{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T23:09:49Z","timestamp":1772492989316,"version":"3.50.1"},"reference-count":58,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/re.2013.6636703","type":"proceedings-article","created":{"date-parts":[[2013,10,29]],"date-time":"2013-10-29T23:25:31Z","timestamp":1383089131000},"page":"32-41","source":"Crossref","is-referenced-by-count":16,"title":["Supporting requirements traceability through refactoring"],"prefix":"10.1109","author":[{"given":"Anas","family":"Mahmoud","sequence":"first","affiliation":[]},{"given":"Nan","family":"Niu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"35","first-page":"44","article-title":"An empirical evaluation of refactoring","volume":"1","author":"wilking","year":"2007","journal-title":"e-Informatica Software Engineering Journal"},{"key":"36","first-page":"297","article-title":"Drivers for software refactoring decisions","author":"ma?ntyla?","year":"2006","journal-title":"International Symposium on Empirical Software Engineering"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1996.565012"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1145\/1767751.1767754"},{"key":"39","first-page":"313","author":"porter","year":"1997","journal-title":"Readings in Information Retrieval"},{"key":"37","year":"2013","journal-title":"Duplicated Code Detection Tool"},{"key":"38","author":"meneely","year":"2012","journal-title":"Trust Electronic Health Care System A Case Study"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809071"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-009-0096-6"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2012.6240487"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1145\/1987856.1987859"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.1265817"},{"key":"23","author":"fowler","year":"1999","journal-title":"Refactoring Improving the Design of Existing Code"},{"key":"24","first-page":"91","article-title":"Identifying refactoring opportunities using logic meta programming","author":"tourw'-rfeti","year":"2003","journal-title":"European Conference on Software Maintenance and Reengineering"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/ASWEC.2007.24"},{"key":"26","first-page":"140","article-title":"Towards an appropriate software refactoring tool support","author":"kati'c","year":"2009","journal-title":"WSEAS International Conference on Applied Computer Science"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1999.806964"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.5381\/jot.2012.11.2.a5"},{"key":"29","author":"gamma","year":"1995","journal-title":"Design Patterns Elements of Reusable Object-Oriented Software"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2006.28"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.1994.292398"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1142\/9789812775245_0014"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.1016"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/ISESE.2004.1334896"},{"key":"5","article-title":"Automatic change support based on a trace model","author":"von knethen","year":"2002","journal-title":"International Workshop on Traceability in Emerging Forms of Software Engineering"},{"key":"31","year":"2013","journal-title":"Bad Smell Identification for Software Refactoring"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.2002.1048538"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2007.195"},{"key":"8","first-page":"11","article-title":"Lessons learned from implementing requirements traceability","volume":"8","author":"ramesh","year":"1995","journal-title":"Crosstalk J of Defense Software Eng"},{"key":"58","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2012.6345841"},{"key":"57","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2012.6345840"},{"key":"56","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-010-9103-x"},{"key":"19","author":"opdyke","year":"1992","journal-title":"Refactoring Object-Oriented Frameworks Doctoral Thesis Department of Computer Science"},{"key":"55","doi-asserted-by":"publisher","DOI":"10.1109\/IWPSE.2004.1334766"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2006.32"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859046"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2009.5090042"},{"key":"16","article-title":"Assessing the relevance of identifier names in a legacy software system","author":"anquetil","year":"1998","journal-title":"Conference of the Centre for Advanced Studies on Collaborative research"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2011.6051655"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(79)90022-0"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2003.1201194"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1041053"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.114"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/32.895984"},{"key":"49","first-page":"81","article-title":"How clones are maintained: An empirical study","author":"aversano","year":"2010","journal-title":"European Conference on Software Maintenance and Reengineering"},{"key":"48","first-page":"95","article-title":"Recovering and using usecasediagramtosourcecode traceability links in joint meeting of the European software engineering conference and the","author":"grechanik","year":"2007","journal-title":"ACM SIGSOFT Symposium on the Foundations of Software Engineering"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-011-0121-4"},{"key":"44","first-page":"573","article-title":"A geometric interpretation of rprecision and its correlation with average precision in annual international","author":"aslam","year":"2005","journal-title":"ACM SIGIR Conference on Research and Development in Information Retrieval"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1007\/b97673"},{"key":"46","first-page":"1","article-title":"Statistical comparisons of classifiers over multiple data sets","volume":"7","author":"demsar","year":"2006","journal-title":"Journal of Machine Learning Research"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9090-8"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2003.1241364"},{"key":"52","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-28244-0"},{"key":"53","doi-asserted-by":"publisher","DOI":"10.1145\/1862372.1862387"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.1999.777754"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2007.03.009"}],"event":{"name":"2013 IEEE 21st International Requirements Engineering Conference (RE)","location":"Rio de Janeiro-RJ, Brazil","start":{"date-parts":[[2013,7,15]]},"end":{"date-parts":[[2013,7,19]]}},"container-title":["2013 21st IEEE International Requirements Engineering Conference (RE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6621629\/6636689\/06636703.pdf?arnumber=6636703","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T23:17:56Z","timestamp":1490224676000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6636703\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":58,"URL":"https:\/\/doi.org\/10.1109\/re.2013.6636703","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}