{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:44:36Z","timestamp":1773247476256,"version":"3.50.1"},"reference-count":73,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2016,3,1]],"date-time":"2016-03-01T00:00:00Z","timestamp":1456790400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/100000001","name":"US National Science Foundation","doi-asserted-by":"publisher","award":["CCF-0810924"],"award-info":[{"award-number":["CCF-0810924"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Research Experience for Undergraduates","award":["CCF 1341072"],"award-info":[{"award-number":["CCF 1341072"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2016,3,1]]},"DOI":"10.1109\/tse.2015.2479217","type":"journal-article","created":{"date-parts":[[2015,9,16]],"date-time":"2015-09-16T20:34:51Z","timestamp":1442435691000},"page":"205-220","source":"Crossref","is-referenced-by-count":65,"title":["Detecting, Tracing, and Monitoring Architectural Tactics in Code"],"prefix":"10.1109","volume":"42","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3470-6856","authenticated-orcid":false,"given":"Mehdi","family":"Mirakhorli","sequence":"first","affiliation":[]},{"given":"Jane","family":"Cleland-Huang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859046"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806825"},{"key":"ref71","article-title":"Software traceability with topic modeling","year":"0","journal-title":"Proc 32nd ACM\/IEEE Int Conf Softw Eng"},{"key":"ref70","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/TSE.2006.3","article-title":"Advancing candidate link generation for requirements tracing: The study of methods","volume":"32","year":"2006","journal-title":"IEEE Trans Softw Eng"},{"key":"ref39","first-page":"335","article-title":"A simple and fast and and effective rule learner","author":"cohen","year":"0","journal-title":"Proc 16th Amer Nat Conf Artif Intell"},{"key":"ref38","first-page":"148","article-title":"Experiments with a new boosting algorithm","author":"freund","year":"0","journal-title":"Proc 13th Int Conf Mach Learn"},{"key":"ref33","first-page":"137","article-title":"Text categorization with suport vector machines: Learning with many relevant features","author":"joachims","year":"0","journal-title":"Proc 10th Eur Conf Mach Learning"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-007-0045-1"},{"key":"ref31","article-title":"Preserving the quality of architectural decisions in source code","year":"0"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/MC.2007.195","article-title":"Best practices for automated traceability","volume":"40","year":"2007","journal-title":"Comput"},{"key":"ref37","year":"0","journal-title":"Technometrics"},{"key":"ref36","author":"quinlan","year":"1993","journal-title":"C4 5 Programs for Machine Learning"},{"key":"ref35","first-page":"45","article-title":"Support vector machine active learning with applications to text classification","volume":"2","author":"tong","year":"2002","journal-title":"J Mach Learn Res"},{"key":"ref34","first-page":"419","article-title":"Text classification using string kernels","volume":"2","author":"lodhi","year":"2002","journal-title":"J Mach Learn Res"},{"key":"ref60","year":"0","journal-title":"J Object Technol"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(01)00061-9"},{"key":"ref61","first-page":"575","article-title":"Evaluation of accuracy in design pattern occurrence detection","volume":"36","year":"0","journal-title":"IEEE Trans Softw Eng"},{"key":"ref63","article-title":"Evaluation of design pattern recovery tools","year":"0","journal-title":"Procedia CS"},{"key":"ref28","first-page":"1994","author":"gamma","year":"0","journal-title":"Design Patterns Elements of Reusable Object-Oriented Software"},{"key":"ref64","article-title":"Using code analysis tools for architectural conformance checking","year":"0","journal-title":"Proc 6th Int Workshop Sharing Reusing Archit Knowl"},{"key":"ref27","article-title":"A decision-centric approach for tracing reliability concerns in embedded software systems","author":"mirakhorli","year":"0","journal-title":"Proceedings of the Workshop on Embedded Software"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2002.1007967"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227154"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1041053"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2005.78"},{"key":"ref68","first-page":"1999","author":"baeza-yates","year":"0","journal-title":"Modern Information Retrieval"},{"key":"ref69","article-title":"Concept location using formal concept analysis and information retrieval","year":"2013","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"ref2","first-page":"2000","author":"bass","year":"0","journal-title":"Software Architecture in Practice"},{"key":"ref1","year":"0"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227153"},{"key":"ref22","year":"0","journal-title":"Microprocess