{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T23:09:52Z","timestamp":1772492992346,"version":"3.50.1"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/re.2013.6636705","type":"proceedings-article","created":{"date-parts":[[2013,10,29]],"date-time":"2013-10-29T23:25:31Z","timestamp":1383089131000},"page":"52-61","source":"Crossref","is-referenced-by-count":28,"title":["Application of reinforcement learning to requirements engineering: requirements tracing"],"prefix":"10.1109","author":[{"given":"Hakim","family":"Sultanov","sequence":"first","affiliation":[]},{"given":"Jane Huffman","family":"Hayes","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"46","article-title":"Imp roving automated requirements trace retrieval: A study of term-based enhancement methods","volume":"15","author":"zou","year":"0","journal-title":"Emp Ir Software Eng"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/280765.280794"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/325737.325859"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806825"},{"key":"16","first-page":"203","article-title":"Detecting text similarity over short passages: Exploring linguistic feature combinations via machine learning","author":"hatzivassiloglou","year":"1999","journal-title":"Proceedings of the 1999 Joint SIGDAT Conference on Empirical Methods in Natural Language Processing and Very Large Corpora"},{"key":"13","author":"baeza-yates","year":"1999","journal-title":"Modern Information Retrieval"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100102"},{"key":"11","year":"0","journal-title":"CM-1 Project"},{"key":"12","first-page":"281","author":"dumais","year":"1988","journal-title":"Using Latent Semantic Analy Sis to Imp Rove Information Retrieval"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.10.023"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/s11334-007-0024-1"},{"key":"1","author":"ruhle","year":"0","journal-title":"Knight Trading Loss Said to Be Linked to Dormant Software"},{"key":"10","volume":"19","year":"2010","journal-title":"Pine Email System"},{"key":"7","author":"spanoudakis","year":"2003","journal-title":"Revising Rules to Capture Requirements Traceability Relations A Machine Learning Approach"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1049\/ip-sen:20030207"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227055"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806817"},{"key":"9","article-title":"Requirements tracing","volume":"41","author":"matthias","year":"1998","journal-title":"Communications of the ACM"},{"key":"8","author":"sutton","year":"1998","journal-title":"Reinforcement Learning An Introduction"}],"event":{"name":"2013 IEEE 21st International Requirements Engineering Conference (RE)","location":"Rio de Janeiro-RJ, Brazil","start":{"date-parts":[[2013,7,15]]},"end":{"date-parts":[[2013,7,19]]}},"container-title":["2013 21st IEEE International Requirements Engineering Conference (RE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6621629\/6636689\/06636705.pdf?arnumber=6636705","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T23:20:12Z","timestamp":1490224812000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6636705\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/re.2013.6636705","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}