{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T00:49:22Z","timestamp":1772930962115,"version":"3.50.1"},"reference-count":43,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/re.2014.6912255","type":"proceedings-article","created":{"date-parts":[[2014,9,30]],"date-time":"2014-09-30T20:37:18Z","timestamp":1412109438000},"page":"133-142","source":"Crossref","is-referenced-by-count":27,"title":["Traceability-enabled refactoring for managing just-in-time requirements"],"prefix":"10.1109","author":[{"given":"Nan","family":"Niu","sequence":"first","affiliation":[]},{"given":"Tanmay","family":"Bhowmik","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhendong","family":"Niu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393655"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2009.161"},{"key":"17","author":"beck","year":"1999","journal-title":"Extreme Programming Explained Embrace Change"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-013-9256-x"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/2501543.2501550"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2008.49"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1976.1674590"},{"key":"34","first-page":"1","article-title":"The case for case","author":"fillmore","year":"1968","journal-title":"Universals in Linguistic Theory"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1049\/ip-sen:20020202"},{"key":"39","first-page":"171","article-title":"Assessing the effect of requirements traceability for software maintenance","author":"m\ufffdder","year":"2012","journal-title":"ICSM"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2012.6345842"},{"key":"14","first-page":"222","article-title":"A review of traceability research at the requirements engineering conference","author":"nair","year":"2013","journal-title":"RE"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1002\/0471445428"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.4"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29044-2"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2012.31"},{"key":"21","author":"cusumano","year":"1998","journal-title":"Microsoft Secrets"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1002\/smr.521"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2013.6636703"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2002.1167824"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2012.6345809"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1232285"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.1994.292398"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.1996.491432"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.2003.1232745"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2010.34"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2012.6345841"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.3"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2010.20"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2012.6240487"},{"key":"3","author":"lee","year":"2002","journal-title":"Just-in-Time Requirements Analysis the Engine That Drives the Planning Game"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2013.6636716"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.41"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2007.54"},{"key":"30","article-title":"Recovering from a decade: A systematic mapping of information retrieval approaches to software traceability","author":"borg","year":"0","journal-title":"Empirical Software Engineering"},{"key":"7","author":"fowler","year":"1999","journal-title":"Refactoring Improving the Design of Existing Code"},{"key":"6","author":"opdyke","year":"1992","journal-title":"Refactoring Object-Oriented Frameworks"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2006.45"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2012.6345811"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-007-0045-1"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/EmpiRE.2012.6347678"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2008.123"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.1265817"}],"event":{"name":"2014 IEEE 22nd International Requirements Engineering Conference (RE)","location":"Karlskrona, Sweden","start":{"date-parts":[[2014,8,25]]},"end":{"date-parts":[[2014,8,29]]}},"container-title":["2014 IEEE 22nd International Requirements Engineering Conference (RE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6903646\/6912234\/06912255.pdf?arnumber=6912255","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T22:36:26Z","timestamp":1490308586000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6912255\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/re.2014.6912255","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}