Microsyst"},{"key":"ref21","year":"0"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.2514\/6.2008-7291"},{"key":"ref23","year":"0"},{"key":"ref26","year":"0","journal-title":"NASA Exploration Systems Architecture Study (ESAS) Final Report"},{"key":"ref25","article-title":"Crew exploration vehicle (CEV) reference guidance, navigation, and control (GN&C) architecture","author":"tamblyn","year":"0","journal-title":"Proc Annu AAS Guidance Contr Conf"},{"key":"ref50","article-title":"Bunch: A clustering tool for the recovery and maintenance of software system structures","year":"50","journal-title":"Proc IEEE Int Conf Softw Maintenance"},{"key":"ref51","article-title":"Evolutionary and collaborative software architecture recovery with softwarenaut","year":"0","journal-title":"Sci Comput Programm"},{"key":"ref59","doi-asserted-by":"crossref","first-page":"536","DOI":"10.1016\/j.jss.2007.08.025","article-title":"Documenting after the fact: Recovering architectural design decisions","volume":"81","year":"2008","journal-title":"J Syst Softw"},{"key":"ref58","article-title":"On bridging the gap between practice and vision for software architecture reconstruction and evolution: A toolbox perspective","year":"0","journal-title":"Proceedings of the WICSA\/ECSA Companion Volume"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2003.1235434"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35563-4_2"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1109\/32.917525","article-title":"Software reflexion models: Bridging the gap between design and implementation","volume":"27","year":"2001","journal-title":"IEEE Trans Softw Eng"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008781513258"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70732"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2465478.2465480"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/1163514.1178644","article-title":"A web-based tool for managing architectural design decisions","volume":"31","author":"capilla","year":"2006","journal-title":"SIGSOFT Softw Eng Notes"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SHARK-ADI.2007.1"},{"key":"ref40","first-page":"123","article-title":"Bagging predictors","volume":"24","year":"0","journal-title":"Mach Learn"},{"key":"ref12","year":"0","journal-title":"J Syst Softw"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985942"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WICSA.2005.61"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2009.52"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.21236\/ADA413701","article-title":"Deriving architectural tactics: A step toward methodical architectural design","author":"bachmann","year":"2003"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080779"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2661671"},{"key":"ref19","author":"hanmer","year":"2007","journal-title":"Patterns for Fault Tolerant Software"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1994.296790"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/141874.141884"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2539117"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-006-7738-4"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.05.004"},{"key":"ref7","year":"0","journal-title":"Journal Software Maintenance Evolution"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"573","DOI":"10.1109\/TSE.2009.19","article-title":"Software architecture reconstruction: A process-oriented taxonomy","volume":"35","year":"2009","journal-title":"IEEE Trans Softw Eng"},{"key":"ref9","first-page":"55","article-title":"An ontology of architectural design decisions","author":"kruchten","year":"0","journal-title":"Proc 2nd Groningen Workshop on Software Variability Management"},{"key":"ref46","first-page":"2006","author":"gorton","year":"0","journal-title":"Essential Software Architecture"},{"key":"ref45","first-page":"78","article-title":"Design rationale systems: Understanding the issues","volume":"12","year":"0","journal-title":"IEEE Expert"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-95888-8_6"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2491509.2491515"},{"key":"ref42","article-title":"Supporting event based traceability through high-level recognition of change events","year":"0","journal-title":"Proc 26th Annu Comput Softw Appl Conf"},{"key":"ref41","year":"0","journal-title":"Apache-Hadoop Design Documents"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.08.025"},{"key":"ref43","year":"0","journal-title":"Proc 5th Working IEEE\/IFIP Conf Softw Archit"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/7432057\/07270338.pdf?arnumber=7270338","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T02:34:42Z","timestamp":1633919682000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7270338\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,1]]},"references-count":73,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tse.2015.2479217","relation":{},"ISSN":["0098-5589","1939-3520"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,3,1]]}}}