{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T21:52:06Z","timestamp":1757541126885,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,5]]},"DOI":"10.1109\/tefse.2009.5069582","type":"proceedings-article","created":{"date-parts":[[2009,6,10]],"date-time":"2009-06-10T16:24:19Z","timestamp":1244651059000},"page":"41-48","source":"Crossref","is-referenced-by-count":62,"title":["Combining textual and structural analysis of software artifacts for traceability link recovery"],"prefix":"10.1109","author":[{"given":"Collin","family":"McMillan","sequence":"first","affiliation":[]},{"given":"Denys","family":"Poshyvanyk","sequence":"additional","affiliation":[]},{"given":"Meghan","family":"Revelle","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2006.13"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1037\/\/0033-295X.104.2.211"},{"key":"18","first-page":"363","article-title":"poirot: a distributed tool supporting enterprise-wide automated traceability","author":"lin","year":"2006","journal-title":"Proc 14th IEEE RE'06"},{"key":"15","article-title":"incremental latent semantic indexing for effective, automatic traceability link evolution management","author":"jiang","year":"2008","journal-title":"Proc of 23rd IEEE\/ACM ASE'08"},{"key":"16","doi-asserted-by":"crossref","DOI":"10.1016\/j.infsof.2006.10.017","article-title":"semantic clustering: identifying topics in source code","volume":"49","author":"kuhn","year":"2007","journal-title":"Information and Software Technology"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.3"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321637"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321668"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2008.39"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194005002543"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2001.919085"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.1016"},{"key":"23","first-page":"27","article-title":"using traceability links to assess and maintain the quality of software documentation","author":"poshyvanyk","year":"2007","journal-title":"Proc of TEFSE'07"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2007.13"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2004.17"},{"key":"26","first-page":"11","article-title":"automatic generation of suggestions for program investigation","author":"robillard","year":"0","journal-title":"Proc of FSE'05"},{"journal-title":"Introduction to Modern Information Retrieval","year":"1983","author":"salton","key":"27"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/1218563.1218587"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/1131421.1131424"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2005.22"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2008.4658063"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1041053"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1276933.1276934"},{"key":"6","first-page":"307","article-title":"can information retrieval techniques effectively support traceability link recovery?","author":"de lucia","year":"0","journal-title":"ICPC '06"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2005.7"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2000.852498"},{"key":"9","first-page":"39","article-title":"ir-based traceability recovery processes: an empirical comparison of \"one-shot\" and incremental processes","author":"de lucia","year":"0","journal-title":"Proc of 23rd IEEE\/ACM ASE'08"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2006.32"}],"event":{"name":"2009 ICSE Workshop on Traceability in Emerging Forms of Software Engineering (TEFSE)","start":{"date-parts":[[2009,5,18]]},"location":"Vancouver, BC, Canada","end":{"date-parts":[[2009,5,18]]}},"container-title":["2009 ICSE Workshop on Traceability in Emerging Forms of Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5061468\/5069559\/05069582.pdf?arnumber=5069582","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T20:53:40Z","timestamp":1497819220000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5069582\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,5]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/tefse.2009.5069582","relation":{},"subject":[],"published":{"date-parts":[[2009,5]]}}}