{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T03:50:40Z","timestamp":1760586640681,"version":"3.28.0"},"reference-count":55,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1109\/re.2012.6345841","type":"proceedings-article","created":{"date-parts":[[2012,11,15]],"date-time":"2012-11-15T12:12:47Z","timestamp":1352981567000},"page":"71-80","source":"Crossref","is-referenced-by-count":49,"title":["The quest for Ubiquity: A roadmap for software and systems traceability research"],"prefix":"10.1109","author":[{"given":"O.","family":"Gotel","sequence":"first","affiliation":[]},{"given":"J.","family":"Cleland-Huang","sequence":"additional","affiliation":[]},{"given":"J. Huffman","family":"Hayes","sequence":"additional","affiliation":[]},{"given":"A.","family":"Zisman","sequence":"additional","affiliation":[]},{"given":"A.","family":"Egyed","sequence":"additional","affiliation":[]},{"given":"P.","family":"Grunbacher","sequence":"additional","affiliation":[]},{"given":"G.","family":"Antoniol","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2003.1201194"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/32.917525"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/TEFSE.2009.5069578"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2009.23"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2008.49"},{"journal-title":"Software Safety Standard NASA-STD-8719","year":"2004","key":"37"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2006.25"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1145\/290133.290147"},{"year":"0","key":"42"},{"journal-title":"Process-Centered Requirements Engineering","year":"1996","author":"pohl","key":"41"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2010.43"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.3"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/s11334-007-0024-1"},{"key":"24","first-page":"60","article-title":"A case study on value-based requirements tracing","author":"heindl","year":"2005","journal-title":"Proc 10th ESEC-FSE Lisbon Portugal"},{"key":"25","first-page":"1","article-title":"Risk reduction through requirements tracing","author":"huffman hayes","year":"1990","journal-title":"Proc Software Quality Week 1990"},{"key":"26","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1007\/s10270-007-0066-8","article-title":"XTraQue: Traceability for product line systems","volume":"8","author":"jirapanthong","year":"2009","journal-title":"Sw & Sys Modeling"},{"key":"27","first-page":"14","article-title":"Why software requirements traceability remains a challenge","author":"kannenberg","year":"2009","journal-title":"Crosstalk The Journal of Defense Software Engineering"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227244"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.20272"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2006.12"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2005.49"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1041053"},{"journal-title":"Value-Based Software Engineering","year":"2005","author":"biffl","key":"7"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2008.08.026"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2000.852489"},{"journal-title":"Software & Systems Requirements Engineering","year":"2009","author":"berenbach","key":"5"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100095"},{"key":"4","article-title":"Never 'without a trace': Practical advice on implementing traceability","author":"behrens","year":"2007","journal-title":"IBM developerWorks"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/32.83915"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-2239-5"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72988-4_21"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.1994.292398"},{"key":"55","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2006.66"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2010.34"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2007.16"},{"key":"15","article-title":"Rich traceability","author":"dick","year":"2002","journal-title":"Proc 6th Int TEFSE Wkshop"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101970"},{"key":"13","article-title":"Grand challenges, benchmarks, and tracelab: Developing infrastructure for the software traceability research community","author":"cleland-huang","year":"2011","journal-title":"Proc 6th Int TEFSE Wkshop"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1276933.1276934"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062525"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.2004.1335680"},{"key":"21","first-page":"343","author":"gotel","year":"0","journal-title":"The Grand Challenge of Traceability (v1 0)"},{"key":"20","first-page":"43","volume":"9","author":"gotel","year":"0","journal-title":"Acquiring Tool Support for Traceability"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(03)00242-5"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1142\/9789812775245_0014"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1109\/32.895989"},{"key":"44","first-page":"256","article-title":"Issues in the development of a requirements traceability model","author":"ramesh","year":"1993","journal-title":"Proc of the 2nd IEEE Int Symp on RE"},{"key":"47","first-page":"204","article-title":"Towards a methodology of computing system design","author":"randell","year":"1968","journal-title":"NATO Software Engineering Conference Report on A Conference Sponsored by The NATO Science Committee Garmisch Germany"},{"key":"46","first-page":"397","article-title":"Requirements traceability: Theory and practice","volume":"3","author":"ramesh","year":"1997","journal-title":"ser Ann"},{"journal-title":"Center of Excellence for Traceability Problem Statements and Grand Challenges (v0 1)","year":"2006","author":"cleland-huang","key":"10"},{"journal-title":"Final Guidance for Industry and FDA Staff","article-title":"General principles of software validation","year":"2002","key":"51"},{"key":"52","article-title":"Automatic change support based on a trace model","author":"von knethen","year":"2002","journal-title":"Proc 1st Int TEFSE Wkshop Edinburgh UK"},{"key":"53","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2003.1159025"},{"key":"54","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1007\/s10270-009-0145-0","article-title":"A survey of traceability in requirements engineering and model-driven development","volume":"9","author":"winkler","year":"2010","journal-title":"Sw and Sys Modeling"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-009-0096-6"}],"event":{"name":"2012 IEEE 20th International Requirements Engineering Conference (RE)","start":{"date-parts":[[2012,9,24]]},"location":"Chicago, IL, USA","end":{"date-parts":[[2012,9,28]]}},"container-title":["2012 20th IEEE International Requirements Engineering Conference (RE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6336974\/6345786\/06345841.pdf?arnumber=6345841","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T22:43:36Z","timestamp":1497998616000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6345841\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9]]},"references-count":55,"URL":"https:\/\/doi.org\/10.1109\/re.2012.6345841","relation":{},"subject":[],"published":{"date-parts":[[2012,9]]}}}