{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T09:16:09Z","timestamp":1775294169583,"version":"3.50.1"},"reference-count":41,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/icacci.2018.8554399","type":"proceedings-article","created":{"date-parts":[[2018,12,3]],"date-time":"2018-12-03T20:17:32Z","timestamp":1543868252000},"page":"1956-1962","source":"Crossref","is-referenced-by-count":12,"title":["Traceability Management with Impact Analysis in DevOps based Software Development"],"prefix":"10.1109","author":[{"given":"Iresha","family":"Rubasinghe","sequence":"first","affiliation":[]},{"given":"Dulani","family":"Meedeniya","sequence":"additional","affiliation":[]},{"given":"Indika","family":"Perera","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICIS.2018.8466414"},{"key":"ref38","year":"2017","journal-title":"ANTLR"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2009.5306277"},{"key":"ref32","first-page":"38","article-title":"An integrated, probabilistic framework for requirement change impact analysis","volume":"6","author":"lock","year":"2007","journal-title":"Australas J Inf Syst"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1996.565004"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1512475.1512493"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1057\/978-1-349-95121-5_2565-1"},{"key":"ref36","first-page":"344","author":"berg","year":"2012","journal-title":"Jenkins Continuous Integration Cookbook"},{"key":"ref35","first-page":"210","article-title":"Mining Software Repositories for Software Change Impact Analysis: A Case Study","author":"hattori","year":"2008","journal-title":"Proceedings of the 23rd Brazilian Symposium on Databases"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2008.25"},{"key":"ref10","first-page":"77","article-title":"Towards Traceability Management in Continuous Integration with SAT-Analyser","author":"rubasinghe","year":"2017","journal-title":"Proc 3rd ACM Int Conf on Communication and Information Processing"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.13001\/1081-3810.1185"},{"key":"ref11","year":"2017","journal-title":"IBM Rational DOORS"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2008.25"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405343"},{"key":"ref14","year":"2017","journal-title":"ReqView - Software and System Requirements Management Tool"},{"key":"ref15","year":"2017","journal-title":"ArchStudio - Getting Started - Easy Setup"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985898"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2006.16"},{"key":"ref18","author":"lee","year":"1998","journal-title":"Change Impact Analysis of Object-Oriented Software"},{"key":"ref19","first-page":"781","author":"zeugmann","year":"2017","journal-title":"Precision and Recall Encyclopedia of Machine Learning"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2003.1201210"},{"key":"ref4","first-page":"61","author":"cohn","year":"2010","journal-title":"Succeeding With Agile Software Development Using Scrum"},{"key":"ref27","year":"2017","journal-title":"The Open Graph Viz Platform"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2013.2286822"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICTER.2014.7083879"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/FOSM.2008.4659245"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MS.2014.58","article-title":"Continuous Integration and Its Tools","volume":"31","author":"meyer","year":"2014","journal-title":"IEEE Softw"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MERCon.2016.7480109"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MERCon.2015.7112366"},{"key":"ref2","first-page":"27","author":"sommerville","year":"2010","journal-title":"Software Engineering"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2016.66"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-2239-5"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.4135\/9781529682557","author":"scott","year":"2013","journal-title":"Social Network Analysis"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2015.08.003"},{"key":"ref21","author":"langville","year":"2012","journal-title":"Google's PageRank and Beyond"},{"key":"ref24","year":"2017","journal-title":"Distance de Jaro-Winkler"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.laa.2009.08.029"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3193092.3193094"},{"key":"ref26","year":"2017","journal-title":"Graph Visualization for Neo4j"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IC4.2015.7375698"}],"event":{"name":"2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","location":"Bangalore","start":{"date-parts":[[2018,9,19]]},"end":{"date-parts":[[2018,9,22]]}},"container-title":["2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8536361\/8554361\/08554399.pdf?arnumber=8554399","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T08:35:01Z","timestamp":1775291701000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8554399\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/icacci.2018.8554399","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}