{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T10:40:55Z","timestamp":1770288055289,"version":"3.49.0"},"reference-count":77,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2014,12,1]],"date-time":"2014-12-01T00:00:00Z","timestamp":1417392000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"High Impact Research","award":["UM.C\/625\/1\/HIR\/MOHE\/FCSIT\/13"],"award-info":[{"award-number":["UM.C\/625\/1\/HIR\/MOHE\/FCSIT\/13"]}]},{"DOI":"10.13039\/501100003093","name":"Ministry of Education, Malaysia","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100003093","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100011915","name":"Taylor's University","doi-asserted-by":"crossref","award":["TRGS\/ERFS\/1\/2014\/SOCIT\/006"],"award-info":[{"award-number":["TRGS\/ERFS\/1\/2014\/SOCIT\/006"]}],"id":[{"id":"10.13039\/501100011915","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/tr.2014.2338254","type":"journal-article","created":{"date-parts":[[2014,7,23]],"date-time":"2014-07-23T20:10:04Z","timestamp":1406146204000},"page":"913-926","source":"Crossref","is-referenced-by-count":50,"title":["Achievements and Challenges in State-of-the-Art Software Traceability Between Test and Code Artifacts"],"prefix":"10.1109","volume":"63","author":[{"given":"Reza Meimandi","family":"Parizi","sequence":"first","affiliation":[]},{"given":"Sai Peck","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Dabbagh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2008.30"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1147\/sj.453.0515"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.03.012"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1142\/S021819401250009X"},{"key":"ref76","first-page":"1307","article-title":"Sufficient dimensionality reduction","volume":"3","author":"globerson","year":"2003","journal-title":"J Machine Learn Res"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1049\/ic.2012.0014"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2009.14"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/361219.361220"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2011.58"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/312624.312649"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2011.151"},{"key":"ref32","year":"2012","journal-title":"Center of Excellence for Software Traceability"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.10.019"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2005.78"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1987856.1987863"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2007.195"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806817"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.1994.292398"},{"key":"ref60","article-title":"Evaluating test-to-code traceability recovery methods through controlled experiments","author":"bavota","year":"2013","journal-title":"J Software Evolution and Process"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-010-9146-4"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(03)00242-5"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2009.07.009"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/EDOC.2006.45"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2003.1201194"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/242224.242420"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.23"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen:20070110"},{"key":"ref66","author":"paech","year":"2002","journal-title":"?A Survey on Tracing Approaches in Practice and Research ?"},{"key":"ref67","doi-asserted-by":"crossref","first-page":"482","DOI":"10.1109\/ICSM.2002.1167808","article-title":"Change-oriented requirements traceability. Support for evolution of embedded systems","author":"knethen","year":"2002","journal-title":"Proc Int Conf Software Maintenance"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ICSEA.2007.17"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/24.249582"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1002\/smr.319"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2012.2194195"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11334-011-0144-5"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1041053"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-009-0096-6"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1178051"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806855"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1276933.1276934"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"1619","DOI":"10.1007\/s10270-007-0066-8","article-title":"XTraQue: Traceability for product line systems","volume":"8","author":"jirapanthong","year":"2009","journal-title":"Software Syst Model"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2012.25"},{"key":"ref59","first-page":"14","article-title":"Why software requirements traceability remains a challenge","author":"kannenberg","year":"2009","journal-title":"Crosstalk J Defense Software Eng"},{"key":"ref58","first-page":"93","author":"pinheiro","year":"2003","journal-title":"Perspectives on Software Requirements"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9090-8"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/EDOC.2007.42"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(90)90094-3"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2011.59"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609581"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080773"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1007\/s10270-009-0145-0","article-title":"A survey of traceability in requirements engineering and model-driven development","volume":"9","author":"winkler","year":"2010","journal-title":"Software Syst Model"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/52.300100"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2006.13"},{"key":"ref12","first-page":"449","article-title":"A research agenda for software reliability","volume":"59","author":"ghazarian","year":"2010","journal-title":"IEEE Trans Rel IEEE Reliability Soc Technical Operations Annual Tech Rep 2010"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2002.801847"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2009.39"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2010.2057310"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2005.858099"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/24.55878"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TR.1983.5221656"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/24.974129"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2002.804489"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2013.2257051"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2009.2034292"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2007.895310"},{"key":"ref8","first-page":"223","article-title":"Improving automated documentation to code traceability by combining retrieval techniques","author":"chen","year":"2011","journal-title":"Proc 26th IEEE\/ACM Int Conf Automated Software Eng"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2008.08.026"},{"key":"ref49","first-page":"92","article-title":"Refactoring test code","author":"deursen","year":"2001","journal-title":"Proc 1st eXtreme Program Flexible Process Conf"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/290133.290149"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609581"},{"key":"ref45","author":"meszaros","year":"2007","journal-title":"xUnit Test Patterns Refactoring Test Code"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1979.234183"},{"key":"ref47","first-page":"51","article-title":"Test infected: Programmers love writing tests","volume":"7","author":"beck","year":"1998","journal-title":"Java Report"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73101-6_14"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2004.1281407"},{"key":"ref44","author":"fewster","year":"1999","journal-title":"Software Test Automation Effective use of test execution tools"},{"key":"ref43","author":"rompaey","year":"2009","journal-title":"Developer Testing as an Asset During Software Evolution A Series of Empirical Studies"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/6966834\/06862933.pdf?arnumber=6862933","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T15:59:23Z","timestamp":1642003163000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6862933\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":77,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tr.2014.2338254","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,12]]}}}