":"860_CR32","first-page":"12","volume-title":"Proceedings of the 6th Working IEEE \/ IFIP Conference on Software Architecture","author":"J Knodel","year":"2007","unstructured":"Knodel J, Popescu D. A comparison of static architecture compliance checking approaches. In: Proceedings of the 6th Working IEEE \/ IFIP Conference on Software Architecture. Washington: IEEE Computer Society, 2007. 12"},{"key":"860_CR33","first-page":"297","volume-title":"An interactive change impact analysis based on an architectural reflexion model approach","author":"T Kim","year":"2010","unstructured":"Kim T, Kim K, Kim W. An interactive change impact analysis based on an architectural reflexion model approach. In: Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference. Washington: IEEE Computer Society, 2010. 297\u2013302"},{"key":"860_CR34","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1109\/2.607045","volume":"30","author":"G C Murphy","year":"1997","unstructured":"Murphy G C, Notkin D. Reengineering with reflexion models: a case study. IEEE Comput, 1997, 30: 29\u201336","journal-title":"IEEE Comput"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-015-0860-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-015-0860-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-015-0860-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T10:27:57Z","timestamp":1498386477000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-015-0860-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,10]]},"references-count":34,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2017,7]]}},"alternative-id":["860"],"URL":"https:\/\/doi.org\/10.1007\/s11432-015-0860-9","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,2,10]]},"article-number":"072102"}}